Agency for State Technology

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Agency for State Technology"

Transcription

1 Agency for State Technology Statewide Information Technology Security Plan The Way Forward Rick Scott, Governor Jason M. Allison, State CIO

2 Table of Contents From the Desk of the State Chief Information Officer (CIO)...3 Executive Summary...4 Strategy 1: Enhance security and privacy capabilities...5 Objective 1: Implement a cybersecurity framework policy...6 Objective 2: Improve situational awareness...7 Objective 3: Develop a robust enterprise security incident response program...8 Strategy 2: Enhance the Enterprise IT environment, including application rationalization...9 Objective 1: Invest in core enterprise enhancement...10 Objective 2: Develop application rationalization approach and begin implementation...11 Strategy 3: Define the roadmap for maturing IT Processes and Strategic Business Alignment...12 Objective 1: Strengthen project assurance and ensure project oversight...13 Objective 2: Coordinate multi-agency enterprise initiatives...14 Timeline...15 Close...16

3 From the Desk of the State CIO, Jason M. Allison As security becomes the focal point for all IT related initiatives, Florida is now in the best place to affect statewide change for a more secure, efficient, and effective future. Security embedded in the foundation of systems, processes, and projects will position the state for great economic and technological success. With the creation of the Agency for State Technology, the state can focus on securing state IT assets, while moving toward consolidated and standardized platforms. This three-year statewide strategic security plan lays out the roadmap to position the state to enter new markets, support hardened infrastructure, and better align Florida s strategic initiatives. This plan lays out three one year high-level strategies, followed by specific objectives. Years two and three are included in a high-level timeline, this supports growth and flexibility within the strategic plan. As AST progresses through the years while maintaining our vision, new goals will be added and new strategies formulated. Horizon-driven strategies are included in a year four brief to show how the strategies position the AST to take on more aggressive, innovative solutions over time. As IT is an ever-changing and evolving industry, our strategy must also be flexible, innovative, and adaptive. The partnerships AST is developing with Agencies will help drive the IT future for the state. This will make Florida a hub for innovation and drive economic success for the state, its citizens, and businesses. I hope you share my excitement, as Florida embarks on this journey and emerges as a competitive industry leader.

4 Executive Summary Safeguarding and protecting Florida s IT resources is a top priority. AST is committed to maintaining the highest level of data security, while embracing new capabilities and ensuring information protection for citizens and businesses in the state. As AST progresses toward a more hardened IT climate, this strategic IT security plan will focus on three long-term strategies spanning 2015 through Emphasis for this plan is on year one objectives which are designed to build security into the very fabric of state IT operations and processes. These are foundational strategies that will position AST to take on horizon-driven initiatives in an organized and secure manner. Each year as objectives are implemented, the strategy will remain with added objectives to show progress year-after-year. Upon full implementation of the foundational strategies, subsequent strategies will be identified, planned, and included in future strategic plans. This phased approach supports continual progress, while moving toward convergence for enterprise strategic alignment. Strategy one establishes objectives for adopting a strong cybersecurity framework, cultivating collaborative partnerships for critical response efforts, and focusing on situational awareness to empower the state workforce. Strategy two establishes objectives for assessing and enhancing the state s data center infrastructure, to include application rationalization. Strategy three establishes objectives for project assurance and oversight and promotes strategic business alignment by partnering with state agencies to understand and support their mission- specific strategies.

5 Strategy 1: Enhance Security and privacy capabilities Objective 1: Implement a Cybersecurity Framework Policy Objective 2: Improve Situational Awareness Objective 3: Develop a Robust Enterprise Security Incident Response Program

6 Objective 1: Implement a cybersecurity framework policy In support of the Governor s job and economic growth initiatives, a top priority is protecting critical IT assets. Systems and information drive delivery of services to citizens and promote effective government. The foundation to building secure IT capabilities is a sound cybersecurity framework with robust underlying processes. AST will develop a cybersecurity framework policy that guides the state s information security workforce and promotes efficient IT operations. Security rules will be mapped to the framework and promote secure and consistent practices for state computing platforms. Security considerations will be developed for all IT functions and promote risk mitigation initiatives. Framework implementation will be a rigorous multi-year effort. Each new initiative will enhance and secure the state s IT resources while consistently moving toward framework compliance. On any given day, Florida has 1.7 million visitors

7 Objective 2: Improve situational awareness Reliance on shared information is critical. How Florida protects and shares information has a significant impact on citizens, visitors, and businesses in the state. To ensure that we are diligent in our efforts, we are reliant on information sharing partnerships and continual education of state workers. As threats emerge and transform, AST will position itself to effectively mitigate attempts to compromise the state s information assets. AST will build partnerships with state and federal entities to support improved situational awareness and harden security practices. AST will support training and outreach campaigns that engage all workers and promote a security-centric culture, involving individuals in data protection initiatives. Florida has surpassed New York as the 3rd most populous state.

