Closing the Gap by Lisa De Luca
15/08/2016
As anybody who has been paying attention to federal headlines or budgets can tell you, the government is making major pushes to update its cybersecurity positioning. And for good reason - both the frequency and severity of cyberattacks are growing by the day. This has brought about the revelation that the government has a number of skills gaps concerning its cyber capabilities. However, while mending cyber skills gaps should be a pressing priority for the government, focusing too narrowly on cybersecurity may come at the cost of missing other equally severe shortcomings within the larger realm of information management. As pointed out in the first blog in this series (Uncovering Hidden Risk Within Federal Information Management Programs), there is a burgeoning information management skills gap that has yet to be recognized.
NextGen InfoPro and the Inherent Skills Gaps
If you missed our initial post, it dealt with a recent Iron Mountain survey that polled federal managers responsible for records and information management (RIM) in their agencies in order to identify their priorities and concerns over the next three to five years. This survey demonstrated that concerning gaps exist between the skills records management professionals currently have and those they believe will be required of them in the near future. Addressing these gaps will strengthen the management of information in the agencies, and will help secure that information across both physical and digital asset formats.
While nearly half (46%) of federal information management professionals cite managing all types of information assets, regardless of format, as a priority for their field, many feel unprepared to handle the future requirements of doing so. The survey also called out these areas of need:
Agencies recognize the need for improvement of key skills: Risk management (34%) is most often cited as an area for improvement, followed by electronic records retention (24%), RIM practices (24%) and analytics (21%)
Risk management/security/data privacy (54%), analytics (42%) and content/records management (33%) are the most desired skill sets
Information security (52%) is by far the technical skill in greatest demand, while innovative thinking (39%) came in as the soft skill most in demand
Given this information, what can agencies do to prevent this skills gap from becoming a major problem?
Remedying Through Training
Increasing the amount of training available to employees seems to be the best way to accomplish this, according to the survey results. Although agencies currently do offer training to help their employees' professional growth, more could be done in this area. Currently, agencies support professional growth through a variety of means with internal training being noted most often by survey respondents (60%). Almost half also indicate they receive support from their agency in the form of professional development plans and paying for external training.
Providing more training in various areas of expertise is cited most often as a way to motivate and support professional development. About one-half feel that the National Archives and Records Administration (NARA) should provide more specific training courses toward certification and deliver progressive training courses via online modules or webinars as ways to motivate understanding and adherence, and support professional development.
Additional Steps
Agencies should also promote the knowledge and mentoring skills of experienced staff before they leave the agency for retirement. These individuals hold a rich repository of knowledge that should be tapped as part of a wider mentoring and training regimen. This will help with the very important task of information transfer and ensure continuity of operations over the longer term. In addition, a focus on developing specialized technical skills, such as agile development, Lean Six Sigma and application and process integration will be important to address the specialized areas in demand. Agencies can also help foster soft skills that were rated as only adequate' or below, such as communications (68%), change management (46%)and use case development (50%) for enhanced internal communications and information sharing.
Readying for the Next Generation
Agencies should take note that most employees are actively seeking professional development opportunities over three-quarters of respondents agree they are proactive in seeking additional training and education to enhance their professional skills. To mitigate rising skills gaps before they occur and to meet this internal demand for training, agencies should consider professional development programs delivered according to employee's preferences, such as in-office training, professional conferences and online courses and webinars.
As the government increasingly collects and utilizes larger stores of information, it cannot afford to have any capability gap compromise the integrity and progress to date of its information keepers. In order to prepare for the next generation of information professionals, agencies need to be doing all that they can in the present to actively engage their employees and provide attractive training, awareness and professional development programs that may save them from having to contend with future skills gaps.
LINK: | http://blogs.ironmountain.com/2016/industry/federal-government-records... |
See more stories from ironmountain |
More from Iron Mountain Entertainment Services
14/06/2017
HIMs in the Driver Seat: Accelerating Data Integrity Efforts by Michelle Urban
Early on in EMR implementation it was all about getting up and running to realize the incentive payments offered by the government. How could legacy information...
14/06/2017
SMB Tax Season: Would Your Business Pass an IRS Audit? by Melissa Cantarow
If you run or work at a small business, you know there are many perks. From the close relationships to the opportunities to take on new skills and roles, there&...
14/06/2017
Are You Looking for Custom Kitting Solutions? Then Look No Further by Leslie Barton
Custom kitting can be viewed as the process by which your business touches pro...
29/03/2017
Leading the way to data quality by Karen Snyder
This year's Healthcare Information and Management Systems Society (HIMSS) Annual Conference had another record-setting year for attendance, with over 40,000...
