SlideShare a Scribd company logo
1 of 10
Download to read offline
5 Steps to Government
IT Modernization
Mike Younkers
Sr. Director, U.S. Public Sector
Systems Engineering,
Cisco
@MichaelYounkers
P resented by
5 Steps to Government IT Modernization
WHY MODERNIZE?
WHY MODERNIZE? | STEP 1 | STEP 2 | STEP 3 | STEP 4 | STEP 5
IT modernization is intimidating,
but it’s necessary. What are the
advantages of modernization?
Enhance citizen
experience and
service delivery
Lower cost and
greater efficiency
Future-proof
your agency
by planning for
technology advances
Reduce demands on
your own IT shop by
moving systems to
the cloud
Improve security
and eliminate
vulnerabilities
inherent to legacy
systems
Take advantage
of the
opportunity
to leverage the
latest technologies
Develop a plan
Using an architectural approach, plot out the systems, processes and job categories that you need
to modernize. Prioritize them so that you can tackle them in manageable increments.
1. Assess and inventory your IT systems; identify those that need to be replaced
2. Remember to consider licensing expenses and whether a product is still inside a support
window in deciding which to update.
3. Now is the perfect time to consider your business processes. Modernization is not just swapping
out a legacy system for a new one, but rethinking what systems you actually need. If there are
changes that can streamline and accelerate the processes that your IT systems support, now is the
time to plan them.
4. Further, if the mission of your agency has evolved recently, you might find that a different
technology approach will serve the new priorities better.
5. Adopt a change-management approach and strive for full transparency so that your agency
leaders and overseers understand what you are doing.
Get leadership buy-in
You must have agency leaders, all the way to the top, fully behind your plan. They control
funding and set internal priorities.
Put cybersecurity first at every step
Build it into systems and keep it at the forefront of planning. Nothing is more important
than protecting national security secrets and personal information of those who interact
with your agency.
STEP 1: PRELIMINARIES
WHY MODERNIZE? | STEP 1 | STEP 2 | STEP 3 | STEP 4 | STEP 5
Replacing older switches and routers with
new, smart, intuitive versions immediately
multiplies security, speed and efficiency to
make other steps in modernization easier.
What does a digital ready
network entail?
The network is the backbone of
everything you do in IT. It should usually
be the first thing you modernize.
Automation
Analytics Open APIs
Mobility
SDN
IoT
Cloud
Policy
Security
Virtualization
Bringing disparate network trends and innovations
together to support digital era needs.
STEP 2: START WITH THE NETWORK
WHY MODERNIZE? | STEP 1 | STEP 2 | STEP 3 | STEP 4 | STEP 5
Switches based on a Digital Network
Architecture with Software Defined access
turn a network from simple connectivity to
a platform for delivering services.
The benefits of a Software
Defined Network
Many things that used to be hardware based
are controlled by software now.
A Software Defined Network (SDN), for
example, reduces agency costs through
policy-enabled workflow automation.
Centralized Network
Provisioning
Enhanced
Security
Reduced
Operating
Costs
Augmented
Automation
Comprehensive
Infrastructure
Management
Reduced Hardware
Management & Costs
Cloud-ready
Infrastructure
STEP 3: LEVERAGE SOFTWARE AND SERVICES
WHY MODERNIZE? | STEP 1 | STEP 2 | STEP 3 | STEP 4 | STEP 5
The cloud enables modernization without the need
to “rip and replace” on-premise systems. In many
cases, you can replicate and even enhance the
functionality of a legacy system by subscribing
to it as a service via the cloud.
Integrate the cloud into your migration plans. Hybrid
cloud systems can blend the best of both worlds.
The cloud offers a secure environment and
compliance with the Federal Risk Authorization and
Management Program (FedRAMP) assures a cloud
offering meets federal requirements.
STEP 4: INTO THE CLOUD
WHY MODERNIZE? | STEP 1 | STEP 2 | STEP 3 | STEP 4 | STEP 5
Together, these technologies empower the advanced and agile security features needed to protect
against today’s threats. By increasing visibility across your entire network and using a network-as-sensor
approach, you can block malware before it enters your network, detect malicious code hiding in encrypted data
and even analyze data to better understand threats and improve future defenses.
NGFW/
NGIPS
Advanced
Malware
Policy &
Access
Email
UTM Network Analytics
Secure Internet
Gateway
Web
STEP 5: SECURITY FROM CORE TO EDGE
WHY MODERNIZE? | STEP 1 | STEP 2 | STEP 3 | STEP 4 | STEP 5
For more information, please
visit: cisco.com/go/federal
Mike Younkers
Director, Systems Engineering
Cisco Public Sector
703-484-5452
@MichaelYounkers
myounker@cisco.com
© 2018 Cisco Systems, Inc. All rights reserved.

