SlideShare a Scribd company logo
1 of 1
Download to read offline
Federal Times 12/01/2014 
Copy Reduced to %d%% from original to fit letter page
 
SOLUTIONS &IDEAS 
TRANSFORMING THE ENTERPRISE OF GOVERNMENT V 
Making the business case for cybersecurity 
KEVIN SMITH 
INTEGRITY MANAGEMENT 
CONSULTING 
22 | federaltimes.com 12.1.14 
Copyright © 2014 All content, Army Times Publishing Company 
Terms of Service | Privacy Policy 12/01/2014 
December 4, 2014 4:59 pm / Powered by TECNAVIA 
Cybersecurity has been one of 
the fastest growing sectors in 
the federal government over 
recent years. It’s a 24/7/365 
job as threats are constant in an 
online world. In fact, the Govern-ment 
Accountability Office re-ported 
in June that “the number 
of cyber incidents reported by 
federal agencies increased in 
fiscal year 2013 significantly over 
the prior three years.” 
At more than 46,000 cyber in-cidents 
in fiscal 2013 and growing, 
greater assets will be required to 
fund cybersecurity programs. 
Have you asked your team: “What 
are we doing to ensure budget 
allocation for cybersecurity not 
only today, but in the coming 
years?” 
One of the best ways to justify 
cybersecurity investment is to 
develop a business case through 
the Capital Planning and Invest-ment 
Control (CPIC) process. 
And the best time to finesse busi-ness 
cases through CPIC is right 
now. 
Even with the growing cyber 
threat, agencies are being asked 
to defend their IT portfolios and 
adapt new technologies in order 
to reduce IT spending. 
Cybersecurity teams must ad-vocate 
for their programs and be 
able to defend the need for 
funding. CPIC is critical for 
cybersecurity leaders if they 
are to effectively manage their 
portfolios. 
The Office of Management and 
Budget mandates that agencies 
develop an annual business case 
(formerly the Exhibit 300). OMB 
expects agencies to submit busi-ness 
cases for its review and 
inclusion on its public-facing 
Federal IT Dashboard. 
In September, agencies sub-mitted 
their IT portfolios, in-cluding 
budget requests and initial 
budget year 2016 business cases. 
Final business cases will be sent 
in late February 2015. This interim 
between initial and final submis-sion 
is when agencies should 
thoroughly review the current and 
future state of their IT portfolios. 
Now is the time to ask, “Do we 
have adequate funding to protect 
the agency from online attacks 
now and in the future? Are re-sources 
in place to ensure that 
these programs can operate in a 
high-threat environment?” 
This is more than examining last 
year’s budget to see how much 
was spent on cybersecurity and 
then allocating a nominal funding 
increase for future years. That is 
not effective planning and poten-tially 
increases risks to the pro-grams. 
If the program needs are 
not in place, program profession-als 
need to communicate short-falls 
to leadership. 
Agency leaders need a full un-derstanding 
of their business 
environment to include the or-ganizational 
missions, portfolios, 
architecture, capabilities, re-sources 
and constraints so that 
they can make hard decisions if 
resources need to be reallocated. 
They must understand the cy-bersecurity 
universe, not only 
within the federal sector, but to 
the extent possible how the pri-vate 
sector is planning and bud-geting 
to meet online threats. 
That may require agency leaders 
to completely rethink and reas-sess 
their programs. 
CPIC supports planning 
In a complex business and IT 
environment, the repeatable CPIC 
process enables the federal gov-ernment 
to control its IT funding 
and manage IT programs. In lay-man’s 
terms, the CPIC process 
can be thought of as a three-legged 
stool: budget planning and 
implementation, program man-agement 
and control, and man-agement 
and oversight. Each leg 
is critical to support the stool. 
CPIC was envisioned to be a 
process that links budget plan-ning, 
and strategic planning to a 
specific program and its perfor-mance. 
By leveraging the OMB 
business case, agencies have at 
their fingertips a multiyear budget 
plan, justified investment port-folio 
and business case, and effi-cient 
plan for resource allocation. 
Use the next three months to 
analyze the data that was sub-mitted 
to OMB in early Septem-ber. 
Doing so will make a stronger 
case for the cybersecurity pro-grams 
that will be a major require-ment 
for the future. Now is the 
time to ask and answer the ques-tion, 
“Does our agency’s IT pro-gram 
