Accessibility in IT Procurement

Ponemon Institute’s 2018 Cost of a Data Breach Study (webinar)

  • 18 September 2018
  • Author: Danielle Doak
  • Number of views: 69
  • 0 Comments
Ponemon Institute’s 2018 Cost of a Data Breach Study (webinar)

This webinar covered the findings of the 2018 Cost of a Data Breach study and how states are preparing for and responding to data breaches.

Leading in a Self-Organizing World: An Operating System for Agile Leaders (webinar)

  • 14 September 2018
  • Author: Danielle Doak
  • Number of views: 113
  • 0 Comments
Leading in a Self-Organizing World:  An Operating System for Agile Leaders (webinar)

This is the first in a series of three, 30-minute webinars. Everyone is asking about scaling Agile, but that's the wrong question. We really need to ask, "How do we lead large, self-organizing teams?" It means strong leadership - just not the kind we're used to. Webinar one explored the forty-year march towards self-organization based on annual Gallup surveys and over two hundred assessments of large agile organizations performed by AgileCxO's partners.

Cybersecurity Governance in the State of Washington

  • 13 September 2018
  • Author: Emily Lane
  • Number of views: 81
  • 0 Comments
Cybersecurity Governance in the State of Washington

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state.

Cybersecurity Governance in the Commonwealth of Virginia

  • 13 September 2018
  • Author: Emily Lane
  • Number of views: 70
  • 0 Comments
Cybersecurity Governance in the Commonwealth of Virginia

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state. 

Cybersecurity Governance in the State of New Jersey

  • 13 September 2018
  • Author: Emily Lane
  • Number of views: 64
  • 0 Comments
Cybersecurity Governance in the State of New Jersey

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state. 
 

RSS
12345678910Last

Publications By Date