Nashville, TN - JW Marriott , October 13-16, 2019
Maryland, MD - Gaylord National Harbor, May 3-6, 2020
During this interactive webinar, Doug Robinson, Executive Director of NASCIO, and Alan Shark, Executive Director of PTI shared their views with regards to the state and local government technology landscape while answering questions submitted by attendees during the Q & A portion.
In this third in our series related to NASCIO’s “The CIO Operating System: Managing Change in a Sustainable Way,” we explore a maturity model that can help state CIOs develop their organization and explain their leadership role to a broad stakeholder audience. This paper creates a connection between trends and action and supports NASCIO’s mission to represent state CIOs in the evolving state government market. The maturity model provides a set of milestones for states to strive toward. Each maturity level is described using key characteristics. This not only provides states with a way for assessing their current state but also assists in creating the next set of goals as they move up the maturity curve. A ratings table is presented that provides a more detailed set of dimensions that characterize the new operating model. The paper culminates with a short assessment of some the key learnings from a survey of the states that was conducted in the third quarter of 2018.
NASCIO conducts a survey of the state CIOs to identify and prioritize the top policy and technology issues facing state government. The CIOs top ten priorities are identified and used as input to NASCIO's programs, planning for conference sessions, and publications.
The 2018 Deloitte-NASCIO Cyber Study, the 5th biennial study, has been referred to as the most “comprehensive study of state-level cybersecurity spending” (White House FY19 Budget Request). The 2018 study, in which all 50 state CISOs participated, highlights perspectives and insights surrounding cybersecurity from state CISOs.
This webinar highlighted the study’s three bold plays, which are recommendations for state CISOs and CIOs to disrupt the status quo, and data from this year’s study on state cybersecurity budgets, talent and cyber threats.
Even as state government Chief Information Security Officers have increased their access to and communications with top leaders, the top three issues impacting states’ cybersecurity remain the same from past surveys – budget, talent and increasing cyber threats. These findings from the 2018 Deloitte-NASCIO Cybersecurity Study are a call for bold action to disrupt the status quo.
As internal and external pressures continue to mount, state technology leaders say they are confident that by building strong teams and embracing new products and development processes, state IT departments will be able to improve how they serve government agencies and residents. Those and other factors contributed heavily to the 2018 State CIO Survey, State CIO as Communicator: The Evolving Nature of Technology Leadership. The survey includes responses from all 50 state CIOs on a range of issues, from evolving business models to workforce and budget to access to innovation and facing the future. Respondents to this year’s survey represent more than 150 years of collective service as a state’s top technology official.
The walleye is South Dakota’s state fish. The opportunity to catch this delicious and challenging sport fish draws many South Dakotans and tourists to the clear, blue waters across the state. Email phishing, on the other hand, is akin to the silver (flying) carp. In the best-case scenario, it is a nuisance, worst case it is very dangerous. Learn how the state of South Dakota educates and trains staff and elected officials from the threatening aspects of email phishing.
The Forces of Change presented in the first paper in this series have a direct relationship to and actually drive what surfaces each year as the Top Ten CIO Priorities. The Top Ten Priorities are essentially presenting the CIO response to these forces. Each year NASCIO asks the state and territorial CIOs to vote on their top priority strategies and top priority technologies. These votes are used to take the pulse of the states and territories as a group and at a point in time. It is through the lens of a Forces for Government Change model that we reframe our Top Ten list in this paper. A new operating model is emerging and will continue to mature as the strategy for addressing the priorities within each state. At its core is the concept that a state CIO’s operational competence and resulting political capital requires a broker of services approach to service delivery.
This webinar covered the findings of the 2018 Cost of a Data Breach study and how states are preparing for and responding to data breaches.
In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state.