StateTech Magazine - Technology Solutions That Drive Government en 5 Tips to Better Manage a Citywide Video Camera System <span>5 Tips to Better Manage a Citywide Video Camera System</span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Fri, 10/19/2018 - 11:59</span> <div><p>Surveillance cameras have become pervasive in many cities in recent years. Privacy concerns aside, IP-based video cameras can improve security, discourage people from committing crimes, provide first responders with situational awareness, help police solve crimes and serve as evidence to secure convictions. But cameras can’t function alone.</p> <p>As local governments <a href="">populate their streets with more cameras</a> or upgrade to high-definition or 4K cameras, they also have to <strong>upgrade their networks, servers and storage equipment to handle the increase in massive video files</strong>. Some cities embrace cloud storage and beef up their camera systems with new applications, such as gunshot-detection technology and video analytics.</p> <p>According to <a href="" target="_blank">IHS Markit Principal Analyst Jon Cropley</a>, while some cities are deploying cameras for the first time, many others are expanding existing systems. “It’s a mix,” he says. “The U.S. as a whole has been installing a high rate of cameras for longer than many other countries. A higher proportion of new equipment, therefore, is for upgrading or adding to existing systems.”</p> <p>There are numerous concerns that city IT leaders need to address as they maintain their surveillance camera systems. City managers of video surveillance networks discussed how to support a strong video camera system with <em>StateTech</em>, and they <strong>emphasized care of the cameras and the health of the network</strong>.</p> <p>Here are their five tips for managing a municipal video camera system.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/wylie-wong"><img src="/sites/" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/wylie-wong"> <div>Wylie Wong</div> </a> <a target="_blank" class="twitter" href=";screen_name=WylieWong&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Wylie Wong is a freelance journalist who specializes in business, technology and sports. He is a regular contributor to the CDW family of technology magazines.</p> </div> </p> </div> </div> </div> </div> Fri, 19 Oct 2018 15:59:07 +0000 phil.goldstein_6191 41626 at How States Can Guard Against Threats to Election Vendors <span>How States Can Guard Against Threats to Election Vendors </span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Thu, 10/18/2018 - 11:35</span> <div><p>Most states maintain aging election equipment, including voting machines. But many have <a href="">boosted investments in cybersecurity measures</a> for their election IT systems, including purchases of multifactor authentication, perimeter sensors, email filtering and monitoring, threat scanning and information sharing systems.</p> <p>There is more they could be doing to enhance voting machine security, including via <strong>network segmentation, zero-trust network architectures </strong><strong>and</strong><strong> next-generation firewalls</strong>. They can also employ cloud-based security services in the short term for the 2018 election if those larger architectural changes cannot be made in time. </p> <p>And while external cyberattacks are the biggest threat to state boards of elections, state officials also should be concerned about <strong>security risks within their systems related to contractors, vendors and other partners</strong>. </p> <p><a href="" target="_blank"><em><strong>MOR FROM STATETECH: </strong>Discover the network security tools your state or county can use to protect voting machines! </em></a></p> <h2 id="toc_0">The Risk to Election Equipment Vendors</h2> <p>“One place we need more transparency is in the private-sector portion of elections,” explains <a href="" target="_blank">Edgardo Cortés</a>, election security adviser at New York University School of Law’s Brennan Center for Justice. </p> <p>The vendors that sell the equipment and the companies that support it are <strong>at risk for supply chain issues</strong>, explains Cortés, who worked as Virginia’s commissioner of elections. </p> <p>Election agencies should <strong>ask all vendors about the security standards and processes </strong>they have in place for their equipment, electronic commerce and employees, according to Cortés. </p> <p>“I recently heard about an election equipment vendor that was the victim of a very sophisticated<strong> spear phishing </strong>campaign. Once the bad actors are inside your vendor’s network, they can pull information that can be used against an agency,” he says.</p> <p><img alt="Cybersecurity_IR_don'tbecome_700x220.jpg" data-entity-type="" data-entity-uuid="" src="'tbecome_700x220.jpg" /></p> <h2 id="toc_1">What States Can Do to Protect Voting Machine Partners</h2> <p>There are several concrete steps that states and partners at the county and local level can do to inoculate themselves from such risks. </p> <p>Earlier this year at <a href="">the National Association of Counties’ 83rd Annual Conference and Exposition</a>, several county CISOs offered their best practices for <a href="">guarding against supply chain risks</a>, which can be applied at the state level as well. </p> <p>First, states need to <strong>have a vetting process when they purchase voting solutions and </strong><strong>products</strong>, and ensure that they adhere to the state’s own standards and policies. </p> <p>Darren May, CISO for <a href="" target="_blank">Tarrant County, Texas</a>, said the county has an acceptable-use policy for its IT solutions. Government users are not allowed to bring software or hardware from home into the county’s IT environment, he said, adding that the county has a “tight vetting system.”</p> <p>If someone is trying to buy an IT service, the request is routed through the county’s enterprise resource planning system. May and the county’s IT business manager review those requests to ensure that any software is on the county’s whitelist and determine whether the county already has such a solution in-house. <strong>“We will literally hold up a purchase order,” </strong>he said.</p> <p>Currently, 21 states and the <a href="" target="_blank">Multi-State Information Sharing and Analysis Center</a> use the “<a href="" target="_blank">Framework for Improving Critical Infrastructure Cybersecurity</a>,” also known as the Cybersecurity Framework, which is managed by the <a href="" target="_blank">National Institute of Standards and Technology</a>. </p> <p>The framework classifies cybersecurity activities into five major functions: identify, protect, detect, respond and recover. The CSF then provides policies, standards and best practices for organizations to follow as they implement and manage each of those five cybersecurity functions.</p> <p>States also need to <strong>hold voting equipment vendors accountable</strong>, and they should be able to show IT leaders where their solutions are manufactured, who is manufacturing them, and which entities have access to any software that goes into the products.