make the budget case to 
counter expected and unexpected 
cybersecurity threats?” N 
Kevin Smith is a senior program 
manager for Integrity Management 
Consulting. 
In the face of shrinking budgets, 
growing demands from citizens 
and an aging IT infrastructure, 
the U. S. government has been 
asking this crucial question: What 
is the best way to deliver IT at 
the federal level to achieve maxi-mum 
value at minimum cost? 
To compel this answer, and 
improve the use and benefits 
derived from IT at federal agen-cies, 
the Federal Information 
Technology Acquisition Reform 
Act (FITARA) was created. While 
this act has not yet been passed 
in Washington, the ongoing de-bate 
about using “smarter” tech-nology 
and seeing a greater 
return has been the genesis for a 
new way of thinking about IT. 
Technology is something that can 
help the government improve 
service to citizens, protect criti-cal 
data, and most importantly, 
generate cost savings. 
Migration to the cloud 
The federal government has 
undertaken three different initia-tives 
to help improve its use of 
technology, with the first being a 
migration to cloud. 
Among the advantages, imple-menting 
an application in the 
cloud is considerably faster and 
more cost-effective for public 
organizations. It minimizes up-front 
costs by eliminating the 
need to purchase on-site hard-ware 
and enables a more predict-able 
total cost of ownership 
through subscription-based pric-ing 
options. This helps generate 
a speedy return on investment 
(ROI) and saves money for the 
government in the long run. The 
cloud also helps agencies im-prove 
disaster readiness by hous-ing 
the data off-premise, so 
unpredictable incidents, such as 
a natural disaster, will not impact 
the accessibility or security of 
information. 
Sharing services and 
technology 
In addition to cloud migration, 
federal decision-makers have 
also created a shared services 
initiative to help optimize tech-nology 
use. Many agencies are 
being consolidated to provide 
services in a more cost-effective 
way. For example, the Treasury 
Department now utilizes a fi-nancial 
services center in West 
Virginia, and the Department of 
Agriculture manages its financial 
and human resources functions 
from New Orleans. Even though 
they are outside the capital, 
these agencies have the ability to 
perform the same, if not more, 
tasks using fewer federal re-sources. 
At these new shared services 
centers, the government is build-ing 
an integrated technology 
environment that provides great-er 
visibility into data for better, 
faster decision-making. 
Talent science 
The third (and most recent) 
way in which the federal govern-ment 
is working to maximize the 
value of technology, while mini-mizing 
costs, is through talent 
science — the practice of lever-aging 
behavioral and perfor-mance 
data to evaluate job 
candidates based on their com-patibility 
with an organization 
and likeliness of success. It al-lows 
organizations to better 
match the right person with the 
right position by analyzing a 
candidate’s behavioral traits and 
comparing it against job-related 
performance data that has been 
collected separately from identi-fied 
high-performing current 
employees. 
In terms of government posi-tions, 
identifying the best candi-date 
for a job is particularly 
challenging because of the high 
number of specialty positions. 
Talent science can help the gov-ernment 
to evaluate applicants 
using their “behavioral DNA,” 
which is uniquely based on the 
traits and characteristics they 
display. By weeding out potential 
hires without the necessary 
attributes before the interview 
process even begins, federal 
agencies can protect their on-boarding 
investment by increas-ing 
the likelihood that their 
selection will be successful in 
the position. 
A continuous process 
The movement to improve 
government operations using 
technology, embodied by FIT-ARA, 
is an ongoing process. 
Examining how IT is acquired 
and used can help federal organi-zations 
to save both time and 
money — resources that will 
continue to prove more precious 
as the future of our government 
unfolds. N 
Wayne Bobby is the vice president of 
Federal Government Solutions for Infor. 
WAYNE BOBBY 
INFOR 
How IT reform saves government resources

More Related Content

What's hot

deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlandsdeloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-NetherlandsDominika Rusek
 