8 Objective 3: Develop a robust enterprise security incident response program Escalation of threat-related activities has driven a change in how the state must approach incident response. AST will cultivate collaborative partnerships to support predictive and preventative cybersecurity efforts. Layered defense must support these techniques; however, when defenses are compromised AST must have a refined, robust response program and assist state agencies with execution. The program will standardize response efforts to support rapid, consistent countermeasures. Miami is among the world s Top 5 most interconnected cities.

9 Strategy 2: enhance the Enterprise IT environment, Including application rationalization Objective 1: Invest in Core Enterprise Enhancement Objective 2: Develop Application Rationalization Approach and Begin Implementation

10 Objective 1: Invest in core enterprise enhancement Information technology has quickly become an enabler, from automation to innovation, it supports trade and investment growth in the state. As technology platforms age, obsolescence introduces risk and duplication, and limits our ability to effetively transform business processes. AST will provide seamless and consistent service delivery to state agencies, so that agencies can in turn provide timely services to Florida s citizens and businesses. AST will undertake enhancements to the enterprise IT environment, supporting the move toward deploying secure, interconnected systems. Primary focus will be on replacing end-of-life equipment, standardizing computing platforms, merging operations for core services, and enhancing disaster recovery service capabilities to align with the application rationalization vision. More than 26,000 IT companies, employing close to a quarter of a mllion workers, call Florida home.

11 Objective 2: Develop application rationalization approach and begin implementation We can only secure what we can see. In order to properly manage the security of the enterprise environment, it is necessary to understand it. Application rationalization includes identifying application dependencies and components that have the potential to introduce security risk. Empowered with this awareness, security initiatives can be prioritized and efficiently applied where they can produce the greatest benefit. The information will also guide future initiatives to offer secure shared services that will reduce the risk, complexity and cost of new applications.

12 Strategy 3: define the roadmap for maturing IT Processes and Strategic Business Alignment Objective 1: Strengthen Project Assurance and Ensure Project Oversight Objective 2: Coordinate Multi-agency Enterprise Initiatives

13 Objective 1: Strengthen project assurance and ensure project oversight Introducing security considerations into the early stages of project initiatives is highly effective in identifying shared security services and tools, which promotes system hardening and supports cost-effective outcomes. Through collaborative efforts with state agencies, we will assist in the development and use of consistent project management standards and methodologies, facilitate project oversight and assessment, project risk, and strive for high performing IT projects across the state. These efforts will improve cost-efficiency through repeatable project success.

14 Objective 2: Coordinate multi-agency Enterprise initiatives Interagency collaboration promotes strategic business alignment. AST will establish enterprise relationships to identify multi-agency integration and consolidation opportunities. Solutions will focus on efficiencies, cost savings, utilizing existing information in new ways, cross-boundary solutions for shared business processes, and ways to measure success. AST will host workshops to promote the conversion of ideas into meaningful and innovative solutions. Workshops will identify data management opportunities to promote interoperability and openness. 40% of all US exports to Latin America pass through Florida.

15 The Way Forward FY Strategy 1: Enhance security and privacy capabilities FY Strategy 2: Enhance the Enterprise IT environment, including application rationalization FY Strategy 3: Define the roadmap for maturing IT Processes & Strategic Business Alignment FY Strategy: Complete migration to enterprise architecture; Implement enterprise hardware and software asset management and service delivery FY Strategy: Implement statewide IT investment and portfolio management; Strengthen these throughout the State The Way Forward: Federated Identity & Access Management Enterprise Data Exchanges Rapid, Streamlined Delivery of Systems and Services Uniform End-User Experience egovernment - anywhere, anytime, any device Digital Automation (digital forms, signatures, etc) Enterprise Application Portfolio Management

16 Statewide Strategic IT Security Plan Agency for state Technology For more information visit

A Final Report for City of Chandler Strategic IT Plan Executive Summary

A Final Report for City of Chandler Strategic IT Plan Executive Summary A Final Report for City of Chandler 6 January 2004 Table of Contents 1. Executive Summary... 1 1.1 Background... 2 1.2 Chandler Business and IT Context... 3 1.3 Chandler s IT Strategic Direction... 5 1.4

