Maryland - Gaylord National Harbor, May 5-7, 2019
Nashville, TN - JW Marriott , October 13-16, 2019
In this webinar you will receive an overview of the NIEM Engagement Process and a live demonstration of the Cost Model.
The NIEM Engagement Process was developed to meet the need for a structured framework to help organizations assess the value of applying NIEM to information sharing and exchange activities. The NIEM Cost Model is a part of an overall NIEM Engagement Process that the NIEM Program Management Office (PMO) is developing.
The National Information Exchange Model (NIEM) Cost Model is designed to quantify the inputs used for NIEM implementation within an organization. It takes the NIEM Information Exchange Development Lifecycle, the processes that are associated with it, and relates associated costs.
NASCIO invites you to listen to an archived educational webinar providing an overview of Domain Name System Security Extensions (DNSSEC), sponsored by its Security and Privacy Committee.
The webinar contextualizes DNSSEC as a security-enhancing tool states need to consider adopting as they evolve their IT security programs to better protect the IT network infrastructure that enables 21st century government. It provides an overview of Domain Name System Security Extensions as adopted and promoted by the Federal government for the .gov domain, along with a summary of the Commonwealth of Virginia’s DNSSEC initiative. The presentations describe the vulnerabilities that DNSSEC is designed to protect against, patterns of adoption within the Federal government, business drivers that led to Virginia’s project, and the state’s implementation experience.
Educational Webinar Hosted by the NASCIO Health Care Working Group and the State Digital Identity Working Group on Identity and Access Management in Health IT
NASCIO invites you to join an archived educational webinar on Identity and Access Management in Health IT.
The webinar highlights the benefits of an enterprise strategy for identity management for health IT. Currently, states maintain a variety of duplicative identity records for their residents – as well as a plethora of credentials associated with those identity records. As a result, a single person carries multiple credentials for a single common purpose: to prove that person’s identity as the basis for granting a privilege. Maintaining these redundant systems is costly, inefficient, and rife with security, privacy and safety risks—both for the state as well as its constituents.
The state of Utah announced its cloud computing strategy in 2009 as a way to improve service to state agencies and other customers. In 2011, after its initial success, the state is preparing to update that plan to build on those early successes and identify how it will use the cloud to further enhance productivity and gain greater efficiencies. This presentation will examine the first two years of Utah’s cloud initiative as well as how the state is preparing to leverage the experience gained during this period.
NASCIO and the National Association of State Personnel Executives recently hosted a discussion on the state government IT workforce, featuring an overview of State IT Workforce: Under Pressure, a January 2011 publication by NASCIO. The agenda included key state government information technology issues, including trends in government’s use of social media, featuring recent research by Jerry Mechling, Research Vice President, at Gartner.
Cloud computing platforms are a high priority for state and local government Chief Information Officers. Recently, the U.S. General Services Administration (GSA) awarded contracts to provide services under a new Infrastructure as a Service (IaaS) Blanket Purchase Agreement. The goal of the webinar is to have GSA discuss how state and local governments can purchase services through this cooperative purchasing agreement. GSA will also discuss how the contracts were awarded, the services offered, common requirements, data control, security & privacy among other contract details.
Please submit advance questions on the registration page. Webinar information will be sent to registrants prior to the call. This webinar is restricted to government only.
NASCIO All States Call: Federal IT Reform with Vivek Kundra
The objective of this forum is to present the State of Oregon
ORSTATS program and how it has begun to expand to include a
variety of government projects beyond stimulus in a way that
is leading to greater government transparency and providing
new potential for location-based performance measurement.
This session will show how information exchange standards provide strategic capabilities that are making New York City a connected city. As integrated components of the enterprise architecture, standards based information exchanges allow information to be assembled, presented and shared across a wide agency user base.
The NASCIO Enterprise Architecture program was developed to enable the mission of state and local government. Government must continually reinvent itself to remain relevant by effectively and efficiently providing services to the citizens of this country. The path to this continual transformation must embrace leadership, management, coordination, communication and technology throughout government. Enterprise architecture is the discipline to appropriately define and leverage these capabilities within the complexities of government.
Funding to support the NASCIO EA Program and information sharing initiative is provided by a grant from the U.S. Department of Justice, the Bureau of Justice Assistance, Office of Justice Programs.
The enhancements in the third version of the Tool-Kit result from the expertise and continued dedication of enterprise architecture practitioners from all levels of government and the private sector. Version 3.0 incorporates an updated governance architecture framework with added roles and responsibilities and a focus on multi-level communication. Process models with explanatory narrative are included for governance and the architecture lifecycle. The Tool-Kit also includes fully populated security domain and application domain blueprints.