Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Incoming

Government Needs to Find Balance in Oversight

February 2009
By Christopher J. Dorobek

It has become a truism that the federal government is awash with waste, fraud and abuse. Over the years, that widely held belief has spurred the creation of an entire oversight industry. This includes the inspectors general, the so-called good-government groups, lawmakers on Capitol Hill and, of course, the news media.

The Wisdom of All of Us

January 2, 2009
By H. Mosher

Chris Dorobek, writing in this month's Incoming column, notes several examples of successful Gov 2.0 implementation in various agencies. He writes that the impending change in Washington's scenery and political tides may not be as nebulous as the rhetorical cry for "change" might imply:

Each inauguration brings about change. But this year, there is an almost palpable feeling that it is a time of change. For more than a year, the mantra on the presidential campaign has been change.

This is probably a good thing. Everyone should be concerned when the approval percentages for the president-and Congress-wallow in the 20s. People feel detached, almost alienated, from their government. What has not been fully defined is what change will mean once it makes its way through the Washington bureaucracy.

There are several reasons for hope, and President-elect Obama comes to Washington at a time when there are many somewhat paradoxical factors. The fact is these are unique times. It is the age of sometimes ruthless competition. We are all hyper-connected. We all feel that we are working 24/7 but that we should be working 25/8.

Competition is pressing the government as well. Agencies are not compared to other agencies, but increasingly, their successes-or failures-are compared to everybody else's. Some real opportunities ahead can alter the way the government has done business-and for the better.

Welcoming Christopher Dorobek to SIGNAL

January 2, 2009
By H. Mosher

SIGNAL Editor in Chief Robert K. Ackerman puts some perspective on the Incoming column in this month's "Behind the Lines":

Two years ago, we began a new column called Incoming. Located on the last page of the magazine and featured online each month as part of SIGNAL's blog, Incoming featured a guest columnist providing commentary on a wide range of SIGNAL coverage issues. The past year, the magazine and its readers were fortunate to have Lt. Gen. Harry D. Raduege Jr., USAF (Ret.), chairman of the Deloitte Center for Network Innovation, provide 12 months of his perspective on many of the pressing issues for the AFCEA community.

Our goal has been to rotate columnists with the dawn of each new year. So, with the January 2009 issue, we welcome SIGNAL's new Incoming contributing columnist. Many readers probably are familiar with Christopher Dorobek. A former editor in chief of Federal Computer Week, Chris now is a co-anchor on Federal News Radio 1500 AM's Daily Debrief with Chris Dorobek and Amy Morris in Washington, D.C. He also hosts his own blog, www.dorobekinsider.com.

Next up: Chris's first Incoming column!

Information Sharing Is Change We Really Can Believe In

January 2009
By Christopher J. Dorobek

January weather in Washington may be dark and dreary, but every four years, the city on the Potomac is filled with the hope and optimism that comes with another inauguration. This isn’t political; it is the sense of renewal. Thousands of new—or somewhat new—faces will come to town. But a certain amount of trepidation also comes with the unknown, particularly for career public servants who have to prove their value.

Evolving Cybersecurity Faces a New Dawn

December 2008
By Lt. Gen. Harry D. Raduege Jr., USAF (Ret.)

Over the last two years, we have been inundated with bad news about the state of cybersecurity. The list of concerns is growing and endless: rampant cybercrime, increasing identity theft, sophisticated social engineering techniques, relentless intrusions into government networks, and widespread vulnerabilities continuously exploited by a variety of entities ranging from criminal organizations and entrepreneurial hackers to well-resourced espionage actors. We also are facing the implications of cyberwarfare in light of last year’s cyber attacks against Estonia. In a recent speech on cybersecurity, U.S. Department of Homeland Security Secretary Michael Chertoff warned, “We’ve entered an era of new threats and vulnerabilities,” and the consequences of failure are exponentially greater.

Think Fast

November 3, 2008
By H. Mosher

"Significant change" is needed in how organizations approach questions of efficiency and effectiveness, writes Lt. Gen. Harry D. Raduege Jr., USAF (Ret.) in this month's Incoming column, Change Is a Requisite for the Future of Network-Centric Operations. Noting how businesses are embracing Internet-based Web services and social networking media, he makes a case for a culture of risk-taking and risk managment, and an ecosystem-like, nodal information structure to better achieve an interoperable information core and cut down on translation overhead. While he doesn't discount the security, privacy and intellectual property issues that will come up, he says that we're already well past anywhere we might have dreamed of just 10 years ago, and emphasizes that government must keep pace:

Continuous improvement in cybersecurity, situational awareness, decision making and response to events across all organizational venues is a national imperative and is being driven by speed. Technology is evolving at a rate that continues to leave behind those who lack the agility to accommodate its accelerating rate of change. Achieving this agility requires institutionalizing a culture of risk taking and risk management, along with streamlined acquisition processes.

The single enterprise concept or vertically oriented approach is not the answer. Power lies in shaping and advancing information and knowledge sharing as a global capability across all operational entities. This will create a competitive advantage that denies opportunities to adversaries and is capable of responding to their actions with speed, precision and measured effect. The resultant global adaptive network of networks eventually will challenge, if not render obsolete, present views on bandwidth limitations, information assurance, reliability and connectivity.

...

Change Is a Requisite for the Future of Network-Centric Operations

November 2008
By Lt. Gen. Harry D. Raduege Jr., USAF (Ret.)

Network-centric operations can improve the effectiveness and efficiency of any business operation. By employing the power of net centricity, the government, businesses and personal lives can be improved significantly. But, as with any endeavor, we must adopt new approaches even for network-centric operations.

The Risky World

October 9, 2008
By H. Mosher

Lt. Gen. Harry D. Raduege Jr., USAF (Ret.) posits some interesting questions in this month's incoming columns. Looking at the nature of enterprise risk, he wonders whether any of our readers have ever been notified that their personal data had been exposed:

I have ... and it is not a comforting feeling. It also makes you immediately question the care and practices of the organizations that solicited your trust in safeguarding your private information.

Today, we find a common thread in our net-centric world: Business opportunity and information dependence breed business risk. In particular, risk to security and privacy is present in huge doses every day. But how should we best manage the information risk coming through the door, over our firewall and through our software on a continual basis?

We all realize that the risk to our national security, business and personal data is growing. Our information networks and means of storage are increasingly vulnerable to attack and compromise. Is it any wonder that new terminology such as enterprise risk management (ERM), risk intelligence, risk assessments and business risk have become so common? Today's business environment is full of risk, whether it involves national security, intelligence gathering, transportation, operations, medical, logistics, sales or any other business activity.

You can read his entire article and suggestion for managing enterprise risk here, but in the meantime, you can comment on the issues he brings up right here on SIGNAL Scape. Have you had any experiences with your personal information being compromised? What do you think needs to be done to stop this from happening?

Managing Enterprise Risk in a Risky World

October 2008
By Lt. Gen. Harry D. Raduege Jr., USAF (Ret.)

Have you ever received notification from a government or industry office that your personal information may have been compromised or lost? I have—on both counts—and it is not a comforting feeling. It also makes you immediately question the care and practices of the organizations that solicited your trust in safeguarding your private information.

The CIO Question

September 7, 2008
By H. Mosher

In this month's Incoming column, Lt. Gen. Harry D. Raduege Jr., USAF (Ret.) poses questions about the nature of CIO positions-their lack of a typical specific qualification list or consistent job description, the trend in CIOs working on management degrees, their lack of strategic decision-making authority.

Pages

Subscribe to RSS - Incoming