More information

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,

More information

Office of Information Technology. County of Dallas FY2014 FY2018 Information Technology Strategic Plan

Office of Information Technology. County of Dallas FY2014 FY2018 Information Technology Strategic Plan Office of Information Technology County of Dallas Letter from the Office of Information Technology This Information Technology Strategic Plan is the culmination of hard work and collaboration by County

More information

The multisourcing approach to IT consolidation

The multisourcing approach to IT consolidation Experience the commitment WHITE PAPER The multisourcing approach to IT consolidation The proven commercial practice of multisourcing services integration can help state and local governments achieve IT

More information

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE ITA Strategic Plan FY 2011 - FY 2016 U.S. Army Information Technology Agency REALIZING The DoD ENTERPRISE COMPUTING ENVIRONMENT Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE Provide Quality

More information

DHS IT Successes. Rationalizing Our IT Infrastructure

DHS IT Successes. Rationalizing Our IT Infrastructure TESTIMONY OF Richard A. Spires Chief Information Officer U.S. Department of Homeland Security Before the House Committee on Oversight and Government Reform February 27, 2013 Chairman Issa, Ranking Member

More information

Information Technology Report MTA IT Department. MTA Finance Committee June 2015

Information Technology Report MTA IT Department. MTA Finance Committee June 2015 Information Technology Report MTA IT Department MTA Finance Committee June 2015 Purpose/Overview This presentation has been prepared to update MTA Board members on major enterprise-wide technology strategies

More information

2015 Strategic Business Plan Franklin County Data Center Ishreth Sameem, CIO

2015 Strategic Business Plan Franklin County Data Center Ishreth Sameem, CIO 2015 Strategic Business Plan Franklin County Data Center Ishreth Sameem, CIO Mission The Franklin County Data Center partners with County agencies to deliver cost efficient business solutions and provide

More information

Information Technology Strategic Plan

Information Technology Strategic Plan Information Technology Strategic Plan IT Strategic Plan Benefits Establishes strategic IT goals, assures corporate alignment Benefits of executive/it engagement in plan development Sets an agreed vision

More information

Cybersecurity Enhancement Account. FY 2017 President s Budget

Cybersecurity Enhancement Account. FY 2017 President s Budget Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities

More information

Enterprise Exchange Email. Category: Enterprise IT Management Initiatives. State: Nebraska

Enterprise Exchange Email. Category: Enterprise IT Management Initiatives. State: Nebraska Enterprise Exchange Email Category: Enterprise IT Management Initiatives State: Nebraska Project contact: Jayne Scofield I.T. Administrator Network Services Office of the CIO 501 S 14 th Street Lincoln,

More information

COMMONWEALTH OF MASSACHUSETTS

COMMONWEALTH OF MASSACHUSETTS COMMONWEALTH OF MASSACHUSETTS Implementation Roadmap February 2003 February 2003 Page 165 of 191 February 2003 Page 166 of 191 A. INTRODUCTION The findings and recommendations of the Enterprise IT Strategy

More information

State of Montana Strategic Plan for Information Technology 2014

State of Montana Strategic Plan for Information Technology 2014 State of Montana Strategic Plan for Information Technology 2014 This document is prepared under the authority of the Montana Information Technology Act of 2001. It is published biennially unless special

More information

Technology Services Strategic Plan

Technology Services Strategic Plan Technology Services Strategic Plan 2014 Table of Contents A Changing Landscape... 3 Values... 4 Technology Services Goals... 5 Employee Engagement... 6 Operational Efficiency... 7 Agency Satisfaction...

More information

Instructional and Information Technology Strategic Plan Update. June 1, 2015

Instructional and Information Technology Strategic Plan Update. June 1, 2015 Instructional and Information Technology Strategic Plan Update June 1, 2015 Context Strategic Plan Drivers Why create a new plan now? IT Strategy 2012-15 is expiring Technology has evolved Signficant portion

More information

State of Montana. Office Of Public Instruction IT Strategic Plan 2014. 1. Executive Summary

State of Montana. Office Of Public Instruction IT Strategic Plan 2014. 1. Executive Summary State of Montana Office Of Public Instruction IT Strategic Plan 2014 1. Executive Summary 1 The IT Division has experienced dramatic growth of its supported environment in the past three to four years.