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/karen-j-bannan"><img src="/sites/" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/karen-j-bannan"> <div>Karen J. Bannan</div> </a> </div> <div class="author-bio"> <p> <div><p>Karen J. Bannan is a freelance writer and editor who has written for a variety of publications including <em>The New York Times, The Wall Street Journal, Time</em> and <em>CIO.</em></p> </div> </p> </div> </div> </div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href=";screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>BizTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Thu, 18 Oct 2018 15:35:49 +0000 phil.goldstein_6191 41621 at Voting Machine Security: How State and Local Governments Can Tackle Threats <span>Voting Machine Security: How State and Local Governments Can Tackle Threats</span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 10/17/2018 - 09:22</span> <div><p>With the 2018 midterm election less than three weeks away, it is clear that while <a href="">state election officials</a> and their <a href="">counterparts at the county level</a> have taken steps to increase cybersecurity protections ahead of the vote, more needs to be done to enhance voting machine security.</p> <p>States have increased their investments in cybersecurity measures for their election IT systems, including purchases of <strong>multifactor authentication, perimeter sensors, email filtering </strong><strong>and</strong><strong> monitoring, threat scanning, information sharing systems</strong> and more. Yet <a href="" target="_blank">as <em>The New York Times </em>points out</a>, many voting machines and the infrastructure used to program them remain vulnerable, and the machines can still be accessed via connections they use to transmit voting totals after the polls close.</p> <p>And, <a href="" target="_blank">as CNET notes</a>, many of the election security investments states have made in the wake of the 2016 election <strong>will not materialize in time</strong> to bolster security before Election Day on Nov. 6. </p> <p>There are still measures that state and local governments and election offices can make to enhance voting machine security, both for the midterms and for future elections, according to cybersecurity experts. Government officials can invest in network segmentation tools to cut off voting machines and associated servers from the wider internet and other parts of agencies’ networks. They can also invest in next-generation firewalls and other security services to bolster voting machine security. </p> <p>The stakes could not be higher, as <strong>nothing less than the integrity of democratic elections hangs in the balance</strong>. Malicious actors may have different goals in attacking voting machines and election infrastructure, says Patrick Sullivan, director of security technology and strategy at content delivery network company <a href=";ctlgfilter=&amp;searchscope=all&amp;sr=1" target="_blank">Akamai Technologies</a>.</p> <p>They could be targeting voter registration lists to remove citizens from voter rolls, or trying to change voting outcomes, which is more difficult to do. Attackers can also target election websites with denial of service attacks to take the sites offline as voting totals roll in, he says. In the end, though, even if they do not change the outcome, the attacks can create uncertainty and <strong>undermine the elections’ integrity.</strong></p> <p>“All that an adversary needs to do is to increase some level of uncertainty about an election, that is easier to do,” Sullivan says. “Depending on those goals, you have to do more and more to achieve them. If you can compromise or release embarrassing information about a candidate, that undermines the confidence.”</p> <p><a data-entity-type="" data-entity-uuid="" href="" target="_blank"><img alt="Cybersecurity_IR_don'tbecome_700x220.jpg" data-entity-type="" data-entity-uuid="" src="/sites/'tbecome_700x220.jpg" /></a></p> <h2 id="toc_0">Network Segmentation Can Enhance Network Security for Voting Machines</h2> <p>Sullivan notes that “anything that is online carries with it some level of risk,” and that <strong>network segmentation</strong> — the process of splitting a computer network into subnetworks, each of which is a segment —is “critical” when it comes to <strong>voting machine security</strong>.</p> <p>Glenn Angstadt, CIO of <a href="" target="_blank">Chester County, Pa.</a>, said earlier this year at the National Association of Counties’ 83rd Annual Conference and Exposition that a key piece of election security is separating — or <strong>“air-gapping” </strong>— critical infrastructure from the public internet. He noted that the county has a setup of four workstations and one server for counting election votes, and those systems are not accessible except from a local network.</p> <p>Chester County does need connectivity to the internet to connect with <a href="" target="_blank">the Pennsylvania Secretary of State’s office</a>, Angstadt said. The county has developed a “high-technology thumb drive” that staff plug into the Election Staff Management System server to extract information, and then plug into an internet-connected device that is used one time to transmit the data. The drives are then disposed of, so “after that, nothing else is getting back into the voting processing system.”</p> <p>“If you look at the pattern of breaches, seldom does the attacker land on the device with the crown jewel of data they want to compromise,” Sullivan adds.</p> <p>“There is almost always some element of lateral movement,” as attackers target agency employees with phishing and social engineering tactics, get a foothold on a laptop and move across internal networks from there, he says. Network segmentation makes it more difficult to move from that initial target to other parts of the network and compromise voting machines connected to internal servers.</p> <p>Karen Scarfone, the principal consultant for <a href="" target="_blank">Scarfone Cybersecurity</a> (and <a href="">a <em>StateTech</em> contributor</a>), says that <strong>network segmentation “is a valuable technique for protecting devices with different security postures.”</strong></p> <p>Voting machines should be on physically or logically separate network segments used for voting machines only, according to Scarfone, and <strong>next-generation firewalls</strong> “should be used at segment boundaries and configured to allow only the network traffic that is required.”</p> <p>“By doing this, the voting machines are mostly isolated from all other devices, and this greatly reduces the opportunities for attackers to reach them,” Scarfone adds. “It also makes it much easier to monitor the network activity for just the voting machines and find anomalies. Network segmentation is a cost-effective technique for protecting voting machines.”</p> <p>Sullivan said that Akamai sees network segmentation for voting machine security as “a half step to where you ultimately want to go,” which is <strong>zero-trust networks</strong>. Such architectures dissolve the elements of trust entirely; rather than having a group of different network segments, it assumes there is no trusted internal network segment. Any device connecting to a network asset must be verified. As <a href="" target="_blank">Palo Alto Networks</a> notes in <a href="" target="_blank">a post on its website</a>, under zero-trust, organizations adopt a least-privileged access strategy and strictly enforce access control.