Enhancing School Security with Information Technology: Relevant Solutions and Funding Opportunities
According to data contained in a recent study from Pediatrics, the official scientific journal of the American Academy of Pediatrics, the number of school shootings in the United States has increased dramatically every year since the 2017-2018 school year. At the same time, school mass shootings have become increasingly deadly. Given this trend and the risk posed by security threats to students and faculty, school districts are desperate to find solutions to improve school security.
5 Tips for Procurement Process Optimization for the Public Sector
Government agencies strive to lower the cost of products and services to save taxpayers money. They also aim to shorten “procurement administrative lead time,” or PALT—the time from identification of need to delivery of value—to expedite their missions without delay.
How to Build a Case Management Process in the Public Sector
Case work is the universal working style of government agencies. Everything from handling customer service inquiries to issuing permits to responding to weather events—in short, any workflow a public sector organization handles—is a “case” that requires a systematic approach from start to finish.
GovIT Podcast Series: Leveraging SLED Fiscal Year-End Sales Opportunities
This is part of a podcast series where the Market Insights team provides insights and analysis on IT opportunities across the public sector. This episode features Yvonne Maffia, Senior Market Insights Analyst at TD SYNNEX Public Sector where she discusses how to leverage SLED Fiscal Year End Sales Opportunities. Listen to this podcast episode now.
Summer’s Over, But the HEAT is On
TD Synnex Public Sector’s Chief Cybersecurity Technologist, Don Maclean sat down with Mark Guntrip, Senior Director of Security Strategy at Menlo Security, to discuss one of the latest emergent security threats.
State and Local Outlook: Over the Horizon Opportunities for FY23
2022 is ending, and it is time for U.S. public sector leaders to reflect on lessons learned while planning for the upcoming state and local government fiscal year-end. This year’s NASCIO Annual Conference highlighted the post-pandemic technology trends and challenges that are defining 2023 policy agendas and the future of technology acquisitions. The conference referenced the State Chief Information Officer Survey which assessed state CIOs’ thoughts on a wide array of topics that affect their roles as public sector technology and business leaders in today’s modern world.
Grid Modernization Dollars are Coming: What it Means for IT Vendors?
The U.S. electric grid is critical infrastructure consisting of an ecosystem of communities, stakeholders, governments and economies. Most of the grid infrastructure was built decades ago and is unreliable. Bad actors know it. In 2015, Russian hackers carried out the first successful cyberattack on the nation's electricity grid, which was just one of an ongoing series of security breaches and attacks on US infrastructure and utilities.
A Two-Pronged Approach to Improving Government Case Management Work
Government organizations have a bad rap for being inefficient. But with outdated technology and limited spending, they aren’t exactly set up for success. And the expectations from stakeholders are high, with funding provided primarily by taxpayer dollars.
Why Government CIOs Need to Rethink Their Tech Procurement Strategy
As government agencies and organizations look to modernize their technology stacks to keep up with changes in the workforce, aging solutions, and closing contracts, they’ll all set out with a similar process: submit an RFP, review submissions, and choose a vendor. Seems simple enough.
But what government CIOs often don’t realize is that requiring proven, specific use cases may be limiting what their new (and likely expensive) technology investment can do for their organization. Here’s what I mean.
Threat-Based Methodology Part 2: Configuration Settings
This is the second post in the Threat-Based Methodology series. The first post introduced Threat-Based Methodology and the analysis conducted by the FedRAMP PMO and NIST. That post concluded with a list of the top seven controls based on their Protection Value. This post will explore CM-6 in greater depth and explain how Devo supports the ability to meet this control.