Author Archives: Alexa Magdalenski

Recent data breaches – from the telecommunications and healthcare industries to the Office of Personnel Management (whose breach impacted over 4 million people) – have left no industry immune to cyber attacks. NVTC recently published a cybersecurity infographic on the rising impacts of cyber threats and the federal government and Great Washington region’s elevated response to these threats. One of the most astounding statistics highlighted in this infographic is the 2016 federal cybersecurity budget, which increased by $5 billion in the last year alone.

The National Capital region is at the intersection of innovation, policy and research and that is why NVTC is hosting the first ever 2016 Capital Cybersecurity Summit on November 2-3, 2016 at The Ritz-Carlton, Tysons Corner.

This region is THE capital of cybersecurity because it is home to:

  1. One of the most educated cybersecurity and tech workforces in the country (55% of tech openings in Virginia are in cyber!)
  2. A large number of Fortune 1000 companies
  3. An incredible number of startup tech firms and entrepreneurs
  4. U.S. Cyber Command
  5. The Department of Defense and intelligence agencies like NSA and CIA, addressing both defensive threats to our classified information and infrastructure as well as offensive cybersecurity capabilities employed against our adversaries
  6. Political and regulatory infrastructure that addresses policy issues surrounding cybersecurity
  7. Unparalleled research infrastructure through institutions like DARPA, IARPA, ODNI, ARL, AFRL (Did you know – The Internet came out of a government-focused research effort at DARPA?)
  8. World class local universities including George Mason University, George Washington University, University of Maryland, University of Virginia and Virginia Tech
  9. Leading Incubators and investors like MACH37, In-Q-Tel, Carlyle Group, Arlington Capital (46% of Greater Washington venture capital funding supported cyber solutions in 2015!)
  10. An underlying commitment to innovation among all members of our region: private companies, government organizations and universities

We’re just over ONE month to go until the Capital Cybersecurity Summit. Planning is well underway and each week we are announcing new panels and speakers. Click here for the latest agenda and to register.

 

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

Nov. 2-3, 2016: Mark Your Calendars for NVTC’s First Ever Capital Cybersecurity Summit

September 22nd, 2016 | Posted by Alexa Magdalenski in Events - (Comments Off)

No industry is immune to today’s rapidly evolving cybersecurity risks. Learn how to protect your organization’s prized digital assets and become empowered against the latest cybersecurity threats by attending NVTC’s first ever Capital Cybersecurity Summit on November 2-3, 2016 at The Ritz-Carlton, Tysons Corner.

Learn more about the Summit’s keynote speakers, exciting panels with principals from leading cybersecurity companies and academics, and extraordinary networking and business opportunities in our new Summit video:

The Capital Cybersecurity Summit will provide tremendous business development and educational value for NVTC members and the entire Greater Washington technology community, helping to accelerate and promote the region’s innovation, connect people, companies and academic partners, and showcase the region’s technology assets and workforce.

We hope you’ll join us! View the latest Summit agenda and register for this inaugural event here: http://conferences.nvtc.org/

 

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

Workflow and Process Automation Series Part 2: Invoice Processing

August 31st, 2016 | Posted by Alexa Magdalenski in Guest Blogs | Member Blog Posts - (Comments Off)

This week on NVTC’s blog, Marty Herbert of NeoSystems Corp. shares the second in a series of tips for workflow and process automation.


In Part 1 of our Workflow and Process Automation Series, Re-evaluating Your Processes, we looked at a few steps your organization can take towards drastically simplifying your billing process. Keep in mind that throughout this series, I will highlight solutions which produce time saving, compliance-driven processes that integrate with business systems, like Deltek Costpoint, NetSuite, SAP or others and create an enhanced workflow automation framework. In today’s post, Part 2 of our series, we’ll address vendor invoice processing.

A few years back, while working on a series of consulting projects, I looked at a client’s AP department while performing an audit and noted several variations they employed to process their vendor invoices. Some invoices came in via email, others via snail mail. Some came in to the attention of the company’s AP department; others came in via the project manager. Some were based on a PO and others were one-off ‘bills that needed to be paid.’ Knowing who the appropriate approver is could be multi-faceted and involve the receipt of goods (or services). Similar to many larger government contractors, our client used Deltek Costpoint for vendor invoice processing so I will use that system as an example of a well-known business system that is largely identifiable for our audience.

This business system has a great mechanism for capturing data and information related to accounts payable, but it can’t necessarily control how invoices are delivered, who approves them, and how that approval is captured for compliance purposes.

Our client’s overarching goal (outside of employing processes that increased efficiency and effectiveness) was to find a way to electronically interface an APPROVED invoice for vouchering in Costpoint. That sounds like a simple objective, but there are nuances that might not be immediately obvious. The “approved” aspect implies that there needs to be a process followed to obtain a valid, recognized approval. The “electronic” aspect implies that the entry into the ERP system should be automated without the need for manual data entry. Automated work flow tools make the design and controlled execution of a process possible, while Costpoint Web Services enables an electronic interface.

But, let’s slow down. Before we send data along, we have to gather the data. In this case the data comes from a vendor’s invoice, but we want to make sure the vendor’s invoice has been reviewed and approved before we send it into the system of record. The first step in automating this process is to gather the data input (the invoices). There are multiple ways we could approach this:

  • We can give vendors access to a “portal” whereby they upload the invoice directly into a workflow, or vendors can email the invoice to a specific address that will automate process kick-off and move it into a queue for AP servicing, or
  • We can receive a vendor invoice and initiate the process by loading it to the AP queue (potentially after scanning it in if it is received hard copy).

Then it is time to route the invoice to the proper ‘approver.” If companies are already connected to an ERP application that supports project management data, they are able to use the data inherent to any given project to pull the relevant approvers for PO-based invoices. AP clerks will then have matched the invoice to a PO (unless the vendor did that already) and chosen the lines from the PO to which the invoice applies then… well, that is all they have had to do so far.

Off to the approver(s) the invoice goes. The approver gets the invoice that has been submitted as well as details added by the AP department. The approver can decide to reject it or send it to another approver, or sit on it a while. Any (or all) of these tasks can be built into the process. The end result is (hopefully) an approved invoice.

At this point, the system should validate the invoice information and manage the voucher process through creation, voucher number generation, accept or reject status and check generation. It is critical and most efficient to have a complete trail of activity from submission to payment.

This process, when automated, is extremely easy to follow, saves time and money and is easier to implement than one might think. Unfortunately, most government contractors don’t know the ease with which automation software can achieve this and many other processes quickly and effectively.

There are numerous effective workflow management software systems in the market today. Integrify, a workflow management software used to automate a myriad of processes within a variety of platforms, is one tool we use at NeoSystems to automate vendor invoice processing within the business systems we use.

Our next blog will focus on the delightful automation of purchase requisition. If you have any burning questions about this or other processes (even those we haven’t gotten to yet!) using web services and workflow management software for your business system, please feel free to contact me.

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS