Government Technology

Missouri CIO Testifies Before Congress on the States and Cybersecurity



October 24, 2007 By

Photo: Missouri CIO Dan Ross 

On October 23, NASCIO member and Missouri CIO Dan Ross testified on behalf of the state of Missouri and NASCIO before the U.S. House Oversight and Government Reform Subcommittee on Information Policy, Census and National Archives on efforts to prevent and respond to Internet disruptions at the state level.

Ross's testimony, provided at the request of the Subcommittee Chairman Wm. Lacy Clay (D-MO), emphasized information technology (IT) security as a vital component in securing our nation's Internet infrastructure and described the important role that the CIOs and their IT security personnel play in responding to Internet and critical IT system disruptions, when they occur.

"As the nation becomes increasingly Internet- and technology-dependent, the need to avert a prolonged, large-scale loss or disruption of critical IT infrastructure or the Internet due to a cyber attack, natural disaster, or terrorist incident, becomes as basic as securing our homes, borders and modes of mass transportation," wrote Ross in his full written testimony. "However, should an Internet or network disruption take place, it is essential that we have effective and well-coordinated processes in place to ensure successful and rapid restoration of critical IT systems and applications as well as the Internet."

Ross's testimony called attention to the need for effective planning and coordination in responding to an Internet and critical IT system disruption indicating that state CIOs and their IT security personnel are increasingly forging partnerships with state homeland security, emergency management, law enforcement and public safety officials to plan for the potential of major disruptions and security events.

"Today's IT security domain is in a constant and evolving state of threat," said NASCIO Executive Director, Doug Robinson. "Should a critical IT system, application, or an Internet disruption take place, it is critical that effective and well-coordinated processes are in place to ensure rapid restoration of services. Successful restoration processes must, however, involve an upfront investment in both human and technology resources. A reactionary response to a security event will only patch system disruptions."


| More

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Better security. Better government.
Powering security at all levels of government with simpler, more connected IT.
Cybersecurity in an "All-IP World" Are You Prepared?
In a recent survey conducted by Public CIO, over 125 respondents shared how they protect their environments from cyber threats and the challenges they see in an all-IP world. Read how your cybersecurity strategies and attitudes compare with your peers.
Maintain Your IT Budget with Consistent Compliance Practices
Between the demands of meeting federal IT compliance mandates, increasing cybersecurity threats, and ever-shrinking budgets, it’s not uncommon for routine maintenance tasks to slip among state and local government IT departments. If it’s been months, or even only days, since you have maintained your systems, your agency may not be prepared for a compliance audit—and that could have severe financial consequences. Regardless of your mission, consistent systems keep your data secure, your age
View All

Featured Papers