The New Federal IT Landscape: Managed Services, Risk Management, Mobility & Big Data


The GTRA Council Meeting will focus on critical components of the changing Federal IT landscape including:

  • Managed Services: How is the OCIOs role changing in an service-heavy IT Ecosystem
  • Economic Analysis of Investments: How to best utilize limited resources and correct wasteful legacy investments
  • Big Data: Leveraging the Power of Big Data to Drive Better Decision Making
  • Risk Management / Security: Supply Chain Management, Continuous Monitoring, & Access Controls
  • Sequestration: Cost Avoidance Planning, Resource Allocation & More
  • Mobility: Creating a Mobile Government: MDM, BYOD, and Beyond
  • Infrastructure / Cloud: Secure Cloud Computing, Contracts and Vendor Assessment Methodologies
  • Efficiency: Improving Efficiencies through Innovation and Modernization
  • Architecture: Strategic Architectures & Portfolio Management

 

Succeeding in a Managed Services Model
  • The Role of the CIO: Leadership Necessities in a Managed Services Environment
  • Creating a Winning Pricing Strategy  to Ensure Long-term Sustainability and Profitability
  • Becoming Risk-Proof: Addressing Both Strategic and Operational Risks
  • Building Clearly-Defined and Trusted Relationship with Partners

Cyber Security and Risk & Incident Management


  • Case Studies and presentations on some of the most critical areas of cyber security including Continuous Monitoring, Advanced Persistent Threats, Risk Management, Identity and Access Management, Controlled Unclassified Information, FISMA, Cloud Computing Security, Records Management/Sharing, Security Lifecycle Management, Web 2.0/Social Networking Security, Virtualization of Security Platforms, Data at Rest and Secure Transparency & Open Government
  • Analysis of emerging threats coming out of both the rise in cyber attacks, an increase in the sophistication of attacks, and the growth of emerging technologies such as Cloud Computing and Web 2.0
  • Review of civilian/intelligence/defense collaborative efforts to create government-wide standards to combat cyber security and implement risk management initiatives
Identity, Credential, and Access Management
  • Discussion of how new infrastructure models (Cloud) and shared service initiatives are changing the way agencies must manage access to data and the identities of users
  • Case studies on how PIV systems can be integrated to provide physical and logical access to building/networks within and across government agencies
  • Discussion of how cloud computing and shared service initiatives are changing the way agencies must manage access to data and the identities of users
Secure Information Sharing & Shared Services
  • Discussions and case studies on information sharing initiatives and programs throughout the defense/intelligence/civilian communities
  • Review of government-wide shared service centers and programs to identify best practices and lessons learned
  • Hear from established information sharing programs such as NIEM and PM-ISE on best practices and lessons learned regarding technology and policy implementation to support inter and intra-agency information sharing
Privacy & E-Discovery
  • Hear case studies and lessons learned from Chief Privacy Officers on their collaboration with the Security, EA and CIOs office and learn best practices to ensure Privacy standards are maintained in all technology initiatives
  • Update on the FEA-Security and Privacy Profile and the critical role EA and Security Architectures play in Privacy
  • Hear updates on E-Discovery requirements facing agencies and learn about new technologies and solutions to meet these needs
  • Discuss Privacy concerns as it relates to Social Networking, Open Government, Transparency and Web 2.0
Cloud Computing & Cloud Security
  • Focus on government Cloud programs/initiatives including Cloud First, FedRAMP,  Cloud Security Assessment Methodologies and other guidance from the White House and other government Cloud Computing policy makers
  • Case studies will share best practices and lessons learned from agencies who have deployed  mission critical Cloud solutions and integrated Cloud Computing into their infrastructures and IT strategies
  • Discuss in detail Security concerns associated with Cloud Computing and collaborate on real solutions based on available technologies and lessons learned
Infrastructure Modernization, Shared Services & Data Center Consolidation
  • Discussions on how new technologies, mandates and fiscal realities are forcing government agencies to invest in new infrastructure models and engage in consolidation activities including the 'Cloud First’ and 'Shared First' initiatives and Data Center Consolidation goals
  • Best Practices and Lessons Learned on ensuring security of new infrastructure models including strong focus on Identity, Credential and Access Management (ICAM)
  • Discussions on how new infrastructure models and data management practices can help support sustainability initiatives
  • Review of government-wide shared service centers and programs to identify best practices and lessons learned
  • Discuss IPv6 Architecture strategies which maintain security
Enterprise Architecture
  • Overview on FSAM, LoB and other Segment architecture methodologies and guidance from OMB
  • Discussion and case studies from senior agency and department leaders on how EA can be used to drive critical business objectives through collaboration at the administrative, business and CIO levels
  • Learn best practices on EA fundamentals such as Capital Planning and Investment Controls (CPIC), Infrastructure Optimization, Capital Expenditures, and Federal Enterprise Architecture initiatives
  • Showcase new technologies designed to help visualize an agency’s architecture
Social Media, Open Government & Web 2.0
  • Analysis of how a new workforce, disruptive technologies, and changing expectation on the availability of information from both the Administration and US Citizens are influencing the adoption of social networking in the government
  • A look at security concerns with the use of Social Media and other Web 2.0 technologies and what can be done to minimize risk and exposure
  • Live Demonstrations of existing social media technologies and case-studies of successful social networking sites currently used in government
  • Case Studies of Social Media & Web 2.0 deployments in various agencies, with particular focus on maintaining security though effective use of  Governance, Technology, Cultural Awareness and training 
Technology for National Security
  • Detailed case studies sharing best practices on how Defense, Intelligence and Civilian agencies are successfully collaborating on various information sharing initiatives for National Security
  • Hear updates from Defense agencies on Net-Centricity, DoD Architectural Framework, and EA Career Path Training
  • Overview of the threat posed to the National Grid and the Defense, Intelligence and Civilian agencies play in securing this national asset
Big Data & Business Analytics
  • Education on what Big Data is and how it can improve your ability to support the business mission
  • Case studies of Big Data Success in the government
  • Big Data, Storage, Warehousing ,and Business Intelligence / Analytics Technologies
Mobile Government & Federal Mobility Strategy
  • Case Studies and lessons learned on how to develop, launch, and manage your mobile strategy with special discussions on iPhones, iPads and Android phones/tablets
  • Learn best practices and lessons learned on how to ensure secure of data and devices for your mobile employees while maintaining access to mission critical networks and information
  • Discuss how a new generation of workers view mobility and how to balance their needs/expectations with existing technological and cultural realities
  • Learn how agencies are using mobile apps and systems to securely deliver better services to citizens, business owners, and employees
Technology to Drive Efficiency & Lower Costs
  • Case studies and lessons learned from Government peers on using technology to drive efficiency and ensure success during times of limited resources
  • Special focus on Big Data Technologies
  • Discussions on how to leverage existing investments and strategies
  • Focus on OMB initiatives including Future First and 25-Point Reform
  • Learn how proper supply chain management can enhance success of IT investments
Performance Management, Leadership and Project Management
  • Analysis of OMB’s “Federal IT Management Reform” Initiative and how it will impact your day-to-day
  • In depth focus on how IT executives must act as leaders for change in their agencies and discussion on specific tools, techniques and strategies to implement transformational leadership at all levels of an organization
  • Discuss change management best practices as they relate to new technologies, a changing workforce, and a new administration

