Contributors

Developing Organizational Resilience through Effective Transition

During administration changes, agencies face the challenge of onboarding new personnel while maintaining core functions to serve the mission. Fortunately, transition cycles are usually predictable, and preparation can begin well in advance. By adopting past best practices and the latest innovative thinking, Government agencies can become more operationally resilient in the face of both scheduled transitions and unexpected leadership changes.

Strategic Change for National Security: The Birth of a New Agency

Strategic Change for National Security: The Birth of a New Agency

In June 2015, the U.S. Office of Personnel Management (OPM) announced that hackers compromised millions of Americans personally identifiable information in one of the most severe data breaches in recent history. The successful intrusion into OPM servers, perpetrated by the Chinese, highlighted major issues in the Government’s information technology (IT) infrastructure, including continued use of legacy systems and lack of oversight of private contractors. As a result, the Government convened an interagency panel to perform a 90-day review of OPM’s background investigation infrastructure.

A Victim-Centered Approach to the Human Trafficking Challenge

A Victim-Centered Approach to the Human Trafficking Challenge

Human trafficking is often difficult to identify due to the skilled practices of human traffickers and the challenge of defining a victim.Victims are often hidden, threatened with abuse, torture, and death. As a result, victims are unlikely to run away or speak for fear of reprisal from their captors. In this modern system of slavery, victims do not have a voice, so citizens and trained professionals must know what to do when encountering a potential victim.

Does LPTA Really Cost More?

“It’s unwise to pay too much, but it’s worse to pay too little. When you pay too much you lose a little money, that is all. When you pay too little, you sometimes lose everything, because the thing you bought was incapable of doing the thing it was bought to do. The common law of business balance prohibits paying a little and getting a lot – it can’t be done. If you deal with the lowest bidder, it is well to add something for the risk you run. And if you do that, you will have enough to pay for something better.” – John Ruskin, 1819-1900

Cyber Criminals Collaborate To Counteract Threats; So Should We

Cyber Criminals Collaborate To Counteract Threats; So Should We

Every month, a new cyber attack makes headlines, startles consumers, and spurs calls for action and new legislation to mitigate emerging cyber threats. By almost any statistic you choose, the risk to Government agencies, corporations, and consumers is escalating. In 2013, MacAfee catalogued more than 100,000 new pieces of malware a day. The Washington Post reported the likely annual cost of cybercrime to the world economy at $445 billion dollars in 2013, and the number of detected cyber attacks in 2014 increased a staggering 48% over the previous year.

Roadmaps for IT Modernization

Roadmaps for IT Modernization

The risk associated with legacy information technology (IT) systems not meeting the Federal Government’s evolving needs is substantial and unacceptable. The costs are also significant with 78% of the $80 billion spent annually on Federal IT going toward maintaining existing systems, crowding out funding for modernization.