82
results found in
11 ms
Page 2
of 9
ACQUISITION REFORM: DOD Should Streamline Its Decision-Making Process for Weapon Systems to Reduce Inefficiencies
Refinement of decision-making processes The US Department of Defense (DOD) has long sought to improve the efficiency of its weapon system acquisition process, including the time and effort needed to complete the milestone decision process. Good practices of some DOD programs and five commercial firms were used by GAO to look for new momentum in refining the process.
Full description
Refinement of decision-making processes The US Department of Defense (DOD) has long sought to improve the efficiency of its weapon system acquisition process, including the time and effort needed to complete the milestone decision process. Good practices of some DOD programs and five commercial firms were used by GAO to look for new momentum in refining the process.
Full description
US Government Accountability Office
, issued in 2015
Risk cases: $risks.size()
ACQUISITION REFORM: DOD Should Streamline Its Decision-Making Process for Weapon Systems to Reduce Inefficiencies
Refinement of decision-making processes The US Department of Defense (DOD) has long sought to improve the efficiency of its weapon system acquisition process, including the time and effort needed to complete the milestone decision process. Good practices of some DOD programs and five commercial firms were used by GAO to look for new momentum in refining the process.
Full description
Refinement of decision-making processes The US Department of Defense (DOD) has long sought to improve the efficiency of its weapon system acquisition process, including the time and effort needed to complete the milestone decision process. Good practices of some DOD programs and five commercial firms were used by GAO to look for new momentum in refining the process.
Full description
US Government Accountability Office
, issued in 2015
Risk cases: $risks.size()
ACQUISITION REFORM: DOD Should Streamline Its Decision-Making Process for Weapon Systems to Reduce Inefficiencies
Refinement of decision-making processes The US Department of Defense (DOD) has long sought to improve the efficiency of its weapon system acquisition process, including the time and effort needed to complete the milestone decision process. Good practices of some DOD programs and five commercial firms were used by GAO to look for new momentum in refining the process.
Full description
Refinement of decision-making processes The US Department of Defense (DOD) has long sought to improve the efficiency of its weapon system acquisition process, including the time and effort needed to complete the milestone decision process. Good practices of some DOD programs and five commercial firms were used by GAO to look for new momentum in refining the process.
Full description
US Government Accountability Office
, issued in 2015
Risk cases: $risks.size()
ACQUISITION REFORM: DOD Should Streamline Its Decision-Making Process for Weapon Systems to Reduce Inefficiencies
Refinement of decision-making processes The US Department of Defense (DOD) has long sought to improve the efficiency of its weapon system acquisition process, including the time and effort needed to complete the milestone decision process. Good practices of some DOD programs and five commercial firms were used by GAO to look for new momentum in refining the process.
Full description
Refinement of decision-making processes The US Department of Defense (DOD) has long sought to improve the efficiency of its weapon system acquisition process, including the time and effort needed to complete the milestone decision process. Good practices of some DOD programs and five commercial firms were used by GAO to look for new momentum in refining the process.
Full description
US Government Accountability Office
, issued in 2015
Risk cases: $risks.size()
ACQUISITION REFORM: DOD Should Streamline Its Decision-Making Process for Weapon Systems to Reduce Inefficiencies
Refinement of decision-making processes The US Department of Defense (DOD) has long sought to improve the efficiency of its weapon system acquisition process, including the time and effort needed to complete the milestone decision process. Good practices of some DOD programs and five commercial firms were used by GAO to look for new momentum in refining the process.
Full description
Refinement of decision-making processes The US Department of Defense (DOD) has long sought to improve the efficiency of its weapon system acquisition process, including the time and effort needed to complete the milestone decision process. Good practices of some DOD programs and five commercial firms were used by GAO to look for new momentum in refining the process.
Full description
US Government Accountability Office
, issued in 2015
Risk cases: $risks.size()
ACQUISITION REFORM: DOD Should Streamline Its Decision-Making Process for Weapon Systems to Reduce Inefficiencies
Refinement of decision-making processes The US Department of Defense (DOD) has long sought to improve the efficiency of its weapon system acquisition process, including the time and effort needed to complete the milestone decision process. Good practices of some DOD programs and five commercial firms were used by GAO to look for new momentum in refining the process.
Full description
Refinement of decision-making processes The US Department of Defense (DOD) has long sought to improve the efficiency of its weapon system acquisition process, including the time and effort needed to complete the milestone decision process. Good practices of some DOD programs and five commercial firms were used by GAO to look for new momentum in refining the process.