28/03/2017
Leading the Way to Quality Data by James White
Having worked in Health Information for over 39 years, I recently had an opportunity to speak with Health Information students at Cuyahoga Community College. Th...
09/03/2017
AWS Outage Shows How Little Control Cloud Users Have by Nadine Dias
On Tuesday, February 28th, Amazon Web Services (AWS) had a service disruption that affected its Simple Storage Service (S3) which supports over 150,000 websites...
07/03/2017
Custom Kitting and Booklets: Cut the Clutter and Make a Good Impreion by Leslie Barton
I don't know about you, but I'm just way too busy these days. When I ask...
01/03/2017
What ds Trump s Dodd-Frank Reform mean for Banking and Financial Services? by Shawn A. Brazeau
The Dodd-Frank Act is currently being reviewed by the Trump administration in an...
28/02/2017
Do Your Point of Purchase Displays ATTRACT Customers? by Leslie Barton
In a competitive retail environment, creative use of point of purchase displays can set you apart from the dull roar of conventional installations. Manufacturer...
16/02/2017
Join the ranks of Heal IT profeionals standing up to #makeHITcount every day! by Elia Robins
Imagine a seamlessappointment with your health provider: Even with a last-minut...
14/02/2017
Treating the Old Wounds of Transition to Advance Value-Based Care by Michelle Urban
ARRA. HIPAA. Meaningful Use. Value-based Care. MACRA. And so it goes The only th...
09/02/2017
Meaningful Use and MACRA-Positive Change by James White
As a Healthcare Information management (HIM) professional for the past 40 years, I have experienced the transition of the paper medical record to today's mo...
08/02/2017
IG Solutions - It s A New Day for Records Retention Schedules! by Craig Grimestad
Companies often struggle with numerous issues when developing and administrating...
06/02/2017
Ds Healcare Care About Clinical Quality Improvement? by John Lynn
We face a big challenge in healthcare. A doctor's success is largely not dependent on the quality of care they provide a patient. We won't dive into the...
03/02/2017
Holy MACRA! by Karen Snyder
A lot has been written about the Medicare Access and CHIP Reauthorization Act, better known as MACRA, since it was published in October 2016. The intent of this...
31/01/2017
Destination: Value-Based Care by Nancy Twombly
Despite all predictions on the future of our healthcare delivery system, healthcare is - and will continue to be - one of the key drivers in our economy. While ...
27/01/2017
Data privacy in the IoT Era by Paul Gillin
It's appropriate that this year's Data Privacy Day (January 28) takes place just three weeks after the giant Consumer Electronic Show (CES). CES is an a...
13/01/2017
5 Top IT Predictions for 07: Which Technology Trends will Impact You? by John Boruvka
This is certainly the time of year for predictions, forecasts, and trends, so we...
05/01/2017
Are you using our Escrow Management Center to your Advantage? by Nadine Dias
As an Iron Mountain technology escrow customer, you have access to our online portal in Iron Mountain Connect called the Escrow Management Center. We hope all ...
05/01/2017
Retention Schedules To Purge or Not to Purge and When? by Linda Joshua
When developing a retention schedule and looking at the legal research that supports it, there are laws and regulations that set minimum periods that must be ad...
30/12/2016
What happens when your Source Code is released from Escrow? by Nadine Dias
You may know that technology escrow (also known as software escrow) is a best practice for safeguarding your software source code in case there is ever an issue...
23/12/2016
The Psychology of Records Management: Energize Compliance with Technology by Craig Grimestad
This is the last of a 7 part series on energizing compliance. The last? I though...
29/11/2016
Mergers, Acquisitions & Divestitures: Managing Information and Risk by Mark Emery
Mergers, Acquisitions and Divestures (MA&D) happen for many reasons - to create ...
18/11/2016
Concerned with Busine Continuity? Understand Software Licensing Risks. by John Boruvka
If you're concerned with business continuity in your company, it's impor...
18/11/2016
Evaluating Your Storage Options: Tape or Cloud by John Sharpe
Over the past few years or so, data protection has trended towards the Cloud. But that doesn't mean tape is dead-far from it. Today's forward-thinking o...
04/11/2016
A Millennial s Impreion: My first Gartner Conference by Nadine Dias
I was the oddball millennial at the recent Gartner IT Financial, Procurement & Asset Management Summit in Grapevine, Texas. As one of the few millennials at th...
21/10/2016
Managing Cyber Security reats to Personal Heal Information by John Lynn
One of the challenges that keeps healthcare leaders up at night more than any other is managing cyber security threats to health data management. Unfortunately,...
