Next Gen Tech Needs Next Gen Acquisition

The speed at which technology evolves presents many challenges for the federal government, the first being the actual acquisition of solutions. Government procurement processes and policies have had to adjust and evolve to enable agencies to buy and implement the emerging technologies that support their mission.

Utilizing Existing Platforms

The Federal Risk and Authorization Management Program (FedRAMP) may be the largest and most visible example of this evolution, allowing agencies to securely acquire cloud solutions. The program is being used as a platform to ensure that other transformative technologies, like the cloud, can securely make their way into government systems. The Emerging Technology Prioritization Framework provides guidance on how cloud service providers can request their emerging tech-powered products be prioritized and then implemented. The initial focus will be on artificial intelligence (AI) solutions, focusing on chat interfaces, code generators and debugging tools, image generators, and associated application program interfaces. Continue reading

Government Security: Looking From the Inside Out

With a number of high-profile security hacks involving widely used software, government agencies are retraining their focus on their organization's security measures and those of the vendors and service providers that work with them. This shift in focus was actually on the rise before the recent hacks in anticipation of cyberattacks just like the ones we've recently seen.

In January of 2020, the Defense Department implemented the Cybersecurity Maturity Model Certification (CMMC), a unified standard for implementing cybersecurity across the defense industrial base (DIB), which includes over 300,000 companies in the supply chain. Contractors have always been held responsible for implementing and documenting their IT systems' security that touch sensitive government data. Under CMMC, this continues, but adds the need for a third party to assess the contractor's compliance.

Continue reading