Risky business

As the six case studies in this special report show, homeland security-related information technology projects come in many shapes and sizes. There are regional emergency alert networks, first responder communication systems, federal data-mining programs, law enforcement data-sharing systems and many more. The systems can involve one agency or multiple ones, focus on a single discipline or span several, and

use technologies that range from conventional to cutting-edge.

It is also true that not every IT project is a success, a fact often abundantly clear given the high visibility of most government programs and the extra scrutiny a nervous nation directs to homeland security initiatives in particular.

So what are the factors that determine whether a project succeeds or fails, and what are the best ways to manage those risks? The purpose of this special report is to address those questions by taking a closer look at the lessons learned in a handful of projects.

Featured

  • Defense
    The Pentagon (Photo by Ivan Cholakov / Shutterstock)

    DOD CIO hits pause on JEDI cloud acquisition

    Dana Deasy set cloud as his office's top priority. But when it comes to the JEDI request for proposal, he's directed staff to "pause" to compile a comprehensive review.

  • Cybersecurity
    By Gorodenkoff shutterstock ID 761940757

    Waging cyber war without a rulebook

    As the U.S. looks to go on the offense in the cyber domain, critical questions remain unanswered around who will take the lead and how clearly to draw the rules of engagement.

  • Government Innovation Awards
    Government Innovation Awards - https://governmentinnovationawards.com

    Deadline extended for Rising Star nominations

    You now have until July 18 to help us identify the early-career innovators and change agents in government IT.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.