My Take on NASCIO's Top 2010 Priorities

The National Association of State CIOs (NASCIO) has again polled state CIOs to determine what's hot and what's not as we head into&...

by / November 20, 2009 0

The National Association of State CIOs (NASCIO) has again polled state CIOs to determine what's hot and what's not as we head into 2010. Here's my take on their survey results.

 Government Technology Magazine summarized the results into two categories. The top three in each category are: 

A. Priority Strategies, Management Processes and Solutions 

1. Budget and cost control: managing budget reduction , strategies for savings, reducing or avoiding costs, activity-based costing
2. Consolidation: centralizing, consolidating services, operations, resources, infrastructure, data centers
3. Shared services: business models, sharing resources, services, infrastructure, independent of organizational structure

B. Priority Technologies, Applications and Tools

1. Virtualization (storage, computing, data center, servers, applications)
2. Networking, voice and data communications, unified communications 
3. Document/content/records/e-mail management
(repository, archiving, digital preservation) 

 I am not surprised by budget issues leading the list. That almost goes without saying during these difficult economic times. Consolidation and shared services are also pretty obvious choices, with the cost control and efficiency being the major themes for CIOs right now. We need to work together to do more more with less, and partnering with others can certainly help. 

What surprises me most from the "A" list is that security dropped to #6. Expect that to change next year. I fully expect security to rise back to the top three as Web 2.0 and cloud computing strategies try to battle with the inevitable threats that will surface from cost cutting.

The other surprise from list A is that infrastructure was #8. If you look at the top items on list B, they are infrastructure items like virtualization and networking. I can't quite figure that one out. List B also shows a drop for identity management from 2009, which will eventually need to be addressed in building more end-to-end trust and for moving forward with ambitious cloud computing plans.

The overall trend is "follow the money." Federal stimulus dollars are raising items like broadband to a new level of importance. Governments across the nation are looking at grant opportunities as well as making the most out of investments that they have already made.

In summary, I have a hard time arguing with any of the items on either list, based upon our economic realities. Michigan's list is similar, with a few exceptions like consolidation - which we've already tackled.

What are your thoughts? Do these priorities match your plans for 2010?

   

Dan Lohrmann Chief Security Officer & Chief Strategist at Security Mentor Inc.

Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author.

During his distinguished career, he has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader.
Lohrmann led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprisewide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan.

He currently serves as the Chief Security Officer (CSO) and Chief Strategist for Security Mentor Inc. He is leading the development and implementation of Security Mentor’s industry-leading cyber training, consulting and workshops for end users, managers and executives in the public and private sectors. He has advised senior leaders at the White House, National Governors Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses and nonprofit institutions.

He has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.

Lohrmann is the author of two books: Virtual Integrity: Faithfully Navigating the Brave New Web and BYOD for You: The Guide to Bring Your Own Device to Work. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington, D.C., to Moscow.

He holds a master's degree in computer science (CS) from Johns Hopkins University in Baltimore, and a bachelor's degree in CS from Valparaiso University in Indiana.

Follow Lohrmann on Twitter at: @govcso