GovConnect BC Towards an Open and Citizen-Centric Public Sector

Size: px
Start display at page:

Download "GovConnect BC Towards an Open and Citizen-Centric Public Sector"

Transcription

1 CI JOIN THE #GovConnect The GovConnect Network Towards an Open and Citizen-Centric Public Sector 2017 Event Snapshot Date December 5th, 2017 Location Fairmont Empress Victoria, British Columbia, Canada 2017 website website CanadianInstitute.com/GovConnect-BC a C5 Group Company Business Information in a Global Context

2 Event Overview For years, citizens have enjoyed the benefits of the consumerization of technology in the private sector. Now tech-savvy citizens are holding governments to higher expectations. Governments are feeling the pressure to adapt or risk becoming less relevant. is part of the GovConnect series and offers a unique, invitation-only format for heads of IM/ IT and policy to enable direct collaboration with peers involved in public sector transformation from across BC. Participants discussed and worked through challenges relating to the adoption and implementation of new tools, technologies, and approaches to being more citizen-centric. These conversations also included strategies around change management, leadership, and team governance. The rotating roundtable sessions allowed attendees to take advantage of direct engagement with topics at the heart of BC s public sector transformation. Excellent opportunity to meet people within provincial government working on similar projects and facing similar challenges. Also opportunity to learn from those who are ahead. Kelli Kryzanowski Director, Strategic Initiatives Ministry of Environment, Province of BC Event Contacts Producer Charlotte Pedersen C.Pedersen@canadianinstitute.com (P) x 7335 Marketing and Press Ashleigh Baker A.Baker@canadianinstitute.com (P) x 7275 Sponsorship Daniel Gellman D.Gellman@canadianinstitute.com (P) x 7389 Graeme Cowlen G.Cowlen@canadianinstitute.com (P) x 7387

3 The Format The unique format of this event is structured around a series of rotating peer-to-peer discussion tables that enable in-depth discussion and thought leadership. It avoids a traditional conference style death by PowerPoint to ensure each delegate receives an experience tailored to their current situation. Moderated by experts, participants benefit from 5 rotations featuring informal, dynamic discussions with peers focusing on one aspect of digital transformation. These moderated discussions allow face-to-face interaction between delegates and speakers to focus on business challenges, implementation issues, and practical solution strategies. HOW DOES THE INTERACTIVE ROUNDTABLE WORK? 40 minute discussion Delegates allocated to a group Delegates rotate around discussion tables during the day Delegates are strategically divided into groups before the event, ensuring a diverse range of perspectives and experiences. Every group visits 5 tables, each featuring a different discussion topic, for a 40-minute discussion throughout the day. Each table is moderated by a public sector leader as well as an executive from a technology partner. After every 40-minute discussion, the groups rotate to the next roundtable to have a new conversation on a new topic.

4 Roundtable Discussion Summaries Many ideas and learnings were shared among delegates as they worked to come up with strategies and takeaways they could bring back to their teams. Explore some of the common themes and pain points that emerged from these roundtable discussions: SECURING SENSITIVE INFORMATION FOR CITIZENS PRIVACY & PEACE OF MIND Moderator: Gary Perkins Chief Information Security Officer (CISO), Information Security Branch Government of BC Co-Moderator: Douglas Santos Security Strategist Fortinet To set the stage, this table first spoke of cyber security in the global context, noting that cybercrime will cost the world in excess of $6 trillion annually by 2021; an increase from $400 billion in early As a response, the global spending on cybersecurity defence is projected to exceed $1 trillion over the next 5 years. During the discussions, delegates were asked to consider recent breaches such as Equifax, Deloitte, Accenture, and Uber, and were reminded that organizations do not get to choose whether they are attacked. As incidents are increasing in frequency in addition to getting more sophisticated and targeted than ever before, no organization is immune to attack. They noted that doing the basics well will only stop about 80% of the problems. As such, incidents have become a matter of when rather than if. Participants examined this shift as organizations are judged not only on their ability to prevent attacks, but detect and respond to them quickly as well. Moving from the what, delegates tried to identify the why why has the environment become one where cyber attacks are able to thrive? The group identified which of the commonly discussed challenges around security are true challenges, and decided: not enough resources (excuse) not enough funding (excuse) not enough people (excuse) can t get access to skills (fair) it s not a priority (fair) legacy applications (fair) technical debt, security debt (fair) lack of understanding of the word security (fair) Security was identified as a threshold capability, without which organizations will not be able to extract value out of other services as they won t be trusted. Citizens deserve to conduct their online transactions knowing the information entrusted to governments is secure. By setting a solid foundation of enterprise-wide security, it makes it possible to promote Cloud usage, mobile devices, mobile employees, Internet of Things all of which improve efficiency and help with cost savings.

