2018 Deloitte-NASCIO Cybersecurity Study – States at Risk: Bold Plays for Change

Even as state government Chief Information Security Officers have increased their access to and communications with top leaders, the top three issues impacting states’ cybersecurity remain the same from past surveys – budget, talent and increasing cyber threats. These findings from the 2018 Deloitte-NASCIO Cybersecurity Study are a call for bold action to disrupt the status quo.

Download

Walleyes, Whales & Cybersecurity

The walleye is South Dakota’s state fish. The opportunity to catch this delicious and challenging sport fish draws many South Dakotans and tourists to the clear, blue waters across the state. Email phishing, on the other hand, is akin to the silver (flying) carp. In the best-case scenario, it is a nuisance, worst case it is very dangerous. Learn how the state of South Dakota educates and trains staff and elected officials from the threatening aspects of email phishing.

Click here to see the full slide deck from the webinar.

Watch the Recording 

The 2018 State CIO Survey

As internal and external pressures continue to mount, state technology leaders say they are confident that by building strong teams and embracing new products and development processes, state IT departments will be able to improve how they serve government agencies and residents. Those and other factors contributed heavily to the 2018 State CIO Survey, State CIO as Communicator: The Evolving Nature of Technology Leadership. The survey includes responses from all 50 state CIOs on a range of issues, from evolving business models to workforce and budget to access to innovation and facing the future. Respondents to this year’s survey represent more than 150 years of collective service as a state’s top technology official.

Download

Ponemon Institute’s 2018 Cost of a Data Breach Study

This webinar covered the findings of the 2018 Cost of a Data Breach study and how states are preparing for and responding to data breaches.

 

Watch the Recording 

Cybersecurity Governance in the Commonwealth of Virginia

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state.

 

Download

Cybersecurity Governance in the State of New Jersey

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state.
 

Download

Cybersecurity Governance in the State of Michigan

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state.

 

Download

Cybersecurity Governance in the State of Georgia

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state.

 

Download

State Cybersecurity Governance Case Studies

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state.

 

Download

Cybersecurity Governance in the State of Washington

In recognition of the importance of governance in addressing cyber risks, the U.S. Department of Homeland Security (DHS) partnered with the National Association of State Chief Information Officers (NASCIO) to develop a report and series of case studies exploring how states govern cybersecurity. The report and case studies explore how Georgia, Michigan, New Jersey, Virginia and Washington use cross-enterprise governance mechanisms (i.e., laws, policies, structures, and processes) across strategy and planning, budget and acquisition, risk identification and mitigation, incident response, information sharing, and workforce and education. The purpose of the report and case studies is to offer concepts and approaches to other states and organizations who face similar challenges. The report summarizes the case studies and identifies common trends in how cybersecurity governance is addressed across the five states, with supporting examples from each state.

 

Download