Seven people to watch in 2007

 

Connecting state and local government leaders

SPECIAL REPORT | Seven leaders who will have a significant impact on the government IT landscape this year.


Bob Mocny, acting director, U.S. Visitor and Immigrant Status Indicator Technology program, Homeland Security Department


Impact in '07: Border management veteran Bob Mocny faces continued scrutiny from Congress and oversight agencies as well as a tight schedule to roll out upgraded systems within a restricted budget.


In addition to running daily U.S. Visit operations, Mocny's highest priority will be managing the program's migration from a two-fingerprint biometric database to a 10-fingerprint system. A key element of that upgrade will be selecting and deploying some 3,000 new fingerprint readers.


U.S. Visit officials expect to issue a request for proposals for the fingerprint readers within a few weeks. After the initial vendor selection, officials will conduct a flyoff to choose contractors for fingerprint readers.


One problem Mocny faces is delays in deployment of a biometric exit system to keep track of travelers leaving the country.


'We haven't abandoned the exit [phase of U.S. Visit],' Mocny said recently. 'One of our priorities is to put it in airports. It is easier in an airport [than at land ports of entry and exit], because we have an environment for processing [travelers].'


In 2007, Mocny also will likely lay the groundwork for a 'global security envelope' of identity management that involves international sharing of standardized biometric data. This program involves continued negotiations with European and Asian authorities as well as talks with privacy advocates here and abroad.


As a federal career employee and an acting director of the program, Mocny may lack the political slugging percentage to shift the course of U.S. Visit in 2007.
But Congress, secretary Michael Chertoff and the program's many other overseers already have set the agenda, and Mocny will be judged on how smoothly he keeps the program on track.






Mike Smith, Homeland Security Department and Security Line of Business program manager


Impact in '07: As the program lead for the IT Security Line of Business Consolidation effort, Mike Smith, a Homeland Security Department IT program manager, will need to act more like a conductor than a traditional program manager to ensure the initiative takes off.


'The biggest challenge the LOB has is pulling this conventional community together and going in a nonconventional direction,' Smith said. 'I need to get security professionals to work together as a team, and look at the federal government as an enterprise.'


The LOB will take shape in April when the shared-services providers in two of four areas'training and Federal Information Security Management Act reporting'of the initiative begin supplying services.


Smith led the Security LOB task force over the past two years, which decided on the shared-services providers and decided the minimum requirements that the SSPs will provide.


'We tried to find commonalties across the enterprise to find out how best to satisfy the requirements of most agencies,' Smith said.


Starting in April and continuing over the next 18 months, agencies will hire the SSPs as their contracts with private-sector vendors for security training or FISMA reporting expire. The SSPs also will expand to ensure they can meet every agency's needs.


Smith also will lead the formation of two new working groups that will analyze the government's requirements for Tier II training, and situational awareness and incident response in preparation for the fiscal 2009 business case submission to the Office of Management and Budget. Tier II training includes certifications, role-based training and specific training for chief information security officers and their staffs.


Additionally, the LOB will re-evaluate the findings of the 2005 task force for the fourth area of the initiative, security solutions. The security solutions area will provide a common methodology for evaluating security tools so each agency does not have to go through the process from scratch each time it acquires security products or services.






Rep. Henry Waxman (D-Calif.), chairman of the Government Reform
Committee


Impact in '07: Waxman alerted agencies even before the elections that he would scrutinize large federal contracts when he introduced his Clean Contracting Act. He pledged to bring it before the next Congress and conduct hearings to reduce waste, fraud and abuse in federal contracting.


'I plan to pursue legislation that increases competition, prevents unjustified award fees and strengthens oversight,' Waxman said.


Although he has indicated that problem contracts awarded for rebuilding Iraq and the Gulf Coast are first in his crosshairs, IT components of large problematic contracts will come under scrutiny as well.


The administration has relied extensively on IT vendors, and Waxman will examine potential harm done in some of those relationships that have not been addressed before, said Bob Woods, president of Topside Consulting and a former commissioner of the General Services Administration's Federal Technology Service.


When problems occur, such as data breaches, investigating them will be a more contentious process, and protecting personal data and privacy will rank high, Woods said.


Rep. Tom Davis (R-Va.), former chairman and now ranking minority member, had a big handicap conducting oversight because he couldn't look like he was questioning the administration, said Stan Collender, managing director of Qorvis Communications LLC of Washington. Waxman will not have that problem.


'He will have a freer hand and will not be taking calls from the White House,' he said.


Olga Grkavac, executive vice president of the Information Technology Association of America, anticipates heavy IT oversight early on.


'We hope this is not a gotcha situation,' she said.


Oversight will need an upside, Collender said.


'If the hearings look like witch hunts, he will lose support. But if they are more important, substantive and produce results, he will have tremendous support for doing more of them,' he said.





Gregory Garcia, Homeland Security Department's assistant secretary for cybersecurity and telecommunications


Impact in '07: The business community finally has received what it spent three years asking for'a person high up enough in the DHS power structure to make a credible commitment to protecting the nation's IT infrastructure.


Now, Gregory Garcia just has to make sure the nation's telecommunications systems and computer networks don't get taken down by either natural or man-made disasters.