5 In terms of solutions, participants looked to the possibilities of blockchain and hyper ledger to help with things like identity access management, and enabling citizens to be in control of their data. Another suggestion was to resist the urge to capture more information than is required. It was concluded that security is not just an IT problem, but a business enterprise risk issue. As such, security should be a top issue of concern for executives and Boards of Directors globally, as it is an enabler to the business. Executive (and policy) support is key to the success of any organization s security, and ultimately, ability to adopt new technology and stay relevant. Looking ahead to next steps and takeaways, the group was asked to think about the key pillars of security and identify what they should be focusing on for a defensible security posture within their organization. In addition to the pillars discussed throughout the roundtable conversation, what would their fourth pillar be? Defense Security Posture Mitigates Risk to an Acceptable Level to Prevent, Detect, and Respond to Attacks Education Legislation Technology? Identity? Trust? Engagement? Communication? Collaboration? People? OPEN AND ANALYTIC GOVERNMENT DATA: PUTTING DATA TO USE Moderator: Mélanie Robert Executive Director, Service and Open Government Treasury Board of Canada Secretariat The purpose of this discussion was to define what open data is, and what the benefits & outcomes of using it within government can look like. Full summary unavailable at this time.

6 ENGAGING THE DIGITAL CITIZEN Moderator: Tanya Twynstra Director, Citizen Engagement BC Government Communications and Public Engagement Co-Moderator: Brent Kennedy Account Manager, Public Sector Western Canada Adobe The purpose of this discussion was to explore how to keep up with rising expectations of tech-savvy citizens, and deliver services as painlessly and seamlessly as the private sector. Full summary unavailable at this time. UTILIZING PUBLIC CLOUD MODELS TO THEIR FULL POTENTIAL Moderator: Stephen Gordon Executive Director, Corporate Software Branch & Cloud Strategy Lead Office of the Chief Information Officer (OCIO), Ministry of Citizens Services, Government of BC Co-Moderator: David Lurie Senior Account Manager, Public Sector Government, Amazon Web Services Cloud Computing has certainly received more serious consideration from governments in the latter half of this decade, as it offers the opportunity to streamline inefficient technology, cut waste, and deliver services quicker. Despite these benefits, it can remain daunting to address the challenges around Cloud deployment in governments. The group discussions focused on three topics: people, privacy compliance, and value propositions. During the roundtable conversations, the discussion leaders noted that there is significant work ahead on the people side, for any organization considering moving forward with enterprise adoption of Cloud. In particular, many people are still wrapping their heads around the impact to their job roles. Compliance (security and privacy) also remains a hot-topic with considerable variation of understanding of how Cloud, whether private or public, meets compliance requirements. There is certainly an educational and change management piece that needs to be hammered down leading up to the adoption of this technology. Beyond compliance and change-management, value proposition was also a strong topic of interest during the discussions. Delegates were curious to learn more about actual examples in which Cloud was used, and the impacts it had. As such, sharing use-cases that speak to past cost savings and business capabilities enabled by Cloud would go a long way in helping people understand why Cloud is compelling, and also why it isn t always the answer. This educational piece is important to understanding why Cloud is (or isn t) a fit to address your organization s challenges. Throughout the roundtable rotations, a disconnect emerged between Cloud services perceptions and facts. For governments to be able to take advantage of what Cloud offers, it is essential that those at the forefront of negotiating for Cloud services, and those already using Cloud services, collaborate and share information with their colleagues and other organizations to show real-world impacts that Cloud services can have on government processes and services.

