NASCIO Guide Maps Out Security Standards

Desperately Seeking Security Frameworks Aimed at State CIOs Responding, in part, to federal IT security requirements, the National Association of State CIOs on Thursday issued a brief entitled Desperately Seeking Security Frameworks A Roadmap for State CIOs .

Though aimed at state governments, the brief serves as a primer for all levels of government IT security, providing an overview of the primary security standards, regulations and laws that have an impact on IT security programs. The brief also highlights how frameworks have been employed to shape government security architectures, policies, standards and controls, and identifies the key issues for CIOs as they establish and maintain IT security programs.

"The infusion of federal dollars coming as a consequence of the American Recovery and Reinvestment Act puts significant new pressures on state IT programs to support recovery programs and services," Colorado CIO Mike Locatis, who co-chairs NASCIO's security and privacy committee, said in a statement accompanying the brief's release.

"It also increases the likelihood that the federal government will impose stricter security controls as part of broader concerns about transparency and accountability in the use of recovery monies," Locatis said. "This heightens the need for states to understand existing and new IT security standards to ensure that their programs employ and integrate these as necessary."

Click here for a copy of the brief.


About the Author

Eric Chabrow

Eric Chabrow

Host & Producer, ISMG Security Report; Executive Editor, GovInfoSecurity & InfoRiskToday

Chabrow hosts and produces the semi-weekly podcast ISMG Security Report and oversees ISMG's GovInfoSecurity and InfoRiskToday. He's a veteran multimedia journalist who has covered information technology, government and business.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.