More agencies are adopting the agile work model, ushering in new levels of productivity. But do its core tenets mesh with a government that demands the utmost in security and compliance?
ALL INSIGHTS Report POSTS
The U.S. Intelligence Community (IC) is seeking to achieve greater effectiveness by implementing the IC Information Technology Enterprise (IC ITE), a platform dedicated to streamlining information sharing across agencies. Government Business Council took a closer look at the perspectives of government leaders from the intelligence community.
With a slew of tech-savvy stars joining the public sector ranks, the federal government looks poised to unleash a transformational era in digital services for its citizens.
Hillary Clinton has a slight lead over Donald Trump among federal employees, according to an independent Government Business Council / Government Executive poll released on July 18, 2016.
As government organizations work to devise robust defensive strategies, it is critical that they take into account the role of the workforce in making or breaking cybersecurity measures.
In order to keep pace with citizen demands, state and local governments must maintain a powerful online presence capable of delivering relevant, personalized information and services.
Government contractors are actively seeking ways to maintain their competitive edge in a volatile federal marketplace, and the result has been a surge in mergers and acquisitions across the government services sector. GBC's exclusive flash poll series takes a closer look at federal perspectives on industry consolidation.
Federal leaders are striving to balance operational effectiveness and security by transitioning to an “Identity Ecosystem” – an online environment designed to enhance government-wide identity and access management (IAM). In an effort to learn more about the current state of federal IAM, GBC undertook an in-depth research study as a follow-up to a previous December 2013 survey.
In today’s complex, unpredictable threat environment, resilient incident detection and response initiatives are paramount.
When it comes to state and local cyber breaches, the biggest threats may come from the inside.