7 BUILDING THE AGILE NATION IN PUBLIC SECTOR Speaker: Evan Leybourn Senior ICT Executive, Business Transformation Leader & Author (Formerly Business Intelligence Transformation Program Agile Lead, Department of Immigration and Citizenship, Australian Government) Comparing conversations to those had in Asia-Pacific regions where the discussion leader is from, the level of discourse was quite innovative and forward-thinking for most of the Canadian teams. The conversations explored 4 key challenges relating to Agile adoption: Theory of Constraints The groups looked at how the biggest limitation to government organisations achieving agility isn t the IT teams. In fact, there are diminishing returns on the investment in this space because the leadership, governance, HR or finance are the biggest constraints. As the discussion leader noted in one of his articles on the topic, An organisation can only be as agile as its least agile division! Governance Participants explored the different types of governance (approval vs audit) and the fact that most government organisations do not have a clear understanding of risk management. Therefore, they take the hardest governance approach (approval) which includes stopping all work before deciding to continue. This causes significant delays and inefficiencies compared to the audit approach where work is allowed to proceed, but there is a feedback loop to ensure the right work is being done. Journey Thinking Delegates discussed the different models that organisations are using to align their work with customer journeys and experience rather than internal processes. Participants looked at the benefits of that approach and a few tips of how to get started (empathy mapping, journey mapping, user centric design and design thinking). The group looked at use-cases, such as The Development Bank of Singapore s journey approach, to dig deeper on the topic of successful journey thinking. #NoProjects Finally, the group discussions concluded with the exploration of different ways of funding and approaching work. The fact that project thinking is by nature temporary, as is analyzed in this article, means that continuous improvement becomes less of a possibility and certainly more costly. Addressing IT needs using project thinking can cause loss of knowledge, can be expensive, and responds only to a static need. Additionally, project thinking does not result in the predictability that executives are looking for when it comes to continuous improvement and change. As such, the group talked about the continuous improvement culture that has emerged around the world and how they can structure their work accordingly.

8 CI Attendee Feedback I met a lot of interesting people who I will stay in touch with so the networking component was great as usual. Sara Bergquist Online Communications Manager Government of Yukon The speakers were great and the round tables were very informative. Guy Landry Service Design Analyst Ministry of Justice, Province of BC The range of speakers brought a good balance of topics within an overall framework. The real world examples and experiences resonated with the direction that our organization is going and has practical discussion areas for further research within out organization. Gordon McLean Client Business Manager Ministry of Finance, Province of BC

9 Attendees TITLE Executive Director, Strategic Projects Director, ITS Service Delivery Program Manager, IT Director, Information Security & Privacy Executive Director, People & Workplace Strategies Director, Business Intelligence Project Director Director, Security Privacy & Compliance Director, Strategic Initiatives Information Management Technology Director, Information Management & Architecture Senior Economist Director, Digital Systems Executive Director, Corporate Software & Cloud Strategy Lead Director, Organizational Effectiveness Director, Information Technology Director, Operation Analysis Director, Records & Information Management Manager, Business Intelligence Research & Analytics Director, IT Services Branch & CSO VP, Transformation Information Services Manager, Client Business Privacy & Information Security Officer Founder General Manager, Corporate Services Manager, IT Chair President Director, Corporate Planning & Event Leader DEPARTMENT Attorney General & Public Safety Sector BC Assessment BC Housing Management Commission BC Justice Sector BC Ministry of Advanced Education BC Ministry of Advanced Education Skills & Training BC Ministry of Attorney General BC Ministry of Citizens Services BC Ministry of Environment BC Ministry of Finance BC Ministry of Forest Lands Natural Resource Operations & Rural Development BC Ministry of Justice BC Ministry of Technology Innovation & Citizens Services BC Ministry of Technology Innovation and Citizens Society BC Oil & Gas Commission BC Oil & Gas Commission BC Oil & Gas Commission BC Oil & Gas Commission BC Pension Corp BC Pension Corporation BC Public Service Ministry of Finance BC Public Service Ministry of Finance Business Agility Institute Comox Valley Regional District Cowichan Valley Regional District Digital Hamilton Task Force Digital ID & Authentication Council of Canada Elections BC