More Related Content

What's hot

Why Cloud needs to be seen beyond it's cost advantages.
Why Cloud needs to be seen beyond it's cost advantages. Why Cloud needs to be seen beyond it's cost advantages.
Why Cloud needs to be seen beyond it's cost advantages. CMS IT SERVICES (Admin)
 
Redefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceRedefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceCitrix
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentationVincent Kwon
 
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New HeightsNetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New HeightsePlus
 
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicCitrix
 
F5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaS
F5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaSF5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaS
F5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaSF5 Networks
 
[Event] Digital transformation : How it affects us - PRESENTATION POST LUXEMB...
[Event] Digital transformation : How it affects us - PRESENTATION POST LUXEMB...[Event] Digital transformation : How it affects us - PRESENTATION POST LUXEMB...
[Event] Digital transformation : How it affects us - PRESENTATION POST LUXEMB...POST Telecom for Business
 
ePlus Intelligent Branch
ePlus Intelligent BranchePlus Intelligent Branch
ePlus Intelligent BranchePlus
 
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix
 
Hybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyHybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyOneNeck
 
[INFOGRAPHIC] Top Use Cases for Citrix XenApp
[INFOGRAPHIC] Top Use Cases for Citrix XenApp[INFOGRAPHIC] Top Use Cases for Citrix XenApp
[INFOGRAPHIC] Top Use Cases for Citrix XenAppCitrix
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapCitrix
 
Meet Secure Messaging
Meet Secure MessagingMeet Secure Messaging
Meet Secure MessagingRapidScale
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at EdgeDell EMC World
 
The Top Three Cloud Security Mythbusters
The Top Three Cloud Security MythbustersThe Top Three Cloud Security Mythbusters
The Top Three Cloud Security MythbustersTrustmarque
 
7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]Citrix
 
Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...Itential
 

What's hot (20)

Why Cloud needs to be seen beyond it's cost advantages.
Why Cloud needs to be seen beyond it's cost advantages. Why Cloud needs to be seen beyond it's cost advantages.
Why Cloud needs to be seen beyond it's cost advantages.
 
Redefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceRedefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer Experience
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
 
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New HeightsNetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
 
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data Infographic
 
F5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaS
F5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaSF5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaS
F5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaS
 
[Event] Digital transformation : How it affects us - PRESENTATION POST LUXEMB...
[Event] Digital transformation : How it affects us - PRESENTATION POST LUXEMB...[Event] Digital transformation : How it affects us - PRESENTATION POST LUXEMB...
[Event] Digital transformation : How it affects us - PRESENTATION POST LUXEMB...
 
ePlus Intelligent Branch
ePlus Intelligent BranchePlus Intelligent Branch
ePlus Intelligent Branch
 
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
 
Hybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyHybrid IT – A Winning Strategy
Hybrid IT – A Winning Strategy
 
Cloud Adoption Trends
Cloud Adoption TrendsCloud Adoption Trends
Cloud Adoption Trends
 
[INFOGRAPHIC] Top Use Cases for Citrix XenApp
[INFOGRAPHIC] Top Use Cases for Citrix XenApp[INFOGRAPHIC] Top Use Cases for Citrix XenApp
[INFOGRAPHIC] Top Use Cases for Citrix XenApp
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
Meet Secure Messaging
Meet Secure MessagingMeet Secure Messaging
Meet Secure Messaging
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
 
The Top Three Cloud Security Mythbusters
The Top Three Cloud Security MythbustersThe Top Three Cloud Security Mythbusters
The Top Three Cloud Security Mythbusters
 
7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]
 
Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...
 

