Technology is driving new opportunities to harness data, transforming health care as we know it. However, emerging technologies also require new approaches to equity starting with the data. Today, government is seeking to improve health care systems for all patients, especially those who have been historically disadvantaged. Agencies such as the Department of Veterans Affairs and the National Institutes of Health are developing responsible AI practices, leveraging data and dashboarding tools, and new hiring strategies to address health disparities.
The Departments of Defense and Veterans Affairs, along with the U.S. Coast Guard and now the National Oceanic and Atmospheric Administration have been on a transformational journey to modernize the joint electronic health record system. The goal of the single, common federal EHR is to enhance patient care and provider effectiveness through digital health records that are interoperable across government. Leaders discuss the progress organizations have made with the health care system and gaps that still need to be filled.
The Pentagon's digital modernization journey represents the digital modernization challenges and priorities all federal agencies face. From budgets to partnerships to emerging technologies, multiple elements can impact government's modernization progress. Industry and federal IT leaders discuss what's most important for efficient and effective digital modernization across government.
With the rise of more frequent, sophisticated cyberattacks, organizations can no longer rely on humans alone to keep their systems and data secure. Automation is a key enabler for the future of cybersecurity. Federal leaders highlight how organizations can leverage automation to improve threat intelligence to better plan and defend against future attacks.
One-time sign-offs for federal IT systems no longer manage cybersecurity risks effectively. To handle the onslaught of cyberattacks, federal agencies are exploring continuous Authorization to Operate (cATO) initiatives to better mitigate risk throughout their IT supply chains.
Under the federal “cloud smart” strategy, agencies are addressing newfound security vulnerabilities through a multi-layered defense system, with protections at the data, network and physical infrastructure layers. But federal experts say cybersecurity is about more than just building in barriers.
Zero trust is essential to solid IT supply chain security due to the sprawling nature of software and hardware supply chains. Hear from industry and government leaders at CISA, DOD and Fortinet Federal about how to integrate zero trust principles into supply chain security strategies to more effectively manage risk and vulnerabilities.
Data analytics efforts are helping organizations measure the success of their programs — perhaps most importantly, their financial management programs. With data analytics, agencies can measure the success of their programs across software development, finance, recruiting and more
The list of benefits of the next-generation wireless capacity is lengthy. It includes faster data transmission, better working environments for remote workers and improved logistics. Even though it’s thriving in the private industry, it’s a different story for government where unique challenges exist. Faced with an executive order to improve the customer experience and also implement zero trust architecture, federal agencies have many opportunities to harness 5G’s power.
Every organization will be hacked at some point, but learning how to curb certain threat vectors like ransomware will be imperative to limit losses and damages. All organizations must remain vigilante against threats by instituting good cyber hygiene practices and meeting directives around zero trust architecture.
In the age of cloud modernization that unlocks better data-computing practices, agencies are faced with different challenges around managing that data. These challenges can include tactics to connect cloud, on-prem and other systems in a hybrid environment, or overseeing change management efforts to recruit and train the workforce properly. With the current widespread move to zero-trust architecture, getting a handle on these challenges are necessary for agencies to maintain efficient data flow and operations. Agencies with different infrastructure approaches and missions have varying degrees for how they are treating their cloud environments and how they are encouraging industry support in these areas.
DevSecOps and security leaders from agencies like the Navy, Army and Department of Homeland Security provide insights on how they're baking in security at all stages of a software development cycle and working with their teams to adapt new cybersecurity tools and strategies for an evolving digital landscape.
Cybersecurity leaders from agencies like the Cybersecurity Infrastructure Security Agency (CISA), Defense Department (DOD) and Office of Management and Budget (OMB) provide insights on how they are utilizing zero-trust strategies to secure data, prevent ransomware incidents and help recover from attacks.
As agencies stand up zero trust strategies, federal and industry partners are working together on best practices for responding to cyber attacks and ensuring critical data and systems remain secured. This Deep Dive features insights from the Defense Department, CISA and more.
Many discussions about infrastructure in federal technology center around physical infrastructure — the hardware, software and, of course, the personnel necessary to maintaining and managing all IT operations. But for artificial intelligence, discussions pivot to include more theory and soft skills. This Deep Dive features discussions from federal leaders on the backbones that make up a federal agency's approach to AI.
Download the latest e-book to learn how federal agencies like NASA and the departments of Defense, Health and Human Services, Homeland Security and others are approaching zero trust within their unique missions. Inside, hear from: Navy Principal Cyber Advisor Chris Cleary on the Navy's new ICAM strategy and the fundamental role identity plays in achieving a zero trust structure. Government Accountability Office's IT and Cybersecurity Director Jennifer Franks on implementing the cyber executive order and securing the supply chain.