by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : January 2014
18 January 2014 FCW.COM across agencies but also allow users to respond and engage so they can receive better public services. Another innovation is the evolution of social media policies and performance analysis.That is happening as agencies better understand how social media and data can be used in their agency outside the traditional public affairs function. For example, of cials at the Centers for Disease Control and Preven- tion are holding a public competition on Challenge. gov for individuals to use data from social media to predict u outbreaks, information which can then be used to make response services more ef cient and effective. Social media for agencies will appear more diverse in 2014 as a result of advance- ments that tailor public services for customers. And thanks to policy enhance- ments, we'll more clearly see the positive impact on those services. ■ Scaling up shared services Scott Quehl The Accenture Federal Services executive and former Commerce Department chief nancial of cer says the old budget buckets will no longer apply "Strategy" and "ef ciency" are terms not often tied together, but times change. Budget pressures now are permanent, forcing govern- ment agencies to rethink day-to-day activities and long-term goals. Technol- ogy will thread throughout government performance to help address this new reality, reaching across agencies and to customers to transform service delivery. This is the year when shared services become essential. Managing cus- tomer cases collaboratively beyond agency boundar- ies simply offers more. The success of BusinessUSA, where the Internet connects companies to more than 1,000 programs and informa- tion sources at nine agencies, suggests digital govern- ment's promise. Paying for those changes will increasingly come from C-suite leaders rethinking existing budgets. Will $25 mil- lion in savings from consoli- dating 200 computer contracts be considered a technology initiative? An acquisition initia- tive? A budget initiative? Or a human resource initiative if savings ease furlough pres- sures and fund tools to make the most of employee talents? The answer is all of the above. There will also be funding from private partners ready to risk capital to share in sav- ings. Imagine an agency with multiple, antiquated email platforms. The CIO, with the support of agency leaders and the nancial and acquisi- tion community, could lead a single cloud-based email implementation across the enterprise. Ef ciencies would fund only half the migration, and the cloud provider would fund the balance, recover- ing its investment only when bill] gives DHS legal authority, and it provides continuity for a new adminis- tration with existing programs. It also helps the Hill because it strengthens their oversight authorities once they authorize programs." Until Congress works its way through the National Security Agency surveillance controversy, those mea- sures might be all that is politically feasible. Broader cybersecurity bills were stalled even before the Snowden scandal. Lawmakers hope a successful launch for the Cybersecurity Frame- work will spur legislative momentum, at least for the narrower bills. Beyond legislation, regulatory mea- sures could touch other areas related to cybersecurity at federal agencies, including IT security and cloud efforts spearheaded by the General Services Administration. "With respect to federal cybersecu- rity initiatives, I anticipate 2014 will be an important year for agencies, particularly GSA, to make signi cant progress in facilitating broad adop- tion of secure, FedRAMP-certified commercial cloud solutions across government," said Rep. Gerry Con- nolly (D-Va.). 3. Defending against evolving threats As fast as most organizations can build up defenses, an adversary is already finding a way through. That is the nature of today's cyber threat, and it will only expand in 2014 and beyond, according to experts. It is a concern compounded by the human element, long known as the weakest link in any organization's cybersecurity. Supply chain threats, credential hacking, accelerated malware, social engineering and the rise of mobile- borne cybersecurity threats are expect- ed to continue evolving in 2014. Gone are the days where Trojans and phish- ing scams were the biggest concerns, although those are still concerns. In the new era of cybersecurity, organizations face a much higher-level adversary. "In terms of how bad guys oper- ate, we're going to see hackers for hire," said Paul Kurtz, CyberPoint International's chief strategy of cer. "I'm not talking about Anonymous --- I'm talking about small, agile groups operating well below the radar screen. Whether they're hired by intelligence organizations, nation states or ter- 2014 outlook