Proposal note for strengthening of monitoring and evaluation on projects
Proposal note for strengthening of monitoring and evaluation on projectsProposal note for strengthening of monitoring and evaluation on projects
Proposal note for strengthening of monitoring and evaluation on projectsNoor Khan
 
connected-government-roadmap-regional-state-and-local
connected-government-roadmap-regional-state-and-localconnected-government-roadmap-regional-state-and-local
connected-government-roadmap-regional-state-and-localRonnen Brunner
 
Federal Statistical System, Transparency Camp West
Federal Statistical System, Transparency Camp WestFederal Statistical System, Transparency Camp West
Federal Statistical System, Transparency Camp Westbradstenger
 
Prove It - The Disciplines of Harvesting Value from Public Sector Information...
Prove It - The Disciplines of Harvesting Value from Public Sector Information...Prove It - The Disciplines of Harvesting Value from Public Sector Information...
Prove It - The Disciplines of Harvesting Value from Public Sector Information...NIC Inc | EGOV
 
e-Government And Public Private Partnership (PPP)
e-Government And Public Private Partnership (PPP)e-Government And Public Private Partnership (PPP)
e-Government And Public Private Partnership (PPP)Jamil Wadaich
 
Technology Trends Impacting the Finance Function and the Profession – An Over...
Technology Trends Impacting the Finance Function and the Profession – An Over...Technology Trends Impacting the Finance Function and the Profession – An Over...
Technology Trends Impacting the Finance Function and the Profession – An Over...International Federation of Accountants
 
The DATA Act - IT Infrastructure Guidance - CT SIG 08-2015
The DATA Act - IT Infrastructure Guidance - CT SIG 08-2015The DATA Act - IT Infrastructure Guidance - CT SIG 08-2015
The DATA Act - IT Infrastructure Guidance - CT SIG 08-2015Subhasis Datta
 
Whitepaper - The need self service data tools, not scientists
Whitepaper - The need  self service data tools, not scientistsWhitepaper - The need  self service data tools, not scientists
Whitepaper - The need self service data tools, not scientistsJosh Howard
 
Information governance a_necessity_in_to
Information governance a_necessity_in_toInformation governance a_necessity_in_to
Information governance a_necessity_in_toAnne ndolo
 
How information technology helps to improve governance
How information technology helps to improve governanceHow information technology helps to improve governance
How information technology helps to improve governanceHaspalelaChe
 
Intro to e gov
Intro to e gov Intro to e gov
Intro to e gov Hardini_HD
 
The Impact of Data Sovereignty on Cloud Computing in Asia 2013 by the Asia Cl...
The Impact of Data Sovereignty on Cloud Computing in Asia 2013 by the Asia Cl...The Impact of Data Sovereignty on Cloud Computing in Asia 2013 by the Asia Cl...
The Impact of Data Sovereignty on Cloud Computing in Asia 2013 by the Asia Cl...accacloud
 
BCG WCIT2019 Plenary Presentation
BCG WCIT2019 Plenary PresentationBCG WCIT2019 Plenary Presentation
BCG WCIT2019 Plenary PresentationMiguel Carrasco
 
From E-Government to Open Government
From E-Government to Open GovernmentFrom E-Government to Open Government
From E-Government to Open GovernmentJohann Höchtl
 
Bitcoin wednesday (1) deloitte
Bitcoin wednesday (1) deloitteBitcoin wednesday (1) deloitte
Bitcoin wednesday (1) deloitteBitcoin Wednesday
 
Intermodal Transport Data Sharing Programme (Sep 2021)
Intermodal Transport Data Sharing Programme (Sep 2021)Intermodal Transport Data Sharing Programme (Sep 2021)
Intermodal Transport Data Sharing Programme (Sep 2021)FairTechInstitute
 

What's hot (19)

deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlandsdeloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
 
Proposal note for strengthening of monitoring and evaluation on projects
Proposal note for strengthening of monitoring and evaluation on projectsProposal note for strengthening of monitoring and evaluation on projects
Proposal note for strengthening of monitoring and evaluation on projects
 
connected-government-roadmap-regional-state-and-local
connected-government-roadmap-regional-state-and-localconnected-government-roadmap-regional-state-and-local
connected-government-roadmap-regional-state-and-local
 
