57.2 F
Washington D.C.
Friday, April 26, 2024

State CIOs Want to Nix Conflicting Security Regulations

The National Association of State Chief Information Officers has released its 2018 federal advocacy priorities, and high on the list is clarifying conflicting security regulations from different agendas and programs.

Other top priorities include recognizing state authority and ongoing innovation with emerging technology, and meeting citizens’ expectations through sharing information.

“State CIOs continue to seek efficiencies within state government through efforts like IT consolidation/optimization, which for my state has reaped over $351 million in savings and IT cost avoidance,” NASCIO President and Oklahoma CIO Bo Reese said. “However, voluminous and conflicting federal cybersecurity regulations often pose a challenge in our ability to do so, and it is our hope that our federal partners will work with state CIOs to harmonize regulations and normalize the audit process.”

author avatar
Homeland Security Today
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.
Homeland Security Today
Homeland Security Todayhttp://www.hstoday.us
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.

Related Articles

Latest Articles