The government is at no loss for data. And, over the last decade, there has been a concerted effort to use that data more efficiently to improve decision making and service to the citizen. Chief Data Officers are in place across government to shepherd the changes in process and technology needed to achieve the goals set forth in the Federal Data Strategy.
Meeting the Plan to Plan
Department-level data strategies have been borne out of the federal guidance to mature data governance and infrastructure and publish those plans. In fact, the report "CDO Insights: 2021 Survey Results On the Maturation of Data Governance in U.S. Federal Agencies," found that 75 percent of respondents said they had started or completed five of the six action items named in the Federal Data Strategy 2020 Action Plan. The report found that constituting a data governance body (completed by 75%) was the least challenging action. Getting these bodies in place means that beyond department-level plans, some agencies are moving to making plans for critical subsets of data much like the State Department did for geospatial data.



The Biden Administration recently issued its request for 2022 spending. This practice is really more of a
Chief Data Officers
Agility has been a key attribute for success over the past year and a half. Everyone had to quickly adapt in their personal and professional lives to do things in new ways to keep business and society running. Even the great bureaucracy of government found itself pivoting and quickly changing "how it's always been done" to meet the needs of the day. This should not end with the return to what feels like pre-pandemic normal. In the form of Agile methodology, Agility will play a huge role in the government's ability to continue the fast-forwarded digital push as a result of the pandemic.
With so many high-profile hacks this year, it's easy to want to throw up your hands and say, "Is there nothing that can be trusted?!" Interestingly, that lament is what is driving the latest approach to cybersecurity -- zero trust. Zero trust is what it sounds like, a security approach 