</p> <p>Election authorities are unlikely to implement a zero-trust architecture for this election cycle, Sullivan says, since it can be <a href="" target="_blank">difficult to set up</a>, but should do so as a long-term solution.</p> <p><strong><a href="" target="_blank"><em>MORE FROM STATETECH: </em></a></strong><a href="" target="_blank"><em>Find out what state election officials have done to secure the vote! </em></a></p> <h2 id="toc_1">Next-Generation Firewall Protection for Voting Machines</h2> <p><strong>Next-generation firewalls</strong> also provide an avenue for agencies to protect voting machines.</p> <p>As Jesse Wiener, an inside solutions architect for CDW’s security practice, <a href="" target="_blank">notes in a CDW blog post</a>, next-gen firewalls have features such as user identification, URL filtering, intrusion prevention systems, malware prevention and application identity and control.</p> <p>IT security admins can use NGFWs to ensure that only the traffic that needs to pass to and from voting machines does so. </p> <p>“Today’s best next-generation firewalls provide security beyond the perimeter, incorporating web application firewalls and internal segmentation firewalls to drive security deep into the network,” Jeff Jennings, national SLED practice director at <a href="" target="_blank">Fortinet</a>, writes <a href="" target="_blank">in <em>GCN</em></a>. “This ensures government networks protect applications and secure networked resources across the distributed network, even into the cloud, while<strong> isolating sensitive voter information as it moves across the network</strong>.”</p> <p>One of the unique challenges with elections, Sullivan says, is that like Super Bowl Sunday, the event involves spinning up a lot of infrastructure for a short period of time and then shutting it down. N<strong>ext-gen firewalls need to be installed </strong>and can require a “pretty heavy learning curve” on election agency IT teams, which might not have security specialists, Sullivan says.</p> <p><a href="" target="_blank"><em><strong>MORE FROM STATETECH: </strong>Discover why your state should use the NIST Cybersecurity Framework! </em></a></p> <h2 id="toc_2">How Governments Can Secure Voting Machines Now</h2> <p>Given that architectural changes may take longer to implement, Sullivan says election agencies can turn to <strong>cloud-based security services</strong> that can be spun up just for the election and immediate aftermath, and for things like testing and normalizing network traffic.</p> <p>Through the end of the 2018 election cycle, Akamai is providing its <a href="" target="_blank">Enterprise Threat Protector with Akamai Cloud Security Intelligence</a> service to election agencies on a pro bono basis. The service looks at the Domain Name System protocol requests for election sites and compares those requests to the intelligence Akamai has gathered by looking at trillions of such requests per day to determine if it is benign.</p> <p>The service is also designed to protect election agencies from phishing attacks, provide data protection, and<strong> guard against malware accessing external command and control servers to tamper with election data</strong>.</p> <p>Other companies are also offering cloud-based security tools to election officials. <a href="" target="_blank">McAfee</a>, via its Skyhigh Networks unit, <a href="" target="_blank">announced in August</a> that it would offer 12 months of free cloud-based free security services to election offices in all 50 states. The offering, McAfee Skyhigh Security Cloud, provides state election officials with a no-cost data security, monitoring, auditing, and remediation solution for their Infrastructure as a Service and Software as a Service environments.  </p> <p>Sullivan called the threats to elections “very real,” but said the flip side is that increased awareness of the threat has led to greater security enhancements. “We’re in a much better spot now,” he says.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href=";screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>BizTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Wed, 17 Oct 2018 13:22:04 +0000 phil.goldstein_6191 41611 at What Massachusetts Can Do to Combat IoT Security Threats <span>What Massachusetts Can Do to Combat IoT Security Threats</span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Tue, 10/16/2018 - 12:07</span> <div><p>The security of Internet of Things devices and systems is a concern at <a href="">both the city</a> and <a href="">state level</a>. IoT devices are increasingly being used in <a href="" target="_blank">botnet attacks to take down computer networks</a>. For the Commonwealth of Massachusetts, the threat is real and needs to be addressed. </p> <p>Last month, Massachusetts State Auditor Suzanne Bump <a href="" target="_blank">released a report</a> that summarized how the state’s agencies currently use and think about IoT and the risks associated with it. While state agencies are using IoT and see its benefits, a plurality also <strong>voiced concerns that IoT risk cannot currently be effectively managed</strong>. </p> <p>The report makes clear that Massachusetts must take steps to bolster its IoT security, including <strong>improving information security policies, standards </strong><strong>and</strong><strong> guidelines</strong>. The report also says the state needs to <strong>create an information security incident response plan</strong> and connect IoT devices to the Commonwealth network with the involvement of the Commonwealth’s CIO or a designee.</p> <p>“As IoT technology becomes increasingly ubiquitous, state government has a choice: it can lead by proactively securing these devices and developing a comprehensive approach to ensure agencies are effectively protected when leveraging these tools, or it can react to challenges and threats when they are at an agency’s doorstep,” <a href="" target="_blank">Bump said in a statement</a>. “As the Commonwealth continues to take measures to improve its IT operations and security, the opportunities and threats presented by IoT devices must be a part of that strategy.” </p> <p><a href="" target="_blank"><em><strong>DOWNLOAD: </strong>Discover how to enhance your agency's cybersecurity in this white paper!</em></a></p> <h2 id="toc_0">Massachusetts Uses IoT in Smart Buildings, Hospitals and on Highways</h2> <p>To gain a better understanding of the current use of IoT devices by state agencies, the Office of the State Auditor conducted a survey of <strong>84 </strong>state agencies, <strong>28</strong> of which responded. </p> <p>The purpose of the survey, which examined the period of July 1, 2016, through March 31, 2017, was to determine the current and future plans for deploying IoT devices in the state, the types of IoT devices deployed, the ways IT devices are connected to networks, the ways IoT devices are used, and agencies’ perspectives on the benefits and risks of IoT technology.</p> <p>Among other use cases, IoT is used in smart building management, in cameras and sensors at highway tolls, via GPS systems on <a href="" target="_blank">Massachusetts Bay Transportation Authority</a> trains and in patient-monitoring systems in hospitals. </p> <p>Notably, the report found that while a <strong>68 percent </strong>of respondents believe that the IoT has enabled their agencies to manage specific activities more efficiently, <strong>43 percent </strong>believe that the IoT “is in its infancy and the risk of adopting IoT devices is greater than the benefits.” Further, <strong>46 percen</strong>t of respondents “believe that IoT risks cannot be managed effectively and efficiently by current controls.”