2020 Forum Presentations
Information Technology (IT)
Joint IT and Software Cost Forum 2020
The Data Governance Council is a senior-leadership governance body that will mature Enterprise Data Management across the Department.
The DHS Information Technology Strategic Plan 2019-2023 sets the Information Technology (IT) goals and strategies for fulfilling the mission of DHS. It focuses on rebuilding foundations and driving innovation. With a mind to the future, it has been developed to address both the current state and our technological ambitions.
The Office of the Chief Information Officer (OCIO) is responsible for implementing the programs necessary to align DHS’s Information Technology (IT) personnel, resources, and assets.
This handbook implements the policies and requirements of the Transportation Security Administration (TSA) Management Directive (MD) 1400.3, Information Technology Security by establishing guidance applicable to the use, development, and maintenance of TSA Information Technology (IT) assets, networks, and systems.
ISAT is an easy-to-use tool for public safety officials and first responders from across the nation to identify their own information sharing capabilities and gaps.
The Public Safety Communications (PSC) Identity, Credential, and Access Management (ICAM) Working Group (WG) performed an assessment of available policy, procurement, grant, and other solicitation sources for ICAM procurement language across the Federal and State marketplace. This document provides guidance to the Public Safety Community (Community) to enhance existing infrastructure to include ICAM principles.
Leslie Hope, Information Technology Field Services Chief, United States Citizenship and Immigration Services (USCIS), talks about the joys and challenges of merging 22 components into one functional agency.
Date Added: May 23, 2018
The National Cybersecurity and Communications Integration Center (NCCIC) is aware of a set of security vulnerabilities—known as Meltdown and Spectre—that affect modern computer processors. While we are not aware of any active exploitation at this time, these vulnerabilities could allow an attacker to obtain access to sensitive information. Patching your operating system is the best way to protect yourself form these vulnerabilities.