Using PRINCE2™ to Manage US Federal Government IT Projects

This paper shows how the PRINCE2 project management method supports US Federal government project managers as they deliver IT investments while satisfying requirements of the Clinger-Cohen Act and Capital Planning and Investment Control. Since enactment of the Clinger-Cohen Act (CCA) in 1996, the US Federal government requires its agencies to improve their management, oversight and control of investments in information technology. Central to the CCA is an obligation for agencies to select, control, and evaluate their portfolio of IT projects in accordance with the principles of Capital Planning and Investment Control (CPIC), an approach to IT investment management referenced in the CCA.

Spotlight

Borough of West Chester

The borough is governed by the town council form of government. Led by the Borough Manager, there are seven Council Members each representing one of the seven voting wards.

OTHER WHITEPAPERS
news image

The State of Ransomware in State and Local Government 2022

whitePaper | September 19, 2022

Sophos' annual study of the real-world ransomware experiences of IT professionals in the state and local government sector has revealed an ever more challenging attack environment. Together with the growing financial and operational burden ransomware places on its victims, it also shines new light on the relationship between ransomware and cyber insurance - including how insurance drives changes to cyber defenses.

Read More
news image

Augmented government Transforming government services through augmented reality

whitePaper | January 27, 2020

On September 27, 1998, football fans who tuned in to watch the game between the Baltimore Ravens and the Cincinnati Bengals witnessed much more than a 31-24 Bengal win. That Sunday, ESPN introduced a technological inno-vation that would forever change the way fans watch sports: a thin yellow line overlaid onto live video representing the distance required for a first down.

Read More
news image

Shift Left API Security Testing for Government Agencies

whitePaper | September 7, 2022

Application programming interfaces, or APIs, enable government agencies to seamlessly share data across federal, state, and local levels. They are quite frankly the glue that allows agencies to deliver services to mission partners, civilians, and even disabled veterans. Similar to how retailers create personalized experiences by integrating location, inventory, and payment data, government agencies also create contextual experiences for constituents and personnel by leveraging APIs. The impact of APIs can be seen across all major sectors of government, including traffic and transportation management, utilities, healthcare, social services, agriculture, as well as law enforcement. With the seamless connection between datasets and agencies, government personnel are able to innovate faster and drive speed to mission. How exactly? APIs reduce the workload and redundant operations performed by developers by allowing them to access data stored elsewhere. This enables them to quickly execute on tasks and take on more important projects of greater impact.

Read More
news image

SECURING THE SOFTWARE SUPPLY CHAIN

whitePaper | August 15, 2022

Cyberattacks are conducted via cyberspace and target an enterprise’s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment or infrastructure; or destroying the integrity of the data or stealing controlled information.1 Recent cyberattacks such as those executed against SolarWinds and its customers, and exploits that take advantage of vulnerabilities such as Log4j, highlight weaknesses within software supply chains, an issue which spans both commercial and open source software and impacts both private and Government enterprises. Accordingly, there is an increased need for software supply chain security awareness and cognizance regarding the potential for software supply chains to be weaponized by nation state adversaries using similar tactics, techniques, and procedures (TTPs).

Read More
news image

DIGITAL TRANSFORMATION IN FEDERAL AGENCIES

whitePaper | January 17, 2023

Digital modernization refers to the process of utilizing technology, whether through adoption of new tools or the improvement of existing ones, to achieve organizational goals. This can include enhancing the user experience, ensuring high uptime, implementing robust security measures, reducing latency, and streamlining processes for resolving issues. All levels of government are going through a digital transformation to deliver services and programs more effectively,transparently, and economically.To meet the demands of citizens who have adapted to the technological advancements in society, digital government transformation has become a vital aspect of providing efficient and effective services. However, one of the biggest hurdles in this process for federal agencies is striking a balance between leveraging technology for its benefits and maintaining robust security and privacy measures. Federal agencies handle confidential information regularly, making it imperative to safeguard against data breaches. Consequently, agencies must ensure that their digital systems and procedures are secure and adhere to relevant regulatory requirements.

Read More
news image

FIDO for e-Government Services

whitePaper | December 13, 2022

The global COVID-19 pandemic closed offices and forced governments to rapidly move services online, if they weren’t already, to serve its citizens. Although usernames and passwords are easy to deploy and easy for citizens to use, they leave systems and users vulnerable to cyberattacks. They are especially vulnerable to phishing attacks designed to steal login credentials and compromise legacy multi-factor authentication (MFA) tools like those using one-time passwords (OTP) and push notifications. With phishing attacks on the rise, it is imperative for governments to support “phishing-resistant” MFA technology that is also accessible, efficient, and cost-effective.

Read More

Spotlight

Borough of West Chester

The borough is governed by the town council form of government. Led by the Borough Manager, there are seven Council Members each representing one of the seven voting wards.

Events