Federal Statistical System, Transparency Camp West
Federal Statistical System, Transparency Camp WestFederal Statistical System, Transparency Camp West
Federal Statistical System, Transparency Camp West
 
Prove It - The Disciplines of Harvesting Value from Public Sector Information...
Prove It - The Disciplines of Harvesting Value from Public Sector Information...Prove It - The Disciplines of Harvesting Value from Public Sector Information...
Prove It - The Disciplines of Harvesting Value from Public Sector Information...
 
e-Government And Public Private Partnership (PPP)
e-Government And Public Private Partnership (PPP)e-Government And Public Private Partnership (PPP)
e-Government And Public Private Partnership (PPP)
 
Technology Trends Impacting the Finance Function and the Profession – An Over...
Technology Trends Impacting the Finance Function and the Profession – An Over...Technology Trends Impacting the Finance Function and the Profession – An Over...
Technology Trends Impacting the Finance Function and the Profession – An Over...
 
The DATA Act - IT Infrastructure Guidance - CT SIG 08-2015
The DATA Act - IT Infrastructure Guidance - CT SIG 08-2015The DATA Act - IT Infrastructure Guidance - CT SIG 08-2015
The DATA Act - IT Infrastructure Guidance - CT SIG 08-2015
 
Whitepaper - The need self service data tools, not scientists
Whitepaper - The need  self service data tools, not scientistsWhitepaper - The need  self service data tools, not scientists
Whitepaper - The need self service data tools, not scientists
 
Ai in government
Ai in government Ai in government
Ai in government
 
Information governance a_necessity_in_to
Information governance a_necessity_in_toInformation governance a_necessity_in_to
Information governance a_necessity_in_to
 
How information technology helps to improve governance
How information technology helps to improve governanceHow information technology helps to improve governance
How information technology helps to improve governance
 
Intro to e gov
Intro to e gov Intro to e gov
Intro to e gov
 
The Bionic Company
The Bionic CompanyThe Bionic Company
The Bionic Company
 
The Impact of Data Sovereignty on Cloud Computing in Asia 2013 by the Asia Cl...
The Impact of Data Sovereignty on Cloud Computing in Asia 2013 by the Asia Cl...The Impact of Data Sovereignty on Cloud Computing in Asia 2013 by the Asia Cl...
The Impact of Data Sovereignty on Cloud Computing in Asia 2013 by the Asia Cl...
 
BCG WCIT2019 Plenary Presentation
BCG WCIT2019 Plenary PresentationBCG WCIT2019 Plenary Presentation
BCG WCIT2019 Plenary Presentation
 
From E-Government to Open Government
From E-Government to Open GovernmentFrom E-Government to Open Government
From E-Government to Open Government
 
Bitcoin wednesday (1) deloitte
Bitcoin wednesday (1) deloitteBitcoin wednesday (1) deloitte
Bitcoin wednesday (1) deloitte
 
Intermodal Transport Data Sharing Programme (Sep 2021)
Intermodal Transport Data Sharing Programme (Sep 2021)Intermodal Transport Data Sharing Programme (Sep 2021)
Intermodal Transport Data Sharing Programme (Sep 2021)
 

Similar to FederalTimes

US State Government Case Study
US State Government Case StudyUS State Government Case Study
US State Government Case StudyMark S. Mahre
 
API-led connectivity: How to leverage reusable microservices
 API-led connectivity: How to leverage reusable microservices API-led connectivity: How to leverage reusable microservices
API-led connectivity: How to leverage reusable microservicesAbhishek Sood
 
Local Authoirity Customer Story: Mid Kent Improvement Partnership
Local Authoirity Customer Story: Mid Kent Improvement PartnershipLocal Authoirity Customer Story: Mid Kent Improvement Partnership
Local Authoirity Customer Story: Mid Kent Improvement PartnershipConnexica
 
The Impact of the Consumerization of IT on the Public Sector
The Impact of the Consumerization of IT on the Public SectorThe Impact of the Consumerization of IT on the Public Sector
The Impact of the Consumerization of IT on the Public SectorGovLoop
 
