The Boldest Predictions for Federal Technology in 2019

Ozz Design/Shutterstock.com

More cyber brinkmanship and super smart artificial intelligence are just a couple forecasts industry leaders divined for the coming year.

Predictions are hard, which is why Nextgov turned to industry leaders with a simple request: Give us your boldest prediction for federal IT.

They dove into specific initiatives like the Defense Department’s Defense Enterprise Office Solutions contract and the General Service Administration's Enterprise Infrastructure Solutions contract as well as the pros and pitfalls of artificial intelligence.

In no particular order (and lightly edited for length), here is what to look out for in 2019:

IT Modernization is THE Priority for the Year

“Technology’s (IT’s) days as a mere enabler are over: in today’s complex and dynamic environment, IT must lead the way. The relationship between technology and mission outcomes has never been stronger. As we move into 2019, we believe technology modernization will be the  No. 1 priority for federal government agencies in the year ahead, which is why IT leaders will become business leaders and use their unique understanding of technology’s potential and limitations to help their agencies envision the art of the possible.”

—Dominic Delmolino, chief technology officer, Accenture Federal Services

Federal Agencies Adopt Commercial Tech—For Real

“[W]e are starting to see a growing realization across government that adoption and deployment of commercial technologies is the best way to go to drive IT modernization. While this seems obvious to the rest of us, the mandates of the Federal Acquisition Streamlining Act, establishing a legal mandate to adopt commercial items in lieu of large, bespoke government IT systems, has been widely ignored, literally for years. This is rapidly changing.

A prime example is a massive new cloud job at [Defense Information Systems Agency] for email and collaboration tools called DEOS. The acquisition strategy for DEOS is to use the GSA Schedules program, Schedule 70 in particular. This is very unusual. [The Defense Department] also has said that DEOS will be a ‘pathfinder’ effort for civilian agencies. The focus of DEOS beyond enterprisewide licensing to a full subscription business model is also important. This migration maps against established commercial practices and reflects reality, I believe.”

— Richard Beutel, managing principal, Cyrrus Analytics

Some Agencies Will Pay for Enterprise IT By the Drink

“At least one other major agency will follow the Air Force's footsteps and take an enterprise IT-as-a-service initiative. The concept of EITaaS has been talked about for years, but it always seemed a little far-fetched for an agency—too far outside the box. But the Air Force thinks otherwise, and as its initiative develops, we can expect other agencies to begin moving in this direction. That’s because it makes sense. The as-a-service model provides agencies with the flexibility they need to adapt to changing requirements—continuous modernization, you might say.” 

— Bryan Thomas, senior vice president, public sector, World Wide Technology

The Early Bird Gets Actual Transformation

“With [General Services Administration] extending the [Enterprise Infrastructure Solutions] deadline to 2023, agencies that were panicking to transition like for like applications will now breathe more easily … maybe too easily. Those that do not procrastinate will start to transition during 2019, finally upgrading critical legacy applications in a more strategic manner. This will enable those agencies that start now to ensure the 2023 transition serves as more of a transformation.”

— Steven Boberski, vice president of business development, collab9

Other Sectors Will Follow the CDM Model

“The Continuous Diagnostics and Mitigation approach will gain traction beyond the public sector particularly within some of the critical sectors that are forward-thinking on cybersecurity. Rooted in the NIST concept of continuous monitoring, CDM is structured in four phases to determine what is on the network, who is on the network, what’s happening on the network, and how data is protected on the network. CDM will continue to mature in the public sector as the leading method for continuous risk identification, prioritization, and mitigation—'ongoing’ activities that are equally applicable and important for other industries such as financial services and health care.”

—Ellen Sundra, vice president of Americas, Systems Engineering, ForeScout Technologies

Government Will Go to the Edge

“I predict that in 2019 the government will adopt a policy of managing data at the edge. Capturing data at the edge and being able to get [artificial intelligence and machine learning] faster with real-time capabilities and security is something all agencies would love to have access to (e.g. to save lives, stronger defense, etc.) and 2019 will be the tipping point. Agencies will no longer be able to avoid harnessing the power of data as AI/ML become critical to the success of our IT operations.”

— Shaun Bierweiler, vice president of U.S. public sector, Hortonworks

Artificial Intelligence Gets Scary Smart

“In 2019, I predict that the rise of artificial intelligence will reach its tipping point. We will officially hit the point of no return where AI has moved beyond the comprehension of even the savviest IT leaders. 2019 will be the year that AI becomes mainstream pushed to the masses but, simultaneously, AI capabilities and actions will also become more ambiguous. As we continue to focus solely on the benefits of AI with very little awareness of potential concerns, our society will unconsciously be influenced by AI processes that make our day-to-day lives easier.

The widespread adoption and blind following of the ‘all-knowing AI’ will start to the give the impression of an omnipresent force. This belief and widespread adoption with force federal IT leaders to begin preparing and implementing the regulations and practices necessary to combat the omniscient AI.”

