Baltimore, Maryland Baltimore Hilton, April 22-24, 2018
San Diego, CA Hilton San Diego Bayfront, October 21-24, 2018
Three important findings have combined to motivate this topic:
Combined these three findings require a new look at these roles. This webinar will explore the role of a Chief Data Officer (CDO) as a function needed by organizations (especially state governments). While we don't yet have all the answers, we can at least lay out three necessary but insufficient prerequisites to making progress faster than we have achieved to date.
This presentation will present HP’s Enterprise Architecture Practice. It will include the rationale for enterprise architecture, the career path and professional development for architects at HP, framework and methodology employed.
This presentation outlines the four pillars of a Holistic Enterprise Architecture: architectural models, framework, methodology, and implementation/solution models. It also explains the business and technology gains, and demystifies the practice of implementing a successful Holistic Enterprise Architecture.
Join us to learn how the Oracle Corporation has instituted business architecture as business discipline.
The presentation will focus on how Oracle defines, organizes and implements business architecture – and why business architecture is essential to ensuring successful IT projects and investment.
Educational Webinar on the 2012 Deloitte-NASCIO Cybersecurity Study: A call for collaboration and compliance
NASCIO invites you to join an archived webinar from Thursday, December 6, 2012. NASCIO and Deloitte conducted a national briefing on the results of the 2012 Cybersecurity Study,States at Risk: A Call for Collaboration and Compliance. The cybersecurity survey, which repeats a comparable study undertaken in 2010, queried state chief information security officers and other state officials in 2012. The study provides comprehensive information about the status of cybersecurity programs in state governments across the country. Survey respondents included 50 CISOs or equivalents responsible for the security oversight of 48 states and two U.S. territories.
Why are states at risk? To learn more about the key concerns of state security officers charged with protecting the critical information state governments create and manage to deliver constituent services please view the archived webinar below. The briefing will outline the challenges faced by state programs and highlight the report's call to action directed at State CIOs and policy leaders within states, which details steps states can take to enhance their capacity to protect citizen data and reduce risk.
Join us to learn how the state of Hawaii has partnered with state and local government to share justice information using NIEM, and the Global Reference Architecture (GRA).
Enterprise architecture is gaining a new level of interest and investment across all sectors of the economy. The motivation is grounded in gaining competitive advantage, reaching new levels of effectiveness, and creating an enterprise that is well orchestrated to continually transform. This need for a complete enterprise-wide discipline becomes even more critical when organizations “join up” to accomplish some purpose, optimize resources, or simply pursue economies of scale.
In this webinar you will receive an overview of the NIEM Engagement Process and a live demonstration of the Cost Model.
The NIEM Engagement Process was developed to meet the need for a structured framework to help organizations assess the value of applying NIEM to information sharing and exchange activities. The NIEM Cost Model is a part of an overall NIEM Engagement Process that the NIEM Program Management Office (PMO) is developing.
The National Information Exchange Model (NIEM) Cost Model is designed to quantify the inputs used for NIEM implementation within an organization. It takes the NIEM Information Exchange Development Lifecycle, the processes that are associated with it, and relates associated costs.
NASCIO invites you to listen to an archived educational webinar providing an overview of Domain Name System Security Extensions (DNSSEC), sponsored by its Security and Privacy Committee.
The webinar contextualizes DNSSEC as a security-enhancing tool states need to consider adopting as they evolve their IT security programs to better protect the IT network infrastructure that enables 21st century government. It provides an overview of Domain Name System Security Extensions as adopted and promoted by the Federal government for the .gov domain, along with a summary of the Commonwealth of Virginia’s DNSSEC initiative. The presentations describe the vulnerabilities that DNSSEC is designed to protect against, patterns of adoption within the Federal government, business drivers that led to Virginia’s project, and the state’s implementation experience.
Educational Webinar Hosted by the NASCIO Health Care Working Group and the State Digital Identity Working Group on Identity and Access Management in Health IT
NASCIO invites you to join an archived educational webinar on Identity and Access Management in Health IT.
The webinar highlights the benefits of an enterprise strategy for identity management for health IT. Currently, states maintain a variety of duplicative identity records for their residents – as well as a plethora of credentials associated with those identity records. As a result, a single person carries multiple credentials for a single common purpose: to prove that person’s identity as the basis for granting a privilege. Maintaining these redundant systems is costly, inefficient, and rife with security, privacy and safety risks—both for the state as well as its constituents.