NASCIO Publications

The State CIO Top Ten: Why It's More Than a List

  • 26 September 2018
  • Author: Emily Lane
  • Number of views: 772
  • 0 Comments
The State CIO Top Ten: Why It's More Than a List

The Forces of Change presented in the first paper in this series have a direct relationship to and actually drive what surfaces each year as the Top Ten CIO Priorities.  The Top Ten Priorities are essentially presenting the CIO response to these forces.  Each year NASCIO asks the state and territorial CIOs to vote on their top priority strategies and top priority technologies.  These votes are used to take the pulse of the states and territories as a group and at a point in time.  It is through the lens of a Forces for Government Change model that we reframe our Top Ten list in this paper.  A new operating model is emerging and will continue to mature as the strategy for addressing the priorities within each state.  At its core is the concept that a state CIO’s operational competence and resulting political capital requires a broker of services approach to service delivery.  

Cybersecurity Governance in the State of Washington

  • 13 September 2018
  • Author: Emily Lane
  • Number of views: 300
  • 0 Comments
Cybersecurity Governance in the State of Washington

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state.

Cybersecurity Governance in the Commonwealth of Virginia

  • 13 September 2018
  • Author: Emily Lane
  • Number of views: 270
  • 0 Comments
Cybersecurity Governance in the Commonwealth of Virginia

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state. 

Cybersecurity Governance in the State of New Jersey

  • 13 September 2018
  • Author: Emily Lane
  • Number of views: 260
  • 0 Comments
Cybersecurity Governance in the State of New Jersey

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state. 
 

Cybersecurity Governance in the State of Michigan

  • 13 September 2018
  • Author: Emily Lane
  • Number of views: 260
  • 0 Comments
Cybersecurity Governance in the State of Michigan

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state. 

Cybersecurity Governance in the State of Georgia

  • 13 September 2018
  • Author: Emily Lane
  • Number of views: 282
  • 0 Comments
Cybersecurity Governance in the State of Georgia

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state. 

State Cybersecurity Governance Case Studies

  • 13 September 2018
  • Author: Emily Lane
  • Number of views: 437
  • 0 Comments
State Cybersecurity Governance Case Studies

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state. 

Limitations on Liability Infographic

  • 10 September 2018
  • Author: Emily Lane
  • Number of views: 294
  • 0 Comments
Limitations on Liability Infographic

NASCIO's 2004 publication NASCIO on Unlimited Liability - Gaining Traction on the Road to "Win-Win" recommended changes to the state IT procurement policy regarding limitations on liability.  This infographic indicates, as of July 2018, which states have have limitations on liability in statute, which states have none, and which states are able to negotiate limitations on a case by case basis.  To update your state's information, please contact Meredith Ward at mward@NASCIO.org.

Ready for Prime Time? State Governments Tune in to Artificial Intelligence

  • 28 August 2018
  • Author: Emily Lane
  • Number of views: 2532
  • 0 Comments
Ready for Prime Time? State Governments Tune in to Artificial Intelligence

As artificial intelligence (AI) becomes more and more a part of our daily lives, we are seeing state governments and state CIOs turning to AI for a broad host of applications. This publication discusses the definitions around artificial intelligence (AI), as well as the challenges, opportunities and applications for state governments. The report also lays out several examples of how states are using AI, along with considerations for its development and implementation. From their role as change managers, to involvement in procurement, the publication also outlines the implications for state CIOs.

State CIO as Broker: A New Model

  • 18 April 2018
  • Author: Emily Lane
  • Number of views: 4118
  • 0 Comments
State CIO as Broker: A New Model

Multisourcing is emerging as the discipline for managing a complex and diversified portfolio of services and service providers.  These services are being employed to meet the continual evolving demand for creatively delivering government services through new channels with new functionality.   In this evolving circumstance there is the need for a new operating model the state chief information officer can employ to bring together agencies needs and demands with available emerging technologies and management disciplines.  This report opens the door to this discussion and explores the underlying forces of change that are driving the need for a new operating model.  

RSS
1234567

Publications By Category

Publications By Date