FCC targets costs, security and mobile communications with IT upgrade plans

The Federal Communications Commission's in-house IT infrastructure has to modernize, in order to save money and become more efficient, according to FCC CIO David Bray.

Bray, in a blog post, cited a 2012 Government Accountability Office study as saying that about 70% of federal IT money went to maintaining older systems leaving just 30% for new acquisitions and developing new capabilities.

+ALSO ON NETWORK WORLD: 6 free network vulnerability scanners | First Look: Firefox 29 +

"Moreover, this cost only captures those legacy processes automated by IT; several paper-based, manual processes exist and result in additional hidden, human-intensive costs that could benefit from modern IT automation," he wrote.

Some of the systems Bray is looking to replace, he told Network World, handle the FCC's central duties, including spectrum auctions and licensing. This is a not-inconsiderable issue, given the major auction scheduled for next year.

Mostly, however, reducing complexity is the priority.

"What I'd love to be able to say ideally within two to two and a half years from now is that I don't have 207 different systems at a commission of only 1,750 people," he said. More than 40% of those systems, he added, are more than a decade old.

Bray declined to mention specific vendors being eyed for new deployments, but stipulated that preserving the commission's existing data would be of paramount concern.

"As you can imagine, trying to extract the data out of some systems that have stored procedures, as well as code commingled with the data it's kind of difficult. But that's actually the most important thing," he said. "What's meant to be long lasting is the data, and actually making that data, as much as possible, available to the public and partners where appropriate."

Read more: Startup Victoria launched to accelerate technology startup ‘ecosystem’

The FCC IT chief also cited a need to improve the commission's public-facing websites specifically for tablet and smartphone users as a priority. But more general modernizations are apparently on the table, as well, given that the FCC still handles its complaints via physical paper forms.

"If you send in a request for the forms for the complaints, we will mail you 18 different forms, and you'll have to figure out which one of the forms is the right one, and then send it back, which we will then scan and enter into the system," Bray said, with evident chagrin. "Obviously, there's huge gains to be [made] where we ideally adopt a web-first approach."

Ensuring mobile device security for teleworkers and travelers at the FCC is also a top priority, he said. Along with end-to-end encryption, secure kernels allowing for devices to be split into personal and workplace partitions will be a critical part of achieving that goal.

"I think we need to prepare for an age in which we have bring-your-own-device," said Bray. "So while I'm hoping that you're running appropriate scans on whatever device you're bringing, and I'm hoping you have anti-virus ... I need to also be assured that if you're operating with a connection to the FCC, it's within a secure kernel, that is, for all intents and purposes, logically abstracted from whatever else is going on inside the device."

Read more: Centrify makes big strides

Email Jon Gold at jgold@nww.com and follow him on Twitter at @NWWJonGold.

Read more about infrastructure management in Network World's Infrastructure Management section.

Join the CSO newsletter!

Error: Please check your email address.

Tags Federal Communications CommissionNetworkingsecuritywirelessinfrastructure managementgovernmentindustry verticalsGovernment Accountability OfficemanagementFirefox

More about FCCFederal Communications Commission

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jon Gold

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts