by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : January 2014
January 2014 FCW.COM 15 the rst annual reviews and assessments by the Of ce of Management and Budget of agencies' progress toward their strategic goals, along with a governmentwide plan for cross-cutting, mission- related and mission-support priorities. 5.Tracking federal dollars OMB is working with agen- cies and outside stakehold- ers in a signi cant effort to improve federal spending transparency. Congress will also again take up the Digital Accountability and Transpar- ency Act. 6. Privacy The Obama administration will review and respond to recommendations from various internal and external groups as agencies continue to seek new ways to protect personal information. 7. Security beyond FISMA OMB's policy encourages agencies to move to the Continuous Diagnostics and Mitigation program and the Department of Homeland Security's CDM contract. Combined with the government's adoption of the National Institute of Standards and Technology's Cybersecurity Framework, we'll see a convergence that will make 2014 a year of signi cant change in federal cybersecurity. ■ The real open-gov opportunity Ben Balter The GitHub government evangelist and former Presidential Innovation Fellow says collaboration, not cost, could be the big win of 2014 Open-government efforts --- whether open data or open source --- are often a compelling avenue for agencies due to their cost- effectiveness and potential to produce higher-quality output when compared to their closed counterparts. Today, however, agencies are realizing with increasing frequency that open gov- ernment provides another, unparalleled advantage: collaboration. Whereas past collabora- It's the snowball of federal issues: Cybersecurity just keeps getting bigger as it rolls through government agen- cies, Capitol Hill and public awareness. An increasing focus on cybersecuri- ty in critical infrastructure, the momen- tum of a presidential deadline and ever higher stakes mean that cybersecurity will be bigger than ever in 2014. Countless areas under the broad heading of cybersecurity will make news and fuel the national dialogue in the coming year, ranging from how agencies reorganize --- or don't --- to address cyber threats to what is hap- pening with Bitcoin. But certain mat- ters will loom large in 2014. Mandated last February by Presi- dent Barack Obama, the forthcom- ing Cybersecurity Framework from the National Institute of Standards and Technology will provide a foun- dation for much of what happens in cybersecurity this year. Release of the nal version, due in February, will be a major event. But the framework will also underscore the importance of two other key areas: potential legislation and the continuously evolving threats it seeks to protect against. Although the executive and legis- lative branches are likely to remain consumed with disagreements over the size of government, the focus on cybersecurity will ensure that the framework, any legislation and the ght against cyber threats remain top priorities. "Cyberspace is one of those areas that will hold its own or maybe even grow a little bit," said Air Force CIO Lt. Gen. Michael Basla. "That's very hard to do because it's at the expense of other programs. Another billion dollars --- where is that going to come from? We've got to have those platforms to To meet an ever-changing threat, the United States needs to fundamentally shift the cybersecurity equation BY AMBER CORRIN R ITY