</p> <p>The finding on risk versus benefit “seemed like a clear call from those agencies that they needed some guidance and some help,” OSA’s Director of Communications Michael Wessler <a href="" target="_blank">tells <em>Government Technology</em></a>. </p> <p><strong><a href="​​​​​​" target="_blank"><em>DOWNLOAD: </em></a></strong><a href="​​​​​​" target="_blank"><em>Find out how your state can achieve digital transformation in this CDW Insight Report! </em></a></p> <h2 id="toc_1">How Massachusetts Can Enhance IoT Cybersecurity</h2> <p>To determine he risks associated with the state’s use of IoT, the state auditor’s office reviewed the applicable network security controls in the Massachusetts Access to Government Network system that were intended to safeguard against potential security vulnerabilities of IoT devices and related information system resources. The office also examined the problem management and patch management processes for IoT devices and related IT resources</p> <p>The office also looked at the procurement and project management methodology for the <a href="" target="_blank">Commonwealth Building Energy Intelligence Program</a> and determined whether cybersecurity risks were properly mitigated. Additionally, the office reviewed the IoT vendor selection and vendor relationship management processes, as well as the availability of state data upon the termination of a relationship with a vendor. </p> <p>According to the report, the state’s Enterprise Information Security Policy <strong>does not provide guidance to state agencies regarding the IoT.</strong> Specifically, “it lacks controls to ensure that a minimum level of security is provided throughout the Commonwealth for the IoT, as well as optional control recommendations based on industry best practices, like those of the National Institute of Standards and Technology.” </p> <p>Without adequate administration through policies, standards and guidelines around IoT, the state “may be subject to security <strong>vulnerabilities that could affect its operations, safety, and privacy,</strong>” the report says. The report says the state CIO’s office should “establish detailed policies, procedures, and standards regarding the connection, use, and security of IoT devices.” </p> <p>The state’s <a href="" target="_blank">Executive Office of Technology Services and Security</a> is in the process of developing new policies, procedures and standards, but says that many of the security controls required to mitigate and counter IoT-based attacks were already fundamental to the existing network security, access controls, and other well-established security areas.</p> <p>The report says EOTSS does not have a documented incident response plan, and it needs one, since “such a plan would establish specific procedures EOTSS would follow to respond to and<strong> resolve any detected incidents</strong> affecting the security of the Commonwealth’s IT <strong>hardware, software, and data related to IoT devices</strong>.” </p> <p>Without an incident response plan, the state “has inadequate assurance that it can effectively respond to and minimize the risk of cyberattacks when they happen.”</p> <p>The report also found that the state’s Division of Capital Asset Management and Maintenance procured the contract for a project that involved connecting IoT devices to the MAGNet without involving the state CIO’s office. Since the CIO’s office was not given the opportunity to participate in the project, “there is inadequate assurance that the connected devices were properly connected, and there is an increased network security risk that IoT devices will be exposed to cyberattacks,” the report says. </p> <p>EOTSS should implement a policy to ensure that all state agencies considering undertaking any projects related to MAGNet <strong>contact the state CIO’s office and learn whether it should be involved</strong> in supervising the projects, the report advises.</p> <p><a data-entity-type="" data-entity-uuid="" href="" target="_blank"><img alt="Cybersecurity-report_HowStrong%20(2)_0.jpg" data-entity-type="" data-entity-uuid="" src="/sites/" /></a></p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href=";screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>BizTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Tue, 16 Oct 2018 16:07:54 +0000 phil.goldstein_6191 41606 at How Companies Think About Smart City Technology and Improving Metropolitan Living <span>How Companies Think About Smart City Technology and Improving Metropolitan Living</span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Mon, 10/15/2018 - 10:10</span> <div><p>Technology has the ability to make living in a city safer, more efficient and more enjoyable. Major companies involved in smart city innovations — like <a href="" target="_blank">Cisco</a> and <a href="" target="_blank">Panasonic</a> — produce technologies that do just that.</p> <p><a href="">Take Las Vegas, Nev.</a>, where officials teamed up with Cisco to help reduce pedestrian deaths in crosswalks. Through <a href="" target="_blank">Cisco Kinetic for Cities</a>, city leaders access <strong>real-time IoT device and sensor data securely, quickly and efficiently</strong>. The platform aggregates data from multiple sources, including sensors, mobile devices and cameras, says Britt Norwood, Cisco’s vice president for state, local and education business for the western part of the United States.</p> <p>Among other things, the city uses Cisco Kinetic for Cities to help reduce traffic congestion and to curb pedestrian accidents.</p> <p>Cisco Kinetic for Cities already helps city leaders make crossing the city’s busy streets safer, and provides them the ability to make real-time decisions about the flow of traffic in Las Vegas, Norwood says.</p> <p><strong>“It’s not just about the technology; it’s about making people’s lives much better,” </strong>he says.</p> <p>In Albuquerque, N.M., <a href="" target="_blank">another smart city that partners with Cisco</a>, officials seek to replace traditional streetlights through the Cisco Kinetic for Cities platform.</p> <p>The project will help improve public safety while making lighting more efficient — and cost-effective, Norwood says.</p> <p>“The data is everywhere in cities,” he says. “Using Cisco’s technology bridges that data together… and lets public officials make really intelligent decisions based on that.”</p> <p><a href="" target="_blank"><em><b>MORE FROM STATETECH: </b>Discover why these eight cities are the smart cities to watch! </em></a></p> <h2 id="toc_0">Panasonic Takes Smart City Plans to the Next Level</h2> <p>But it takes more than technology to make a smart city a success, says George Karayannis, vice president of <a href="" target="_blank">CityNOW</a> for the Panasonic Corporation of North America.</p> <p>“Technology is only an enabler,” he says.</p> <p>The secret sauce is to <strong>align all stakeholders</strong> — including government leaders, transportation and utility leads — to <strong>define collective goals that can only be achieved through collaboration</strong>, Karayannis says.