A New Network Acquisition Model for the Federal Government
A New Network Acquisition Model for the Federal GovernmentA New Network Acquisition Model for the Federal Government
A New Network Acquisition Model for the Federal GovernmentGov BizCouncil
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docxfaithxdunce63732
 
The Government of New Brunswick Enterprise Architecture Vision (2013)
The Government of New Brunswick Enterprise Architecture Vision (2013)The Government of New Brunswick Enterprise Architecture Vision (2013)
The Government of New Brunswick Enterprise Architecture Vision (2013)Tamim Rahman
 
Fueling the future of fintech with data science and ai
Fueling the future of fintech with data science and aiFueling the future of fintech with data science and ai
Fueling the future of fintech with data science and aiIndusNetMarketing
 
vision 2020 testimony
vision 2020 testimonyvision 2020 testimony
vision 2020 testimonyRob Arnold
 
State of GovTech Market Briefing.pptx
State of GovTech Market Briefing.pptxState of GovTech Market Briefing.pptx
State of GovTech Market Briefing.pptxDustin Haisler
 
The Vision & Value of a Connected_Government
The Vision & Value of a Connected_GovernmentThe Vision & Value of a Connected_Government
The Vision & Value of a Connected_GovernmentAllCloud
 
From AI to Analytics
From AI to AnalyticsFrom AI to Analytics
From AI to AnalyticsDeloitte UK
 
From AI to Analytics
From AI to AnalyticsFrom AI to Analytics
From AI to AnalyticsDeloitte UK
 
e-governance
e-governancee-governance
e-governanceamit amit
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
 
EXPLORING CRITICAL SUCCESS FACTORS FOR CYBERSECURITY IN BHUTAN’S GOVERNMENT O...
EXPLORING CRITICAL SUCCESS FACTORS FOR CYBERSECURITY IN BHUTAN’S GOVERNMENT O...EXPLORING CRITICAL SUCCESS FACTORS FOR CYBERSECURITY IN BHUTAN’S GOVERNMENT O...
EXPLORING CRITICAL SUCCESS FACTORS FOR CYBERSECURITY IN BHUTAN’S GOVERNMENT O...csandit
 
Top Technology Trends
Top Technology TrendsTop Technology Trends
Top Technology TrendsEvincedev
 
CISO Survey Report 2010
CISO Survey Report 2010CISO Survey Report 2010
CISO Survey Report 2010Scientia Groups
 

Similar to FederalTimes (20)

US State Government Case Study
US State Government Case StudyUS State Government Case Study
US State Government Case Study
 
API-led connectivity: How to leverage reusable microservices
 API-led connectivity: How to leverage reusable microservices API-led connectivity: How to leverage reusable microservices
API-led connectivity: How to leverage reusable microservices
 
Local Authoirity Customer Story: Mid Kent Improvement Partnership
Local Authoirity Customer Story: Mid Kent Improvement PartnershipLocal Authoirity Customer Story: Mid Kent Improvement Partnership
Local Authoirity Customer Story: Mid Kent Improvement Partnership
 
The Impact of the Consumerization of IT on the Public Sector
The Impact of the Consumerization of IT on the Public SectorThe Impact of the Consumerization of IT on the Public Sector
The Impact of the Consumerization of IT on the Public Sector
 
A New Network Acquisition Model for the Federal Government
A New Network Acquisition Model for the Federal GovernmentA New Network Acquisition Model for the Federal Government
A New Network Acquisition Model for the Federal Government
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docx
 
The Government of New Brunswick Enterprise Architecture Vision (2013)
The Government of New Brunswick Enterprise Architecture Vision (2013)The Government of New Brunswick Enterprise Architecture Vision (2013)
The Government of New Brunswick Enterprise Architecture Vision (2013)
 
Fueling the future of fintech with data science and ai
Fueling the future of fintech with data science and aiFueling the future of fintech with data science and ai
Fueling the future of fintech with data science and ai
 
vision 2020 testimony
vision 2020 testimonyvision 2020 testimony
vision 2020 testimony
 
State of GovTech Market Briefing.pptx
State of GovTech Market Briefing.pptxState of GovTech Market Briefing.pptx
State of GovTech Market Briefing.pptx
 