Similar to 5 Steps to Gov IT Modernization

How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks Abaram Network Solutions
 
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Dell World
 
10603_EBK_Observability_Challenges.pdf
10603_EBK_Observability_Challenges.pdf10603_EBK_Observability_Challenges.pdf
10603_EBK_Observability_Challenges.pdfJuanPabloTasayco2
 
Cloud Applications Management Nirvana
Cloud Applications Management NirvanaCloud Applications Management Nirvana
Cloud Applications Management NirvanaSeema Jethani
 
Five keys to successful cloud migration
Five keys to successful cloud migrationFive keys to successful cloud migration
Five keys to successful cloud migrationIBM
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Zeeve
 
How Can Your Organization Benefit From Application Modernization_.pdf
How Can Your Organization Benefit From Application Modernization_.pdfHow Can Your Organization Benefit From Application Modernization_.pdf
How Can Your Organization Benefit From Application Modernization_.pdfAnil
 
Mastering Enterprise Networking: Components, Strategies, and Trends | Enterp...
Mastering Enterprise Networking: Components, Strategies, and Trends  | Enterp...Mastering Enterprise Networking: Components, Strategies, and Trends  | Enterp...
Mastering Enterprise Networking: Components, Strategies, and Trends | Enterp...Enterprise Wired
 
Culture Is More Important Than Competence In IT.pptx
Culture Is More Important Than Competence In IT.pptxCulture Is More Important Than Competence In IT.pptx
Culture Is More Important Than Competence In IT.pptxmushrunayasmin
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...NetworkCollaborators
 
Culture is more important than competence in IT outsourcing
Culture is more important than competence in IT outsourcingCulture is more important than competence in IT outsourcing
Culture is more important than competence in IT outsourcingBJIT Ltd
 
How to modernize legacy application infrastructure?
How to modernize legacy application infrastructure?How to modernize legacy application infrastructure?
How to modernize legacy application infrastructure?Cygnet Infotech
 
5 Ways to Reduce Costs While Modernizing Your Infrastructure
5 Ways to Reduce Costs While Modernizing Your Infrastructure5 Ways to Reduce Costs While Modernizing Your Infrastructure
5 Ways to Reduce Costs While Modernizing Your InfrastructureITOutcomes
 
End to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpsEnd to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpseG Innovations
 
Application Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the CloudApplication Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the CloudSkytap Cloud
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryQuest
 
Virtual security is no less real
Virtual security is no less realVirtual security is no less real
Virtual security is no less realguest24ab95c
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guideYury Chemerkin
 

Similar to 5 Steps to Gov IT Modernization (20)

How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
 
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
 
10603_EBK_Observability_Challenges.pdf
10603_EBK_Observability_Challenges.pdf10603_EBK_Observability_Challenges.pdf
10603_EBK_Observability_Challenges.pdf
 
Cloud Applications Management Nirvana
Cloud Applications Management NirvanaCloud Applications Management Nirvana
Cloud Applications Management Nirvana
 
Five keys to successful cloud migration
Five keys to successful cloud migrationFive keys to successful cloud migration
Five keys to successful cloud migration
 
How to Overcome the Challenges of Cloud Application
How to Overcome the Challenges of Cloud ApplicationHow to Overcome the Challenges of Cloud Application
How to Overcome the Challenges of Cloud Application
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
 
How Can Your Organization Benefit From Application Modernization_.pdf
How Can Your Organization Benefit From Application Modernization_.pdfHow Can Your Organization Benefit From Application Modernization_.pdf
How Can Your Organization Benefit From Application Modernization_.pdf
 
Mastering Enterprise Networking: Components, Strategies, and Trends | Enterp...
Mastering Enterprise Networking: Components, Strategies, and Trends  | Enterp...Mastering Enterprise Networking: Components, Strategies, and Trends  | Enterp...
Mastering Enterprise Networking: Components, Strategies, and Trends | Enterp...
 
Culture Is More Important Than Competence In IT.pptx
Culture Is More Important Than Competence In IT.pptxCulture Is More Important Than Competence In IT.pptx
Culture Is More Important Than Competence In IT.pptx
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
Culture is more important than competence in IT outsourcing
Culture is more important than competence in IT outsourcingCulture is more important than competence in IT outsourcing
Culture is more important than competence in IT outsourcing
 
How to modernize legacy application infrastructure?
How to modernize legacy application infrastructure?How to modernize legacy application infrastructure?
How to modernize legacy application infrastructure?
 
