151
results found in
16 ms
Page 1
of 16
FEMA Needs to Address Management Weaknesses to Improve Its Systems
Controls in emergency management GAO audited the agency of the Department of Homeland Security, responsible for federal efforts to mitigate, respond to, and recover from disasters. American auditors recommend that the agency fully define its investment board’s roles and responsibilities and procedures for selecting and overseeing investments, update its strategic plan and complete plans for IT modernization, and establish time frames for completing workforce planning efforts. The agency should also establish policies and guidance for implementing key IT management controls.
Full description
Controls in emergency management GAO audited the agency of the Department of Homeland Security, responsible for federal efforts to mitigate, respond to, and recover from disasters. American auditors recommend that the agency fully define its investment board’s roles and responsibilities and procedures for selecting and overseeing investments, update its strategic plan and complete plans for IT modernization, and establish time frames for completing workforce planning efforts. The agency should also establish policies and guidance for implementing key IT management controls.
Full description
General Accountability Office
, issued in 2016
Risk cases: 4
Information Technology Cost Estimation Agencies Need to Address Significant Weakness in Policies and Practices
To estimate reliable cost for the sucess of an IT program by providing the basis for the informed decision making and realistic budget information. To assess the extent to which selected departments ... and agencies have appropriately implement costestimating policies an procedures(four caracteristics of a reliable cost estimation: comprehensive, well-documented, accurate, credible). ... IT cost estimation ... Check out what may go wrong with the information technology cost estimation. Results of the US GAO audit can help to identify high risk areas: comprehensiveness of estimations, their documentation ... , lack of adequacy and inadequate implementation.
Full description
To estimate reliable cost for the sucess of an IT program by providing the basis for the informed decision making and realistic budget information. To assess the extent to which selected departments ... and agencies have appropriately implement costestimating policies an procedures(four caracteristics of a reliable cost estimation: comprehensive, well-documented, accurate, credible). ... IT cost estimation ... Check out what may go wrong with the information technology cost estimation. Results of the US GAO audit can help to identify high risk areas: comprehensiveness of estimations, their documentation ... , lack of adequacy and inadequate implementation.
Full description
General Accountability Office
, issued in 2012
Risk cases: 4
Federal Agencies Need to Address Aging Legacy Systems
Be aware of legacy IT risks The US government spends about 75 percent of the total amount budgeted for information technology on operations and maintenance. GAO reviewed Office of Management and Budget and 26 agencies, covering years 2010 through 2017 and recommends to develop a goal for spending measure and finalize guidance to identify and prioritize legacy IT needing to be modernized or replaced.
Full description
Be aware of legacy IT risks The US government spends about 75 percent of the total amount budgeted for information technology on operations and maintenance. GAO reviewed Office of Management and Budget and 26 agencies, covering years 2010 through 2017 and recommends to develop a goal for spending measure and finalize guidance to identify and prioritize legacy IT needing to be modernized or replaced.
Full description
General Accountability Office
, issued in 2016
Risk cases: 3
CYBERSECURITY: Implementation of Executive Order Requirements Is Essential to Address Key Actions
GAO continues to review and report status of information security - the high-risk area for more than 25 years already. Special focus is on federal cybersecurity challenges. An average of approximately 31,492 incidents per year for fiscal years 2017 through 2022 were reported by responsible Government bodies. In fiscal year 2022, agencies reported experiencing 30,659 incidents.
Full description
GAO continues to review and report status of information security - the high-risk area for more than 25 years already. Special focus is on federal cybersecurity challenges. An average of approximately 31,492 incidents per year for fiscal years 2017 through 2022 were reported by responsible Government bodies. In fiscal year 2022, agencies reported experiencing 30,659 incidents.
