Many agencies are hopping onto the bandwagon of RPA, the workhorse technology that automates repetitive and instruction-based tasks.
When you consider the law enforcement sector and how often cases span cities, counties and even state lines, it’s imperative that governments can coordinate and easily share information. A federated identity system could lay the groundwork for new systems that allow for these seamless connections.
Because the application became much more efficient, employee satisfaction increased significantly and citizens viewed the agency as more valuable.
During an interview with GovLoop, Rear Adm. Danelle Barrett described the Navy’s cybersecurity challenges while modernizing its networks.
Dempsey Hackett shared what other agencies can learn from the Defense Logistics Agency’s network modernization moves. DLA manages the global supply chain for the entire U.S. military.
Identity and access management (IAM) is not just about doing security to comply with government requirements. Instead, it’s a means to ensure the consistency and trustworthiness of government services, especially as digital options expand.
To date, there has been minimal focus and attention on addressing the largest culprit of poor acquisition outcomes: inadequate requirements definition.
The demand for digital products and services is creating more IT projects for federal, state and local agencies nationwide.
Several employees across different levels of government suggested one of those primary departments that proves to be a roadblock is IT.
The Trusted Internet Connections (TIC) program launched in 2007 to protect the security of federal network connections governmentwide.