A new state commission will focus on maintaining security of computer systems and data — cybersecurity — for Rhode Island government operations, as well as growing the cybersecurity industry in the state.
Federal and state enterprises that had been working with G4S Government Services will soon be working with American group Centerra, soon to be the largest American-owned provider of protective services to the Federal Government.
Being a government organization that services every facet of the public, there is a whole host of different scenarios that take place on a daily basis,” says Kirk Simmons, Security Manager for Hennepin County in Minnesota. “There are occasions where people are getting their kids taken away from them or they’re being told they need to pay a lot of money in taxes. So, for them, it’s not a really pleasant experience all the time. So, as the security department, we want to ensure that employees and the people utilizing our services can do so in a safe manner. We’re there to protect them and make sure they do what they need to do and get home safely.”
More than a third of the Federal government’s total IT budget could be saved by utilizing shared services through cloud computing.
April 1, 2014
According to MeriTalk’s report Shared Services: Ready or Not?, underwritten by ServiceNow, 87 percent of Feds believe that cloud computing has transformed their view of shared services, but just 53 percent use shared services today. Only 44 percent say their agency currently offers IT services to other agencies.
The global biometrics market is expected to reach $20 billion by 2018, according to the recently released second edition of the Global Biometrics System Market Forecast & Opportunities, 2018 report. While public sector adoption of biometrics trails that of the private sector – as is the case with many emerging technologies – adoption across the U.S. government is accelerating.
Change-makers, thought leaders and industry pioneers, these 16 security executives, legislators and mavericks are making a difference in security, impacting enterprises, communities and nations. Can Hackers Really Control Airplanes? Discover 3 steps for timely cyber intrusion detection. Read all this and more in the September 2015 issue of Security.