 National association Pamela Walker, Director of Government Affairs National Association of State Chief Information Officers NLC Congressional City Conference:

Slides:



Advertisements
Similar presentations
Manatt manatt | phelps | phillips New York State Health Information Technology Summit Initiative Overview and Update Rachel Block, Project Director United.
Advertisements

Impacts of 3 rd Party IaaS on broadband network operations and businesses Prabhat Kumar Managing Partner, i 3 m 3 Solutions.
Cybersecurity Update December 5, Agenda Cybersecurity – A growing problem Cybersecurity in other states (NASCIO/Deloitte Study) Structure Challenges.
Shared Technical Infrastructure Bill Willis Deputy State CIO ITAB Meeting 12/2/2005.
Information Resources In Transition… Adding Value… Making a Difference University of Scranton – IT Forum February 14, 2013.
CUPA-HR Strong – together!
Mobility in Government Consolidation & Wrap-up Lee Naik3 Oct 2013.
Doug Couto Information Systems and Technology Committee (ABJ50) Washington, DC January 25, 2011.
Institutional Transformation of Government in the Network Society Jane E. Fountain Director, National Center for Digital Government Harvard University.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Private Sector Perspectives on Federal Financial Systems Modernization and Shared Services.
David A. Brown Chief Information Security Officer State of Ohio
State IT Priorities and Trends: Collaborating with Your State CIO SERI Institute July 9, 2013 Doug Robinson, Executive Director National Association of.
Keystone Technology Plan Presentation to Chesapeake Bay Program Information Management Subcommittee May 19, 2004 Nancie L. Imler Chief Information Officer.
Identity, Privacy, and Security: Higher Education Policy and Practice Rodney Petersen Government Relations Officer Director of Cybersecurity Initiative.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Thought Leaders Retreat September 23,  Talent shortages already exist in many areas of the global workforce  Effectively handling organizational.
From the IT Assessment to the IT Roadmap ( )
Building Public Health / Clinical Health Information Exchanges: The Minnesota Experience Marty LaVenture, MPH, PhD Director, Center for Health Informatics.
Solution Briefing Business Productivity in Action Keynote.
Navigating the Maze How to sell to the public sector Adrian Farley Chief Deputy CIO State of California
21 st Century Maricopa Review of Process Human Resources Projects Steering Team Meeting May 12, 2010.
Driving Improvements in Efficiency & Effectiveness North West Centre of Excellence Stakeholder Event Martin Fokinther Executive Consultant, Global Public.
Strategic Planning for EEO & HR Offices Dinah Cohen CAP Director Derek Shields CAP Program Manager EEOC Executive Leadership Conference – May 3-5, 2011.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
State of the States 2012: IT Priorities, Issues and Trends National State Auditors Association IT Conference Nashville, Tennessee Doug Robinson, Executive.
IT Project Management in Virginia IT Project Management Audits in Virginia _____________________________________ NSAA IT Conference.
Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. Mobile Work Exchange Spring Town Hall April 30, 2013 Planning for Tomorrow’s Mobile.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
The CIO’s response to the Global Agenda Daniel Benton, Global Managing Director IT Strategy.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Delivering an Architecture for the Social Enterprise Alpesh Doshi, Fintricity Information Age Social&Mobile Business Conference Tuesday 31st January 2012.
© 2014 IBM Corporation Smarter Workforce Services Business Process Innovation.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Transforming Services Creating Efficiencies Empowering Citizens Transforming Services Creating Efficiencies Empowering Citizens Transforming Services Creating.
© Copyright 2011 Hewlett-Packard Development Company, L.P. Patrick Moore Hewlett Packard August 7, 2011 C HANGE I S O PPORTUNITY : A NEW PARADIGM FOR THE.
Cloud Computing Zach Ciccone Claudia Rodriguez Annia Aleman Xiaoying Tu Nov 14, 2013.
Optimized IT Gae Lyn DeLand, IT Director In. March 15, 2007 IT Governance General Description: “This Bill consolidates information technology services.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
IT ISSUES & TRENDS, 2015 Faculty Technology Day Wednesday, August 19, 2025.
Joseph Kurian CEO, 249Labs Building a Marketing Technology Organization.
EDUCAUSE 2014 Top Ten IT Issues. Today’s Agenda Introduction to EDUCAUSE IT Issues History & Methodology 2014 Top Ten IT Issues Selected Issues Reviewed.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.
Cloud Market Readiness Report Finance, Media, and Legal Sectors March 2014 Trend Consulting 2013.
Enterprise Cybersecurity Strategy
Confidential 1 HIPAA Compliance at Blue Cross Blue Shield of Minnesota: A Case Study Tim Wittenburg Director of Corporate Architecture & Data Management.
FFIEC Cyber Security Assessment Tool
State of New Jersey IT Consolidation Charles S. Dawson CTO/CIO.
FST Media Technology & Innovation – the Future of Insurance & Wealth Management Conference Four Pillars of the CIO Role Strategy, Governance, Risk and.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Budget Study Sessions -Sound Fiscal Management that Facilitates Meeting the Needs of the Community -A High Performing Workforce that is Committed.
Cloud, big data, and mobility Your phone today probably meets the minimum requirements to run Windows Server 2003 Transformational change up.
GSA IT Strategic Plan 2009 – 2011 August 2007 US General Services Administration 1.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Budget Study Sessions Strategic Support Proposed Operating Budget OUTCOMES: - A High Performing Workforce that is Committed to Exceeding.
State-of-the-States: CIO Priorities, Trends and Opportunities
Information Security Program
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
The Practical Side of Meaningful Use:
Assistant Vice President and Chief Technology Officer
Cloud adoption NECOOST Advisory | June 2017.
The EDUCAUSE 2019 Top 10 IT Issues
The State of Cybersecurity in State Government NAST March 26, 2019
Managing IT Risk in a digital Transformation AGE
The EDUCAUSE 2019 Top 10 IT Issues
Presentation transcript:

 National association Pamela Walker, Director of Government Affairs National Association of State Chief Information Officers NLC Congressional City Conference: Status of Cybersecurity with States and Congress

Fiscal recovery uneven, slow revenue growth, budgets are better, federal deficit reduction impact? CIOs seeking IT operational cost savings and alternative IT sourcing strategies Opportunities for change and innovation Living with the past - modernizing the legacy IT security and risk! Game has changed IT workforce: retirement wave, skills, recruiting State CIO positions – major churn State IT Landscape Today

CIO Priorities, Trends and Perspectives

State CIO Priorities for Consolidation / Optimization: consolidating infrastructure and services, centralizing 2. Budget and Cost Control: managing budget reduction, strategies for savings 3. Governance: improving IT governance, authority, data governance, partnering, collaboration 4. Health Care: Affordable Care Act, health information and insurance exchanges, architecture, partnering, implementation, technology solutions, Medicaid systems 5. Cloud Computing: governance, service management, service catalogs, platform, infrastructure, security, privacy, data ownership, legal issues, vendor management 6. Security: risk assessment, governance, budget and resource requirements; security frameworks, data protection, training and awareness, insider threats, third party security 7. Broadband and Connectivity: strengthening statewide connectivity, public safety wireless network/interoperability, implementing BTOP grant 8. Shared Services: business models, sharing resources, services, infrastructure, independent of organizational structure, service portfolio management 9. Portal: maturing state portal, e-government, single view of the customer/citizen, emphasis on citizen interactive self-service, mobile apps, accessibility 10. Mobile Services/Mobility: devices, applications, workforce, security, policy issues, support, ownership, communications, wireless infrastructure Source: NASCIO State CIO Survey, October 2011

Cybersecurity in the States  Critical infrastructure protection  More aggressive threats – organized crime, unorganized crime, hacktivism  Spam, phishing, hacking, and network probes up  Data breaches – trust impact  Insider threats, third party  Executive support  Inadequate funding  Need more training, awareness

Growing IT Security Risks in the States  Protecting legacy systems  Expansion of wireless networks  Adoption of cloud services  Online transactions  Use of social media platforms  Mobile devices and services  Use of personally-owned devices (BYOD)  Miscellaneous devices (USB, digital cameras, MP3 players, etc.)  Third-party contractors and managed services

What are your State’s top five IT security initiatives? 1. Data Protection 2. Information Security Risk Assessments 3. Information Security Training and Awareness 4. Application Security 5. Information Security Measurement and Reporting

What major barriers does your State face in addressing information security?

Today’s State IT Workforce: Under Pressure  State CIOs say % of state IT employees eligible for retirement within the next five years  Fiscal stress - hiring freezes and elimination of vacant positions  Nearly two-thirds say they anticipate having to reduce IT staff  IT Security positions are difficult to recruit and retain

Challenges Recruiting IT Security Professionals Source: NASCIO State IT Workforce: Under Pressure, January 2011

Business objectives GovernanceAcquisition strategyJurisdictional issues Security and privacy concerns Policy and legal issuesExit strategy

Social Media: Connecting Citizens, Presenting Risks securitylegal issues with Terms of Serviceprivacyrecords managementacceptable use Social media adoption rates are broad across state governments - 98% use free social media tools on hosted, third party platforms. Social media pose challenges to states in the areas of:

NASCIO Cybersecurity Call to Action Key Questions for State Leaders  Have you created a culture of information security in your state government?  Have you adopted a cybersecurity framework, based on national standards & guidelines?  Have you acquired continuous vulnerability management capabilities?  Have you documented the effectiveness of your cybersecurity with metrics and testing?  Have you developed security awareness training for workers and contractors?

Looking Ahead  More IT consolidation, shared services  Outsourcing: more steering, less rowing  IT implications of healthcare reform  Demand for performance, results  Extending the enterprise: locals?  Massive collaboration - Web 2.0  DHS, MS-ISAC and NASCIO collaboration – NCSR  More intra-state and inter-state collaboration; state homeland security advisors  State Centers of Excellence for cyber education & research  Funded research, scholarships, internships  Sharing best practices, recognition Looking Ahead: Leveraging State Assets

More Administrative Flexibility Needed for States Secure and Protect Citizen Data and State Digital Assets Support the Adoption and Expansion of the National Information Exchange Model (NIEM) Support State Role in Identity Management and Verification Solutions NASCIO 2012 Federal Advocacy Priorities

Congress and Cybersecurity  The Cybersecurity Act of 2012 (S. 2105) introduced by Sens. Lieberman and Collins  Strengthening and Enhancing Cybersecurity by Using Research, Education, Information, and Technology Act of 2012 or ‘‘SECURE IT” (S. 2151) introduced by Sen. McCain  Focus on critical infrastructure, information sharing, FIMSA reform, cyber workforce and international cooperation.  House taking a piecemeal approach.

Connect with... youtube.com/nasciomedia linkedin.com facebook.com twitter.com/nascio nascio.org