State of the States for Tech and Cyber

With the midterm elections just days away, state government leaders in technology and cybersecurity assembled in San Diego, California, this past week for the National Association of State CIOs (NASCIO) Annual Conference. The presentations, survey results and hallway conversations were compelling – to say the least.

No doubt, many new governors will be elected soon who will appoint new Chief Information Officers (CIOs) and even some new Chief Information Security Officers (CISOs). Indeed, several current CIOs and CISOs are serving in an “acting” capacity to keep things running smoothly until January. There has also been a lot of state government CIO changes and CISO turnover in 2018.

Regular transitions to new administrations occur in states every four or eight years. This normal pattern is a part of the NASCIO DNA, and also why the non-profit organization is so unique and critically important. The list of government leaders in Nashville, Tennessee, in October 2019 to celebrate NASCIO’s 50th anniversary will certainly be very different.    

Nevertheless, the participation, commentary and results surrounding these two major surveys is an important baseline and helpful snapshot for both the current public sector leadership, the corporate leaders who support government technology teams nationwide as well as new incoming administrations who will be setting 100-day, 1-year, 2-year and 4-year agendas.

The 2018 State CIO Survey

The National Association of State Chief Information Officers (NASCIO), Grant Thornton LLP and CompTIA have collaborated for a ninth consecutive year to survey state government information technology (IT) leaders on current issues, trends and perspectives.

All fifty NASCIO member states completed the survey. Primary respondents were the state chief information officers (CIOs), although deputy CIOs and other senior state IT leaders contributed. A version of the survey results report can be found here, State CIO as Communicator: The Evolving Nature (Read more...)

*** This is a Security Bloggers Network syndicated blog from Lohrmann on Cybersecurity authored by Lohrmann on Cybersecurity. Read the original post at: