The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.
|Our Connected Government||
Our nation is built on connections. Connecting our people, our nation, to services and devices. Learn how Salesforce is transforming government for the 21st Century.
Sponsored by CarahSoft
|Data Interoperability||Data Management||November 2015|
|Moving Forward: Leadership Toolkit for State CISOs||
In 2006, the National Association of State Chief Information Officers (NASCIO) surveyed state chief information security officers (CISOs) and released a report titled, A Current View of the State CISO: A National Survey Assessment. The report called for a heightened role of state CISOs as cybersecurity continues to be an important issue to states and state chief information officers (CIOs). Fast forward nearly 10 years and cybersecurity is not only “an” important issue but “the” issue of most importance to state CIOs.
|Data Security||Data Management, Security||October 2015|
|The Vision and Value of a Connected Government||
Government is in the midst of a profound transformation, powered by innovative ideas and a commitment to do better. The new model puts citizens first and agencies out in front of needs – anticipating, personalizing, and delivering intelligent services when, where, and to whom they are needed.
Government organizations are continuing the tradition of innovation that created the Internet 40 years ago. The transformation in progress today is equally profound. The stakes are high and the needs are urgent. Failures make headlines. Government needs to lead again - working to improve critical services without adding costs - turning to technology innovation to get there.
Sponsored by CarahSoft
|Data Sharing||Data Management||October 2015|
|A Practical Path to Unified Identity Across Data Center, Cloud and Mobile||
Establishing and maintaining a security and compliance posture, in what is a disparate and dynamically changing IT environment, is regularly cited as the top concern of IT leaders who are responsible for mitigating risk and protecting the information assets of their organizations. The major trends at the heart of this changing IT environment is the increasing heterogeneity and hybridization of platforms inside and outside the organization, the rush to deploy SaaS applications and the explosion in smart phone and tablet devices users are bringing to work to for personal productivity.
|Saas||Data Management||October 2015|
|2015 State CIO Survey: The Value Equation||
The state IT and business landscape continues to change, reflecting both emerging approaches to delivering IT products and services, and also the faster paced, more complex environment
|Data Management||Data Management||October 2015|
|The Value Equation Agility in Sourcing, Software and Services||
The state IT and business landscape continues to change, reflecting both emerging approaches to delivering IT products and services, and also the faster paced, more complex environment faced by state CIOs. We asked state CIOs to share their perspective on a number of topics, with a particular focus on the emerging role of the CIO as a broker of shared services, and on the use of incremental software development approaches to accelerate the delivery of value to customers. These topics share a common theme – customer expectations continue to rise, and state CIOs must be agile enough to adapt to changing circumstances and to rapidly deliver business value. We also asked CIOs about the characteristics they felt were most valuable for a state CIO, and which dimensions of the role were most critical for success.
|Technology Products and Services||Data Management, Services, Technology Equipment||October 2015|
|Guide to Application Whitelisting||
A whitelist is a list of discrete entities, such as hosts, email addresses, network port numbers, runtime processes, or applications that are authorized to be present or active on a system according to a welldefined baseline. A blacklist is a list of discrete entities that have been previously determined to be associated with malicious activity. A graylist is a list of discrete entities that have not yet been established as benign or malicious; more information is needed to move graylist items onto a whitelist or a blacklist. Whitelists, blacklists, and graylists are primarily used as a form of access control: permitting activity corresponding to the whitelist and not permitting activity corresponding to the blacklist.
|Data Security||Data Management||October 2015|
|Policy Machine: Features, Architecture, and Specification||
The purpose of this Internal Report (IR) is to provide an overview of the PM and guidelines for its implementation. The report explains the basics of the PM framework and discusses the range
This document, while technical in nature, provides background information to help readers understand the topics that are covered. The material presumes that readers have a basic understanding of computer security and possess fundamental operating system and networking expertise.
|Data Security, Access Control||Data Management, Security||October 2015|
|Justice Assistance Grant (JAG) Program, 2015||
The Department of Justice's Bureau of Justice Statistics (BJS) has released Justice Assistance Grant (JAG) Program, 2015, which describes steps used in the Edward Byrne Memorial Justice Assistance Grant (JAG) formula calculation process to determine award amounts for states, local governments, and territories. It presents summary results of the FY 2014 allocation amounts.
|Grant Funding||Uncategorized||October 2015|
|Content Encryption: Key Issues to Consider||
Encryption of electronic content is an essential best practice, despite the fact that many organizations and individual users do not encrypt email, files stored behind their corporate firewall, files stored in the cloud, and in other venues. However, most IT administrators understand the benefits of encrypting content to protect sensitive or confidential information, to protect their organizations against data breaches, to satisfy regulatory obligations, and to protect against various types of legal liabilities.
It is important for decision makers to understand that encryption is more than simply a defensive strategy to protect against data breaches or to comply with regulations. Organizations that encrypt content can create new business opportunities and create competitive differentiation that can contribute significantly to their bottom line and provide new ways of attracting and keeping customers.
|Data Security||Data Management||October 2015|