{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram

Are federal CDOs being set up to fail?

It hasn't been easy for some agencies to meet a new requirement to install a chief data officer: Several missed a July 13 deadline to have one in place, and others designated an existing official — typically the chief information officer — to take on the CDO portfolio. A new white paper by the Data Foundation and Deloitte says that those dual-hat arrangements potentially undermine the CDO's unique role in facilitating evidence-based policymaking. Dave Nyczepir explains the findings.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

Army refreshes its data strategy, with an emphasis on trust and security

"If we want to achieve outcomes, and that ultimately is our ability to properly leverage data, we’ve got to fix the data problem, and the first part starts with the actual strategy," says Lt. Gen. Bruce Crawford, the Army's CIO. Billy Mitchell reports on the service's "data problem."

U.S. Cyber Command’s bug bounty program uncovers more than 30 vulnerabilities

White-hat hackers found nine “high severity” vulnerabilities and one “critical” vulnerability across Department of Defense proxies, virtual private networks and virtual desktops, the Pentagon said Monday in announcing the results a bug bounty program sponsored by U.S. Cyber Command. The “Hack the Proxy” competition — the eighth of its kind across the DOD — was administered by the Defense Digital Service and HackerOne. Shannon Vavra has the details for CyberScoop.

Let’s Talk About IT Ep. 6 — Continuous monitoring for Cybersecurity Awareness Month

The latest episode of Let's Talk About IT, in celebration of Cybersecurity Awareness Month, focuses on the government's adoption of continuous monitoring. Featuring Kevin Cox of DHS and Simon Elliston Ball of Cloudera, the conversation starts on the progress the government has made through the CDM program and evolves into a broader discussion of what ideal cybersecurity looks like in the age of the cloud. Listen now to the new episode.

NIST to test federal ‘zero trust’ security architectures

Some agencies have elements of zero-trust frameworks in place, but NIST will explore the proper way to use them, according to its chief cybersecurity adviser. Dave has more.

Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}