Enterprise Architecture Program: Publications, Resources & Toolkit

State of Michigan and State of Connecticut on Cyber Disruption (webinar)

  • 8 October 2015
  • Author: Emily Lane
  • Number of views: 9740
State of Michigan and State of Connecticut on Cyber Disruption (webinar)
NASCIO Innovations Forum: State of Michigan and State of Connecticut on Cyber Disruption

Learn how the states of Michigan and Connecticut developed their respective State Government Cyber Disruption Response Plans. 


Chris Christensen Director of Office of Infrastructure Protection Department of Technology Management & Budget State of Michigan
David Geick Director, IT Security DAS/Bureau of Enterprise Systems and Technology State of Connecticut

Sheri DeVaux IT Security Manager DAS/Bureau of Enterprise Systems and Technology State of Connecticut

Eric Sweden, MBA, MSIH 
Program Director, Enterprise Architecture & Governance

2014 Deloitte-NASCIO Cybersecurity Study (webinar)

  • 16 December 2014
  • Author: Mike Cooke
  • Number of views: 9945

Join us in reviewing the results and recommendations of the third biennial Deloitte-NASCIO Cybersecurity Study - State Governments at Risk: Time to Move Forward. This study reports findings and analysis of a comprehensive survey of State Chief Information Security offices (CISOs) conducted by NASCIO in partnership with Deloitte. CISOs from 49 states participated in the survey and 186 elected and appointed business leaders from a broad cross-section of states responded to a parallel survey.

State of Georgia’s Investment Strategy and Portfolio Management (webinar)

  • 17 December 2013
  • Author: Mike Cooke
  • Number of views: 31712

Information Technology Investment Management (IT/IM) - What does it mean for state government?

Both industry and governments are challenged to find better, more effective and reliable ways to deliver services to consumers and citizens. Organizations must adapt to the challenges of technology complexity, regulations and change while delivering more for less. IT/IM integrates several methodologies to ensure the limited dollars invested in technology provide the best outcome possible. The state of Georgia will share their approach as well as provide a practical guide to IT/IM for others.

Commonwealth of Virginia’s EIA Strategy and NIEM Integration Plan (webinar)

  • 16 July 2013
  • Author: Mike Cooke
  • Number of views: 30981

Commonwealth of Virginia’s EIA Strategy and NIEM Integration Plan

The Commonwealth of Virginia has completed an eight-month strategic planning process to develop an Enterprise Information Architecture (EIA) strategy.  A central element of the EIA strategy involves building exchanges for “citizen-centric” data that conform with the National Information Exchange Model (NIEM).

Virginia’s NIEM integration plan will enable the state government to comply with new statutory requirements for standardizing Person data and promote enhanced capabilities for business-driven information exchanges.

This webinar will provide insight on Virginia’s emerging EIA strategy and NIEM integration planning. The primary focus will be on Virginia’s EIA strategic plan and successful implementation of the NIEM Engagement Process.

The Changing Roles of the Chief Architect and the CIO (webinar)

  • 17 April 2013
  • Author: Mike Cooke
  • Number of views: 8691

Three important findings have combined to motivate this topic:

  • #1 Poor data management performance to date (requires additional or difference effort)
  • #2 Recognition that data is not a project (requires a difference approach)
  • #3 Lack of domain expertise (requires different career preparation)

Combined these three findings require a new look at these roles.  This webinar will explore the role of a Chief Data Officer (CDO) as a function needed by organizations (especially state governments).  While we don't yet have all the answers, we can at least lay out three necessary but insufficient prerequisites to making progress faster than we have achieved to date.

Architecture at HP – Architecting for Public Value

  • 22 March 2013
  • Author: Mike Cooke
  • Number of views: 19624

This presentation will present HP’s Enterprise Architecture Practice.  It will include the rationale for enterprise architecture, the career path and professional development for architects at HP, framework and methodology employed.

Driving Efficiency and Innovation by Consistently Managing Complexity and Change (webinar)

  • 27 February 2013
  • Author: Mike Cooke
  • Number of views: 8360

This presentation outlines the four pillars of a Holistic Enterprise Architecture: architectural models, framework, methodology, and implementation/solution models. It also explains the business and technology gains, and demystifies the practice of implementing a successful Holistic Enterprise Architecture.

Business Architecture at Oracle Corporation

  • 28 January 2013
  • Author: Mike Cooke
  • Number of views: 6753

Join us to learn how the Oracle Corporation has instituted business architecture as business discipline.

The presentation will focus on how Oracle defines, organizes and implements business architecture – and why business architecture is essential to ensuring successful IT projects and investment.

2012 Deloitte-NASCIO Cybersecurity Study: A call for collaboration and compliance

  • 7 December 2012
  • Author: Mike Cooke
  • Number of views: 5784

Educational Webinar on the 2012 Deloitte-NASCIO Cybersecurity Study: A call for collaboration and compliance

NASCIO invites you to join an archived webinar from Thursday, December 6, 2012. NASCIO and Deloitte conducted a national briefing on the results of the 2012 Cybersecurity Study,States at Risk:  A Call for Collaboration and Compliance.  The cybersecurity survey, which repeats a comparable study undertaken in 2010, queried state chief information security officers and other state officials in 2012.  The study provides comprehensive information about the status of cybersecurity programs in state governments across the country.  Survey respondents included 50 CISOs or equivalents responsible for the security oversight of 48 states and two U.S. territories. 

Why are states at risk? To learn more about the key concerns of state security officers charged with protecting the critical information state governments create and manage to deliver constituent services please view the archived webinar below.  The briefing will outline the challenges faced by state programs and highlight the report's call to action directed at State CIOs and policy leaders within states, which details steps states can take to enhance their capacity to protect citizen data and reduce risk.

Hawaii Integrated Information Sharing and the Open Justice Broker Consortium (webinar)

  • 27 November 2012
  • Author: Mike Cooke
  • Number of views: 7472

Join us to learn how the state of Hawaii has partnered with state and local government to share justice information using NIEM, and the Global Reference Architecture (GRA).


About The Enterprise Architecture Program

The NASCIO Enterprise Architecture program was developed to enable the mission of state and local government. Government must continually reinvent itself to remain relevant by effectively and efficiently providing services to the citizens of this country. The path to this continual transformation must embrace leadership, management, coordination, communication and technology throughout government. Enterprise architecture is the discipline to appropriately define and leverage these capabilities within the complexities of government.

Funding to support the NASCIO EA Program and information sharing initiative is provided by a grant from the U.S. Department of Justice, the Bureau of Justice Assistance, Office of Justice Programs.

Enterprise Architecture Development Tool-Kit v3.0

October 2004

The enhancements in the third version of the Tool-Kit result from the expertise and continued dedication of enterprise architecture practitioners from all levels of government and the private sector. Version 3.0 incorporates an updated governance architecture framework with added roles and responsibilities and a focus on multi-level communication. Process models with explanatory narrative are included for governance and the architecture lifecycle. The Tool-Kit also includes fully populated security domain and application domain blueprints.