</p> <p>Panasonic did that at <a href="" target="_blank">Pena Station NEXT</a>, a 400-acre, mixed-use, transit-oriented development in Denver, Colo. The public-private partnership offers a living lab for stakeholders where they can understand and interact with the technology firsthand. Panasonic has built a 20,000-square-foot model “mini city” in a building that includes a sports and entertainment district, a commercial business district and a mobility district to help stakeholders achieve a shared baseline of knowledge of the costs, benefits and underlying technology of practically any smart city application.</p> <p>Technologies deployed at Pena Station NEXT include a portfolio microgrid, connected mobility, autonomous shuttles, community Wi-Fi, <strong>smart streetlights, public-safety cameras, digital signage, smart parking </strong><strong>and</strong><strong> environmental sensing</strong>.</p> <p><a href="" target="_blank"><em><strong>DOWNLOAD: </strong>Find out how your city can achieve digital transformation in this CDW Insight Report! </em></a></p> <h2 id="toc_1">City Leaders Drive the Future of Smart City Innovation</h2> <p>The future of smart city implementations looks increasingly positive as city leaders adopt a “Smart City 2.0” mentality, Karayannis says.</p> <p>“Smart Cities 1.0 was mostly vendor-led, and as a result, it was mostly about shiny stuff they could sell,” he says. “Smart Cities 2.0 is more about<strong> process improvement, enabled by technology</strong>. This is a subtle but critical distinction.”</p> <p>Stakeholder alignment will be a key piece of this next step. “We believe the future of successful smart city implementations is stakeholder alignment, which unlocks the public-private partnership opportunities, which then lead to impactful projects,” Karayannis says.</p> <p>Looking forward, smart cities have<strong> a lot of room to grow in the transportation space</strong>, Cisco’s Norwood says.</p> <p>With <strong>40,000 </strong>vehicle crashes annually, there clearly is a problem with roadways — one that smart technology can help to solve. Cities may adopt technology that can tie together various data in real time. Using data from fog sensors and connecting those sensors to roadway signs can indicate a gate is closed due to fog, for example, Norwood says.</p> <p>This focus will make roadways safer and also offer the added benefit of cutting down on traffic, he says.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/erin-cunningham"> <div>Erin Cunningham</div> </a> </div> <div class="author-bio"> <p> <div><p>Erin Cunningham is a writer and editor based in Maryland with experience writing about state and local government, education, technology and more.</p> </div> </p> </div> </div> </div> </div> Mon, 15 Oct 2018 14:10:47 +0000 phil.goldstein_6191 41581 at Drones Increasingly Get Ahead of Disaster Damage <span>Drones Increasingly Get Ahead of Disaster Damage</span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Fri, 10/12/2018 - 09:07</span> <div><p>Immediately after Hurricane Florence hit the East Coast of the United States, drones were in the air, surveying the damage. In Wilmington, N.C., for example, a news drone <strong>tracked floodwaters as the hurricane moved through the state</strong> in <a href="" target="_blank">reports from WTVD 11 Eyewitness News</a>. </p> <p>Several years ago, drones began appearing in emergency response situations, conducting surveillance and assessing damage. Today, utilities use drones regularly. <strong>Every agency involved in disaster responses may somehow deploy a drone as a primary tool</strong>, whether for damage assessment, search and rescue, overall surveillance and more. </p> <p>During the approach of Hurricane Florence in September, authorities <strong>alerted more than one million people and advised them to evacuate their homes</strong>. Drones gathered data for damage reports caused by the hurricane, which informed citizens when they might return home, <a href="" target="_blank">reports <em>Wired</em></a>. </p> <p>“Utilities are spelling out where they have vulnerable, infrastructure-like long power lines. The company is also pulling together pre-event data: ‘before’ pictures to contrast with the ‘after,’” according to <em>Wired</em>. “Getting those ‘after’ images is the challenge. No aircraft can fly in the storm itself, and even when it passes, they have to get into place to start work.”</p> <p><strong><a href="" target="_blank"><em>MORE FROM STATETECH: </em></a></strong><a href="" target="_blank"><em>See how counties are using mobile communications centers to respond to emergencies! </em></a></p> <h2 id="toc_0">Drones Help Restore Power, Ensure Clean Water</h2> <p>Facing Hurricane Florence, Edison Electric Institute, an industry group coordinating utility recovery efforts, tracked the recruitment of at least <strong>53 drone teams</strong> to identify and fix damage from the storm. Each team fielded more than one drone and collectively about <strong>100-160 operators</strong> flew the drones, <a href="" target="_blank">according to <em>Fortune</em></a>.</p> <p>The drones can <strong>assess damage quickly and pinpoint trouble spots</strong> in places where it may be dangerous for people to venture. Companies like Duke Energy and Southern Company deployed drones with infrared and high-zoom sensors that can inspect substations, locate malfunctioning solar panels and help to restring power lines, according to Fortune.</p> <p>When Hurricane Harvey flooded Houston in 2017, CenterPoint Energy assessed a damaged substation and built a backup. To assess damage, the energy company turned to <a href="" target="_blank">IBM</a>. Drones “can also be used to check hospital generators or alert residents if the local hardware store is open to get supplies,” Chris Behme, an energy and utilities partner at IBM, tells <em>Fortune</em>.</p> <p>The Long Island branch of the Public Service Enterprise Group has deployed drones to examine substations as well as transmission and distribution systems. John O’Connell, vice president of transmission and distribution operations at PSEG Long Island, tells <a href="" target="_blank">Unmanned Aerial Online</a>, “Compared to using helicopters or ground-based observation, <strong>UAVs give us better data on the electric system, which directly improves system reliability and employee safety</strong>.”</p> <p>The eruption of the Kilauea volcano in Hawaii came with bursts of lava up to 160 feet high, destroying more than 700 homes and forcing the evacuation of more than 2,000 people, <a href="" target="_blank">reports Reuters</a>.</p> <p>Drone operators went into “24/7 disaster mode,” surveying the volcanoes with drones and other tools. Data collected by the drones helped to advise scientists as to what the effects of a volcano eruption on the mainland might be.</p> <p>According to Reuters, “Water and electric utilities wanted to know if the plumes of fine ash would affect water quality, and how they might interfere with transmission lines.” Damage assessments from Hawaii could predict future trends.