More information

Enterprise Security Tactical Plan

Enterprise Security Tactical Plan Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise

More information

e Governance ULB Level Reform

e Governance ULB Level Reform ULB Level Reform 1. The Reform e-governance is a form of public administration making use of information and communication technologies (ICT) to enhance the access and delivery of government services to

More information

The transformation of IT Risk Management. kpmg.com

The transformation of IT Risk Management. kpmg.com The transformation of IT Risk Management kpmg.com The transformation of IT Risk Management The role of IT Risk Management Scope of IT risk management Examples of IT risk areas of focus How KPMG can help

More information

Red Hat Cloud, HP Edition:

Red Hat Cloud, HP Edition: Red Hat Cloud, HP Edition: Private IaaS Clouds 2 Red Hat Cloud 2 Red Hat Enterprise Virtualization 3 Red Hat Enterprise Linux 3 Red Hat Network Satellite 3 HP CloudSystem Matrix and HP Converged Infrastructure

More information

Information Resources Management (IRM) Strategic Plan

Information Resources Management (IRM) Strategic Plan National Aeronautics and Space Administration Information Resources Management (IRM) Strategic Plan Office of the Chief Information Officer March 2014 www.nasa.gov NASA IRM Strategic Plan CIO s Introductory

More information

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)

More information

Technology Resource Planning

Technology Resource Planning Technology Resource Planning Part 1: Technology Assessment Summary The Department is dedicated to modernizing and expanding its current information technology function. An independent assessment of the

More information

Cybersecurity in the States 2012: Priorities, Issues and Trends

Cybersecurity in the States 2012: Priorities, Issues and Trends Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State

More information

Strategic Plan 2015-2017

Strategic Plan 2015-2017 Strategic Plan 2015-2017 Page 1 Table of Contents Information Technology Mission... 5 Information Technology Vision Statement... 5 Information Technology Values... 5 The Information Technology s Alignment

More information

Small Business. Leveraging SBA IT resources to support America s small businesses

Small Business. Leveraging SBA IT resources to support America s small businesses Small Business Administration Information Technology Strategic Plan ( ITSP) 2012-2016 Leveraging SBA IT resources to support America s small businesses Message from the Chief Information Officer The Small

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity

Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness

More information

Strategies for assessing cloud security

Strategies for assessing cloud security IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary

More information

1 YORK REGION INFORMATION TECHNOLOGY STRATEGY (YRITS) 2006 UPDATE

1 YORK REGION INFORMATION TECHNOLOGY STRATEGY (YRITS) 2006 UPDATE Report No. 1 of the e-government Sub-Committee 1 YORK REGION INFORMATION TECHNOLOGY STRATEGY (YRITS) 2006 UPDATE The e-government Sub-Committee recommends the adoption of the recommendation contained in

More information

Iowa State University Proposal for HR-01 ISU HR Operating Model

Iowa State University Proposal for HR-01 ISU HR Operating Model Iowa State University Proposal for HR-01 ISU HR Operating Model Overview: Iowa State University proposes undertaking the HR-01 ISU HR Operating Model business case to transform the quality, manner and

More information

Strategic Plan FY 2014-2016

Strategic Plan FY 2014-2016 Strategic Plan FY 2014-2016 CONTENTS SUMMARY 3 ACADEMIC SERVICES 4 DATA MANAGEMENT & REPORTING 6 COMMUNICATIONS & COLLABORATION 7 IT SERVICES 8 INFRASTRUCTURE 9 SECURITY 10 BRAND BUILDING 11 INITIATION

More information

Project Governance Plan Next Generation 9-1-1 Project Oregon Military Department, Office of Emergency Management, 9-1-1 Program (The OEM 9-1-1)

Project Governance Plan Next Generation 9-1-1 Project Oregon Military Department, Office of Emergency Management, 9-1-1 Program (The OEM 9-1-1) Oregon Military Department, Office of Emergency Management, 9-1-1 Program (The OEM 9-1-1) Date: October 1, 2014 Version: 3.1 DOCUMENT REVISION HISTORY Version Date Changes Updated By 0.1 02/13/014 Initial

More information

Office of the Chief Information Officer

Office of the Chief Information Officer Office of the Chief Information Officer Business Plan: 2012 2015 Department / Ministère: Executive Council Date: November 15, 2012 1 P a g e This Page Left Intentionally Blank 2 P a g e Contents The Business

More information

2011-2014. Strategic Plan

2011-2014. Strategic Plan 2011-2014 Strategic Plan Utah Department of Technology Services UTAH DEPARTMENT OF TECHNOLOGY SERVICES AND OFFICE OF THE CHIEF INFORMATION OFFICER 1 State Office Building, Suite 6000 Salt Lake City, Utah

More information

DoD Strategy for Defending Networks, Systems, and Data

DoD Strategy for Defending Networks, Systems, and Data DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July

More information

Table of Contents CYBER SECURITY STRATEGIC PLAN VERSION 1.0

Table of Contents CYBER SECURITY STRATEGIC PLAN VERSION 1.0 U.S DEPARTMENT OF ENERGY CYBER SECURITY PROGRAM CYBER SECURITY STRATEGIC PLAN FEBRUARY 12, 2007 Table of Contents INTRODUCTION... 4 CYBER SECURITY STRATEGY OVERVIEW... 5 CYBER SECURITY VISION AND MISSION...

More information

Preventing and Defending Against Cyber Attacks November 2010

Preventing and Defending Against Cyber Attacks November 2010 Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing

More information

IT Governance Overview

IT Governance Overview IT Governance Overview Contents Executive Summary... 3 What is IT Governance?... 4 Strategic Vision and IT Guiding Principles... 4 Campus-Wide IT Strategic Vision... 4 IT Guiding Principles... 4 The Scope

More information

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO DoD CIO s 10-Point Plan for IT Modernization Ms. Teri Takai DoD CIO Executive Summary Proactive Partnerships for IT Modernization IT Modernization Strategy Consolidate Infrastructure Streamline Processes

More information

Strategic Plan for the Enterprise Portfolio Project Management Office Governors Office of Information Technology... Ron Huston Director

Strategic Plan for the Enterprise Portfolio Project Management Office Governors Office of Information Technology... Ron Huston Director Strategic Plan for the Enterprise Portfolio Project Management Office Governors Office of Information Technology.......... June 2010 Ron Huston Director Message from the State Enterprise Portfolio Project

More information

Information and Communications Technology Strategy 2014-2017

Information and Communications Technology Strategy 2014-2017 Contents 1 Background ICT in Geoscience Australia... 2 1.1 Introduction... 2 1.2 Purpose... 2 1.3 Geoscience Australia and the Role of ICT... 2 1.4 Stakeholders... 4 2 Strategic drivers, vision and principles...

More information

IRM FY2014 2018. Information Resources Management Strategic Plan

IRM FY2014 2018. Information Resources Management Strategic Plan IRM FY2014 2018 Information Resources Management Strategic Plan DOE IRM Mission Advance the Department s mission through policy, standards, and services, which meet mission requirements, balance risk and

More information

Cisco Security Services

Cisco Security Services Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee

More information

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity; NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will

More information

Agency Services. Moving Ahead. Agency Services Road Map

Agency Services. Moving Ahead. Agency Services Road Map Table of Contents Moving Ahead... 2 Service Delivery... 3 Agency-specific Applications... 4 Shared Services... 6 Targets for Initiatives and Outcomes... 7 Outcomes... 8 Cross-walk between the Goals, Strategies

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

Information Technology Strategic Plan 2014-2017

Information Technology Strategic Plan 2014-2017 Information Technology Strategic Plan 2014-2017 Leveraging information technology to create a competitive advantage for UW-Green Bay Approved December 2013 (Effective January 2014 December 2017) Contents

More information

INFORMATION TECHNOLOGY GOVERNANCE IN PENNSYLVANIA. Executive Summary

INFORMATION TECHNOLOGY GOVERNANCE IN PENNSYLVANIA. Executive Summary INFORMATION TECHNOLOGY GOVERNANCE IN PENNSYLVANIA Executive Summary The Commonwealth of Pennsylvania has launched a comprehensive IT management transformation. This transformation is evolving the IT governance

More information

U.S. Nuclear Regulatory Commission

U.S. Nuclear Regulatory Commission U.S. Nuclear Regulatory Commission 2011 Data Center Consolidation Plan and Progress Report Version 2.0 September 30, 2011 Enclosure Contents 1 Introduction... 2 2 Agency Goals for Data Center Consolidation...

More information

Risk & Audit Committee California Public Employees Retirement System

Risk & Audit Committee California Public Employees Retirement System California Public Employees Retirement System Consent Agenda Item 4d ITEM NAME: Enterprise Risk Management Division Status Report PROGRAM: Risk Management ITEM TYPE: Consent Information EXECUTIVE SUMMARY

More information

California Information Technology Strategic Plan

California Information Technology Strategic Plan California Information Technology Strategic Plan 2013 Update Edmund G. Brown Jr. Governor Carlos Ramos Secretary of Technology Focusing on Outcomes Table of Contents Message from the Secretary of California

More information

University of Hawaii Information Technology Services Strategic Plan May 22, 2015. Looking Forward to 2020 and Beyond [V15-1]

