o f i
play

O F I I N F O R M A T I O N & & E P A R A R T M E N T N F - PowerPoint PPT Presentation

D E P T M E N T O F O F I I N F O R M A T I O N & & E P A R A R T M E N T N F O R M A T I O N I N N O I O N N N O V A T I O N Agency of Administration Susanne Young, Secretary Darwin Thompson, Commissioner Fiscal Year 2018 Budget


  1. D E P T M E N T O F O F I I N F O R M A T I O N & & E P A R A R T M E N T N F O R M A T I O N I N N O I O N N N O V A T I O N Agency of Administration Susanne Young, Secretary Darwin Thompson, Commissioner Fiscal Year 2018 Budget Request

  2. De par tme nt of Infor mation & Innovation F isc al Ye ar 2018 Budge t Re que st Darwin T ho mpso n, Co mmissio ne r Budget Development James Nash CP A F inanc ial Dir e c to r I I I 2

  3. Department of Information & Innovation F Y 2018 Budge t Re que st T able of Contents Page E xe c utive Summary ……………………………………………………….. 4 Se c tio n 1: Cro sswalk De finitio ns & Cro sswalks ..,,……………………. 7 Se c tio n 2: Budge t De tail Re po rting …..………………………….……. 15 Se c tio n 3: Re quire d Vantage Re po rts …………………………….…... 18 Se c tio n 4: DI I Me tric s ……………..……………………………………….. 43 3

  4. E xe c utive Summa ry define the work left to do in the context of the new Agency of Ag e nc y o f Administra tio n Digital Services. De pa rtme nt of Informa tion & Innova tion (DII) Leverage Cloud Services We have been moving selected IT services to the public/government E xe c utive Summary: cloud for nearly five years, but much of the state computing infrastructure remains inside our state network, i.e. our private cloud. The Department of Information and Innovation was created in A key to understanding why the cloud is good centers on 2003 to provide direction and oversight for all activities related management standards. A managed cloud service, whether here or to information technology for the state. Information not, is more secure, more resilient, and more sustainable, and generally more cost effective than the alternatives. The cloud has Technology includes phone service, hardware, software, freed agencies and departments from the burden of managing server accessibility, and the communications and technology hardware, databases, networking, and critical operational functions. infrastructure for the State of Vermont. This office has broad Adding additional services in the cloud is fast, offering quick authority to meet the goals of the department and state as turnaround for new applications and services for Vermonters. established by statute and policy. Leverage the success of others Consistent with prior years our goals remain to operate IT effectively and efficiently, reduce risks to data security, and Vermont is a special place with our own style and approach to life help project teams deliver successful projects. and government, but we are not unique from a technical perspective. We need the same approaches and often the same tools as other Goal 1: Be Effective and Efficient states as we deliver healthcare, education, infrastructure such as roads and telecommunications, permitting, licensing, and other Effective, efficient delivery of technology means little unless it helps services. We often consult with our peers to leverage solutions for solve problems for the people using it. Therefore, we will judge our common problems. This collaboration is reflected in our contracting success in terms of outcomes for program providers and recipients of process, our approach to information security, the application of government services. Our approach to optimizing effectiveness and lessons learned from common projects, training initiatives and efficiency continues to include appropriate consolidation of practically everything else we do. infrastructure and common services, leveraging cloud services, learning from the success of others, and measuring results. Measure results Consolidate infrastructure and common services By incorporating standard metrics into IT delivery, we can measure We’ve been consolidating infrastructure and common services since our performance against our peers and against competing sources for 2010. We’ve completed much of the work as planned, and will the service. For example, by measuring the cost of a service that is available from multiple sources (i.e. State provided or outsourced), 4

  5. E xe c utive Summa ry we can make appropriate choices about how to source that service. In Encryption. The specific technologies may change, but the strategy addition to sourcing, metrics can be used to measure improvements is sound. in service, and benefits will be compounded when used in conjunction with results based accountability (RBA). In any given week, we see over 10,000 attempts to gain unauthorized access to state resources. Goal 2: Reduce risks to data security Train employees and partners on security awareness Managing data security risk requires the involvement of everyone. Implementing an information security strategy includes managing Employees are the last line of defense. Security awareness data based on classification, maintaining defense in depth and training pays off when users prevent malicious activity that providing security awareness for all employees and contractors. Our to-do list includes policy development, continuous assessment, other efforts failed to prevent. Knowing how to recognize and training, security design and project execution. Security is a priority respond to phishing and social engineering is priceless. for every system we buy or build. Goal 3: Help project teams deliver successful projects Manage Data based on its classification We have established repeatable project management processes To properly protect data, we must understand what the data is and consistent with industry standards and best practices, and we offer what rules apply. For example, we protect open data like the state project management guidance and training. Project managers in budget differently than closed data such as patient health state government provide oversight as well as hands-on information. For open and closed data we need to control management of projects. We provide useful tools, templates and authenticity, but closed data requires additional protection to limit information that contribute to project success. Our project access. Understanding this helps to optimize safeguards. management processes integrate and reinforce transparency, accountability and collaboration, allowing us to detect and fix Defense in Depth problems earlier, mitigate risks appropriately, and produce realistic schedules. Defense in depth is the concept of protecting a computer network with a series of defensive mechanisms such that if one mechanism Leverage business process optimization (BPO) processes fails, another will already be in place to thwart an attack. Because there are so many potential attackers with such a wide variety of Business process optimization activities essentially minimize the attack methods available, there is no single method for successfully resources required to get things done. When used in conjunction protecting a computer network. Utilizing the strategy of defense in with automation, programs get double the benefit. It makes no depth will reduce the risk of having a successful and likely very sense to automate a bloated process. Agencies and departments costly attack on a network. are leaders in business process optimization. The Agency of Natural Examples include Firewalls, Network Intrusion Detection Systems Resources (ANR) provides a standout example. ANR technologists (NIDS), Network Segmentation, Strong Authentication, and 5

  6. E xe c utive Summa ry and program teams have been active participants in Lean for a few years. The goal of Lean is to maximize customer value while reducing waste in the business process. Many outcomes from Lean process improvement call for the use of technology solutions to automate business processes and enable efficiencies. ANR IT has been involved to help facilitate the recommendations in the process to ensure they are manageable and sustainable. Enterprise Architects work closely with agency leadership and technical professionals to ensure we choose appropriate technologies to support service delivery needs. Thus, when appropriate enterprise architecture is included in a project, the technology is aligned with business goals. The primary benefit is information technology becomes a direct contributor to better business outcomes. For Vermont, this means consumers of government services have better experience when transacting business with state programs. It also means we can accomplish more with equal or less effort, allowing us to reallocate people resources as necessary. Proper alignment of technology with our business goals also reduces duplication and creates economies of scale. 6

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend