Jim Weaver

Jim Weaver

Secretary for Information Technology / State CIO, State of North Carolina

Jim Weaver was appointed Director and State CIO for Washington Technology Solutions in December 2018. Jim has over 32 years of experience in the IT industry, having served in varying management and technical positions, most notably as the Commonwealth of PA's Chief Technology Officer, as well as Chief Technology Officer and Deputy Chief Information Officer for the commonwealth's Departments of Human Services, Aging and Insurance.

During his tenure, he had responsibility for planning, directing, and evaluating Commonwealth IT operations and was a key contributor for the IT shared services transformation effort to align technology staff and services into functional matrix-based teams. In his agency roles, Jim was responsible for planning, directing and evaluating the IT operations of the three agencies, which included mainframe and distributed systems platforms, data base design and application/software development, telecommunications, IT security and business intelligence.

Jim has proven expertise with successful large scale modernization efforts with an enterprise approach to technology and information security management - many of these efforts have been nationally recognized by NASCIO (2008, 2013, and 2014) and Computerworld Honors (2010 and 2013). Jim holds numerous ITIL certifications and earned his Certified Government Chief Information Officer qualification from Harrisburg University. Jim is also an active member of the armed forces serving in the Pennsylvania Army National Guard with over 33 years' experience in personnel information management systems.


CIO Panel: Where Security Meets Technology

Presented by Alan Cunningham , Bill Smith , Jim Weaver  •  June 17, 2021

Cybersecurity 2021: Threats, Technologies and Leadership

Presented by Kim Green , Kevin Murphy , Jim Weaver  •  November 18, 2020

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.