10 TITLE Senior Programmer Analyst Director, Citizen Engagement Manager, Online Communications Chief Information & Technology Officer Service Design Analyst Director Business Application Analyst Business Application Analyst Manager, Business Innovation Analyst, Security & Privacy Director, Information Management Security & Privacy Director, Communications & Engagement Executive Director Learning & Development Strategist Natural Resources Transformation Secretariat Team Lead, Change Management Lead, Cloud Strategy Engagement Assistant Auditor General Chief Information Security Officer Chief Strategist Manager, Program Planning & Implementation Manager, Information Management & Privacy Chief Information Officer Chief Information Officer Director, Corporate Administration Executive Director, Service & Open Government DEPARTMENT Elections BC Government Communications & Public Engagement Government of Yukon ICBC Ministry of Attorney General BC Ministry of Children & Family Development Ministry of Children and Family Development Ministry of Children and Family Development Ministry of Children and Family Development Ministry of Transportation & Infrastructure Ministry of Transportation & Infrastructure Natural Resource Transformation Secretariat Natural Resource Transformation Secretariat Natural Resource Transformation Secretariat Natural Resource Transformation Secretariat Natural Resource Transformation Secretariat OCIO Ministry of Citizens Services Office of the Auditor General BC Office of the Chief Information Officer Open Innovation Environment and Climate Change Canada Province of BC Province of British Columbia Simon Fraser University The Representative for Children & Youth Township of Langley Treasury Board of Canada Secretariat

GovConnect Ontario Event Snapshot. Date. Location website website. Building a Digital Platform to Better Serve Citizens

GovConnect Ontario Event Snapshot. Date. Location website website. Building a Digital Platform to Better Serve Citizens 2017 Event Snapshot Date Location 2017 website May 9, 2017 One King West Hotel & Residence Toronto, Ontario, Canada https://www.canadianinstitute.com/govconnect-ontario/ 2018 website https://www.canadianinstitute.com/3rd-govconnect-ontario/

More information

Cybersecurity. Securely enabling transformation and change

Cybersecurity. Securely enabling transformation and change Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why

More information

Architecture and Standards Development Lifecycle

Architecture and Standards Development Lifecycle Architecture and Standards Development Lifecycle Architecture and Standards Branch Author: Architecture and Standards Branch Date Created: April 2, 2008 Last Update: July 22, 2008 Version: 1.0 ~ This Page

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b) AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft

More information

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.

More information

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions IDC FutureScape: Worldwide Security Products and Services 2017 Predictions Sean Pike, Program Vice President, Robert Ayoub, Research Director IDC Web Conference December, 7, 2016 Logistics Submit any questions

More information

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution

More information

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017 State Governments at Risk: State CIOs and Cybersecurity CSG Cybersecurity and Privacy Policy Academy November 2, 2017 About NASCIO National association representing state chief information officers and

More information

Track 1 // Collaboration & Partnerships

Track 1 // Collaboration & Partnerships Track 1 // Collaboration & Partnerships 1.1 Designate Single Point of Contact to serve as an consistent entry point for companies seeking to deploy in San Francisco. There is often a lack of trust and

More information

DELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS

DELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS DELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS Building digital trust and cyber security resilience is no longer just an IT issue, it s a business mandate. Fusion brings a simplified approach to our client

More information

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment

More information

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on

More information

Webinars INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America

Webinars INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America Webinars INSPIRING A SAFE AND SECURE CYBER WORLD 2018 Media Kit - North America 1 THE (ISC) 2 SECURE WEBINARS (ISC) 2 Secure Webinars are a proven method of reaching high-level IT security executives in

More information

Security in Today s Insecure World for SecureTokyo

Security in Today s Insecure World for SecureTokyo Security in Today s Insecure World for SecureTokyo David Shearer (ISC) 2 Chief Executive Officer dshearer@isc2.org www.isc2.org I m Influenced by a Mission Driven Background U.S. Maritime Transportation

More information

WEBINARS INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America

WEBINARS INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America INSPIRING A SAFE AND SECURE CYBER WORLD 2019 Media Kit - North America THE (ISC) 2 (ISC) 2 Webinars are a proven method of reaching high-level IT security executives in an intimate setting. Members advance

More information

5 Challenges to Government IT Modernization: In Brief. Quick tips & facts about IT modernization across federal, state and local governments

5 Challenges to Government IT Modernization: In Brief. Quick tips & facts about IT modernization across federal, state and local governments 5 Challenges to Government IT Modernization: In Brief Quick tips & facts about IT modernization across federal, state and local governments Executive Summary Information technology (IT) modernization can

More information

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill

More information

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES Introductions Agenda Overall data risk and benefit landscape / shifting risk and opportunity landscape and market expectations Looking at data

More information

How Your Organization Can Drive Success in the Age of Digital Disruption

How Your Organization Can Drive Success in the Age of Digital Disruption How Your Organization Can Drive Success in the Age of Digital Disruption Produced by How Your Organization Can Drive Success in the Age of Digital Disruption Digital success isn t just about technology,

More information

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Shifting budgets and responsibilities require IT and physical security teams to consider fundamental change in day-to-day

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Leading the Digital Transformation from the Centre of Government

Leading the Digital Transformation from the Centre of Government 37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00

More information

Securing Your Digital Transformation

Securing Your Digital Transformation Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,

More information

IT Risk & Compliance Federal

IT Risk & Compliance Federal Dell UnisysSoftware Modernization Revolution Survey IT Risk & Compliance Federal Summary Report PulsePoll Results September 2017 JULY 10, 2014 RESPONDENT CLASSIFICATIONS 2 Current Employer From June 19,

More information

SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG

SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG THE WORLD S LEADING CYBERSECURITY AND IT SECURITY PROFESSIONAL ORGANIZATION How to face the immense

More information

Sales Presentation Case 2018 Dell EMC

Sales Presentation Case 2018 Dell EMC Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations

More information

Managing complexity and rapid change in 2019

Managing complexity and rapid change in 2019 2019 Predictions Managing complexity and rapid change in 2019 No-one has a crystal ball, but here at NTT Security we ve worked with our security experts around the world to identify trends that affect

More information

Defensible Security DefSec 101

Defensible Security DefSec 101 Defensible Security DefSec 101 Security Day November 2017 Information Security Branch Paul Falohun Senior Security Analyst Dan Lathigee Senior Project Manager Content 1 Introduction 2 DefSec for PSO 3

More information

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION 9 th ANNUAL A select group of C-suite panelists and key stakeholders will engage participants in dynamic discussion and debate about the transformational change taking place in today s energy industry.

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

ACTIONABLE SECURITY AWARENESS: CONVERT THE WEAKEST LINK INTO THE SAFETY FORCE

ACTIONABLE SECURITY AWARENESS: CONVERT THE WEAKEST LINK INTO THE SAFETY FORCE ACTIONABLE SECURITY AWARENESS: CONVERT THE WEAKEST LINK INTO THE SAFETY FORCE Cybersecurity Awareness by gamification: Kaspersky CyberSafety Training 2017 Kaspersky Lab. All rights reserved. 1 HUMAN MISTAKES

More information

Your Challenge. Our Priority.

