NASCIO Resources

State Cyber Security Resource Guide: Awareness, Education, and Training Initiatives

  • September 2011
  • Number of views: 6285
State Cyber Security Resource Guide:  Awareness, Education, and Training Initiatives
For the 2011 observance of National Cyber Security Awareness Month, NASCIO has updated its Resource Guide for State Cyber Security Awareness,Education, and Training Initiatives. The guide includes new information from our state members, who provided examples of state awareness programs and initiatives. This is an additional resource of best-practice information, together with an interactive state map to allow users to drilldown to the actual resources that states have developed or are using to promote cyber awareness. It includes contact information for the CISO, hyperlinks to state security and security awareness pages, and information describing cyber security awareness, training, and education initiatives.

Capitals in the Clouds - The Case for Cloud Computing in State Government Part I: Definitions and Principles

  • June 2011
  • Number of views: 7861
Capitals in the Clouds - The Case for Cloud Computing in State Government Part I: Definitions and Principles
Cloud computing has arrived as a serious alternative for state government. There are outstanding issues that must be faced and dealt with in order to maintain the reliability, responsibility, security, privacy, and citizen-confidence in government services. Government is exploring technology and business process innovations that will make the way for government to deliver existing services more economically. Cloud computing provides a number capabilities that have the potential for enabling such innovation.

State CIO Top Ten Policy and Technology Priorities for 2011

  • October 2010
  • Number of views: 8239
State CIO Top Ten Policy and Technology Priorities for 2011
Each year NASCIO conducts a survey of the state CIOs to identify and prioritize the top policy and technology issues facing state government. The CIOs top ten priorities are identified and used as input to NASCIO's programs, planning for conference sessions, and publications.

State Governments at Risk: A Call to Secure Citizen Data and Inspire Public Trust

  • September 2010
  • Number of views: 6285
State Governments at Risk: A Call to Secure Citizen Data and Inspire Public Trust
People put a lot of trust in state governments to collect, maintain and protect the appropriate information necessary to execute their programs, protect individual rights, and ensure public safety. The volume of that information expands at an ever-increasing pace, and maintenance and protection of that information, particularly where it involves Personally Identifiable Information (PII) and Personal Health Information (PHI), becomes more and more challenging. The 2010 Deloitte-NASCIO Cybersecurity Study finds that states need to do more to secure citizen data and maintain public trust.

Security at the Edge: Protecting Mobile Computing Devices Part II: Policies on the Use of Personally Owned Smartphones in State Government

  • March 2010
  • Number of views: 5671
Security at the Edge: Protecting Mobile Computing Devices  Part II: Policies on the Use of Personally Owned Smartphones in State Government
Due to the pervasive use of personally owned smartphones in the U.S., practical concerns have arisen around state employee requests to use these devices for state business. The potential for security incidents and data breaches is a practical concern that state CIOs and CISOs must address when establishing security standards. While these devices make the work lives of employees less complicated, and perhaps reduce state IT acquisition costs, officials must once again face the classic dilemma of balancing risks and rewards. Policies on the Use of Personally Owned Smartphones in State Government highlights the trend toward states establishing security policies and standards for connecting personally owned smartphones to government networks.

State CIO Top Ten Policy and Technology Priorities for 2010

  • November 2009
  • Number of views: 8119
State CIO Top Ten Policy and Technology Priorities for 2010
Each year NASCIO conducts a survey of the state CIOs to identify and prioritize the top policy and technology issues facing state government. The CIOs top ten priorities are identified and used as input to NASCIO's programs, planning for conference sessions, and publications.

Resource Guide for State Cyber Security Awareness, Education, and Training Initiatives

  • September 2009
  • Number of views: 6332
Resource Guide for State Cyber Security Awareness, Education, and Training Initiatives
For the observance of the sixth annual National Cyber Security Awareness Month, NASCIO has created a Resource Guide of examples of state awareness programs and initiatives. The compendium augments previously gathered information with data from a just-completed, short survey of state CISOs. It includes links to state security awareness pages, contact information for state CISOs, and information describing cyber security awareness, training, and education initiatives that target four categories: Executives/Elected Officials; Citizens; State Workers; and IT Security Personnel.

The Resource Guide is a work-in-progress that should provide a valuable reference resource for Cyber Security Awareness Month, as well as the ongoing planning of security awareness and training efforts state programs may undertake thereafter.

Security at the Edge — Protecting Mobile Computing Devices

  • July 2009
  • Number of views: 16521
Security at the Edge — Protecting Mobile Computing Devices
The business of government is increasingly conducted or supported by mobile computing devices as states adopt these tools to un-tether traditional office workers from their desks or employ them for a wide variety of purposes in the field. Use of mobile devices is so widespread that it is difficult to imagine how state governments can operate without them, given their increased computing power and the ease with which they may be integrated with state networks and databases via the Internet. At the same time, however, mobile devices are unusually vulnerable to loss, theft, mis-use, or misconfiguration, which can and does lead to the loss of sensitive data. Security at the Edge highlights the risks associated with uncontrolled use of mobile devices, and targets the standards and procedural controls that allow state CIOs to better secure them.

Desperately Seeking Security Frameworks – A Roadmap for State CIOs

  • March 2009
  • Number of views: 16117
Desperately Seeking Security Frameworks – A Roadmap for State CIOs
State CIOs, chief security officers, and the IT security professionals who work with them face a challenging and sometimes confusing array of security frameworks – these may be pushed down by Federal agencies, issued by national or international standards bodies, promoted by industry as best practice, or in some instances, be written into law or federal regulation. Desperately Seeking Security Frameworks provides an overview of the primary security standards, regulations, and laws that impact state IT security programs, highlights how states have used the frameworks to shape their security architectures, policies, standards, and controls, and identifies the key issues for CIOs as they establish and maintain IT security programs.

State CIO Top Ten Policy and Technology Priorities for 2009

  • November 2008
  • Number of views: 7600
State CIO Top Ten Policy and Technology Priorities for 2009
Each year NASCIO conducts a survey of the state CIOs to identify and prioritize the top policy and technology issues facing state government. The CIOs top ten priorities are identified and used as input to NASCIO's programs, planning for conference sessions, and publications.
RSS
1234567

Resources By Category

Categories

Resources By Date

Archive