17/10/2016
The consequences of data hoarding by Paul Gillin
At some point during the past decade, storage costs crossed a threshold that made it cheaper and easier for organizations to keep data than to throw it away. Th...
08/10/2016
Why Hackers Love Small Businees
Typically, when a data breach makes the headlines it involves a well-known brand with deep pockets which might give you a sense that hackers are only interested...
05/10/2016
Records management best practices: In 40 characters or le by Karen Guglielmo
Records management is a complicated job. RIM professional work hard every day to take their company's R and I and M the heck out it. So we took to Twi...
30/09/2016
Building a Framework for the Future of Federal Information Management by Lisa De Luca
The information landscape is constantly changing, especially for government. Fed...
30/09/2016
Care Continuum And the Internet of ings by Simon Morrell
I was once part of the Internet of Things. A sensor on my sneaker linked to a tiny computer on my wrist. When I plugged the computer into my laptop the battery ...
30/09/2016
Is Your Busine Prepared for a Cyberattack? by Eileen Sweeney
September is National Preparedness Month and a good time to think about whether your company is ready. Companies can improve preparedness by being proactive - r...
28/09/2016
The Psychology of Records Management: Energize Compliance with Forcing Functions by Craig Grimestad
With what? Never heard the term Forcing Functions used in Records Management (...
16/09/2016
A Virus Backup Plan: Responding to a Terrible, Horrible, No Good, Very Bad Day by John Sharpe
Extortion. Ransom. International crime syndicates. No, this isn't a descript...
16/09/2016
How can procurement help an organization master information risk? by Amy Perras
There is a tendency for discussions about information risk to focus exclusively on the dangers organizations find themselves exposed to and potential disasters ...
15/09/2016
Why is procurement so critical to minimizing information risk? by Amy Perras
In today's business environment, no organization can afford to ignore information risk. The consequences of an information related catastrophe, whether it...
23/08/2016
The 4 Levels of Verification: Verify Your Developer s Compliance by Nadine Dias
Once you have made the decision of whether or not you need technology escrow, ha...
22/08/2016
The Standard is the Standard: ISO 700 & Law Firms by Brianne Aul
This past June, our Pittsburgh ARMA chapter toured Heinz Field, home to the Super Bowl LI Champion (you heard it here first!) Pittsburgh Steelers. Directly out...
18/08/2016
Pre- Vs. Post-Claification For Records Metadata by Juerg Meier
I recently watched a demo of the IBM Watson natural language processing (NLP) tool that showed how it was used by police for criminal investigations at a Record...
15/08/2016
Closing the Gap by Lisa De Luca
Empowering Federal Professionals with Next-Generation Information Management Skills As anybody who has been paying attention to federal headlines or budgets ca...
10/08/2016
Putting information privacy first by John JT Tomovcsik
There is a lot more to protecting customer privacy than locking down facilities and enforcing strong passwords. It's about getting the entire organization a...
09/08/2016
A Licensee s Guide to Technology Escrow [Free eBook] by Nadine Dias
Investing in technology is not a decision that is made lightly. In today's technology-driven world, companies are competing to be the best of the best and t...
05/08/2016
Disposing of IT ts: eBay, You Found What on ose Hard Drives? by Michele Hope
Some organizations dispose of their IT assets by recycling what they can and discarding the rest. For others, this process involves reselling parts that still h...
05/08/2016
How to Reduce Data Storage Costs by John Sharpe
In the age of big data, IT managers are increasingly tasked with taking more comprehensive views of their organizations' data. This requires them to evaluat...
05/08/2016
Uncovering the Hidden Risk wiin Federal Information Management Programs by Lisa De Luca
Identifying and addressing the burgeoning skills gap issue The federal governm...
04/08/2016
My First 6 Mons as an IG Project Coordinator by Jeica Bundy
I recently checked in with Karen, the project coordinator for the Records and Information Governance Group at a large healthcare corporation in Missouri. Karen ...
28/07/2016
Customer Care by Day, Rock Star by Night by Megan OKeefe
Friendliness, patience, and determination are qualities that make for a remarkable customer service agent, and Kim possesses all three. As a member of Iron Mou...
22/07/2016
Top Benefits of Outsourcing Print and Fulfillment by Leslie Barton
You have to spend money to make money, as the old adage goes. But, when it comes to print and fulfillment, most companies would prefer to spend less and make mo...
21/07/2016
6 Bad Habits of Data Management- Part by John Sharpe
In my last blog, 6 Bad Habits of Data Management- Part 1, I covered three bad habits many IT departments across the globe are guilty of committing. Here are 3 m...