University of Hawaii Information Technology Services Strategic Plan May 22, 2015. Looking Forward to 2020 and Beyond [V15-1] University of Hawaii Information Technology Services Strategic Plan May 22, 2015 [V15-1] I. Introduction This Information Technology Services (ITS) Strategic Plan, Looking Forward to 2020 and Beyond, updates

More information

Systems Development Life Cycle (SDLC)

Systems Development Life Cycle (SDLC) DEPARTMENT OF BUDGET & MANAGEMENT (SDLC) Volume 1 Introduction to the SDLC August 2006 Table of Contents Introduction... 3 Overview... 4 Page 2 of 17 INTRODUCTION 1.0 STRUCTURE The SDLC Manual consists

More information

IT service management solutions Executive brief. Making ITIL actionable in an IT service management environment.

IT service management solutions Executive brief. Making ITIL actionable in an IT service management environment. IT service management solutions Executive brief Making ITIL actionable in an IT service management environment. 2 Making ITIL actionable in an IT service management environment. Contents 2 Executive summary

More information

PRESENTATIONS BY Mr. Richard Sanchez CIO, Chief Information Office Los Angeles County. December 2, 2010

PRESENTATIONS BY Mr. Richard Sanchez CIO, Chief Information Office Los Angeles County. December 2, 2010 Editorial Note: Although every effort has been made to insure the accuracy of the material in this presentation, the scope of the material covered and the discussions undertaken lends itself to the possibility

More information

Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA

Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA Volume 3, July 2014 Come join the discussion! Alberto León Lozano will respond to questions in the discussion area of the COBIT 5 Use It Effectively topic beginning 21 July 2014. Mapping COBIT 5 with IT

More information

September 24, 2015. Mr. Hogan and Ms. Newton:

September 24, 2015. Mr. Hogan and Ms. Newton: Mr. Michael Hogan and Ms. Elaine Newton Office of the Director, Information Technology Laboratory National Institute of Standards and Technology 100 Bureau Drive Mail Stop 8930 Gaithersburg, MD 20899-8930

More information

DEFENSE SECURITY SERVICE

DEFENSE SECURITY SERVICE DEFENSE SECURITY SERVICE DEFENSE SECURITY SERVICE U N I T E D S TAT E S O F A M E R I C A STRATEGIC PLAN 2012-2016 Partnership and Service for a Secure Future TABLE OF CONTENTS Who We Are Vision Values

More information

Cybersecurity Framework: Current Status and Next Steps

Cybersecurity Framework: Current Status and Next Steps Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor Adam.Sedgewick@nist.gov National Institute of Standards

More information

STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE

STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE HOUSE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON INFORMATION TECHNOLOGY AND SUBCOMMITTE

More information

Health Care Solutions

Health Care Solutions Health Care Solutions Increase Service Levels, Meet Expectations A Unified Approach to Health Care Automation Processes Hospitals, clinics, extended care facilities, and physician s offices are facing

More information

Information Technology Strategic Plan Final Presentation

Information Technology Strategic Plan Final Presentation City of Boise, ID Information Technology Strategic Plan Final Presentation August 28, 2012 Pacific Technologies, Inc. Practical planning. Positive change. City of Boise, ID IT Strategic Plan Final Presentation

More information

Enterprise IT Portfolio Governance and Management Model

Enterprise IT Portfolio Governance and Management Model STATE OF MICHIGAN Department of Information Technology Enterprise IT Portfolio Governance and Management Model NASCIO 2007 RECOGNITION AWARDS CATEGORY: IT PROJECT AND PORTFOLIO MANAGEMENT Enterprise IT

More information

Strategic Plan

Strategic Plan 2013-2016 Strategic Plan Office for Information Technology Message from the Chief Information Officer Shortly after Governor Corbett took office in 2011, the Office of Administration/Office for Information

More information

Information Systems Security Line of Business (ISS LoB)

Information Systems Security Line of Business (ISS LoB) Information Systems Security Line of Business (ISS LoB) Information Security and Privacy Advisory Board George Washington University Washington, DC March 22, 2007 Agenda Background Status Next Steps Background

More information

NASCIO 2014 State IT Recognition Awards

NASCIO 2014 State IT Recognition Awards NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos

More information

County of Hanover. Board Meeting: May 28, 2014. Presentation - Information Technology Department 2014-2019 Strategic Plan

