NASCIO Resources

State Archiving in the Digital Era: A Playbook for the Preservation of Electronic Records

  • October 2018
  • Number of views: 150
State Archiving in the Digital Era: A Playbook for the Preservation of Electronic Records

States are creating digital records at a rapid and increasing pace. Many states are finding that they are unprepared to deal with the unique management and preservation issues that are related to digital archives. NASCIO, along with the Council of State Archivists created this playbook for the preservation of state electronic records. This document includes eleven plays that state officials should consider when working together toward the preservation of digital archives.

Walleyes, Whales & Cybersecurity (webinar)

  • October 2018
  • Number of views: 212
Walleyes, Whales & Cybersecurity (webinar)

The walleye is South Dakota’s state fish. The opportunity to catch this delicious and challenging sport fish draws many South Dakotans and tourists to the clear, blue waters across the state. Email phishing, on the other hand, is akin to the silver (flying) carp. In the best-case scenario, it is a nuisance, worst case it is very dangerous. Learn how the state of South Dakota educates and trains staff and elected officials from the threatening aspects of email phishing.

The State CIO Top Ten: Why It's More Than a List

  • September 2018
  • Number of views: 820
The State CIO Top Ten: Why It's More Than a List

The Forces of Change presented in the first paper in this series have a direct relationship to and actually drive what surfaces each year as the Top Ten CIO Priorities.  The Top Ten Priorities are essentially presenting the CIO response to these forces.  Each year NASCIO asks the state and territorial CIOs to vote on their top priority strategies and top priority technologies.  These votes are used to take the pulse of the states and territories as a group and at a point in time.  It is through the lens of a Forces for Government Change model that we reframe our Top Ten list in this paper.  A new operating model is emerging and will continue to mature as the strategy for addressing the priorities within each state.  At its core is the concept that a state CIO’s operational competence and resulting political capital requires a broker of services approach to service delivery.  

Ponemon Institute’s 2018 Cost of a Data Breach Study (webinar)

  • September 2018
  • Number of views: 493
Ponemon Institute’s 2018 Cost of a Data Breach Study (webinar)

This webinar covered the findings of the 2018 Cost of a Data Breach study and how states are preparing for and responding to data breaches.

Leading in a Self-Organizing World: An Operating System for Agile Leaders (webinar)

  • September 2018
  • Number of views: 353
Leading in a Self-Organizing World:  An Operating System for Agile Leaders (webinar)

This is the first in a series of three, 30-minute webinars. Everyone is asking about scaling Agile, but that's the wrong question. We really need to ask, "How do we lead large, self-organizing teams?" It means strong leadership - just not the kind we're used to. Webinar one explored the forty-year march towards self-organization based on annual Gallup surveys and over two hundred assessments of large agile organizations performed by AgileCxO's partners.

Cybersecurity Governance in the State of Washington

  • September 2018
  • Number of views: 318
Cybersecurity Governance in the State of Washington

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state.

Cybersecurity Governance in the Commonwealth of Virginia

  • September 2018
  • Number of views: 285
Cybersecurity Governance in the Commonwealth of Virginia

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state. 

Cybersecurity Governance in the State of New Jersey

  • September 2018
  • Number of views: 271
Cybersecurity Governance in the State of New Jersey

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state. 
 

Cybersecurity Governance in the State of Michigan

  • September 2018
  • Number of views: 273
Cybersecurity Governance in the State of Michigan

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state. 

Cybersecurity Governance in the State of Georgia

  • September 2018
  • Number of views: 304
Cybersecurity Governance in the State of Georgia

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state. 

RSS
123

Resources By Category

Categories

Resources By Date

Archive