5 Ways to Reduce Costs While Modernizing Your Infrastructure
5 Ways to Reduce Costs While Modernizing Your Infrastructure5 Ways to Reduce Costs While Modernizing Your Infrastructure
5 Ways to Reduce Costs While Modernizing Your Infrastructure
 
End to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpsEnd to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOps
 
Application Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the CloudApplication Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 
Virtual security is no less real
Virtual security is no less realVirtual security is no less real
Virtual security is no less real
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 

More from scoopnewsgroup

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMAscoopnewsgroup
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choicescoopnewsgroup
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernizationscoopnewsgroup
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Securescoopnewsgroup
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecturescoopnewsgroup
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformationscoopnewsgroup
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?scoopnewsgroup
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problemsscoopnewsgroup
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trustscoopnewsgroup
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happyscoopnewsgroup
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linuxscoopnewsgroup
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Agescoopnewsgroup
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Governmentscoopnewsgroup
 
DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factoryscoopnewsgroup
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Rangescoopnewsgroup
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurityscoopnewsgroup
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summitscoopnewsgroup
 

More from scoopnewsgroup (20)

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMA
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choice
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernization
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecture
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformation
 
IC Fireside Chat
IC Fireside ChatIC Fireside Chat
IC Fireside Chat
 
The Edge to AI
The Edge to AIThe Edge to AI
The Edge to AI
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happy
 
Opening Remarks
Opening RemarksOpening Remarks
Opening Remarks
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linux
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Age
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Government
 
DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factory
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit
 

Recently uploaded

Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfMonastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfCharlynTorres1
 
Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Sonam Pathan
 
Start Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleStart Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleSERUDS INDIA
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...narwatsonia7
 
call girls in sector 22 Gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in sector 22 Gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in sector 22 Gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in sector 22 Gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhellokittymaearciaga
 
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...saminamagar
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Servicenarwatsonia7
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Christina Parmionova
 
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...ankitnayak356677
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationEnergy for One World
 
productionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxproductionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxHenryBriggs2
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...narwatsonia7
 
Earth Day 2024 - AMC "COMMON GROUND'' movie night.
Earth Day 2024 - AMC "COMMON GROUND'' movie night.Earth Day 2024 - AMC "COMMON GROUND'' movie night.
Earth Day 2024 - AMC "COMMON GROUND'' movie night.Christina Parmionova
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...ResolutionFoundation
 
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...Christina Parmionova
 
13875446-Ballistic Missile Trajectories.ppt
13875446-Ballistic Missile Trajectories.ppt13875446-Ballistic Missile Trajectories.ppt
13875446-Ballistic Missile Trajectories.pptsilvialandin2
 

Recently uploaded (20)

Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfMonastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
 
Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170
 
Start Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleStart Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor People
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
 
call girls in sector 22 Gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in sector 22 Gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in sector 22 Gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in sector 22 Gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptx
 
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.
 
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological Civilization
 
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
 
productionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxproductionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptx
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
 
Earth Day 2024 - AMC "COMMON GROUND'' movie night.
Earth Day 2024 - AMC "COMMON GROUND'' movie night.Earth Day 2024 - AMC "COMMON GROUND'' movie night.
Earth Day 2024 - AMC "COMMON GROUND'' movie night.
 
Model Town (Delhi) 9953330565 Escorts, Call Girls Services
Model Town (Delhi)  9953330565 Escorts, Call Girls ServicesModel Town (Delhi)  9953330565 Escorts, Call Girls Services
Model Town (Delhi) 9953330565 Escorts, Call Girls Services
 
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...
 