</p> <h2 id="toc_1">Potential Future Benefits of Drone Surveillance in Disasters</h2> <p>In the future, drones will do even more to assist with disaster response and recovery. <a href="" target="_blank">Curbed reports</a> architect Stephanie Chaltiel recently demonstrated a prototype drone that<strong> builds a mud shelter for use in an emergency</strong>. Emergency responders can set up lightweight wooden frames and cover them with burlap. The drone then covers the structure in mud, providing occupants with protection from the elements.</p> <p>Meanwhile, IBM applied for a patent for technology to track drone flights through <strong>a blockchain ledger</strong>, according to Coingeek. </p> <p>“The goal, according to the patent application, is to ensure that airspace controllers, regulatory bodies and even UAV owners can <strong>check and supervise the rising number of drones in the sky</strong>,” <a href="" target="_blank">the report says</a>.</p> <p>As major storms become more costly — <a href="" target="_blank">at $170 billion in damages</a>, Hurricane Florence may be the most expensive storm in U.S. history — innovators will continue to find ways in which relatively inexpensive drones can mitigate potential disasters.</p> <p><em>This article is part of </em>StateTech<em>'s <a href="">CITizen blog series</a>. Please join the discussion on Twitter by using the <a href="">#StateLocalIT</a> hashtag.</em></p> <p><em><a data-entity-type="" data-entity-uuid="" href=""><img alt="CITizen_blog_cropped_0.jpg" data-entity-type="" data-entity-uuid="" src="" /></a></em></p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/matt-parnofiello"><img src="/sites/" width="58" height="58" alt="Matt Parnofiello" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/matt-parnofiello"> <div>Matt Parnofiello</div> </a> </div> <div class="author-bio"> <p> <div><p>In his role as Senior Business Development Strategist and Senior Public Safety Strategist at CDW•G, Matt Parnofiello manages technology integration projects with public safety agencies from concept to implementation. Working with the CDW•G team, customers, and industry partners he provides agencies with new capabilities and improved safety through digital transformation.</p> </div> </p> </div> </div> </div> </div> Fri, 12 Oct 2018 13:07:16 +0000 phil.goldstein_6191 41576 at Port of San Diego Continues to Recover from Ransomware Attack <span>Port of San Diego Continues to Recover from Ransomware Attack </span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Thu, 10/11/2018 - 12:20</span> <div><p>The Port of San Diego, which <a href="" target="_blank">disclosed late last month</a> that it had suffered from a ransomware attack on Sept. 25, continues to recover from the attack. </p> <p>The port has continued to operate, but some computer and IT systems remained offline as of last week, <a href="" target="_blank">according to <em>The San Diego Union-Tribune</em></a>. The port is working with state, local, regional, state and federal experts to restore its systems, the newspaper reports, and the FBI and Department of Homeland Security are part of the investigation.</p> <p>While the port has not been totally crippled, the attack highlights the <strong>continuing threat of ransomware</strong>, especially since it came shortly after an attack struck the Port of Barcelona, <a href="" target="_blank">as ZDNet reports</a>. The attack also underscores the need for all state and local government organizations to <strong>take the necessary precautions to guard against and mitigate ransomware attacks</strong>. </p> <p><a href="" target="_blank"><em><strong>MORE FROM STATETECH: </strong>Find out why proactive threat hunting appeals to state IT pros! </em></a></p> <h2 id="toc_0">Port of San Diego Suffers a Cyberattack</h2> <p>The Port of San Diego disclosed on Sept. 27 that it has first reported an incident on Sept. 25 that disrupted the agency’s IT systems. The port noted that the issue is <strong>“mainly an administrative issue”</strong> and normal port operations were continuing as usual. </p> <p>“The Port remains open, public safety operations are ongoing, and ships and boats continue to access the Bay without impacts from the cybersecurity incident,” Port of San Diego CEO Randa Coniglio said in a statement.</p> <p>Coniglio noted that, while <strong>some of the port’s IT systems were compromised by the attack</strong>, port staff also “proactively shut down other systems out of an abundance of caution.” </p> <p>The ransom note the port received requested payment in bitcoin, although the amount that was requested is not being disclosed. <strong>Park permits cannot be accepted online, and public records requests are taking longer to process</strong>, according to the <em>Union-Tribune</em>.</p> <p><a data-entity-type="" data-entity-uuid="" href="" target="_blank" title="CDW Cybersecurity Insight Report"><img alt="Cybersecurity-report_EasyTarget.jpg" data-entity-type="" data-entity-uuid="" src="" /></a></p> <h2 id="toc_1">Why It’s Important to Guard Against Ransomware</h2> <p>It can take a long time to repair IT systems and computers infected by ransomware, and doing so sometimes requires manually disinfecting hard drives and reconfiguring systems. </p> <p>“There is <strong>a lot of triage and analysis work you need to do in a recovery operation</strong>,” Stephen Cobb, a researcher with internet security software firm ESET, told the <em>Union-Tribune</em>. “It is a tedious process.”</p> <p>Ransomware is spread not only via emails but in malware hidden in advertising, too. Attackers are also downloading kits that let them easily deploy ransomware, a practice known as Ransomware as a Service.</p> <p>To help mitigate these risks, organizations should <strong>deploy a multilayered security program</strong> in order to prevent the intrusion of malware and allow for quick recovery in case an attack is not stopped, says Darius Goodall, director of product marketing at <a href="" target="_blank">Barracuda Networks</a>.</p> <p>Goodall notes that, while detection and mitigation is key, there are instances when ransomware attacks succeed. That is why it is critical for organizations to back up their data. </p> <p>“If data backup is not in place, there are a few steps one can take,” Goodall says. “First, <strong>find out what type of ransomware it is</strong>, e.g. encryption, screen-locking, etc. From there, you can see if you’re still able to access files, especially from another location, like a mobile device. If so, then the ransomware is likely fake.”</p> <p>If the attack is encryption or screen-locking, IT administrators should <strong>disconnect from their network and use anti-malware or anti-virus software</strong> to clean the ransomware and use a data recovery tool to help find those deleted files that are often trashed once ransomware encrypts new copies, Goodall says. </p> <p>“It’s critical for organizations to continually test backup and recovery processes while also backing up copies of data at multiple locations,” he adds. “This ensures data has a life somewhere else if compromised”</p> <p>Like many other security pros, Goodall also strongly recommends <strong>never negotiating with hackers</strong> since there is no guarantee organizations will get their data back. He notes that this is “tough advice to follow when critical data is involved, but ultimately, the real challenge many organizations face is implementing the security measures necessary to prevent your organization from ever finding itself in the position in the first place.”