The Vision & Value of a Connected_Government
The Vision & Value of a Connected_GovernmentThe Vision & Value of a Connected_Government
The Vision & Value of a Connected_Government
 
From AI to Analytics
From AI to AnalyticsFrom AI to Analytics
From AI to Analytics
 
From AI to Analytics
From AI to AnalyticsFrom AI to Analytics
From AI to Analytics
 
Impacts of FITARA on IT Security & IT Spending
Impacts of FITARA on IT Security & IT SpendingImpacts of FITARA on IT Security & IT Spending
Impacts of FITARA on IT Security & IT Spending
 
e-governance
e-governancee-governance
e-governance
 
Finance
FinanceFinance
Finance
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 
EXPLORING CRITICAL SUCCESS FACTORS FOR CYBERSECURITY IN BHUTAN’S GOVERNMENT O...
EXPLORING CRITICAL SUCCESS FACTORS FOR CYBERSECURITY IN BHUTAN’S GOVERNMENT O...EXPLORING CRITICAL SUCCESS FACTORS FOR CYBERSECURITY IN BHUTAN’S GOVERNMENT O...
EXPLORING CRITICAL SUCCESS FACTORS FOR CYBERSECURITY IN BHUTAN’S GOVERNMENT O...
 
Top Technology Trends
Top Technology TrendsTop Technology Trends
Top Technology Trends
 
CISO Survey Report 2010
CISO Survey Report 2010CISO Survey Report 2010
CISO Survey Report 2010
 

