{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram

Sue Gordon's next move

After a long career in the intelligence community, Sue Gordon resigned in August from a top post at the Office of the Director of National Intelligence. A champion of IT innovation and a favorite among colleagues, Gordon stayed in the public eye after her departure but was quiet about her next plans. A tweet from a Microsoft executive on Friday provided an answer: Gordon will be joining the tech giant to consult on “security, national security and leadership topics.” Tajha Chappellet-Lanier has more.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

IT education is a Navy priority

The Navy's top civilian — acting Secretary Thomas Modly — knows a little bit about IT: He was once the service's CIO. And he wants sailors and Marines to be more tech-savvy sooner in their military careers. IT training for personnel is at the top of the department’s priorities, Modly said Friday. Part of that effort will be an emphasis on IT training at the soon-to-be-launched Navy Community College. The Navy also has plans to expand tech-related courses for its executive-level officers, officials said. Jackson Barnett has the details.

NSA's CIO office needs some clarity, report says

The National Security Agency could be getting more out of its CIO role, but it has to clarify and reorganize some things about the job first, according to an Office of the Inspector General audit within a semiannual report to Congress. The way the spy agency positions its CIO office "may not be maximizing its effectiveness and efficiency in designing, investing in, acquiring, managing, and maintaining the full range of its IT,” the report said. Dave Nyczepir explains what the IG found.

At State, more data at the top

The State Department is touting its new Center for Analytics, which is intended to help its thousands of employees worldwide make foreign policy and management decisions driven by data insights. “The establishment of State’s first enterprise-wide data analytics organization is a strategic milestone for U.S. foreign policy," the department says. Led by the department’s acting chief data officer, Janice deGarmo, the center plans to outfit everyone from diplomats to Secretary of State Mike Pompeo with data tools and training. Dave has more.

A candid conversation about AI

Let's Talk About IT is back with a brand new episode on the state of federal artificial intelligence and how agencies are looking to adopt it. Tim Persons, who’s leading the Government Accountability Office’s efforts to adopt AI, and Henry Sowell, CIO of Cloudera, discuss the federal context for the emerging technology. "You have a broad array of use cases...and that's really what makes [AI in the government] so interesting — the use cases, the mission contexts are what's driving this," Persons says in the new episode. Listen now to the new episode.


Technology and policy advances enable federal moves to achieve zero-trust

2020 looks to be a promising year for federal agencies as they move beyond perimeter defense and implement zero-trust security practices. Recent zero-trust guidelines from OMB and NIST show potential as an important resource in how best to deploy distributed security controls in hybrid- and multi-cloud operating environments. Also, agencies stand to benefit from new technology features that better manage identity and authentication controls arising from Cisco System’s 2018 acquisition of Duo Security. Read the full story.

A spearphishing mystery

Spearphishing campaigns against federal agencies are not new, but they're not getting any easier to investigate. Last year an agency was targeted repeatedly with bogus emails that could have been from a mysterious group that has evaded attribution for years, according to research by security firm Palo Alto Networks. The company's Unit 42 threat intelligence team was able to figure out technical aspects of the spearphishing campaign but wasn't able to attribute it solidly to any known nation-state hackers. One group could be the culprit, but the evidence is thin. Shannon Vavra explains the murky circumstances at CyberScoop.

Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}