</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href=";screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>BizTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Thu, 11 Oct 2018 16:20:28 +0000 phil.goldstein_6191 41571 at Smart Cities Week 2018: 3 Key Takeaways for Smart City Leaders <span>Smart Cities Week 2018: 3 Key Takeaways for Smart City Leaders</span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 10/10/2018 - 11:47</span> <div><p>Smart cities are popping up everywhere, and there are <a href="">several that are worth keeping an eye on</a>. But the proliferation of smart cities — and of technologies that purportedly will help cities become “smart” in the first place — can sometimes make it hard for civic leaders and city IT managers to keep track of some basic things. What is a smart city? What should a city be doing to be smarter? </p> <p>At the <a href="" target="_blank">Smart Cities Week 2018 conference</a> in Washington, D.C., held from Oct. 2-4, city IT leaders from different parts of the country, and even a few from Canada, offered their thoughts on how their peers can <strong>chart a path forward and make their cities more innovative and responsive to residents’ needs</strong>. </p> <p>Here are <strong>three key takeaways</strong> from the conference to bear in mind when moving ahead on smart city projects. (And for all of <em>StateTech</em>’s coverage of Smart Cities Week 2018, <a href="">click here</a>.)</p> <p><a href="" target="_blank"><strong><em>MORE FROM STATETECH: </em></strong><em>Find out why these eight smart cities are ones to watch!</em></a></p> <h2 id="toc_0">1. Smart Cities Require New Ways of Thinking from Leaders</h2> <p>One clear lesson from the conference is that for cities to become smarter, they will need to rethink how they do business, fund IT projects and collaborate with the private sector. </p> <p>Frank Johnson, CIO of <a href="" target="_blank">Baltimore</a>, suggested <a href="">that city IT leaders</a> need to “open our aperture” and recognize that city governments only have so much capacity to carry out IT modernization plans, <a href="">like the one that Baltimore just recently unveiled</a>. They need to <strong>work with businesses, technology partners, philanthropies and universities</strong> to achieve smarter cities that are more innovative and sustainable, he said. Unsurprisingly, this approach is championed in <a href=" Strategic Plan Final 7.10.18.pdf" target="_blank">Baltimore’s modernization plan</a>. </p> <p>Wendy Gnenz, CIO of <a href="" target="_blank">Edmonton</a>, Canada, agreed, and added that it is important for municipalities to start exploring different business models and not just assume that they will be able to fund smart city and Internet of Things projects via traditional sources of funding, like property taxes. Cities should look to <strong>forge public-private partnerships</strong> — which, she acknowledged, is not that common in Canada. “It takes some innovation, some agility to show a city council that this is the right way to go,” she said. Edmonton is pursuing this model with its <a href="" target="_blank">Health City program</a>, an economic development initiative designed to spur healthcare innovation. </p> <p>City leaders should consider how to work with companies in the private sector to come up with new kinds of solutions they could not on their own, <a href="">said Michael Mattmiller</a>, a former CTO of Seattle who is now a director of government affairs at <a href="" target="_blank">Microsoft</a>. For example, <a href="" target="_blank">Microsoft is partnering with Chicago</a> to make the city’s technology more accessible and easier to use for people with disabilities or mobility issues. </p> <p><a href="" target="_blank"><em><strong>MORE FROM STATETECH: </strong>Find out how cities can benefit from public-private partnerships! </em></a></p> <h2 id="toc_1">2. Focus on the Unique Needs of Your City</h2> <p>Speakers at the conference also emphasized that every city will take a unique path on its smart city journey, and that is as it should be. </p> <p>Miguel Gamiño Jr., now the <a href="" target="_blank">executive vice president for global cities at Mastercard</a>, knows a thing or two about smart cities, having served as CTO for New York City from 2016 to April 2018. Gamiño also was CIO of San Francisco and chief innovation and information officer for the city of El Paso, Texas. </p> <p>He emphasized that, <strong>while they may face similar problems, they all have different priorities</strong>. They also each have different appetites for risks, he said. “What that taught me very quickly was that becoming smart city wasn’t a destination, it was a journey,” he said. “What makes for a smart city is in the eye of the beholder, in the city itself.”</p> <p>For example, in El Paso, the city was focused on efficiency in government, minimizing taxpayer expenses and improving service delivery. In San Francisco, the city and IT organization were much larger and more focused on broadband deployment, according to Gamiño.</p> <p>Smart cities may not necessarily all be focused on deploying IoT devices and sensors and making traffic more efficient. Sometimes making a city smarter<strong> can simply mean making sure its IT systems are up-to-date</strong>. Barney Krucoff, interim CTO of <a href="" target="_blank">the government of the District of Columbia</a>, said that while city IT leaders are pursuing smart city projects, they should not lose sight “of the fundamentals we need to every day.”</p> <p>The D.C. government is running some systems that were created in the 1980s and deployed in the 1990s that need to be updated, including financial tools and department of motor vehicles systems. Those are multimillion-dollar software upgrades that need to be addressed, he said, and smart cities programs can sometimes be a distraction from those fundamental IT challenges.</p> <h2 id="toc_2">3. Make Your City Resilient as Well as Smart</h2> <p>Cities should not just deploy new technology, but ensure that they will have the <strong>capacity to withstand big shifts in technology and the environment </strong>— not just over the next few years, but decades from now.</p> <p>Kevin Bush, <a href="" target="_blank">chief resilience officer</a> for the District of Columbia, said <a href="">resilience is the city’s “immune system,” </a>and smart cities need to probe where their immune systems are weak and strong and how capable they are of handling technological change, climate change, and changes in their populations and economies, he said. </p> <p>As cities deploy more IoT sensors, they will increasingly need to build up their cybersecurity resilience, Bush said. “We need to think about intrusions and bouncing back from an attack,” he added. <strong>“What is your fallback and your plan to get technologies back online?”</strong></p> <p>Erin Gill, <a href="" target="_blank">director of the office of sustainability</a> for the city of <a href="" target="_blank">Knoxville, Tenn.</a>, said that the municipality’s proximity to <a href="" target="_blank">Oak Ridge National Laboratory</a> has set a tone of innovation and progress for the city. “My role is to bring innovation theories and technologies into long-entrenched bureaucratic systems,” she said, including engineering and sustainability solutions. </p> <p>Gill also said that it is important for cities to <strong>break down silos and share data across departments </strong>to develop better services for residents and improve resiliency. Knoxville and its partners have done that to expand a home weatherization program for low-income residents.