FederalTimes

  • 1. Federal Times 12/01/2014 Copy Reduced to %d%% from original to fit letter page SOLUTIONS &IDEAS TRANSFORMING THE ENTERPRISE OF GOVERNMENT V Making the business case for cybersecurity KEVIN SMITH INTEGRITY MANAGEMENT CONSULTING 22 | federaltimes.com 12.1.14 Copyright © 2014 All content, Army Times Publishing Company Terms of Service | Privacy Policy 12/01/2014 December 4, 2014 4:59 pm / Powered by TECNAVIA Cybersecurity has been one of the fastest growing sectors in the federal government over recent years. It’s a 24/7/365 job as threats are constant in an online world. In fact, the Govern-ment Accountability Office re-ported in June that “the number of cyber incidents reported by federal agencies increased in fiscal year 2013 significantly over the prior three years.” At more than 46,000 cyber in-cidents in fiscal 2013 and growing, greater assets will be required to fund cybersecurity programs. Have you asked your team: “What are we doing to ensure budget allocation for cybersecurity not only today, but in the coming years?” One of the best ways to justify cybersecurity investment is to develop a business case through the Capital Planning and Invest-ment Control (CPIC) process. And the best time to finesse busi-ness cases through CPIC is right now. Even with the growing cyber threat, agencies are being asked to defend their IT portfolios and adapt new technologies in order to reduce IT spending. Cybersecurity teams must ad-vocate for their programs and be able to defend the need for funding. CPIC is critical for cybersecurity leaders if they are to effectively manage their portfolios. The Office of Management and Budget mandates that agencies develop an annual business case (formerly the Exhibit 300). OMB expects agencies to submit busi-ness cases for its review and inclusion on its public-facing Federal IT Dashboard. In September, agencies sub-mitted their IT portfolios, in-cluding budget requests and initial budget year 2016 business cases. Final business cases will be sent in late February 2015. This interim between initial and final submis-sion is when agencies should thoroughly review the current and future state of their IT portfolios. Now is the time to ask, “Do we have adequate funding to protect the agency from online attacks now and in the future? Are re-sources in place to ensure that these programs can operate in a high-threat environment?” This is more than examining last year’s budget to see how much was spent on cybersecurity and then allocating a nominal funding increase for future years. That is not effective planning and poten-tially increases risks to the pro-grams. If the program needs are not in place, program profession-als need to communicate short-falls to leadership. Agency leaders need a full un-derstanding of their business environment to include the or-ganizational missions, portfolios, architecture, capabilities, re-sources and constraints so that they can make hard decisions if resources need to be reallocated. They must understand the cy-bersecurity universe, not only within the federal sector, but to the extent possible how the pri-vate sector is planning and bud-geting to meet online threats. That may require agency leaders to completely rethink and reas-sess their programs. CPIC supports planning In a complex business and IT environment, the repeatable CPIC process enables the federal gov-ernment to control its IT funding and manage IT programs. In lay-man’s terms, the CPIC process can be thought of as a three-legged stool: budget planning and implementation, program man-agement and control, and man-agement and oversight. Each leg is critical to support the stool. CPIC was envisioned to be a process that links budget plan-ning, and strategic planning to a specific program and its perfor-mance. By leveraging the OMB business case, agencies have at their fingertips a multiyear budget plan, justified investment port-folio and business case, and effi-cient plan for resource allocation. Use the next three months to analyze the data that was sub-mitted to OMB in early Septem-ber. Doing so will make a stronger case for the cybersecurity pro-grams that will be a major require-ment for the future. Now is the time to ask and answer the ques-tion, “Does our agency’s IT pro-gram make the budget case to counter expected and unexpected cybersecurity threats?” N Kevin Smith is a senior program manager for Integrity Management Consulting. In the face of shrinking budgets, growing demands from citizens and an aging IT infrastructure, the U. S. government has been asking this crucial question: What is the best way to deliver IT at the federal level to achieve maxi-mum value at minimum cost? To compel this answer, and improve the use and benefits derived from IT at federal agen-cies, the Federal Information Technology Acquisition Reform Act (FITARA) was created. While this act has not yet been passed in Washington, the ongoing de-bate about using “smarter” tech-nology and seeing a greater return has been the genesis for a new way of thinking about IT. Technology is something that can help the government improve service to citizens, protect criti-cal data, and most importantly, generate cost savings. Migration to the cloud The federal government has undertaken three different initia-tives to help improve its use of technology, with the first being a migration to cloud. Among the advantages, imple-menting an application in the cloud is considerably faster and more cost-effective for public organizations. It minimizes up-front costs by eliminating the need to purchase on-site hard-ware and enables a more predict-able total cost of ownership through subscription-based pric-ing options. This helps generate a speedy return on investment (ROI) and saves money for the government in the long run. The cloud also helps agencies im-prove disaster readiness by hous-ing the data off-premise, so unpredictable incidents, such as a natural disaster, will not impact the accessibility or security of information. Sharing services and technology In addition to cloud migration, federal decision-makers have also created a shared services initiative to help optimize tech-nology use. Many agencies are being consolidated to provide services in a more cost-effective way. For example, the Treasury Department now utilizes a fi-nancial services center in West Virginia, and the Department of Agriculture manages its financial and human resources functions from New Orleans. Even though they are outside the capital, these agencies have the ability to perform the same, if not more, tasks using fewer federal re-sources. At these new shared services centers, the government is build-ing an integrated technology environment that provides great-er visibility into data for better, faster decision-making. Talent science The third (and most recent) way in which the federal govern-ment is working to maximize the value of technology, while mini-mizing costs, is through talent science — the practice of lever-aging behavioral and perfor-mance data to evaluate job candidates based on their com-patibility with an organization and likeliness of success. It al-lows organizations to better match the right person with the right position by analyzing a candidate’s behavioral traits and comparing it against job-related performance data that has been collected separately from identi-fied high-performing current employees. In terms of government posi-tions, identifying the best candi-date for a job is particularly challenging because of the high number of specialty positions. Talent science can help the gov-ernment to evaluate applicants using their “behavioral DNA,” which is uniquely based on the traits and characteristics they display. By weeding out potential hires without the necessary attributes before the interview process even begins, federal agencies can protect their on-boarding investment by increas-ing the likelihood that their selection will be successful in the position. A continuous process The movement to improve government operations using technology, embodied by FIT-ARA, is an ongoing process. Examining how IT is acquired and used can help federal organi-zations to save both time and money — resources that will continue to prove more precious as the future of our government unfolds. N Wayne Bobby is the vice president of Federal Government Solutions for Infor. WAYNE BOBBY INFOR How IT reform saves government resources