Date post: | 03-Aug-2015 |
Category: |
Government & Nonprofit |
Upload: | fedscoop |
View: | 1,077 times |
Download: | 1 times |
Landing the Plane: Invest. Deliver. Protect.
Tony ScottU.S. Chief Information Officer
June 17, 2015
1
Driving Value in Federal IT Investments
Protecting Federal IT Assets and Information
Delivering World-‐class
Digital Services
Federal IT Objectives
2
People
Federal IT Strategy
3
4
4* Compound Annual Growth RateData source: Agency FY 2016 IT budgets
Efficiencies achieved through improved IT management7.1% CAGR*
FY2001 - FY2009
$125.7
$86.3
$0
$20
$40
$60
$80
$100
$120
$140
2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016
$Billio
ns
Total for Major Agencies Budget Projected at 2001-2009 Growth Rate
Drive Value in IT InvestmentsFY 2016 Budget of $86.3B
1.5% CAGR*FY2009 - FY2016
Analytics and Oversight
6
Enhance transparency and improve oversight of Federal IT through the use of data analytics, portfolio reviews and technical assistance, and
optimize the use of IT infrastructure across the Government.
PortfolioStat – Establish quarterly PortfolioStat reviews
Cross-‐OMB Analytics – Continue to integrate PortfolioStat with other management stats
Optimize Infrastructure – Continue to drive Federal Data Center Consolidation (FDDCI)
IT Transparency – Publish revised Federal IT Dashboard
Deliver World Class Digital Services
7
Transforming the way government works for citizens and businesses by dramatically improving each
agency’s most important digital services.
https://playbook.cio.gov
8
Digital Service Plays
9
Protect Federal Assets & Information
10
The E-‐Gov Cyber Unit will focus resources on strengthening Federal cybersecurity through targeted oversight and policy issuance.
E-‐Gov Cyber NSC NIST DHS
Vision & Mission• Vision: Reduce the number of cyber incidents in which sensitive Government information is compromised
• Mission: Strengthen Federal cybersecurity through:1) Data-driven, risk-based oversight of agency and
government-wide cybersecurity programs;2) Issuance and implementation of Federal policies consistent
with emerging technologies and evolving cyber threats; 3) Oversight of the Government-wide response to major
cyber incidents and vulnerabilities to ensure appropriate mitigation measures are effectively implemented; and
4) Engagement with key stakeholders to modernize relevant cybersecurity statutes.
11
Industry Considerations
• Build PIV capability into products by default• The ability to use PIV credentials with network
authentication products • Use of PIV digital signature capability with email and digital
transaction products• Use of PIV authentication, digital signature and encryption
in all cloud services offerings• Use of PIV credentials, to include derived credentials, in
mobile devices • Get PIV enabled products on the GSA Approved
Products List (APL) and build use of PIV PKI authentication into all physical access systems
12
Develop the Next Generation
13
14