Full description
US Government Accountability Office
, issued in 2024
Risk cases: $risks.size()
Copyright Office Needs to Develop Plans that Address Technical and Organizational Challenges
The mission of the Copyright Office, a service unit within the Library of Congress, is to promote creativity by administering and sustaining a national copyright system. As part of this mission ... , the Copyright Office registers about 500,000 creative works a year for copyright and records documentation related to copyright transfer and sale. In recent years, the Register of Copyrights has discussed ... the need for a modernized Copyright Office, to include upgrades to the current IT environment. ... No justified investments without IT strategy ... GAO shows in its report on the US Copyright Office, what is a role of IT strategy in organisaion. Effects can be found at the bottom and at the top: the lack of strategic plan can make it more ... difficult to solve practical problems, but it can also put the overall mission of the Office at risk.
Full description
The mission of the Copyright Office, a service unit within the Library of Congress, is to promote creativity by administering and sustaining a national copyright system. As part of this mission ... , the Copyright Office registers about 500,000 creative works a year for copyright and records documentation related to copyright transfer and sale. In recent years, the Register of Copyrights has discussed ... the need for a modernized Copyright Office, to include upgrades to the current IT environment. ... No justified investments without IT strategy ... GAO shows in its report on the US Copyright Office, what is a role of IT strategy in organisaion. Effects can be found at the bottom and at the top: the lack of strategic plan can make it more ... difficult to solve practical problems, but it can also put the overall mission of the Office at risk.
Full description
General Accountability Office
, issued in 2015
Risk cases: 2
The National Offender Management Information System (NOMIS)
’ fitness to deliver. The aim of one integrated information system (C-NOMIS i.e. National Offender Management Information System) was to improve information sharing about offenders; address the lack ... This report examines the reasons for the delays and cost increases to the original integrated information system and, since the moratorium imposed by the Minister of State in order to seek options ... for project’s cost reduction, the aims of the revised National Offender Management Service (NOMS) and the progress made, the impact of the delays and rescoping on the costs and benefits achieved, and NOMS ... Rescoping necessary, but not fully successful ... An initiative to build a single offender management IT system for the prison and probation services has not delivered value for money. The NAO investigation found the project had been hampered ... by poor management leading to a three-year delay, a doubling in project costs and reductions in scope and benefits.
Full description
’ fitness to deliver. The aim of one integrated information system (C-NOMIS i.e. National Offender Management Information System) was to improve information sharing about offenders; address the lack ... This report examines the reasons for the delays and cost increases to the original integrated information system and, since the moratorium imposed by the Minister of State in order to seek options ... for project’s cost reduction, the aims of the revised National Offender Management Service (NOMS) and the progress made, the impact of the delays and rescoping on the costs and benefits achieved, and NOMS ... Rescoping necessary, but not fully successful ... An initiative to build a single offender management IT system for the prison and probation services has not delivered value for money. The NAO investigation found the project had been hampered ... by poor management leading to a three-year delay, a doubling in project costs and reductions in scope and benefits.
Full description
National Audit Office
, issued in 2009
Risk cases: 4
CRITICAL INFRASTRUCTURE PROTECTION: EPA Urgently Needs a Strategy to Address Cybersecurity Risks to Water and Wastewater Systems
US GAO reviewed cybersecurity threats facing the water sector and the federal government’s efforts to address these threats. Auditors found out problems including: funding prioritization, incident reporting, sector-wide risk assessment and vulnerability self-assessment tool. Recent cyber incidents highlight the vulnerability of the 170,000 water and wastewater systems in the U.S. water sector.
Full description
US GAO reviewed cybersecurity threats facing the water sector and the federal government’s efforts to address these threats. Auditors found out problems including: funding prioritization, incident reporting, sector-wide risk assessment and vulnerability self-assessment tool. Recent cyber incidents highlight the vulnerability of the 170,000 water and wastewater systems in the U.S. water sector.
