New Core Services Taxonomy for State IT Security Programs

The National Association of State Chief Information Officers (NASCIOs) Security and Privacy Committee has released a new report entitled: The Heart of the Matter: A Core Services Taxonomy for State IT Security Programs.

by / October 30, 2011 0

The National Association of State Chief Information Officer’s (NASCIO’s) Security and Privacy Committee has released a new report entitled: The Heart of the Matter: A Core Services Taxonomy for State IT Security Programs. The PDF version of the document is available for free download from the NASCIO Publications website.

Why is this document important and worth reading? Here’s an excerpt from the opening paragraph:

“This brief arises from discussions in NASCIO’s Security and Privacy Committee that relate to several factors: the chronic degree of underfunding for IT security programs within state government, in the context of significantly diminished state budgets; the transition of over half of the state CIO positions in the wake of 27 new governors in 2011; and the expanding number of states undertaking IT consolidation across the country.”

 Although I was not one of the authors of this report, I certainly agree with call to action and the urgency required regarding the current situation for most state and local governments around America.

 What is covered in the taxonomy? Here are the service categories described in the briefing:

 Governance, Risk, and Compliance Services

1. Information Security Program Management

2. Secure System Engineering

3. Information Security Training and Awareness

4. Business Continuity

5. Information Security Compliance

6. Information Security Monitoring

7. Information Security Incident Response and Forensics

8. Vulnerability and Threat Management

9. Boundary Defense

10. Endpoint Defense

11. Identity and Access Management

12. Physical Security

 For each of these areas, the document defines the scope of the individual services, and describes the key activities and tools employed in the delivery of the service. The potential benefits of using a comprehensive taxonomy as well as some possible cost savings are also offered at the end of this document.

 I highly encourage IT leaders as well as state and local security leadership to take a look at this piece.

 

 

Dan Lohrmann Chief Security Officer & Chief Strategist at Security Mentor Inc.

Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author.

During his distinguished career, he has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader.
Lohrmann led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprisewide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan.

He currently serves as the Chief Security Officer (CSO) and Chief Strategist for Security Mentor Inc. He is leading the development and implementation of Security Mentor’s industry-leading cyber training, consulting and workshops for end users, managers and executives in the public and private sectors. He has advised senior leaders at the White House, National Governors Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses and nonprofit institutions.

He has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.

Lohrmann is the author of two books: Virtual Integrity: Faithfully Navigating the Brave New Web and BYOD for You: The Guide to Bring Your Own Device to Work. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington, D.C., to Moscow.

He holds a master's degree in computer science (CS) from Johns Hopkins University in Baltimore, and a bachelor's degree in CS from Valparaiso University in Indiana.

Follow Lohrmann on Twitter at: @govcso