Security Solution Categories

Access Management
Advanced Persistent Threats
Authentication
Biometrics
Business Optimization & Consulting
Breach Management
BYOD
Centralized Network Security Control
Cloud Computing Security
Compliance & Accreditation
Computer Desktop Core Configuration
Computer Forensics
Continuous Monitoring
Cryptography
Controlled Unclassified Information
Data Center Consolidation
Data Security
Data-at-Rest Security
Digital Certificates / SSL
Digital Security
Enterprise Architecture Security
E-Discovery
E-Mail Security
Fingerprint Biometrics
Firewalls / VPN / Anti-Virus
FISMA Compliance
Forensics
Identity Management Solutions and Systems
Incident Prevention, Detection & Response
Information Assurance
Information Risk Management
Information Security Architectures
Instant Messaging Security
Intrusion Detection / Prevention
IPv6
Malware Detection
Mobile Device Management
Mobile and Wireless Security
Monitoring Solution
Network Security
Penetration Testing
PIV
PKI
Privacy
Risk Management
S-CAP
Secure LAN/WAN
Secure Remote Access
Security Architectures
Security Training
Single Sign-On
Smartcards
SOA Security
Social Media Security
Supply Chain Management
System Integrators
Transaction Security
User Identification & Management
Vulnerability Assessments
Virtualization Security
Web 2.0 Security