Nashville, TN - JW Marriott , October 13-16, 2019
Maryland, MD - Gaylord National Harbor, May 3-6, 2020
Learn how the states of Michigan and Connecticut developed their respective State Government Cyber Disruption Response Plans.
Sheri DeVaux IT Security Manager DAS/Bureau of Enterprise Systems and Technology State of Connecticut
Eric Sweden, MBA, MSIH
Program Director, Enterprise Architecture & Governance
Join us in reviewing the results and recommendations of the third biennial Deloitte-NASCIO Cybersecurity Study - State Governments at Risk: Time to Move Forward. This study reports findings and analysis of a comprehensive survey of State Chief Information Security offices (CISOs) conducted by NASCIO in partnership with Deloitte. CISOs from 49 states participated in the survey and 186 elected and appointed business leaders from a broad cross-section of states responded to a parallel survey.
Information Technology Investment Management (IT/IM) - What does it mean for state government?
Both industry and governments are challenged to find better, more effective and reliable ways to deliver services to consumers and citizens. Organizations must adapt to the challenges of technology complexity, regulations and change while delivering more for less. IT/IM integrates several methodologies to ensure the limited dollars invested in technology provide the best outcome possible. The state of Georgia will share their approach as well as provide a practical guide to IT/IM for others.
Commonwealth of Virginia’s EIA Strategy and NIEM Integration Plan
The Commonwealth of Virginia has completed an eight-month strategic planning process to develop an Enterprise Information Architecture (EIA) strategy. A central element of the EIA strategy involves building exchanges for “citizen-centric” data that conform with the National Information Exchange Model (NIEM).
Virginia’s NIEM integration plan will enable the state government to comply with new statutory requirements for standardizing Person data and promote enhanced capabilities for business-driven information exchanges.
This webinar will provide insight on Virginia’s emerging EIA strategy and NIEM integration planning. The primary focus will be on Virginia’s EIA strategic plan and successful implementation of the NIEM Engagement Process.
Three important findings have combined to motivate this topic:
Combined these three findings require a new look at these roles. This webinar will explore the role of a Chief Data Officer (CDO) as a function needed by organizations (especially state governments). While we don't yet have all the answers, we can at least lay out three necessary but insufficient prerequisites to making progress faster than we have achieved to date.
This presentation will present HP’s Enterprise Architecture Practice. It will include the rationale for enterprise architecture, the career path and professional development for architects at HP, framework and methodology employed.
This presentation outlines the four pillars of a Holistic Enterprise Architecture: architectural models, framework, methodology, and implementation/solution models. It also explains the business and technology gains, and demystifies the practice of implementing a successful Holistic Enterprise Architecture.
Join us to learn how the Oracle Corporation has instituted business architecture as business discipline.
The presentation will focus on how Oracle defines, organizes and implements business architecture – and why business architecture is essential to ensuring successful IT projects and investment.
Educational Webinar on the 2012 Deloitte-NASCIO Cybersecurity Study: A call for collaboration and compliance
NASCIO invites you to join an archived webinar from Thursday, December 6, 2012. NASCIO and Deloitte conducted a national briefing on the results of the 2012 Cybersecurity Study,States at Risk: A Call for Collaboration and Compliance. The cybersecurity survey, which repeats a comparable study undertaken in 2010, queried state chief information security officers and other state officials in 2012. The study provides comprehensive information about the status of cybersecurity programs in state governments across the country. Survey respondents included 50 CISOs or equivalents responsible for the security oversight of 48 states and two U.S. territories.
Why are states at risk? To learn more about the key concerns of state security officers charged with protecting the critical information state governments create and manage to deliver constituent services please view the archived webinar below. The briefing will outline the challenges faced by state programs and highlight the report's call to action directed at State CIOs and policy leaders within states, which details steps states can take to enhance their capacity to protect citizen data and reduce risk.
Join us to learn how the state of Hawaii has partnered with state and local government to share justice information using NIEM, and the Global Reference Architecture (GRA).
The NASCIO Enterprise Architecture program was developed to enable the mission of state and local government. Government must continually reinvent itself to remain relevant by effectively and efficiently providing services to the citizens of this country. The path to this continual transformation must embrace leadership, management, coordination, communication and technology throughout government. Enterprise architecture is the discipline to appropriately define and leverage these capabilities within the complexities of government.
Funding to support the NASCIO EA Program and information sharing initiative is provided by a grant from the U.S. Department of Justice, the Bureau of Justice Assistance, Office of Justice Programs.
The enhancements in the third version of the Tool-Kit result from the expertise and continued dedication of enterprise architecture practitioners from all levels of government and the private sector. Version 3.0 incorporates an updated governance architecture framework with added roles and responsibilities and a focus on multi-level communication. Process models with explanatory narrative are included for governance and the architecture lifecycle. The Tool-Kit also includes fully populated security domain and application domain blueprints.