CIO, CTO & CISO
CIO: Continuous Learning is Key to Digital Transformation. Lexmark CIO Brad Clay, who is upgrading everything from how Lexmark replenishes printer toner to how employees consume corporate information, says the company must learn fast and learn continuously. Read more
CTO: Open Source Software Can Be Profitable. Bikash Koley came to Juniper with a clear understanding of the power of open source software, from his years at Google as a senior network architect who helped drive things such as OpenConfig, getting the industry to rally around key standards for next-gen networks. As the CTO of Juniper Networks Inc., however, he is seeing the other side of open source and how it is transforming vendor business models. Read more
CISO: Former Air Force CISO Peter Kim Lands at Raytheon. Peter Kim, who left the Air Force in early June after serving as its chief information security officer, has been hired as director of IT security and governance at Raytheon subsidiary Raytheon Missile Systems. Read more
FEDERAL GOVERNMENT: Former Federal CIO Tony Scott’s Federal Foresight. Tony Scott was the Federal government’s third chief information officer, serving the nation in that role from 2015 through early 2017. During his time at the helm of government-wide IT, Scott led the development of 2016’s State of Federal IT Report, which left a lasting roadmap for modernization progress in the Federal government. Scott sat down with MeriTalk founder Steve O’Keeffe at MeriTalk’s 2018 Cloud Computing Brainstorm to discuss that progress and all the pieces in play in today’s Federal IT environment. Read more
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems June 2018 https://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-june-2018.
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.