Full description
US Government Accountability Office
, issued in 2024
Risk cases: $risks.size()
Data security and positions with access to confidential information
This government wide audit on information security and positions with access to confidential information has been performed at all ministries ans for each ministry also at one of the agencies ... . The 2007 Civil Service Data Information Security Decree (in Dutch: VIR 2007) is the legal foundation of the first part of this audit (data security). The Security Screening Act (in Dutch: WVO ... ) is the foundation of the second part (positions with access to confidential information). Only four of the organizations we have audited show an acceptible level of compliance with the 2007 Civil Service Data ... ... Shortcomings in information security and in positions with access to confidential information ... protection policy and poor protection of information systems. Also, non vetted positions with access to confidential information. ... Surprising weaknesses were revealed by the NCA in its Government-wide operational audit performed as part of the 2011 audit into the state of central government accounts: Poor quality of data
Full description
This government wide audit on information security and positions with access to confidential information has been performed at all ministries ans for each ministry also at one of the agencies ... . The 2007 Civil Service Data Information Security Decree (in Dutch: VIR 2007) is the legal foundation of the first part of this audit (data security). The Security Screening Act (in Dutch: WVO ... ) is the foundation of the second part (positions with access to confidential information). Only four of the organizations we have audited show an acceptible level of compliance with the 2007 Civil Service Data ... ... Shortcomings in information security and in positions with access to confidential information ... protection policy and poor protection of information systems. Also, non vetted positions with access to confidential information. ... Surprising weaknesses were revealed by the NCA in its Government-wide operational audit performed as part of the 2011 audit into the state of central government accounts: Poor quality of data
Full description
Netherlands Court of Audits
, issued in 2012
Risk cases: 3
Management of State Information Resources
The objective of the audit was to assess effectiveness of the management of the state information resources and of the use of their possibilities: suitability of the chosen state resources management ... model; rationality of the use of the State Budget funds when managing information resources; use of the possibilities of the state information resources to improve the performance of the public sector ... . Audit procedures were performed in all major institutions which form and implement the policy of information resources: Ministry of Transport and Communications, Ministry of the Interior, Ministry ... Well targeted requirements, interconnected information resources and broad use - why so difficult to be gained? ... The leading idea of the 'Approach to Management of State Information Resources' programme was to entrench a comprehensive management of data resources. After five years preparations, the desired ... momentum was still not the case. SAI Lithuania analysed roots of the problems: concept, poor use of funds, lack of interconnections, unsatified users.
Full description
The objective of the audit was to assess effectiveness of the management of the state information resources and of the use of their possibilities: suitability of the chosen state resources management ... model; rationality of the use of the State Budget funds when managing information resources; use of the possibilities of the state information resources to improve the performance of the public sector ... . Audit procedures were performed in all major institutions which form and implement the policy of information resources: Ministry of Transport and Communications, Ministry of the Interior, Ministry ... Well targeted requirements, interconnected information resources and broad use - why so difficult to be gained? ... The leading idea of the 'Approach to Management of State Information Resources' programme was to entrench a comprehensive management of data resources. After five years preparations, the desired ... momentum was still not the case. SAI Lithuania analysed roots of the problems: concept, poor use of funds, lack of interconnections, unsatified users.
Full description
National Audit Office of the Republic of Lithuania
, issued in 2013
Risk cases: 3
Traffic Ticketing information system
The audit included two areas of focus - the environment surrounding the Traffic Ticketing Information System - the System (designed to input, process, manage and collect payment for the traffic ... tickets) and also the internal environment of the System that guarantees the quality of its performance and safety. ... Security can hinder effectiveness ... SAI of Kuwait analysed system supporting collection of the traffic tickets - data input, processing and management. What was found was lack of basic safety measures, that hindered the effectiveness ... of the system.
Full description
The audit included two areas of focus - the environment surrounding the Traffic Ticketing Information System - the System (designed to input, process, manage and collect payment for the traffic ... tickets) and also the internal environment of the System that guarantees the quality of its performance and safety. ... Security can hinder effectiveness ... SAI of Kuwait analysed system supporting collection of the traffic tickets - data input, processing and management. What was found was lack of basic safety measures, that hindered the effectiveness ... of the system.
Full description
State Audit Bureau of Kuwait
, issued in 2014
Risk cases: 3