Maryland - Gaylord National Harbor, May 5-8, 2019
Nashville, TN - JW Marriott , October 13-16, 2019
Information Technology Investment Management (IT/IM) - What does it mean for state government?
Both industry and governments are challenged to find better, more effective and reliable ways to deliver services to consumers and citizens. Organizations must adapt to the challenges of technology complexity, regulations and change while delivering more for less. IT/IM integrates several methodologies to ensure the limited dollars invested in technology provide the best outcome possible. The state of Georgia will share their approach as well as provide a practical guide to IT/IM for others.
One of NASCIO's guiding principles is to "promote the CIO as the technology leader who drives innovation and transformation." To advance this belief, this leadership white paper explores the various structures and relationships of the State Chief Information Officer's (CIO) role and how these differences impact the CIO's participation in government transformation and innovation. The NASCIO CIO Leadership Working Group explored these differences and caution that a "one size fits all" approach is not the objective given that there are clear reasons for these variations. We looked at how the role of the CIO might evolve given 'forces' that could impact this evolution, such as technology disrupters and innovation. We discussed these 'forces' and critical success factors with private sector CIOs to learn how they have evolved their position, authority, and responsibility to support corporate transformation. We prepared this paper as a guide for CIOs, Governors, and other state officials to learn more about the various models that exist and how those models could evolve to support the direction of the enterprise.
NASCIO, TechAmerica, and Grant Thornton LLP have collaborated for a fourth year on the annual survey of state government IT leaders. The 2013 survey report, The Enterprise Imperative, offers the latest insights from State CIOs and concludes these leaders are emphasizing effective enterprise governance models, adopting business disciplines, and forging the right relationships for collaboration. The 2012 survey – Advancing the C4 Agenda – focused on the balancing act that CIOs must maintain both in providing high-quality services and in delivering new, innovative solutions. These demands have not decreased over the past year. CIOs are responding by focusing on the enterprise, and by coordinating across boundaries. The enterprise focus may involve integrating governance and portfolio management across the state, improving the effectiveness of IT procurement, or deploying statewide identity and access management solutions.
For the 2013 observance of National Cyber Security Awareness Month, NASCIO has updated its Resource Guide for State Cybersecurity Awareness, Education, and Training Initiatives. The guide includes new information from our state members, who provided examples of state awareness programs and initiatives. This is an additional resource of best-practice information, together with an interactive state map to allow users to drilldown to the actual resources that states have developed or are using to promote cyber awareness. It includes contact information for the CISO, hyperlinks to state security and security awareness pages, and information describing cybersecurity awareness, training, and education initiatives.
The Resource Guide is a work-in-progress that should provide a valuable reference resource for Cyber Security Awareness Month, as well as the ongoing planning of security awareness and training efforts state programs may undertake thereafter.
The NASCIO Procurement Modernization Committee, in partnership with TechAmerica and the National Association of State Procurement Officials, continues to focus on state IT procurement reforms and highlight best practices at the state level. This brief is the third in a series of recommendations set forth by this collaborative. The purpose of the brief is to highlight some of the strategies used to first identify, then to avoid, transfer, mitigate, and ultimately accept the risks associated with the procurement of IT products or services. Although not all risks can be identified, the goal should be to understand how much risk is associated with a specific IT procurement and what tools, processes, benchmarks, and methodologies are available to uniquely address IT procurement risks.