Page 4 - FCW, August 2019
P. 4

Contents
18
CYBERSECURITY
TRENDING
3 CLOUD
Republicans urgeTrump not to interfere with JEDI
cloud buy
FCW CALENDAR
Where you need to be next
8 MANAGEMENT
FAR tweaked in time
for fall buying, and
House NDAA includes prohibition on OPM merger
9 TECHNOLOGY
Connolly pushes for
new bill to reform FedRAMP, and DOD scouts military bases for 5G testing
10 PROCUREMENT
GSA issues solicitation
for e-marketplace
for micropurchases, and EIS vendors say agencies aren’t rushing to modernize telecom services
11 POLICY
OMB ties evidence- based policymaking
to budget planning,
and White House moves forward on data strategy
DEPARTMENTS
12 COMMENTARY
4 keys to successful
cyber defense automation BY JIM HANSEN
47 CASE STUDY
Alabama preps responders for World Games 2021
BY STEPHANIE KANOWITZ Automating the review
of Medicare claims
BY STEPHANIE KANOWITZ
51 FCW INDEX
14 Are contractors ready for DOD’s cybersecurity framework?
The Cybersecurity Maturity Model Certification could have a profound impact on the procurement landscape when it goes live next year
BY DEREK B. JOHNSON
BY MATT VASILOGAMBROS
BY STEVE KELMAN
BY DEREK B. JOHNSON
VOTING SECURITY
18 Voting by phone is easy. But is it secure? Some states and cities are turning to the latest technology to make voting easier, but experts say the risks may be too great
ACQUISITION
22 New contractors in government:
The new normal?
The use of tech demos and an emphasis on agile development are opening doors for nontraditional IT contractors
EMERGING TECH
27 What happens when machines break the law? As the use of artificial intelligence becomes more widespread, so
do concerns about how algorithms make potentially discriminatory decisions
INNOVATION IN GOVERNMENT:
The Next Wave of Cybersecurity
As they navigate today’s challenges, agencies must keep an eye on the future and the coming wave of cybersecurity tools and strategies
Custom content: Presented by Carahsoft
4
August 2019 FCW.COM
S-32
S-34
S-35
S-36
S-37
S-38
S-39
Steering a course through stormy cyber
Why identity is the key to
Ensuring secure and accessible
INNOVATION IN GOVERNMENT®
As they navigate today’s challenges, agencies must keep an eye on the future and the coming wave of cybersecurity tools and strategies
The case
for open,
data-driven
seas security resources cybersecurity accesssecurity intelligence spots
S-40
S-41
S-42
S-43
S-44
S-45
S-46
Scaling cybersecurity through automation
The value of threat intelligence
How teamwork boosts security
Defense- in-depth strategies in the cloud age
Protecting high-value assets
Rethinking security in the cloud
How IARPA is using cloud to evolve security
0819_fcw_Carahsoft_cover.indd
17
 Learn more at carahsoft.com/innovation
7/24/19 9:45 AM
The importance of privileged
Balancing artificial and human
Eliminating security blind







   2   3   4   5   6