Maryland - Gaylord National Harbor, May 5-8, 2019
Nashville, TN - JW Marriott , October 13-16, 2019
In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state.
Participants in this webinar learned about the methods by which state and national elections officials are preparing for upcoming elections. Both state and national leaders discussed current efforts to secure our elections process and national resources available to assist those who administer that process.
The State of North Dakota sees the safety of the Internet and our citizens’ information as absolutely essential to our collective future. During this webinar, Shawn Riley expounded on how the North Dakota approach to cyber across their educational systems and workforce organizations will be accomplished and details of execution as North Dakota contributes to the cyber moonshot.
The 2018 Deloitte-NASCIO Cybersecurity Study will be the 5th of its kind. Listen to this webinar to learn about what has changed since the survey was released in 2010 and get a sneak peek at the 2018 survey.
Effective metadata management is no longer an option, but an absolute requirement for state governments and federal agencies looking to enable their master data management and data governance initiatives. Without proper metadata management their IT departments cannot manage their systems and ensure that they are providing the true value to the agency.
This practical course leverages the lessons learned from successful metadata management programs and it explains:
• Metadata Management Fundamentals
• Business vs. Technical Metadata
• Metadata Management Use Cases
• Metadata ROI
• Metadata Management and Data Management
This webinar focused on business related software risk. This is the risk that organizations face that is inherent in systems and applications. There are three levels of risk associated with the structure of systems. They include the system level, the technology level and the code level. In this webinar, we explored the magnitude of risk attributable to each of these layers.
Systems and applications in the 21st Century enterprise are highly complex involving many layers and components, technologies, languages. All of this complexity creates risk. Add to this the advent of cloud, mobile, and new approaches to development such as agile and we find mission critical business processes are supported by highly complex portfolio of technology and development that must be orchestrated by an overall architecture.
We explored what can be done about managing this complexity and the inherent risk that accompanies it. You will learn about the Consortium for IT Software Quality (CISQ) and recent legislation that demonstrates the importance government is placing on this type of risk at the federal and state level.
NASCIO conducts a survey of the state CIOs to identify and prioritize the top policy and technology issues facing state government. The CIOs top ten priorities are identified and used as input to NASCIO's programs, planning for conference sessions, and publications.
This is an update since NASCIO’s last publication on data center consolidation in 2007. This version is a playbook of 10 plays for states who have yet to consolidate their data centers using lessons learned and advice from the trenches from states who have completed enterprise consolidation.