County of Hanover. Board Meeting: May 28, 2014. Presentation - Information Technology Department 2014-2019 Strategic Plan VI. Agenda Item County of Hanover Board Meeting: May 28, 2014 Subject: Summary of Agenda Item: Presentation - 2014-2019 Strategic Plan The IT 2014-2019 Strategic Plan defines goals, objectives, and strategies

More information

Department of Technology Services

Department of Technology Services Department of Technology Services 2016-2019 Strategic Plan DTS Dept. of Technology Services Utah Code 63F- 1-203 explicitly requires the Chief Information Officer (CIO) to prepare an executive branch strategic

More information

Office of the Auditor General AUDIT OF IT GOVERNANCE. Tabled at Audit Committee March 12, 2015

Office of the Auditor General AUDIT OF IT GOVERNANCE. Tabled at Audit Committee March 12, 2015 Office of the Auditor General AUDIT OF IT GOVERNANCE Tabled at Audit Committee March 12, 2015 This page has intentionally been left blank Table of Contents Executive Summary... 1 Introduction... 1 Background...

More information

National Initiative for Cyber Security Education

National Initiative for Cyber Security Education 2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women

More information

Addressing FISMA Assessment Requirements

Addressing FISMA Assessment Requirements SOLUTION BRIEF Heeding FISMA s Call for Security Metrics and Continuous Network Monitoring Addressing FISMA Assessment Requirements Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965 Freedom

More information

2009 NASCIO Recognition Awards Nomination. A. Title: Sensitive Data Protection with Endpoint Encryption. Category: Information Security and Privacy

2009 NASCIO Recognition Awards Nomination. A. Title: Sensitive Data Protection with Endpoint Encryption. Category: Information Security and Privacy 2009 NASCIO Recognition Awards Nomination A. Title: Sensitive Data Protection with Endpoint Encryption Category: Information Security and Privacy State: Ohio B. Executive Summary Protecting the confidentiality

More information

Physical Infrastructure Management Solutions

Physical Infrastructure Management Solutions Physical Infrastructure Management Solutions Physical Infrastructure Challenges Require Innovative Solutions The Need for In-Depth Network Intelligence. With increased acceptance of virtualization, cloud

More information

Leveraging MITA to Implement Service Oriented Architecture and Enterprise Data Management. Category: Cross Boundary Collaboration

Leveraging MITA to Implement Service Oriented Architecture and Enterprise Data Management. Category: Cross Boundary Collaboration Leveraging MITA to Implement Service Oriented Architecture and Enterprise Data Management Category: Cross Boundary Collaboration Initiation date: August 2011 Completion date: October 2013 Nomination submitted

More information

Technology Strategy April 2014

Technology Strategy April 2014 Technology Strategy April 2014 Contents Overview 1 Our environment 1 Why change? 2 Our vision for technology what success looks like 3 Our approach 7 Transformation shifts how will we know we have been

More information

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT IntelliDyne, LLC MARCH 2012 STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT

More information

UNITED NATIONS OFFICE FOR PROJECT SERVICES. ORGANIZATIONAL DIRECTIVE No. 33. UNOPS Strategic Risk Management Planning Framework

UNITED NATIONS OFFICE FOR PROJECT SERVICES. ORGANIZATIONAL DIRECTIVE No. 33. UNOPS Strategic Risk Management Planning Framework UNOPS UNITED NATIONS OFFICE FOR PROJECT SERVICES Headquarters, Copenhagen O.D. No. 33 16 April 2010 ORGANIZATIONAL DIRECTIVE No. 33 UNOPS Strategic Risk Management Planning Framework 1. Introduction 1.1.

More information

Service Integration. Ensuring the best IT service providers deliver the best IT service

Service Integration. Ensuring the best IT service providers deliver the best IT service Infrastructure Services the way we do it Service Integration Ensuring the best IT service providers deliver the best IT service Businesses have recognized the value of IT services for years. Moving the

More information

Strategic Plan Network Optimization & Transport Services 2013-2018

Strategic Plan Network Optimization & Transport Services 2013-2018 Strategic Plan Network Optimization & Transport Services 2013-2018 Office of the Chief Information Officer National Oceanic and Atmospheric Administration United States Department of Commerce Version 2.0

More information

INFORMATION SECURITY STRATEGIC PLAN

INFORMATION SECURITY STRATEGIC PLAN INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information

More information

Creating a More E fficient New Mexico

Creating a More E fficient New Mexico NEW MEXICO INFORMATION TECHNOLOGY STRATEGIC PLAN FY2010 FY2013 Creating a More E fficient New Mexico JULY 31, 2009 Office of Strategic Planning 505-827-0656 Table of Contents CONTENTS CONTENTS...2 MESSAGE