— Mike Ewell, senior director of cyber, Solutions By Design II

Government Ditches ‘Cloud First’

“We predict that the government will drop its ‘Cloud First’ position in recognition of the high costs of data egress, the evolution of hybrid cloud architectures, lower costs of hyper-converged infrastructure solutions, and better utilization of geographically disparate data and compute resources that operate on data where it’s generated or at the edge. The major driver for this will be the need to improve the government’s time-to-insight and time-to-decision processes and a more sustainable operating model. As Gartner stated at the 2018 [IT Infrastructure, Operations & Cloud Strategies] event, IT Infrastructure needs to be always available, always on, and everywhere.”

— Russel Davis, chief technology officer and chief operating officer, Vcinity, Inc

The Resurgence of the Data Engineer

“The ‘rise of the citizen data scientist’ expression was emphasized over the last year as machine learning technologies matured to allow more automation and ease of use. The real need in 2019 now is not data scientists (nor ‘citizen data scientists’) but rather data engineers. Getting traction on machine learning use cases requires data engineers to understand, prepare and manipulate data in order for machine learning models to work.”

— Scott Smith, managing director, Sila Solutions Group

The Perimeter Will Not Exist

“In 2019, we predict that the trend towards the cloud will continue and accelerate rapidly, which will ultimately lead to the widespread closure of government data centers. As the government enters the era of post-perimeter security—an entirely cloud-based, no perimeter IT infrastructure—agencies will be forced to move key security functions to the endpoint and establish a zero-trust access model.”

— Bob Stevens, vice president of public sector, Lookout

Bad Guys Use AI Too

“Everyone is talking about [artificial intelligence] right now—it’s the buzz of the industry. But not many people fully understand what AI and machine learning can do. One area where AI will be really powerful is cybersecurity. In 2019, we will see agencies start to harness the power of advanced analytics and machine learning to take action against real-time threats in an automated, predictive way. Using AI will also address some of the growing skills gaps federal agencies are experiencing, because these technologies when used this way can supplement the human element in cybersecurity.

On the flip, adversaries will also be leveraging these technologies to launch attacks, making the defensive use of AI even more critical for federal agencies in the coming year.”  

—Jason Parry, vice president of client solutions, Force 3

The Government Will Tap Different Agencies’ Data to Help Citizens

“We will see a broader push by public health agencies and their partner departments to integrate health and non-health data to better understand the intersection of services and to improve whole person care. Citizens, particularly those struggling with mental illness or addiction, will often touch several government entities (public health, law enforcement, social services, etc.). Not only can bouncing around the system be detrimental to their health, but the lack of coordination is not an efficient use of resources. For instance, a homeless person is more susceptible to illness and brushes with the police. The costs of visits to emergency rooms and free clinics, plus time spent in jail, add up quickly. Providing a stable housing option would be better for the individual, and for the taxpayer. Bringing together the relevant data from the different agencies will change how we help citizens in need.”

— Joshua P. Morgan, PsyD, national director of Behavioral Health and Whole Person Care for U.S. Government and Education, SAS

Clouds Now Enable Data Oceans in the Future

“The rapid adoption of cloud systems will harness and combine the power of data harmonization with information alignment and cybersecurity awareness in an unprecedented fashion. As a result, the most forward leaning agencies in government will increasingly deliver modern, consumer-like user experiences that leverage native-to-platform artificial intelligence and machine learning. In turn, these next generation systems will further mine databases, data warehouses, and data lakes, as well as present authoritative information to augment human decision making, while fully understanding the ‘chain of custody’ and the ‘identity’ of all data which is entering an agency’s enterprise boundaries. These capabilities are critical for agencies to be prepared to deal with the coming data oceans being produced by the internet of things.”

— Bob Osborn, federal chief technology officer, ServiceNow

Phishing May Get Harder

“Believe it or not, the majority of successful security breaches are still a result of simple attacks through web and email—often a result of phishing attacks targeted at end users. In 2019, agencies will move away from on-premise tools to incorporate cloud-based threat isolation platforms that offer a virtualized security environment. This capability isolates web browsing and email attachment execution in an off-premise/virtualized environment, ensuring malware never passes through the security boundary.”

— Chris Townsend, vice president of federal, Symantec

Cyber Adversaries Will Increasingly Push Our Limits

“2019-2021 prediction: Continued and persistent escalation in nation state led cyberattacks will push unexplored limits until a breach or provocation crosses a currently undefined line. The ‘breach’ may be intentional, accidental, loosely directed (actors may not have full understanding of what they are targeting) or have unintentional consequences (loss of positive control).  It may impact a government or civilian target. It may cause financial harm or loss of life, potentially both. Regardless, deterrence fails (it never worked anyway) and the incursion escalates into a national retaliatory response. This will result in kinetic, monetary, legal, and/or similar type(s) of active response and potentially escalate into open conflict.

The current and continuing escalation of cyber activity is really a game of brinkmanship—a very serious game that continues to push limits never before tested and one that will eventually result in an interpretation or realization of hostile intentions followed by an escalated response.”

—Eric Trexler, vice president of Global Governments and Critical Infrastructure, Forcepoint

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.