NASCIO Resources

Cybersecurity Governance in the State of Michigan

  • September 2018
  • Number of views: 589
Cybersecurity Governance in the State of Michigan

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state. 

Cybersecurity Governance in the State of Georgia

  • September 2018
  • Number of views: 627
Cybersecurity Governance in the State of Georgia

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state. 

State Cybersecurity Governance Case Studies

  • September 2018
  • Number of views: 735
State Cybersecurity Governance Case Studies

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state. 

Securing Our Elections: A State and National Perspective (webinar)

  • September 2018
  • Number of views: 831
Securing Our Elections: A State and National Perspective (webinar)

Participants in this webinar learned about the methods by which state and national elections officials are preparing for upcoming elections. Both state and national leaders discussed current efforts to secure our elections process and national resources available to assist those who administer that process.

Building North Dakota’s Contribution to the Cyber Moonshot (webinar)

  • August 2018
  • Number of views: 1299
Building North Dakota’s Contribution to the Cyber Moonshot (webinar)

The State of North Dakota sees the safety of the Internet and our citizens’ information as absolutely essential to our collective future. During this webinar, Shawn Riley expounded on how the North Dakota approach to cyber across their educational systems and workforce organizations will be accomplished and details of execution as North Dakota contributes to the cyber moonshot.

State of Cyber: A Roadtrip Through Where We’ve Been and Where We’re Going (webinar)

  • August 2018
  • Number of views: 1141
State of Cyber: A Roadtrip Through Where We’ve Been and Where We’re Going (webinar)

The 2018 Deloitte-NASCIO Cybersecurity Study will be the 5th of its kind. Listen to this webinar to learn about what has changed since the survey was released in 2010 and get a sneak peek at the 2018 survey.

Successful Metadata Management Strategy and Implementation for State Government (webinar)

  • December 2017
  • Number of views: 3749
Successful Metadata Management Strategy and Implementation for State Government (webinar)

Effective metadata management is no longer an option, but an absolute requirement for state governments and federal agencies looking to enable their master data management and data governance initiatives.  Without proper metadata management their IT departments cannot manage their systems and ensure that they are providing the true value to the agency.

This practical course leverages the lessons learned from successful metadata management programs and it explains:
•    Metadata Management Fundamentals
•    Business vs. Technical Metadata
•    Metadata Management Use Cases
•    Metadata ROI
•    Metadata Management and Data Management

Managing Software Risk in a Multi-Sourced Environment (webinar)

  • November 2017
  • Number of views: 3276
Managing Software Risk in a Multi-Sourced Environment (webinar)

This webinar focused on business related software risk.  This is the risk that organizations face that is inherent in systems and applications.  There are three levels of risk associated with the structure of systems.  They include the system level, the technology level and the code level.  In this webinar, we explored the magnitude of risk attributable to each of these layers.  

Systems and applications in the 21st Century enterprise are highly complex involving many layers and components, technologies, languages.  All of this complexity creates risk.  Add to this the advent of cloud, mobile, and new approaches to development such as agile and we find mission critical business processes are supported by highly complex portfolio of technology and development that must be orchestrated by an overall architecture.

We explored what can be done about managing this complexity and the inherent risk that accompanies it. You will learn about the Consortium for IT Software Quality (CISQ) and recent legislation that demonstrates the importance government is placing on this type of risk at the federal and state level.
 

State CIO Top Ten Policy and Technology Priorities for 2018

  • November 2017
  • Number of views: 11500
State CIO Top Ten Policy and Technology Priorities for 2018

NASCIO conducts a survey of the state CIOs to identify and prioritize the top policy and technology issues facing state government. The CIOs top ten priorities are identified and used as input to NASCIO's programs, planning for conference sessions, and publications.

Shrinking State Data Centers: A Playbook for Enterprise Data Center Consolidation

  • November 2017
  • Number of views: 7299
Shrinking State Data Centers: A Playbook for Enterprise Data Center Consolidation

This is an update since NASCIO’s last publication on data center consolidation in 2007. This version is a playbook of 10 plays for states who have yet to consolidate their data centers using lessons learned and advice from the trenches from states who have completed enterprise consolidation.

RSS
12345678

Resources By Category

Categories

Resources By Date

Archive