Year Ahead

Chenok and Kamensky: Looking at the big picture

upward trend

This year promises to see significant activity across a range of management and technology issues. At the IBM Center for the Business of Government, we have noted a few that are likely to rise above others in terms of attention and potential impact:

1. Managing in the cloud. Now that the cloud-first policy and the Federal Risk and Authorization Management Program are maturing, agencies are likely to look for new opportunities to leverage cloud computing for a wider range of IT needs, including application development and service provision. Expect a wider discussion around standardization as open-cloud technologies advance.

2. IT reform. In light of recent high-profile technology implementations and the legislative focus from the House and Senate on IT management and acquisition, various government and industry players will identify potential paths forward. The key will be ensuring that any initiative addresses systemic challenges in managing complex technology projects that involve multiple elements if performance is to improve.

3. The Obama management agenda. The White House plans to release a four-pronged management reform agenda in early 2014 that focuses on economy, efficiency, effectiveness, and people and culture. 

4. Implementing the Government Results and Performance Act modernization. This 2010 law is scheduled to go into full implementation in 2014, with a refreshed set of agency strategic plans released in February followed by new annual performance plans and agency priority goals. 2014 will see the first annual reviews and assessments by the Office of Management and Budget of agencies' progress toward their strategic goals, along with a governmentwide plan for cross-cutting, mission-related and mission-support priorities.

5. Tracking federal dollars. OMB is working with agencies and outside stakeholders in a significant effort to improve federal spending transparency. Congress will also again take up the Digital Accountability and Transparency Act.

6. Privacy. The Obama administration will review and respond to recommendations from various internal and external groups as agencies continue to seek new ways to protect personal information.

7. Security beyond FISMA. OMB's policy encourages agencies to move to the Continuous Diagnostics and Mitigation program and the Department of Homeland Security's CDM contract. Combined with the government's adoption of the National Institute of Standards and Technology's cybersecurity framework, we’ll see a convergence that will make 2014 a year of significant change in federal cybersecurity.

About the Authors

Dan Chenok is executive director of the IBM Center for the Business of Government.

John M. Kamensky is a senior fellow at the IBM Center for the Business of Government and a fellow at the National Academy of Public Administration. He can be reached at john.kamensky@us.ibm.com.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group