GEM

Government Management Information Sciences

Naylor Association Solutions
Naylor Association Solutions
Naylor Association Solutions
Naylor Association Solutions
Naylor Association Solutions
Legislative Issues
Mounting threats, new technology and the Wild West mentality of the Web spur discussion on whether the government should assume more of a leadership role. (GovTech.com)

Visit http://www.govtech.com/federal/Report-What-is-the-US-Governments-Role-in-Cybersecurity.html to view the full article online.

 
The recent emergence of body-worn cameras has already had an impact on policing, and this
impact will only increase as more agencies adopt this technology.

Visit http://www.justice.gov/iso/opa/resources/472014912134715246869.pdf to view the full article online.

 
In Washington, D.C., city officials are considering the nation’s most publicly accessible police-body-cam policy. (The Atlantic)

Visit http://www.theatlantic.com/technology/archive/2015/08/police-worn-body-camera-footage-video-washington-dc-new-policy/401468/ to view the full article online.

 
CIOs need to develop better ways to measure the impact of technology. (GovTech.com)

Visit http://www.govtech.com/opinion/Metrics-That-Matter-How-Does-Technology-Affect-Government-Outcomes.html to view the full article online.

 
Professional Development and Leadership
Try these tips to recruit younger workers to your ranks. (State Tech)

Visit http://www.statetechmagazine.com/article/2015/08/it-leaders-seek-solve-age-old-problem to view the full article online.

 
Everyone seems to think that there’s a lack of qualified security professionals, and that the reason is that there aren’t enough people entering the field with the required skills. (CIO)

Visit http://www.cio.com/article/2979866/cyber-attacks-espionage/the-myth-of-the-cybersecurity-skills-shortage.html to view the full article online.

 
Geek's Corner
Recently, I received an article from GCN about changing the trust method on a network to trusting no one, including PCs on the private network. It reminded me of an idea I have been toying with for years: firewalling our datacenter off from everyone, including our users. In a similar fashion to the article, it makes perfect sense when you break it into simplest form. Treat everyone as if they are the enemy and your defenses will be better.

Visit http://www.naylornetwork.com/gms-nwl/articles/index.asp?aid=338473&issueID=45125 to view the full article online.

 
New operating systems are always a cause for concern among government users, especially because with most agencies, fancy new features and usability improvements take a back seat to simply getting the job done. (TechInsider)

Visit http://www.nextgov.com/technology-news/tech-insider/2015/08/cracking-open-windows-10-can-windows-10-serve-and-protect-government-users/119426/ to view the full article online.

 
Law enforcement agencies and first responders would do well to acclimate themselves to Facebook, Twitter, Pinterest and other social media sites as additional tools in the emergency management toolbox. (American City & County)

Visit http://americancityandcounty.com/blog/viewpoint-aid-emergency-management-turn-social-media to view the full article online.

 
GMIS International Headquarters
PO Box 27923 Austin, TX 78755 | 877-963-4647
www.gmis.org