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href=";screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>BizTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> Wed, 10 Oct 2018 15:47:14 +0000 phil.goldstein_6191 41566 at New Model for State CIO Procurement to Take Center Stage at NASCIO 2018 <span>New Model for State CIO Procurement to Take Center Stage at NASCIO 2018</span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 10/10/2018 - 10:52</span> <div><p>The <a href="" target="_blank">National Association of State Chief Information Officers</a> will leverage its <a href="" target="_blank">annual conference in San Diego</a> Oct. 21-24 as an opportunity to introduce a new way for state CIOs to do business. The multisourcing model, dubbed <strong>State CIO as Broker</strong>, will advocate for CIOs to serve as f<strong>acilitators of state information technology</strong> projects rather than as executors.</p> <p><a href="" target="_blank"><em><strong>JOIN THE CONVERSATION:</strong> Follow @StateTech on Twitter for continued NASCIO Annual 2018 coverage!</em></a></p> <p>In the months leading up to NASCIO 2018, the nonprofit already has produced two interim reports: first, an introductory report prior to its April midyear conference introducing the concept, “<a href="" target="_blank">State CIO as Broker: A New Model</a>,” and in September, “<a href="" target="_blank">The State CIO Top Ten: Why It's More Than a List</a>.” The latest examines “four forces of government change that a state CIO must manage to be an executive enterprise leader,” according to the report.</p> <p>In that report, NASCIO outlines driving pressures that influence how state CIOs may address their top 10 priorities. The report heralds research being conducted by NASCIO on multisourcing with intent to provide best practices and a maturity assessment for <strong>the management of a multisourcing environment</strong>.</p> <p><a href="" target="_blank">In a statement</a>, Mississippi CIO Craig Orgeron, co-chair of the NASCIO Enterprise Architecture and Governance Committee said, “The State CIO Top Ten Priorities that is published each year is more than a list. It presents the pulse of the states, what is surfacing to the top from across all the states and territories as they anticipate and respond to the various forces of change. In this paper we’re discussing that relationship between these forces and state priorities as reflected in the NASCIO Top Ten.”</p> <p>North Carolina CIO Eric Boyette, the committee co-chair, added, “The actual forces of change can be somewhat different from state to state. Each state has their own unique political forces, organizational dynamics, and reporting structure that constitute the specific forces of change we generalize in our model. The Top Ten State CIO Priorities helps rationalize all of these specific forces into a set of common priorities we can work on together at a national level.”</p> <p><a href="" target="_blank"><em><strong>DOWNLOAD: </strong>Find out how your agency can achieve digital transformation in this CDW Insight Report! </em></a></p> <h2 id="toc_0">NASCIO 2018 to Focus on Multisourcing, Cybersecurity and Cloud</h2> <p>At NASCIO 2018, the organization will present a final report and its model, State CIO as Broker, in sessions for attendees. In addition, Texas CIO Todd Kimbriel will lead a session on<strong> “leveraging the multisourcing framework.”</strong></p> <p>And the nonprofit will present <strong>the results of its 2018 State CIO Survey i</strong>n a panel discussion at NASCIO 2018. Speakers at the panel include Nevada CIO Michael Dietrich, Grant Thornton Principal Graeme Finley, NASCIO Executive Director Doug Robinson and California CIO Amy Tong.</p> <p>In addition to the “State CIO as Broker” report and the State CIO Survey, NASCIO also will publish its “2018 Deloitte-NASCIO Cybersecurity Study” report, the fifth iteration of the landmark report. State CIOs consistently rank <strong>cybersecurity</strong> as a primary concern for their governments, and a panel discussion will highlight key findings of the “<a href="’ve-Been-and-Where-We’re-Going-webinar" target="_blank">2018 Deloitte-NASCIO Cybersecurity Study</a>” with Georgia CISO Stan Gatewood, Oklahoma CISO Mark Gower, Arizona CISO Mike Lettman and Deloitte Principal Srini Subramanian. Conversations on cybersecurity continue with a look at <a href="">the new Georgia Cyber Center</a> with Georgia CIO Calvin Rhodes.</p> <p>Another big focus area for NASCIO 2018 will be <strong>migration</strong><strong> to the cloud</strong>, particularly as state governments still have many legacy applications that have never moved to cloud. Representatives from Nebraska and Ohio will discuss<strong> “State as a Service” </strong>and how their state governments support local governments, partly with assistance in cloud computing. Hawaii CIO Todd Nacapuy will discuss his state’s e-sign service. </p> <p>And a NASCIO roundtable on IT procurement innovation will present marketplace recommendations in a chat with Idaho CIO Greg Zickau; Regina Kunkle, SAP national vice president for state and local and education; and Josh Nisbet, director of U.S. government markets for Deloitte.</p> <p><strong><a href="">Bookmark this page</a> </strong>for stories and videos from the <em>StateTech</em> team. Follow us on Twitter at <a href="" target="_blank">@S</a><a href="" target="_blank">tateTech</a> or the official conference Twitter account, <a href="" target="_blank">@</a><a href="" target="_blank">NASCIO</a>, and join the conversation using <a href="" target="_blank">#N</a><a href=";src=typd" target="_blank">ASCIO18</a>.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/taxonomy/term/11391"><img src="/sites/" width="58" height="58" alt="Mickey McCarter" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/taxonomy/term/11391"> <div>Mickey McCarter</div> </a> </div> <div class="author-bio"> <p> <div><p>Mickey McCarter is the senior editor of StateTech Magazine.</p> </div> </p> </div> </div> </div> </div> Wed, 10 Oct 2018 14:52:23 +0000 phil.goldstein_6191 41561 at NASCIO 2018 <span>NASCIO 2018 </span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 10/10/2018 - 10:51</span> <div><p>Join <em>StateTech</em> as we cover the NASCIO 2018 Annual conference in San Diego from Oct. 21-24. </p> </div> <div> <div>Event Image Toggle</div> <div>Off</div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="" data-title="NASCIO 2018" data-via="StateTech" data-button-background="none"> <span> <span>Oct</span> <span>10</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> <!-- Pinterest button is in EdTechk12 theme's vertical template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="" data-title="NASCIO 2018" data-via="StateTech" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href=";" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> <!-- Pinterest button is in EdTechk12 theme's horizontal template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="" data-title="NASCIO 2018" data-via="StateTech" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> Wed, 10 Oct 2018 14:51:45 +0000 phil.goldstein_6191 41556 at