Arlington, Virginia , Hyatt Regency Crystal City, April 23-25, 2017
Austin, Texas, JW Marriott Austin, October 1-4, 2017
NASCIO, Grant Thornton LLP and CompTIA have collaborated for a seventh consecutive year to survey state government IT leaders on current issues, trends and perspectives. New service delivery models, innovative technology solutions, and rising customer expectations all require state CIOs to adapt continually to changing circumstances.
This study reports findings and analysis of a comprehensive survey of
State Chief Information Security Officers (CISOs) conducted by NASCIO
in partnership with Deloitte. The results of the 2016 Deloitte-NASCIO
Cybersecurity Study confirm the growing importance of cybersecurity for
Each year NASCIO honors outstanding IT projects among the states through the NASCIO State IT Recognition Awards. The Awards showcase innovation and excellence in the use of information technology in state government, such as transformational projects and initiatives that address critical business problems, improve business processes and increase citizen engagement in state government.
In 2016, NASCIO's 28th consecutive year of the awards program, volunteer judges selected 12 recipients across 11 categories.
This report describes the basics of how to get started with a data management discipline. It maintains a simple approach to gaining support including governance, bringing together the right stakeholders, and establishing a compelling business case. This report is the second in a series of reports that deals with WHY is data management important; HOW does state government get started.
This webinar presents a discussion on how government can improve its effectiveness through better collaboration and information sharing. Examples of intergovernmental collaborative projects are presented by state and local government recipients of the Best of NIEM awards.
State government must
now view cyber attacks that are more than cyber incidents. We must prepare for larger magnitude
events. These can be termed cyber
disruptions, disasters or even catastrophes.
This publication includes the following: