Yearly Archives: 2012

Politics Destroys An Ethics Commission

After a two year investigation, hearing from twenty five witnesses and receiving 5,000 pages of evidence, a Special Grand Jury report in Suffolk County, New York concluded that a small but powerful group of Suffolk County Officials intentionally corrupted and undermined the county Ethics Commission. Some of the amazing findings of the Grand Jury include:Read… Read more »

Finding Enterprise Value, Part 3: Four Reasons Why Government Needs a Single Document Repository

This is the third blog in a series about the enterprise value of a simplified IT environment. In the first two parts, we discussed internal pressures and reasons for a single enterprise content management (ECM) solution. However, those aren’t the only reasons to optimize, consolidate and centralize. Your constituent service will improve, too! Think aboutRead… Read more »

Social Media Works When Combined with Awesome Attitude

This interview with Deloitte Australia’s CEO highlights the best use of social media – collaboration, communication, “flattening” the organization. I find it truly incredible how this CEO and company are able to do better for their customers and each other using social media (Yammer). Granted, every company and agency and culture is different/has it’s ownRead… Read more »

The High Costs of FISMA and Google Lobbying, and More

Today’s federal cybersecurity and information technology news: The the Federal Information Security Management Act (FISMA) of 2012 currently being debated in the House of Representatives would cost the federal government an estimated $710 million through 2017. More here. The hacktivist group UGNazi has taken the official CIA website offline with a Distributed Denial of ServiceRead… Read more »

All the groups are now open and active on TheIntelligenceCommunity.com Two new member added groups today!

All groups are now open and active on TheIntelligenceCommunity.com Two new member added groups today! These groups are great additions to our site and support our mission to support and serve the Intelligence & National Security Community. We look forward to the addition of future member created groups and are confident that these groups willRead… Read more »

2012 Digital Government Conference (dg.o 2012), June 4-7, 2012 at the University of Maryland, College Park

The 2012 Digital Government Conference (dg.o 2012) is taking place June 4-7, 2012 at the University of Maryland College Park (a few miles out of Washington, DC). Marking its 13th year, the conference brings together an international community of leading digital government researchers and practitioners to discuss such key topics as open data; open government;Read… Read more »

Social Media: Does the 24-Hour Response Rule Apply?

Last week, GovLoop member Julie Jenkins, a Communications Analyst with the Internal Revenue Service, posted a popular forum question in which she declared, “At some point we have to say, enough social media; time for real, live socializing,” and asked: “Where is your social media ceiling?” DorobekINSIDER host Chris Dorobek and I talked about theRead… Read more »

Learn Best Practices, Tips & Tricks at the Free Microsoft Virtual Summit

Register Today for the Free Microsoft Virtual Summit Over the last few months, the GovLoop community has had some great posts on innovation in government. Now is the time for innovation in government – with increasing budgetary constrains, growing fiscal austerity and the prospects of deep budget cuts, the public sector is called to findRead… Read more »

WayIn for Enterprise Security

Study after study refutes the myth that cybersecurity is compromised by malicious, brilliant hackers. Advanced persistent threats, state-sponsored hackers, and foreign intelligence agencies are serious threats, especially to major targets, but the vast majority of breaches and leaks result from the cyber equivalent of forgetting to lock your door or losing your wallet. Two recent,Read… Read more »