FCW Insider

Blog archive

CIO and the power of the purse

We got word yesterday that DHS Secretary Michael Chertoff was going to make news at the Northern Virginia Technology Council breakfast this morning, and that he did.

"Later today, I am issuing a management directive to enhance the authority of CIO Scott Charbo," Chertoff said in a speech this morning.

This was something of the discussion at IPIC earlier this month. As we note in Circuit in the 3.19 issue, only two CIOs have the power of the purse: Bob Howard, the VA CIO, and now DHS CIO Scott Charbo.

The VA is being carefully watched, of course.

Bob Woods, president of Topside Consulting and a former VA IT official, speaking at IPIC, said, "VA will be judged pretty harshly if this model doesn't work, and they're going to have to work pretty hard at it."

But there is still something of a debate about where the bucks should stop. "We're going to see it play out in real life," said Karen Evans, the Office of Management and Budget's administrator for e-government and IT.

"When I was a CIO, I felt… there were certain corporate services that need to be owned by the CIO," she said, "but the applications should be owned by the program areas."

Pat Schambach, former CIO at the Transportation Security Administration and now the a senior vice president at Nortel, said that he created a governance framework so there was a process, but the applications were best left in the hands of the officials responsible for the task. "They know what [these systems] mean for them operationally," he said.

Woods argued that a CIO can get much more done with the power of the purse.

"You can get more done with a kind word and a gun then just a kind word," he said.

(Woods was a quote machine during that session.)

Posted by Christopher Dorobek on Mar 15, 2007 at 12:16 PM


  • Cybersecurity
    malware detection (Alexander Yakimov/Shutterstock.com)

    Microsoft targets copycat influence websites

    Microsoft went to court to take down websites it believes to be part of a foreign intelligence operation targeting conservative think tanks and the U.S. Senate.

  • Cybersecurity
    secure network

    FAA explores shifting its network to FISMA high

    The Federal Aviation Administration is exploring an upgrade to the information security categorization of IT systems as part of air traffic control modernization.

  • Cybersecurity
    Shutterstock photo id 669226093 By Gorodenkoff

    The disinformation game

    The federal government is poised to bring new tools and strategies to bear in the fight against foreign-backed online disinformation campaigns, but how and when they choose to act could have ramifications on the U.S. political ecosystem.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.