Full description
US Government Accountability Office
, issued in 2015
Risk cases: $risks.size()
Has Public Administration Used All Opportunities for Efficient Management of ICT Infrastructure?
Efficient Management of ICT Infrastructure Centralised management of ICT services and infrastructure would allow the institutions to optimise in long run their resources – financial, human, material and technical. However, we observed during the audit that the move towards ICT centralisation and single data centres has ceased. The different ministries and even the institutions subordinated to the same ministry do not cooperate sufficiently with each other regarding the ICT management, maintenance, and infrastructure placement. They rather choose to maintain their own, sometimes even several, data centres.
Full description
Efficient Management of ICT Infrastructure Centralised management of ICT services and infrastructure would allow the institutions to optimise in long run their resources – financial, human, material and technical. However, we observed during the audit that the move towards ICT centralisation and single data centres has ceased. The different ministries and even the institutions subordinated to the same ministry do not cooperate sufficiently with each other regarding the ICT management, maintenance, and infrastructure placement. They rather choose to maintain their own, sometimes even several, data centres.
Full description
State Audit Office of the Republic of Latvia
, issued in 2019
Risk cases: 3
Online fraud
Uneven response to online fraud This type of fraud can affect everyone, but yet it is not a strategic priority for local police forces and the response from industry is uneven. UK NAO underlines: For too long, as a low-value but high-volume crime, online fraud has been overlooked by government, law enforcement and industry. It is a crime that can affect everyone. Fraud is now the most commonly experienced crime in England and Wales, is growing rapidly and demands an urgent response. Yet fraud is not a strategic priority for local police forces, and the response from industry is uneven.
Full description
Uneven response to online fraud This type of fraud can affect everyone, but yet it is not a strategic priority for local police forces and the response from industry is uneven. UK NAO underlines: For too long, as a low-value but high-volume crime, online fraud has been overlooked by government, law enforcement and industry. It is a crime that can affect everyone. Fraud is now the most commonly experienced crime in England and Wales, is growing rapidly and demands an urgent response. Yet fraud is not a strategic priority for local police forces, and the response from industry is uneven.
Full description
National Audit Office
, issued in 2017
Risk cases: 6
Management of IT security in systems outsourced to external suppliers
Security to be improved in IT processes outsourced to external suppliers When IT processes are outsourced to external suppliers, the authorities no longer have direct control of the IT security, but remain responsible for managing the security of the IT. Authorities that fail to manage IT security actively based on risk assessments, and omit to monitor the implementation of these requirements, will not be able to determine if the level of IT security in the outsourced systems safeguards their systems and data. This is how the conclusion of the Rigsrevisionen starts. The Danish auditors noticed improvement in the audited entities, but they add that tha majority of the auditees: can refine their requirements for and follow-up on access control and logging practices
Full description
Security to be improved in IT processes outsourced to external suppliers When IT processes are outsourced to external suppliers, the authorities no longer have direct control of the IT security, but remain responsible for managing the security of the IT. Authorities that fail to manage IT security actively based on risk assessments, and omit to monitor the implementation of these requirements, will not be able to determine if the level of IT security in the outsourced systems safeguards their systems and data. This is how the conclusion of the Rigsrevisionen starts. The Danish auditors noticed improvement in the audited entities, but they add that tha majority of the auditees: can refine their requirements for and follow-up on access control and logging practices
Full description
National Audit Office of Denmark
, issued in 2016
Risk cases: 3
Security of servers managed by the Danish Agency for Governmental IT Services
Servers are essential part of IT infrastructure. At the same time, they are vulnerable to cyberattacks, because they can be exploited by hackers to gain unauthorized access to the system and steal sensitive information, corrupt data, or cause systems to malfunction. Once the security of a server is compromised, attackers can gain access to other computers and servers across the network. Danish auditors paid attention to risky stages of servers lifecycle. The Danish Agency for Governmental IT Services managed 5,353 servers on behalf of 46 authorities in time of the audit. 537 of these servers were no longer supported by their developers because they have reached the end of their lifecycle.
Full description
Servers are essential part of IT infrastructure. At the same time, they are vulnerable to cyberattacks, because they can be exploited by hackers to gain unauthorized access to the system and steal sensitive information, corrupt data, or cause systems to malfunction. Once the security of a server is compromised, attackers can gain access to other computers and servers across the network. Danish auditors paid attention to risky stages of servers lifecycle. The Danish Agency for Governmental IT Services managed 5,353 servers on behalf of 46 authorities in time of the audit. 537 of these servers were no longer supported by their developers because they have reached the end of their lifecycle.
Full description
National Audit Office of Denmark
, issued in 2023
Risk cases: $risks.size()