ATF CIO Pushes for a More Mobile Government

WASHINGTON -- Departments and agencies across the federal government are increasingly warming to policies that would allow more employees to work remotely more often, inviting into the enterprise a host of new devices and collaborative applications, according to Rick Holgate, CIO of the Bureau of Alcohol, Tobacco, Firearms and Explosives and a leading advocate for incorporating mobile technology into the federal government.

[ Government CIOs Insist on Business Case for Mobile Deployments ]

Speaking here at a government tech conference, Holgate said that the feds are "extremely optimistic" about the benefits to emerge from a more mobile labor force, where the technology and work patterns are better aligned with how people use devices and applications in their personal lives.

"That's really what's changed in the last five to 10 years, we've all become much more accustomed to having technology at our fingertips, having our own technology, and having the ability to do things on demand, in real time on those types of platforms," Holgate said. "We're also used to being connected everywhere we are. We don't have to be sitting at a desk anymore to be productive or to be connected or to have access to information and applications."

A More Mobile Government Would be a More Productive Government

The Obama administration has identified mobility as one of the leading objectives in its broad-ranging agenda for overhauling the government's IT operations, along with cloud computing, open data and social applications, among other areas of focus. To Holgate, though, mobility is less an end in itself than it is a vehicle to support a more agile, productive workforce able to connect remotely to an enterprise cloud and collaborate with other members of their team.

"All of these administration priorities reflect the importance of mobility and the reality of mobility and how the federal government can move more quickly and more aggressively to embrace and adopt mobility across the board," Holgate said.

In a recent survey, federal IT managers said that they expected that always-on access to the enterprise could boost worker productivity by seven hours a week, amounting to an average of $14,000 in projected productivity gains each year. At the same time, a large majority said that they were frustrated by the mobile situation at their agency, citing slow connections, security hassles and inadequate infrastructure as their chief complaints.

Mobility Security Challenges Can be Overcome

Indeed, the feds are well aware of the distinct risks that arise with a mobile workforce, where the long list of challenges includes lost devices, authentication and remote data security.

"Mobility comes with a lot of new challenges that we're not used to because now we're dealing in a much more open, diverse ...environment than we've been used to," Holgate acknowledged.

But security concerns alone are not an insurmountable obstacle, he argued. In May, the federal CIO Council announced a new set of mobile security standards and a reference architecture to help agencies standardize security in their mobile computing environments. That framework was the product of a joint effort that brought together specialists from multiple departments with a hand in information security, including the departments of Defense, Homeland Security and Commerce.

It was, according to Holgate, an unprecedented collaboration.

"That's the first of its kind ever, I would say, in the federal government to really establish a consistent way of thinking about security across federal agencies. That's pretty much unprecedented. Every other instance of security adoption in the federal government has been very much agency-dependent, agency-specific," he said.

"This was the first time that we ever attempted as a federal government to establish a baseline of security across the entire federal government, and one that multiple agencies participated in and agreed to," Holgate added. "And what this allows us to do now is to adopt much more common and efficient solutions because now we don't have to argue over what the security baseline is or what the security controls are that we have to implement."

Kenneth Corbin is a Washington, D.C.-based writer who covers government and regulatory issues for

Follow everything from on Twitter @CIOonline, on Facebook, and onGoogle +.

Read more about government in CIO's Government Drilldown.

Join the CSO newsletter!

Error: Please check your email address.

Tags business issuesFirearms and ExplosivesManagement Topics | Governmentmobilepush for mobile governmentIT managementCIOBureau of Alcoholconsumerization of ITBYODmobile governmentManagement Topicstobaccosecuritymobile securitybusiness

More about CIO CouncilFacebookGoogle

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Kenneth Corbin

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts