Shared Technical Architecture’s Role within the ECIO Organization “Arkansas Shared Technical Architecture”

Slides:



Advertisements
Similar presentations
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
Advertisements

Unit 1: Introductions and Course Overview Administrative Information  Daily schedule  Restroom locations  Breaks and lunch  Emergency exit routes 
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS.
Legal Agreements and Policy Work Group Co-facilitators: Linda Attarian and Jill Moore Dial: Enter room#: * * (don’t forget the asterisks.
Auditor General’s Office One key audit focus area – Compliance with Laws and Regulations.
Enterprise Architecture. 2 Agenda What is Enterprise Architecture (EA)? Roles in EA? Why is EA Important? Tangible Benefits from EA? What Do We Need to.
Information Security Policies Larry Conrad September 29, 2009.
A.Vandenberg August 7, 2001 HE PKI Summit State of Georgia and PKI Art Vandenberg Director, Advanced Campus Services Information Systems & Technology.
Alabama Geospatial Office Established May 2007 Mike Vanhook State GIS Coordinator.
Overarching Roles of Critical Partners In A Project 9:30 – 10:00 Rob Curlee, FMO Joseph Dominque, OCISO Mike Perry, EA.
IT PLANNING Enterprise Architecture (EA) & Updates to the Plan.
Keystone Technology Plan Presentation to Chesapeake Bay Program Information Management Subcommittee May 19, 2004 Nancie L. Imler Chief Information Officer.
Accessible IT Policy in K-12 Education Pat Brown AccessIT University of Washington
Enterprise Architecture The Arkansas Approach. Key Areas What is enterprise architecture? Why is it important? How you can participate Current status.
1 Federal IT Asset Management: The Government’s SAM Challenges Alan Vander Mallie, Program Manager U.S. General Services Administration Interagency Policy.
Introduction to Information Architecture Informatics Training for CDC Public Health Advisors.
Measuring the effectiveness of government IT systems Current ANAO initiatives to enhance IT Audit integration and support in delivering Audit outcomes.
Affiliated Information Security Collaborative An Affiliated Enterprise Approach to Information Security Deans and Vice Presidents Meeting April 17, 2014.
Investment Management Concepts Portfolio Management | Segment Architecture March 25, 2009 Adrienne Walker and Kshemendra Paul
EVALUATION IN THE GEF Juha Uitto Director
April 2, 2013 Longitudinal Data system Governance: Status Report Alan Phillips Deputy Director, Fiscal Affairs, Budgeting and IT Illinois Board of Higher.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Virginia Department of Minority Business Enterprise (DMBE) 8/24/2015 “Leading By Example” 1 New DMBE TAKE A LOOK at the New Department of Minority Business.
Justice Information Network Strategic Plan Development Justice Information Network Board March 18, 2008 Mo West, JIN Program Manager.
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
KEEP System Stakeholder Advisory Team Meeting September 15, 2010.
© TecSec® Incorporated 2003 Threat Notification Model for Federal, State and Local Authorities Threat Notification Model for Federal, State and Local Authorities.
Evolving IT Framework Standards (Compliance and IT)
1 Working Group on Archives and Records Management WGARM.
Headquarters U. S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e Section 508 of the Rehabilitation Act of 1973 Mr. Wayman I. Braxton.
A Commercialization Measurement System Jim Tolle Verisystem.
ICT Standards and Guidelines Findings and Recommendations B. Chatterjee Chief Technology Officer, CNSI.
The Challenge of IT-Business Alignment
EEC Internal Control Plan (ICP) FY2013. Direction from Secretary Malone Acting EEC Commissioner Thomas Weber shall initiate a top-to-bottom review of.
Higher Education Capital Facilities Studies: Expanding The Comparable Framework Preliminary Report Joint Legislative Audit & Review Committee May 18, 2005.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
IT PMB: Executive Oversight and Decision Authority for Application and Infrastructure Projects at NASA Larry Sweet Chair, IT PMB JSC CIO August 2010.
NASA CIO Standards Activities Presentation to NASA Technical Standards Working Group June 11-12, 2007 HQ/R. Benedict.
DRAFT – For Discussion Only HHSC IT Governance Executive Briefing Materials DRAFT April 2013.
MD Digital Government Summit, June 26, Maryland Project Management Oversight & System Development Life Cycle (SDLC) Robert Krauss MD Digital Government.
The Minnesota State Colleges and Universities system is an Equal Opportunity employer and educator. Information Technology Enterprise Strategic Investment.
Enterprise Architecture, Enterprise Data Management, and Data Standardization Efforts at the U.S. Department of Education May 2006 Joe Rose, Chief Architect.
Name Position Organisation Date. What is data integration? Dataset A Dataset B Integrated dataset Education data + EMPLOYMENT data = understanding education.
Massachusetts Open Standards Policy Claudia Boldman Director of Policy and Architecture Information Technology Division, MA.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
1 Strategic Plan for Digital Archives Programme DAP PROJECT SCOPE OVERVIEW STATUS.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
EGovOS Panel Discussion CIO Council Architecture & Infrastructure Committee Subcommittee Co-Chairs March 15, 2004.
Transportation leadership you can trust. presented to Safety Data Analysis Tools Workshop presented by Eric Ziering Cambridge Systematics, Inc. March 27,
Effectively Integrating Information Technology (IT) Security into the Acquisition Process A course for the Department of Commerce contracting and contracting.
State of New Jersey IT Consolidation Charles S. Dawson CTO/CIO.
Federal Geographic Data Committee Update Karen Siderelis, Acting Chair Ivan B. DeLoatch, Executive Director NGAC Meeting March 24, 2010.
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
Presented by Eliot Christian, USGS Accessibility, usability, and preservation of government information (Section 207 of the E-Government Act) April 28,
For More Best A+ Tutorials CMGT 442 Entire Course (UOP Course) CMGT 442 Week 1 DQ 1 (UOP Course)  CMGT 442 Week 1 DQ 1 (UOP Course)
Focus for the Future Technology-Related Proposals Daniel Ewart, CIO.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Grid Deployment Technical Working Groups: Middleware selection AAA,security Resource scheduling Operations User Support GDB Grid Deployment Resource planning,
Welcome to the Green.Arkansas.gov Question & Answer Session
WGARM Appraisal Decision Assistance Phase 1, Dec. 2002
Shared Technical Architecture’s Role within the ECIO Organization
IPv6 within the Australian Government
Securing Critical Assets: Arizona’s Security & Privacy Initiatives
The ePhyto Solution A Guide to implement the ePhyto System
VERMONT INFORMATION TECHNOLOGY LEADERS
Dan Tofan | Expert in NIS 21st Art. 13a WG| LISBON |
Increase and Improve your PC management with Windows Intune
PLANNING A SECURE BASELINE INSTALLATION
Louisiana Geographic Information Center
Information Resource & Security Management www. oti. fsu. edu www
Presentation transcript:

Shared Technical Architecture’s Role within the ECIO Organization “Arkansas Shared Technical Architecture”

Executive CIO responsibilities pertaining to Shared Technical Architecture ECIO has the authority to define IT standards, policies and procedures to manage the information resources within the state. This is accomplished through the Arkansas Shared Technical Architecture. – Shared Technical Architecture Team directs the formulation and publication of policies, standards, specifications, and guidelines for IT in the state. Act 1042-Section 4-a(2)(A) & a(2)(B)

What is a shared technical architecture? A shared technical architecture is policies, standards, and best practices that have been agreed on, publicized and periodically reviewed by domain working groups. Domain working groups represent a cross- section of state, legislative and judicial agencies, institutions of higher education, as well as the Information Network of Arkansas.

Shared Technical Architecture Program has existed for 5 years A component of the Office of Information Technology (OIT) which was charged with creating standards to facilitate electronic access to government information and enable interoperability.

Current Examples Information Architecture set standards for preservation, protection and disposition of electronic records for state agencies; Accessibility Architecture set standards for hardware, application development and web design to comply with state accessibility laws.

Current Examples (continued) Network Architecture group has reviewed the trouble areas on the state network and drafted network requirements for agencies which would aid in reducing these trouble areas. Video Network Architecture is providing a framework for how agencies will deploy video conferencing technology that is compatible with Arkansas video network system.

Current Examples (continued) Data Architecture group is finalizing standardizing data throughout state government. Benefits of data standardization include: – Information sharing across agency boundaries – Enterprise system interoperability – Reduces redundant data

Current Examples (continued) Desktop Operating System & Application Suite Architecture has recently delivered the following: – Software License Management Guidelines (supporting the Governor’s Software Piracy Proclamation); – Recommendations for Upgrading Desktop Operating System and Application Software; – Considerations for Implementing Alternative Desktop OS and Application Suites;

Current Examples (continued) Security Architecture: - Created the State Agency Security Policy Guidelines which contain minimum requirements concerning IT security measures – Actively creating security policies through the larger security working group as well as in the three smaller working groups Public Key Infrastructure working group Business Continuity working group Disaster Recovery working group

Current Examples (continued) Application Architecture: – Incorporating existing application development standards created in the security and accessibility working groups – Identifying application development best practices Project Management Architecture

Process for Agency Contribution to Technical Policy and Standards A policy has been recently drafted that defines the process to facilitate state agency participation in the development of IT policies, standards and best practices. Present the plan (policy) to the Governor and to the General Assembly. Act 1042-Section 4-a(3); The IT architecture domain working groups represent a cross-section of state agencies

Issues of Compliance with Enterprise Architecture Agency IT projects will be evaluated on the basis of the ROI of the project, the value-added services, and the compatibility with state Shared Technical Architecture. Act Section 5-e(2) & e(3)

Issues of Compliance with Enterprise Architecture In the event a state agency proposes an information technology project which does not comply with the state shared technical architecture: – Submit concerns related to noncompliance to the ECIO, who shall seek review and advice of the CIO Council [Act 1722-Section 17-f(1) & f(2) – amending Act 1042-Section 4-f(1) and f(2)] A policy related to compliance with State’s Shared Architecture is currently in being developed.

Arkansas’ Approach to the Portfolio Management Model Based on the Washington State portfolio management model Links IT investments to business plans Facilitates IT investment risk analysis Provides for agency and statewide technology reporting Promotes technology integration and interoperability Compiles information about each agency’s IT investment portfolio from biennial plans

Act 1042 Web Page