recommended reading

Leaders Split on Whether the Obama Administration Can Accomplish Its IT Goals

asharkyu/Shutterstock.com

Federal information technology leaders are about evenly split on whether their agencies can achieve a slate of ambitious IT reform goals established by the Obama administration, according to survey data gathered by the Government Business Council.

About 32 percent of the 74 civilian and military information technology leaders surveyed by GBC said they were “confident” or “very confident” their agencies could meet those goals, which include plans to consolidate government data centers, shift more government computing to the cloud and increase the use of shared IT services across government. Another 32 percent said they were “not confident” their agencies could achieve those goals.

About 35 percent of respondents were “somewhat confident” their agencies could accomplish the goals.

GBC and Nextgov are both divisions of Government Executive Media Group. The 74 tech leaders included in the survey were all at the GS-14, GS-15 or Senior Executive Service grade. The survey doesn’t have a meaningful margin of error because the universe of possible survey respondents -- top level technology officials -- is very small.

When asked to rank the importance of the Obama administration’s IT goals, respondents placed improving IT services’ quality and accountability at the top of the list and put opening up government data at the bottom.

About 32 percent of respondents listed IT services’ quality and accountability as the administration’s most important goal. About 18 percent of respondents prioritized improving mobility and mobile security first and 15 percent listed insider threat detection as the most important priority.

About 7 percent of respondents put open data at the top of that list.

The greatest challenge to fulfilling the Obama administration’s IT priorities is a lack of funding, the survey found, followed by insufficient personnel, cultural resistance to change and technological barriers such as legacy systems.

Nextgov launched an interactive quiz today to help federal technologists assess their own IT priorities. Take the quiz here

(Image via asharkyu/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.