recommended reading

IT project reviews have saved $4 billion since 2010, according to CIO

This story has been updated.

Federal agencies have saved nearly $4 billion in the past year through TechStat reviews that resulted in scaling back or canceling information technology projects that are over budget or delayed, officials said Thursday.

The TechStat model, aimed at weeding out underperforming contracts, was launched by former federal chief information officer Vivek Kundra in 2010. Kundra credited those reviews -- essentially adapt-or-perish presentations by project managers of red-flag projects in front of agency IT leaders and Kundra himself -- with saving the government $3 billion.

Agencies began doing their own TechStat reviews on smaller programs in early 2011 and have saved another $930 million through nearly 300 sessions so far, according to a briefing by the federal CIO Steven VanRoekel.

One of those TechStats led to the termination of a troubled contract for the Interior Department's Point-of-Sale system, saving nearly $10 million, VanRoekel said.

The Veterans Affairs Departments has seen the greatest level of cost avoidance through agency-level TechStats at nearly $12 million, according to a Year in Review document also released Thursday.

VanRoekel's office plans to implement the TechStat model at the bureau and component level by June 2012, according to the review.

The document envisions implementing triggered TechStat reviews when a project first starts to miss deadline or cost projects, so it becomes less of a "triage effort...during crises" and more of an inspiration to improved performance.

VanRoekel touted TechStat savings during a federal technology conference, where he also announced approval of the Federal Risk and Authorization Management Program, or FedRAMP, aimed at easing the government's transition to cloud-based technology and storage.

VanRoekel also announced the official launch of the Shared First federal IT strategy, which he had outlined in a speech to industry IT leaders in Palo Alto, Calif., in October.

That plan requires agencies to identify two areas where they can shift to shared IT services by March 2012. VanRoekel's office plans to publish a Shared First strategy by May 2012, according to his presentation.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.