Enterprise Architecture Program: Publications, Resources & Toolkit

Cybersecurity Governance in the State of Washington

  • 13 September 2018
  • Author: Emily Lane
  • Number of views: 2715
  • 0 Comments
Cybersecurity Governance in the State of Washington

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state.

Cybersecurity Governance in the Commonwealth of Virginia

  • 13 September 2018
  • Author: Emily Lane
  • Number of views: 2511
  • 0 Comments
Cybersecurity Governance in the Commonwealth of Virginia

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state. 

Cybersecurity Governance in the State of New Jersey

  • 13 September 2018
  • Author: Emily Lane
  • Number of views: 2118
  • 0 Comments
Cybersecurity Governance in the State of New Jersey

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state. 
 

Cybersecurity Governance in the State of Michigan

  • 13 September 2018
  • Author: Emily Lane
  • Number of views: 1889
  • 0 Comments
Cybersecurity Governance in the State of Michigan

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state. 

Cybersecurity Governance in the State of Georgia

  • 13 September 2018
  • Author: Emily Lane
  • Number of views: 1976
  • 0 Comments
Cybersecurity Governance in the State of Georgia

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state. 

State Cybersecurity Governance Case Studies

  • 13 September 2018
  • Author: Emily Lane
  • Number of views: 2303
  • 0 Comments
State Cybersecurity Governance Case Studies

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state. 

Securing Our Elections: A State and National Perspective (webinar)

  • 6 September 2018
  • Author: Danielle Doak
  • Number of views: 2516
  • 0 Comments
Securing Our Elections: A State and National Perspective (webinar)

Participants in this webinar learned about the methods by which state and national elections officials are preparing for upcoming elections. Both state and national leaders discussed current efforts to secure our elections process and national resources available to assist those who administer that process.

Building North Dakota’s Contribution to the Cyber Moonshot (webinar)

  • 28 August 2018
  • Author: Danielle Doak
  • Number of views: 3614
  • 0 Comments
Building North Dakota’s Contribution to the Cyber Moonshot (webinar)

The State of North Dakota sees the safety of the Internet and our citizens’ information as absolutely essential to our collective future. During this webinar, Shawn Riley expounded on how the North Dakota approach to cyber across their educational systems and workforce organizations will be accomplished and details of execution as North Dakota contributes to the cyber moonshot.

State of Cyber: A Roadtrip Through Where We’ve Been and Where We’re Going (webinar)

  • 21 August 2018
  • Author: Danielle Doak
  • Number of views: 3116
  • 0 Comments
State of Cyber: A Roadtrip Through Where We’ve Been and Where We’re Going (webinar)

The 2018 Deloitte-NASCIO Cybersecurity Study will be the 5th of its kind. Listen to this webinar to learn about what has changed since the survey was released in 2010 and get a sneak peek at the 2018 survey.

Successful Metadata Management Strategy and Implementation for State Government (webinar)

  • 1 December 2017
  • Author: Danielle Doak
  • Number of views: 6611
  • 0 Comments
Successful Metadata Management Strategy and Implementation for State Government (webinar)

Effective metadata management is no longer an option, but an absolute requirement for state governments and federal agencies looking to enable their master data management and data governance initiatives.  Without proper metadata management their IT departments cannot manage their systems and ensure that they are providing the true value to the agency.

This practical course leverages the lessons learned from successful metadata management programs and it explains:
•    Metadata Management Fundamentals
•    Business vs. Technical Metadata
•    Metadata Management Use Cases
•    Metadata ROI
•    Metadata Management and Data Management

RSS
12345678

About The Enterprise Architecture Program

The NASCIO Enterprise Architecture program was developed to enable the mission of state and local government. Government must continually reinvent itself to remain relevant by effectively and efficiently providing services to the citizens of this country. The path to this continual transformation must embrace leadership, management, coordination, communication and technology throughout government. Enterprise architecture is the discipline to appropriately define and leverage these capabilities within the complexities of government.

Funding to support the NASCIO EA Program and information sharing initiative is provided by a grant from the U.S. Department of Justice, the Bureau of Justice Assistance, Office of Justice Programs.

Enterprise Architecture Development Tool-Kit v3.0

October 2004

The enhancements in the third version of the Tool-Kit result from the expertise and continued dedication of enterprise architecture practitioners from all levels of government and the private sector. Version 3.0 incorporates an updated governance architecture framework with added roles and responsibilities and a focus on multi-level communication. Process models with explanatory narrative are included for governance and the architecture lifecycle. The Tool-Kit also includes fully populated security domain and application domain blueprints.