NASCIO Resources

Top Ten Talks: Security and Risk Management (video)

  • September 2016
  • Number of views: 2472
Top Ten Talks: Security and Risk Management (video)
Top Ten Talks session at the NASCIO 2016 Annual Conference in Orlando, FL.

Speaker has just 5 minutes to deliver a focused talk on one of the CIO Top Ten Priorities.

2016 Deloitte-NASCIO Cybersecurity Study - State Governments at Risk: Turning Strategy and Awareness into Progress

  • September 2016
  • Number of views: 36938
2016 Deloitte-NASCIO Cybersecurity Study - State Governments at Risk: Turning Strategy and Awareness into Progress

This study reports findings and analysis of a comprehensive survey of State Chief Information Security Officers (CISOs) conducted by NASCIO in partnership with Deloitte. The results of the 2016 Deloitte-NASCIO Cybersecurity Study confirm the growing importance of cybersecurity for states.

NASCIO Staff Contact: Meredith Ward, Senior Policy Analyst (mward@NASCIO.org)

Value and Vulnerability: The Internet of Things in a Connected State Government

  • June 2016
  • Number of views: 17541
Value and Vulnerability: The Internet of Things in a Connected State Government
States are finding that the “Internet of Things” (IoT) can improve efficiency, reduce waste and connect citizens to state services in faster and more affordable ways. But with that value comes vulnerability. States must consider security, privacy, accessibility and standardization when crafting a roadmap for IoT. This policy brief describes ways that states are currently implementing IoT, possibilities for the coming years, and recommendations on avoiding difficulties along the way.

Advanced Cyber Analytics

  • April 2016
  • Number of views: 14392
Advanced Cyber Analytics
This report examines the subject of advanced cyber analytics.  It makes the case for states to invest in such capabilities and maintain ongoing maturity in advanced analytics.  All organizations, including state government must also develop and maintain response capabilities that continuously mature in sophistication in order to keep pace with an ever changing threat landscape. State government remains in a defensive position.  With the advent of multi-vector strategies by cyber criminals, state government now more than ever needs the ability to correlate disparate data sources generated from the myriad of security tools agencies have already invested in.  Examples of advanced analytics tools are provided.  The report includes a call to action list, a checklist, key questions, and recommendations.

Cyber Disruption Response Planning Guide

  • April 2016
  • Number of views: 21410
Cyber Disruption Response Planning Guide

State government must now view cyber attacks that are more than cyber incidents.  We must prepare for larger magnitude events.  These can be termed cyber disruptions, disasters or even catastrophes.  This publication includes the following:

  • A call to action for states to develop state cyber disruption response plans that include: a governance structure that clearly designates who is in charge in a given event or phase of an event; development of a risk profile for state assets; collaboration among the various agencies that have cyber responsibility; and a communication plan to ensure the right people have the right information as early as possible so they can response effectively.
  • A checklist for states to work with in developing progress toward a cyber disruption response operating discipline.
  • A cross functional process description that can be used as a starting point for states to develop their own unique cross functional process for orchestrated planning and response at various threat levels.

State CIO Top Ten Policy and Technology Priorities for 2016

  • November 2015
  • Number of views: 26785
State CIO Top Ten Policy and Technology Priorities for 2016
Each year NASCIO conducts a survey of the state CIOs to identify and prioritize the top policy and technology issues facing state government. The CIOs top ten priorities are identified and used as input to NASCIO's programs, planning for conference sessions, and publications.

2015 CISO Toolkit

  • October 2015
  • Number of views: 13498
2015 CISO Toolkit
Moving Forward: Leadership Toolkit for State CISOs includes state CISO critical leadership traits, how state CISOs and private sector CISOs differ and the tenure of state CISOs. This publication examines survey responses, gives “advice from the trenches” and details other critical success factors for state CISOs.

2015 State CIO Survey: The Value Equation

  • October 2015
  • Number of views: 28909
2015 State CIO Survey: The Value Equation
NASCIO, Grant Thornton LLP and CompTIA have collaborated for a sixth consecutive year to survey state government IT leaders on current issues, trends and perspectives. The survey sponsors seek to provide these state government IT leaders with an opportunity to voice their thoughts and opinions on matters of high importance. Governors, legislatures and business leaders can benefit from these knowledgeable insights about essential state IT services. As highlighted in the survey results, the state IT and business landscape continues to change, reflecting both emerging approaches to delivering IT products and services, and also the faster paced, more complex environment faced by state CIOs. We asked state CIOs to share their perspective on a number of topics, with a particular focus on the emerging role of the CIO as a broker of shared services, and on the use of incremental software development approaches to accelerate the delivery of value to customers. These topics share a common theme – customer expectations continue to rise, and state CIOs must be agile enough to adapt to changing circumstances and to rapidly deliver business value. State CIOs also shared their thoughts on the leadership attributes they perceive as most valuable for a state CIO, and which dimensions of the role were most critical for success. Cybersecurity , cloud services, mobility, broadband and IT procurement represent other high priority topics covered in the survey report.

NASCIO 2015 Cybersecurity Awareness Resource Guide

  • September 2015
  • Number of views: 14901
NASCIO 2015 Cybersecurity Awareness Resource Guide
For the 2015 observance of National Cyber Security Awareness Month, NASCIO has updated its Resource Guide for State Cybersecurity Awareness, Education, and Training Initiatives. The guide includes new information from our state members, who provided examples of state awareness programs and initiatives. This is an additional resource of best-practice information, together with an interactive state map to allow users to drilldown to the actual resources that states have developed or are using to promote cyber awareness. It includes contact information for the CISO, hyperlinks to state security and security awareness pages, and information describing cybersecurity awareness, training, and education initiatives.

The Resource Guide is a work-in-progress that should provide a valuable reference resource for Cyber Security Awareness Month, as well as the ongoing planning of security awareness and training efforts state programs may undertake thereafter.

Unmanned Aerial Systems, Governance and State CIOs: On the Radar

  • May 2015
  • Number of views: 17896
Unmanned Aerial Systems, Governance and State CIOs: On the Radar
State governments are turning to unmanned aerial systems (UAS) for a variety of applications. This brief lays out important public policy issues when it comes to state CIO governance of UAS.
RSS
1234567

Resources By Category

Categories

Resources By Date

Archive