More information

IT Strategic Plan. Enterprise IT Services 2012-2017 OFFICE OF THE CIO 1 OF 13

IT Strategic Plan. Enterprise IT Services 2012-2017 OFFICE OF THE CIO 1 OF 13 IT Strategic Plan Enterprise IT Services 2012-2017 OFFICE OF THE CIO 1 OF 13 Message from the CIO Information technology (IT) is the lifeblood of state government. Every Nevada agency, resident, and business

More information

University of Wisconsin - Platteville UNIVERSITY WIDE INFORMATION TECHNOLOGY STRATEGIC PLAN 2014

University of Wisconsin - Platteville UNIVERSITY WIDE INFORMATION TECHNOLOGY STRATEGIC PLAN 2014 University of Wisconsin - Platteville UNIVERSITY WIDE INFORMATION TECHNOLOGY STRATEGIC PLAN 2014 Strategic PRIORITIES 1 UNIVERSITY WIDE IT STRATEGIC PLAN ITS is a trusted partner with the University of

More information

Michigan Business One-Stop Enterprise IT Management Initiatives

Michigan Business One-Stop Enterprise IT Management Initiatives Title: Category: State: Michigan Business One-Stop Enterprise IT Management Initiatives Michigan Contact Information: Jim Hogan Information Officer Michigan Department of Technology, Management and Budget

More information

California Enterprise Architecture Framework

California Enterprise Architecture Framework Version 2.0 August 01, 2013 This Page is Intentionally Left Blank Version 2.0 ii August 01, 2013 TABLE OF CONTENTS 1 Executive Summary... 1 1.1 What is Enterprise Architecture?... 1 1.2 Why do we need

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Begin Your BI Journey

Begin Your BI Journey Begin Your BI Journey As part of long-term strategy, healthcare entities seek opportunities for continuous improvement in order to meet the changing needs of their patients while also maintaining compliance

More information

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013 State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council

More information

Goal 5: Create a 21st century approach to government by improving efficiency, effectiveness, and customer interaction

Goal 5: Create a 21st century approach to government by improving efficiency, effectiveness, and customer interaction Goal 5: Create a 21st century approach to government by improving efficiency, effectiveness, and customer interaction STRATEGIC OBJECTIVE 5.3: Promote efficient use of resources through shared services,

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

Guidelines. for setting up. Dedicated Project Team. Page 1 of 14

Guidelines. for setting up. Dedicated Project Team. Page 1 of 14 Guidelines for setting up Dedicated Project Team Page 1 of 14 Foreword The National e-governance Plan of Indian Government seeks to lay the foundation and provide the impetus for long-term growth of e-governance

More information

Team A SaaS Strategy

Team A SaaS Strategy Team A SaaS Strategy What is a strategy? Strategy is the direction and scope of an organization over the long-term term: : which achieves advantages for the organization through its configuration of resources

More information

accelerating time to value in Microsoft Hyper-V environments

accelerating time to value in Microsoft Hyper-V environments SOLUTION BRIEF accelerating time to value in Microsoft Hyper-V environments 01 CA Technologies 30-year partnership with Microsoft uniquely positions us to help you exceed your Microsoft virtual and cloud

More information

Bridging the HIPAA/HITECH Compliance Gap

Bridging the HIPAA/HITECH Compliance Gap CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According

More information

Information Technology Strategy

Information Technology Strategy Information Technology Strategy ElectraNet Corporate Headquarters 52-55 East Terrace, Adelaide, South Australia 5000 PO Box, 7096, Hutt Street Post Office, Adelaide, South Australia 5000 Tel: (08) 8404

More information

Office of Undergraduate Education Strategic Plan

Office of Undergraduate Education Strategic Plan 1 Office of Undergraduate Education Strategic Plan Letter from the Dean The Office of Undergraduate Education (UE) at The Ohio State University is located in the Office of Academic Affairs, and assumes

More information

CONNECTing to the Nationwide Health Information Network (NHIN)

CONNECTing to the Nationwide Health Information Network (NHIN) CONNECTing to the Nationwide Health Information Network (NHIN) Craig Miller (Contractor) CONNECT Chief Architect April 30, 2009 NHIN Mission Mission To achieve better quality, value, and affordability

More information

IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY

IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY IG MATURITY MODEL FOR FY 2015 FISMA 1 Ad-hoc 1.1 program is not formalized and activities are performed in a reactive manner resulting in an adhoc program that does not meet 2 requirements for a defined

More information