NASCIO Resources

The Changing Roles of the Chief Architect and the CIO (webinar)

  • April 2013
  • Number of views: 6100

Three important findings have combined to motivate this topic:

  • #1 Poor data management performance to date (requires additional or difference effort)
  • #2 Recognition that data is not a project (requires a difference approach)
  • #3 Lack of domain expertise (requires different career preparation)

Combined these three findings require a new look at these roles.  This webinar will explore the role of a Chief Data Officer (CDO) as a function needed by organizations (especially state governments).  While we don't yet have all the answers, we can at least lay out three necessary but insufficient prerequisites to making progress faster than we have achieved to date.

Architecture at HP – Architecting for Public Value

  • March 2013
  • Number of views: 13700

This presentation will present HP’s Enterprise Architecture Practice.  It will include the rationale for enterprise architecture, the career path and professional development for architects at HP, framework and methodology employed.

Driving Efficiency and Innovation by Consistently Managing Complexity and Change (webinar)

  • February 2013
  • Number of views: 5999

This presentation outlines the four pillars of a Holistic Enterprise Architecture: architectural models, framework, methodology, and implementation/solution models. It also explains the business and technology gains, and demystifies the practice of implementing a successful Holistic Enterprise Architecture.

Business Architecture at Oracle Corporation

  • January 2013
  • Number of views: 4815

Join us to learn how the Oracle Corporation has instituted business architecture as business discipline.

The presentation will focus on how Oracle defines, organizes and implements business architecture – and why business architecture is essential to ensuring successful IT projects and investment.

2012 Deloitte-NASCIO Cybersecurity Study: A call for collaboration and compliance

  • December 2012
  • Number of views: 3876

Educational Webinar on the 2012 Deloitte-NASCIO Cybersecurity Study: A call for collaboration and compliance

NASCIO invites you to join an archived webinar from Thursday, December 6, 2012. NASCIO and Deloitte conducted a national briefing on the results of the 2012 Cybersecurity Study,States at Risk:  A Call for Collaboration and Compliance.  The cybersecurity survey, which repeats a comparable study undertaken in 2010, queried state chief information security officers and other state officials in 2012.  The study provides comprehensive information about the status of cybersecurity programs in state governments across the country.  Survey respondents included 50 CISOs or equivalents responsible for the security oversight of 48 states and two U.S. territories. 

Why are states at risk? To learn more about the key concerns of state security officers charged with protecting the critical information state governments create and manage to deliver constituent services please view the archived webinar below.  The briefing will outline the challenges faced by state programs and highlight the report's call to action directed at State CIOs and policy leaders within states, which details steps states can take to enhance their capacity to protect citizen data and reduce risk.

Hawaii Integrated Information Sharing and the Open Justice Broker Consortium (webinar)

  • November 2012
  • Number of views: 5076

Join us to learn how the state of Hawaii has partnered with state and local government to share justice information using NIEM, and the Global Reference Architecture (GRA).

Effective Transformation and Integration that can Enable Cross-jurisdiction Collaboration (webinar)

  • September 2012
  • Number of views: 5191

Enterprise architecture is gaining a new level of interest and investment across all sectors of the economy.  The motivation is grounded in gaining competitive advantage, reaching new levels of effectiveness, and creating an enterprise that is well orchestrated to continually transform.  This need for a complete enterprise-wide discipline becomes even more critical when organizations “join up” to accomplish some purpose, optimize resources, or simply pursue economies of scale.

Charting the Course for Information Sharing - Developing a NIEM Implementation Roadmap including the use of the NIEM Cost Model

  • December 2011
  • Number of views: 2809

In this webinar you will receive an overview of the NIEM Engagement Process and a live demonstration of the Cost Model. 

The NIEM Engagement Process was developed to meet the need for a structured framework to help organizations assess the value of applying NIEM to information sharing and exchange activities.  The NIEM Cost Model is a part of an overall NIEM Engagement Process that the NIEM Program Management Office (PMO) is developing. 

The National Information Exchange Model (NIEM) Cost Model is designed to quantify the inputs used for NIEM implementation within an organization.  It takes the NIEM Information Exchange Development Lifecycle, the processes that are associated with it, and relates associated costs. 

DNSSEC and the States, an Educational Webinar Hosted by the NASCIO Security and Privacy Committee

  • November 2011
  • Number of views: 3307

NASCIO invites you to listen to an archived educational webinar providing an overview of Domain Name System Security Extensions (DNSSEC), sponsored by its Security and Privacy Committee.

The webinar contextualizes DNSSEC as a security-enhancing tool states need to consider adopting as they evolve their IT security programs to better protect the IT network infrastructure that enables 21st century government. It provides an overview of Domain Name System Security Extensions as adopted and promoted by the Federal government for the .gov domain, along with a summary of the Commonwealth of Virginia’s DNSSEC initiative. The presentations describe the vulnerabilities that DNSSEC is designed to protect against, patterns of adoption within the Federal government, business drivers that led to Virginia’s project, and the state’s implementation experience.

Identity and Access Management in Health IT

  • November 2011
  • Number of views: 3573

Educational Webinar Hosted by the NASCIO Health Care Working Group and the State Digital Identity Working Group on Identity and Access Management in Health IT

NASCIO invites you to join an archived educational webinar on Identity and Access Management in Health IT.

The webinar highlights the benefits of an enterprise strategy for identity management for health IT. Currently, states maintain a variety of duplicative identity records for their residents – as well as a plethora of credentials associated with those identity records. As a result, a single person carries multiple credentials for a single common purpose: to prove that person’s identity as the basis for granting a privilege. Maintaining these redundant systems is costly, inefficient, and rife with security, privacy and safety risks—both for the state as well as its constituents.


Resources by Type

Resources By Category


Resources By Date