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
 
13875446-Ballistic Missile Trajectories.ppt
13875446-Ballistic Missile Trajectories.ppt13875446-Ballistic Missile Trajectories.ppt
13875446-Ballistic Missile Trajectories.ppt
 

5 Steps to Gov IT Modernization

  • 1.
  • 2. 5 Steps to Government IT Modernization Mike Younkers Sr. Director, U.S. Public Sector Systems Engineering, Cisco @MichaelYounkers P resented by
  • 3. 5 Steps to Government IT Modernization
  • 4. WHY MODERNIZE? WHY MODERNIZE? | STEP 1 | STEP 2 | STEP 3 | STEP 4 | STEP 5 IT modernization is intimidating, but it’s necessary. What are the advantages of modernization? Enhance citizen experience and service delivery Lower cost and greater efficiency Future-proof your agency by planning for technology advances Reduce demands on your own IT shop by moving systems to the cloud Improve security and eliminate vulnerabilities inherent to legacy systems Take advantage of the opportunity to leverage the latest technologies
  • 5. Develop a plan Using an architectural approach, plot out the systems, processes and job categories that you need to modernize. Prioritize them so that you can tackle them in manageable increments. 1. Assess and inventory your IT systems; identify those that need to be replaced 2. Remember to consider licensing expenses and whether a product is still inside a support window in deciding which to update. 3. Now is the perfect time to consider your business processes. Modernization is not just swapping out a legacy system for a new one, but rethinking what systems you actually need. If there are changes that can streamline and accelerate the processes that your IT systems support, now is the time to plan them. 4. Further, if the mission of your agency has evolved recently, you might find that a different technology approach will serve the new priorities better. 5. Adopt a change-management approach and strive for full transparency so that your agency leaders and overseers understand what you are doing. Get leadership buy-in You must have agency leaders, all the way to the top, fully behind your plan. They control funding and set internal priorities. Put cybersecurity first at every step Build it into systems and keep it at the forefront of planning. Nothing is more important than protecting national security secrets and personal information of those who interact with your agency. STEP 1: PRELIMINARIES WHY MODERNIZE? | STEP 1 | STEP 2 | STEP 3 | STEP 4 | STEP 5
  • 6. Replacing older switches and routers with new, smart, intuitive versions immediately multiplies security, speed and efficiency to make other steps in modernization easier. What does a digital ready network entail? The network is the backbone of everything you do in IT. It should usually be the first thing you modernize. Automation Analytics Open APIs Mobility SDN IoT Cloud Policy Security Virtualization Bringing disparate network trends and innovations together to support digital era needs. STEP 2: START WITH THE NETWORK WHY MODERNIZE? | STEP 1 | STEP 2 | STEP 3 | STEP 4 | STEP 5
  • 7. Switches based on a Digital Network Architecture with Software Defined access turn a network from simple connectivity to a platform for delivering services. The benefits of a Software Defined Network Many things that used to be hardware based are controlled by software now. A Software Defined Network (SDN), for example, reduces agency costs through policy-enabled workflow automation. Centralized Network Provisioning Enhanced Security Reduced Operating Costs Augmented Automation Comprehensive Infrastructure Management Reduced Hardware Management & Costs Cloud-ready Infrastructure STEP 3: LEVERAGE SOFTWARE AND SERVICES WHY MODERNIZE? | STEP 1 | STEP 2 | STEP 3 | STEP 4 | STEP 5
  • 8. The cloud enables modernization without the need to “rip and replace” on-premise systems. In many cases, you can replicate and even enhance the functionality of a legacy system by subscribing to it as a service via the cloud. Integrate the cloud into your migration plans. Hybrid cloud systems can blend the best of both worlds. The cloud offers a secure environment and compliance with the Federal Risk Authorization and Management Program (FedRAMP) assures a cloud offering meets federal requirements. STEP 4: INTO THE CLOUD WHY MODERNIZE? | STEP 1 | STEP 2 | STEP 3 | STEP 4 | STEP 5
  • 9. Together, these technologies empower the advanced and agile security features needed to protect against today’s threats. By increasing visibility across your entire network and using a network-as-sensor approach, you can block malware before it enters your network, detect malicious code hiding in encrypted data and even analyze data to better understand threats and improve future defenses. NGFW/ NGIPS Advanced Malware Policy & Access Email UTM Network Analytics Secure Internet Gateway Web STEP 5: SECURITY FROM CORE TO EDGE WHY MODERNIZE? | STEP 1 | STEP 2 | STEP 3 | STEP 4 | STEP 5
  • 10. For more information, please visit: cisco.com/go/federal Mike Younkers Director, Systems Engineering Cisco Public Sector 703-484-5452 @MichaelYounkers myounker@cisco.com © 2018 Cisco Systems, Inc. All rights reserved.