CTO, CIO & CISO
CIO: Focus Needs to Shift from Cutting IT Costs. Put your own house in order before you start giving advice to others is a popular idiom. And CIOs have been doing that for years, incrementally cutting costs in IT functions. But what if the mandate from your CEO is for IT to help improve the performance of another department such as finance and accounting (F&A), for instance, but at the same time cut F&A costs by 60 percent? How can IT help that department? Read more
CTO: US CTO Megan Smith Highlights Heritage of Women in Tech. The former Googler and current chief technology officer of the United States also talks about encryption and bringing more techies to government. Read the rest
CISO: House Bill Would Elevate HHS CISO from CIO’s Purview. The HHS Data Protection Act would create a CISO’s office to alleviate concerns that the current organizational structure sacrifices security for operational efficiencies. Find out more
FEDERAL CIO: Hire Faster, from Every Discipline. The government needs to hire skilled cybersecurity professionals fast, starting with the federal chief information security officer, according to Federal CIO Tony Scott. “There’s no area combined with cybersecurity that I would say we’re full up on,” Scott said, adding that agencies need to broaden their reach. They should consider hiring people from a variety of disciplines — such as cultural anthropology, economics, biology and foreign languages — who also have cybersecurity knowledge. “Cyber is a global problem, and we need people who speak every language on the planet,” he said. Read more
BLUE MOUNTAIN DATA SYSTEMS MANAGEMENT: Find out more about Paul T. Vesely, Founder, President, CEO and Principal Architect of Blue Mountain Data Systems. Paul Vesely is a recognized leader in systems architecture, having designed and delivered many database and document processing systems ranging from work group LANs to enterprise-wide solutions. His goal is to minimize the impact of cultural change in organizations where myriad job functions of document management and workflow are affected. Read more about Paul Vesely’s experience.
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems April 2016 http://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-april-2016.
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.