NASCIO and VMware conducted a study during 2022 on the topic of state government application modernization. This study included an online survey and detailed individual interviews of state and territorial CIOs. The report presents findings from this research, key recommendations and a playbook for moving forward with application modernization.
This report presents the results of a joint Accenture/NASCIO research project exploring the future role of the state CIO and how the state CIO will drive innovation.
The research included interviews and a survey of state CIOs to understand the role of state CIOs in promoting innovation in government.
- The study explored how state IT organizations build the capacity to innovate and which best practices help in doing so.
- We also examined how state CIOs embrace new and emerging technologies to create the best government outcomes.
- Our report illuminates compelling opportunities, persistent obstacles, strategies for accelerating innovation and inspiring real-world case studies.
- The report presents a set of practical recommendations for driving innovation.
- Creating an Innovation Culture (April 15, 2020)
- Future State CIO: Catalyst and Convener of Innovation (February 17, 2020)
Compared to a private company or even any other level of government, the need to focus on privacy at the state level is significant. The amount of personal information citizens provide to their state outweighs anything a citizen provides to any one company. Because of this, we have seen number of states who have hired a chief privacy officer increase rapidly over the last several years. This NASCIO research provides a snapshot of the state chief privacy officer position, the background of CPOs, what they do in their roles, how the role is administratively structured and their advice for states interested in creating the position.
Multisourcing is emerging as the discipline for managing a complex and diversified portfolio of services and service providers. These services are being employed to meet the continual evolving demand for creatively delivering government services through new channels with new functionality. In this evolving circumstance there is the need for a new operating model the state chief information officer can employ to bring together agencies needs and demands with available emerging technologies and management disciplines. This report opens the door to this discussion and explores the underlying forces of change that are driving the need for a new operating model.
This report describes the basics of how to get started with a data management discipline. It maintains a simple approach to gaining support including governance, bringing together the right stakeholders, and establishing a compelling business case. This report is the second in a series of reports that deals with WHY is data management important; HOW does state government get started.
States are finding that the “Internet of Things” (IoT) can improve efficiency, reduce waste and connect citizens to state services in faster and more affordable ways. But with that value comes vulnerability. States must consider security, privacy, accessibility and standardization when crafting a roadmap for IoT. This policy brief describes ways that states are currently implementing IoT, possibilities for the coming years, and recommendations on avoiding difficulties along the way.
This report examines the subject of advanced cyber analytics. It makes the case for states to invest in such capabilities and maintain ongoing maturity in advanced analytics. All organizations, including state government must also develop and maintain response capabilities that continuously mature in sophistication in order to keep pace with an ever changing threat landscape. State government remains in a defensive position. With the advent of multi-vector strategies by cyber criminals, state government now more than ever needs the ability to correlate disparate data sources generated from the myriad of security tools agencies have already invested in. Examples of advanced analytics tools are provided. The report includes a call to action list, a checklist, key questions, and recommendations.
State government must now view cyber attacks that are more than cyber incidents. We must prepare for larger magnitude events. These can be termed cyber disruptions, disasters or even catastrophes. This publication includes the following:
- A call to action for states to develop state cyber disruption response plans that include: a governance structure that clearly designates who is in charge in a given event or phase of an event; development of a risk profile for state assets; collaboration among the various agencies that have cyber responsibility; and a communication plan to ensure the right people have the right information as early as possible so they can response effectively.
- A checklist for states to work with in developing progress toward a cyber disruption response operating discipline.
- A cross functional process description that can be used as a starting point for states to develop their own unique cross functional process for orchestrated planning and response at various threat levels.
This report presents the case for investing in data management. It presents in simple terms WHY data and information must be properly managed. The report presents basic rationale for investing in the development of a formal data management program. This report is the first in a series of reports that will deal with WHY is data management important; HOW does state government get started; Legal aspects of data management.
What does it mean to be working on the right things? This determination is often difficult when considering the state as both an enterprise and a collective of individual agencies. Through interviews and formal surveys, NASCIO and Infosys Public Services gained insight from state IT leaders on the fundamental processes, mechanisms and criteria necessary to ensure that state IT is working on the right things. The resulting report will help state IT decision makers understand the key factors needed to identify the right things to do, see how they and their peer states stand against these factors and what can be done to bridge the gap.