Amid continued cost cutting, the White House will seek to drive innovation, ROI and cybersecurity.
IW500: 15 Top Government Tech Innovators
(click image for larger view and for slideshow)
Federal CIO Steven VanRoekel laid out the Obama administration's second-term IT priorities in a congressional hearing on IT reform. The White House will focus on increasing the return on investment of its $79 billion annual IT budget, strengthening cybersecurity and driving new forms of innovation.
Over the past four years, the administration focused on eliminating duplicative IT systems and services, reforming IT management, and streamlining service delivery, VanRoekel said at the Jan. 22 hearing by House Oversight and Government Reform Committee. Going forward, he said, the objective is to "balance cost savings with innovation by continuing to cut costs while we invest in technology that security serves the American people."
To drive innovation, VanRoekel said he will guide federal agencies to apply IT to simplify the complexity of government and make more government data available to feed "the new data economy." In the area of ROI, VanRoekel said the feds must increase adoption of technology-as-a-service as a way of shifting from "asset ownership to service-orientation." He called cyber threats "one of the most serious national security, public safety and economic challenges we face as a nation."
Committee chairman Darrell Issa (R-Calif.) opened the hearing by stating that according to some estimates, 47% of federal IT spending goes to maintain "obsolete and deficient IT resources" and that as much as $20 billon is wasted each year.
Some committee members expressed surprise that such a big chunk of the federal IT budget goes to the maintenance of legacy systems. But VanRoekel, in an ironic twist, pointed out that the relative antiquity of many federal computer systems provides some level of protection against modern-day cyber threats, which tend to target newer platforms. "Who knew that outdated and antiquated systems would provide protection against cyber-attacks?" quipped Rep. Gerry Connolly (D-Va.).
Former congressman and committee chairman Tom Davis, who contributed to the development of Federal Information Security Management Act (FISMA), testified that more is needed in the area of cybersecurity. "It has turned into a box-checking exercise," he said.
Davis advocated implementing share-in-savings contracts as one way to shift project risk to contractors. "They bear the risk of actually delivering on what they say they can do. If they are successful, they make money; if not, they don't," he said in formal remarks.
Davis chided government leaders who consider IT projects to be discretionary spending rather than strategic investments. He said continuing resolutions, in lieu of a fiscal budget, make it difficult for IT managers to commit funds to projects. "CRs kill IT procurement," he said. "They kill innovation in government."
According to David Powner, director of IT management issues at the Government Accountability Office, three areas of IT acquisition require increased attention: There must be more transparency on troubled projects, duplication of systems must be tackled more aggressively, and the Office of Management and Budget and agencies must follow through on data center consolidation plans.
Issa expressed frustration that the title of CIO has proliferated throughout federal government, observing that the Justice Department has 40 CIOs. Powner and VanRoekel responded that the title is less important than having budget authority and accountability for an IT executive's area of responsibility.
Mobile applications are the new way to extend government information and services to on-the-go citizens and employees. Also in the new, all-digital Anytime, Anywhere issue of InformationWeek Government: A new initiative aims to shift the 17-member Intelligence Community from agency-specific IT silos to an enterprise environment of shared systems and services. (Free registration required.)
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.