One of Garcia's top priorities for 2007 is to use his position as a bully pulpit.
'I want to help develop a well-informed public at both the enterprise level and individual consumer level,' Garcia said. 'It's a matter of getting out and talking. Doing a lot of talking.'


Garcia will work with the Office of Management and Budget this year to 'raise the bar for federal agencies' on implementing sound security practices.


But his responsibilities extend beyond government cybersecurity. Garcia also will try to build a public-private partnership that will let government and industry coordinate incident responses in the face of an attack or disaster. He also will establish a new national office of emergency communications.


'[The office] is dedicated to emergency and interoperable communications; that is an added bonus to my portfolio,' he said.





Kevin Messner, associate administrator in GSA's Office of Congressional and Intergovernmental Affairs and Governmentwide Policy


Impact in '07: With the GSA administrator's decision to combine the Office of Governmentwide Policy with the Congressional and Intergovernmental Affairs Office late last month, Messner walks into a new role in shaping how GSA supports e-government and the Lines of Business. He said the goal is to make GSA work better by intertwining policy, legislation and regulations.


'Strong communications along the entire line of legislation, regulations and policy is very important,' said Messner, a political appointee and a former Capitol Hill chief of staff who has mechanical engineering and international management degrees. 'GSA is uniquely situated to affect government in many aspects because legislation feeds regulations, which feeds policies, and the feedback among the three needs to continually happen.'


But some observers think GSA merged the offices to have a political appointee act as a buffer with the Office of Management and Budget's IT and E-Government office.


For many years, OMB has used OGP as its operational arm to move initiatives forward, but GSA administrator Lurita Doan isn't happy with that role.


'The idea around the merger was focused on the One GSA policy that Doan is pushing,' said a senior IT manager, who requested anonymity. 'OGP was founded on objectivity, but there will be more of a conflict with the merger.'


Larry Allen, executive vice president of the Coalition for Government Procurement, an industry association in Washington, said Messner's biggest challenge is to ensure agencies and vendors understand OGP's role in and out of GSA.


Neil Fox, a former GSA procurement official, agreed with Allen's assessment, and added that a lot of OGP's work over the last year moved to the Federal Acquisition Service so Messner must clearly define the new office's role.





Air Force Lt. Gen. Robert Elder Jr., commander, Air Force Cyberspace Command


Impact in '07: Cyberspace is the new frontier in warfare, and Lt. Gen. Bob Elder is the sheriff who will lead the posse.


Already the commander of the 8th Air Force, based at Barksdale Air Force Base, La., and joint functional component commander for global strike and integration for U.S. Strategic Command, Elder now is the nation's first cybergeneral.


'Our first priority is to establish cyberspace as a warfighting domain characterized by the use of electronics and the electromagnetic spectrum,' Elder said. 'The Air Force now recognizes that cyberspace ops is a potential center of gravity for the United States and, much like air and space superiority, cyberspace superiority is a prerequisite for effective operations in all warfighting domains.'


How Elder goes about building the military's capability to wage offensive war in cyberspace is what will be answered over the next 12 months.


The evidence has been increasing in recent months that nation-states such as China, North Korea, Iran and other countries hostile to the United States are probably funding, if not actually carrying out, many of the millions of probes of DOD systems launched each day.


'We are already at war in cyberspace,' said Lani Kass, director of the Air Force's cyberspace task force, when Elder was appointed. 'Having a [commander] there that thinks about this issue exclusively, focuses not only his organizational capabilities but his mind as a warfighter, he can not only respond to the threat of today, ... he can plan and think about the fight we are going to be in tomorrow and the day after tomorrow and 20 years out.'






Robert Howard, CIO of Veterans Affairs Department


Impact in '07: Veterans Affairs Department CIO Robert Howard will be in the spotlight this year for how well he delivers on pledges to make VA a model for IT security. He stepped into his position just as VA was pilloried in congressional hearings for gaping holes in data security and lack of enforcement following the theft of a VA notebook PC containing the personal data of 26 million veterans.


The data breaches ended up being a catalyst for overhauling VA's IT environment. VA secretary James Nicholson directed that the department CIO assume authority for IT management, operations and application development from the health, benefits and burial administrations. Howard also gained enforcement authority over IT security.


Nicholson's actions to centralize VA's IT authority could establish a model for other large, decentralized agencies, according to the former chairman and now ranking member of the House Veterans' Affairs Committee, Steve Buyer (R-Ind.). But Howard must do the heavy lifting to make it happen.


'We do need one thing, and that's time, and we don't have that,' Howard said.
This year, Howard will move applications development personnel under his authority and complete more activities from its Data Security Assessment and Controls program to implement VA data security controls, resolve IT material weaknesses and create an environment of vigilance, he said.


He hopes to use the example of VA's transformation of health care into the gold standard for data security.


At the same time, Howard will advance plans for the development of HealtheVetVistA, VA's modernized version of its electronic health record, and its Financial and Logistics Integrated Technology Enterprise, its financial management program to replace the failed CoreFLS system.

NEXT STORY: LCD has bright lights, big picture

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.