Your Challenge. Our Priority. Your Challenge. Our Priority. Building trust and Confidence. When Federal managers and military leaders face tough challenges in cyber, data collection & analytics, enterprise IT or systems and software

More information

THE POWER OF TECH-SAVVY BOARDS:

THE POWER OF TECH-SAVVY BOARDS: THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES

More information

How Cisco IT Improved Development Processes with a New Operating Model

How Cisco IT Improved Development Processes with a New Operating Model How Cisco IT Improved Development Processes with a New Operating Model New way to manage IT investments supports innovation, improved architecture, and stronger process standards for Cisco IT By Patrick

More information

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES DIGITAL TRANSFORMATION IN FINANCIAL SERVICES Global Priorities, Progress, and Obstacles Insights from business and IT executives at financial services institutions worldwide reveal that while digital transformation

More information

PEOPLE INNOVATION CAPITAL INFRASTRUCTURE AGILITY. New Brunswick Growth Opportunity. Cybersecurity

PEOPLE INNOVATION CAPITAL INFRASTRUCTURE AGILITY. New Brunswick Growth Opportunity. Cybersecurity PEOPLE INNOVATION CAPITAL INFRASTRUCTURE AGILITY New Brunswick Growth Opportunity New Brunswick Growth Opportunity Province of New Brunswick PO 6000, Fredericton NB E3B 5H1 Canada ISBN 978-1-4605-1669-0

More information

INTELLIGENCE DRIVEN GRC FOR SECURITY

INTELLIGENCE DRIVEN GRC FOR SECURITY INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to

More information

Cyber Security: Threat and Prevention

Cyber Security: Threat and Prevention Expand Your Horizons Webinar Series Cyber Security: Threat and Prevention February 24, 2015 1:00 1:45pm The Webinar will begin shortly. You can ask a question in the box on the right hand side. We will

More information

Government IT Modernization and the Adoption of Hybrid Cloud

Government IT Modernization and the Adoption of Hybrid Cloud Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments

More information

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018 Transformation in Technology Barbara Duck Chief Information Officer Investor Day 2018 Key Takeaways 1Transformation in Technology driving out cost, supporting a more technologyenabled business Our new

More information

the steps that IS Services should take to ensure that this document is aligned with the SNH s KIMS and SNH s Change Requirement;

the steps that IS Services should take to ensure that this document is aligned with the SNH s KIMS and SNH s Change Requirement; Shaping the Future of IS and ICT in SNH: 2014-2019 SNH s IS/ICT Vision We will develop the ICT infrastructure to support the business needs of our customers. Our ICT infrastructure and IS/GIS solutions

More information

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE SESSION ID: SBX4W5 SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE Dara Such VP & Publisher, Security Networking and IoT TechTarget @darasuch What we ll cover today State of SecOps:

More information

Risk Advisory Academy Training Brochure

Risk Advisory Academy Training Brochure Academy Brochure 2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

Update on the Government of Canada s Information Technology Transformation Plan

Update on the Government of Canada s Information Technology Transformation Plan Update on the Government of Canada s Information Technology Transformation Plan Presentation to the Information Technology Infrastructure Roundtable June 27, 2016 Peter Bruce, Senior Assistant Deputy Minister,

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

Building a Resilient Security Posture for Effective Breach Prevention

Building a Resilient Security Posture for Effective Breach Prevention SESSION ID: GPS-F03B Building a Resilient Security Posture for Effective Breach Prevention Avinash Prasad Head Managed Security Services, Tata Communications Agenda for discussion 1. Security Posture 2.

More information

13967/16 MK/mj 1 DG D 2B

13967/16 MK/mj 1 DG D 2B Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:

More information

Defensible and Beyond

Defensible and Beyond TELUS Defensible and Beyond Mike Vamvakaris Director and Head of Cyber Security Consulting November 2017 Digital transformation brings many benefits Communication and Collaboration Autonomous and Artificial

More information

Cybersecurity & Digital Privacy in the Energy sector

Cybersecurity & Digital Privacy in the Energy sector ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European

More information

Public Sector Cyber Security Series

Public Sector Cyber Security Series 2018 Staying ahead of evolving threats Public Sector Cyber Security Series program Sydney 10 th September Melbourne 11 th September Canberra 12 th September Brisbane 19 th September Wellington 20 th September

More information

Build confidence in the cloud Best practice frameworks for cloud security

Build confidence in the cloud Best practice frameworks for cloud security Build confidence in the cloud Best practice frameworks for cloud security Cloud services are rapidly growing and becoming more of a focus for business. It s predicted that more than $1 trillion in IT spending

More information

Information Security and Cyber Security

Information Security and Cyber Security Information Security and Cyber Security Policy NEC recognizes that it is our duty to protect the information assets entrusted to us by our customers and business partners as well as our own information

More information

Bundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved. FlyntGroup.

Bundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved. FlyntGroup. Bundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved FlyntGroup.com Flynt Group White Paper Bundling Arrows: Making a Business

More information

The Mission of the Abu Dhabi Smart Solutions and Services Authority. Leading ADSSSA. By Michael J. Keegan

The Mission of the Abu Dhabi Smart Solutions and Services Authority. Leading ADSSSA. By Michael J. Keegan Perspective on Digital Transformation in Government with Her Excellency Dr. Rauda Al Saadi, Director General, Abu Dhabi Smart Solutions and Services Authority By Michael J. Keegan Today s digital economy

More information

STRATEGIC PLAN

STRATEGIC PLAN STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology

More information

BRING EXPERT TRAINING TO YOUR WORKPLACE.

BRING EXPERT TRAINING TO YOUR WORKPLACE. BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique

More information

HOW BUSINESS FUNCTIONS ARE DRIVING PUBLIC CLOUD ADOPTION ACROSS THE TECHNOLOGY, MEDIA & ENTERTAINMENT INDUSTRY

HOW BUSINESS FUNCTIONS ARE DRIVING PUBLIC CLOUD ADOPTION ACROSS THE TECHNOLOGY, MEDIA & ENTERTAINMENT INDUSTRY HOW BUSINESS FUNCTIONS ARE DRIVING PUBLIC CLOUD ADOPTION ACROSS THE TECHNOLOGY, MEDIA & ENTERTAINMENT INDUSTRY Telecoms, Media & Entertainment Industry Report Contents 2 4 6 Executive Summary Context for

More information

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016 Data Protection Practical Strategies for Getting it Right Jamie Ross Data Security Day June 8, 2016 Agenda 1) Data protection key drivers and the need for an integrated approach 2) Common challenges data

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

Protecting information across government

Protecting information across government Report by the Comptroller and Auditor General Cabinet Office Protecting information across government HC 625 SESSION 2016-17 14 SEPTEMBER 2016 4 Key facts Protecting information across government Key facts

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

Cyber Resilience: Developing a Shared Culture. Sponsor Guide

Cyber Resilience: Developing a Shared Culture. Sponsor Guide Lead : Cyber Resilience: Developing a Shared Culture Guide ISfL Annual Cyber Security Conference This ISfL Conference has been made possible by the exhibitors who kindly sponsored the event. Please show

More information

POSITION DESCRIPTION

POSITION DESCRIPTION POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose

More information

Leadership and Innovation to Every Building Greener THREE-YEAR STRATEGIC DIRECTION TO 2019

Leadership and Innovation to Every Building Greener THREE-YEAR STRATEGIC DIRECTION TO 2019 Leadership and Innovation to Every Building Greener THREE-YEAR STRATEGIC DIRECTION - 2017 TO 2019 TELUS Garden Office Tower- LEED Platinum Leadership and Innovation to Make Every Building Greener outlines

More information

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee

More information

Public Sector Cyber Security Series

Public Sector Cyber Security Series 2019 program Public Sector Cyber Security Series Enabling Business Outcomes with Risk-Based Security TORONTO May 2 nd Ottawa May 3 rd Victoria May 6 th Edmonton May 8 th 01 / introduction What to expect

More information

TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING

TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING In 2014, West Midlands Police (WMP) committed to a striking transformation programme that would help the force meet current and future policing

More information

January 25, Digital Governments. From KPMG s Harvey Nash survey to a future of opportunities

January 25, Digital Governments. From KPMG s Harvey Nash survey to a future of opportunities January 25, 2018 Digital Governments From KPMG s Harvey Nash survey to a future of opportunities About the Survey 4,500 Responses 2 Decades $1-3trn IT budget 86 Countries 118 Government agencies 2 Digital

More information

Cyber Security 2018: Building Resilience Now and For the Future Mar 1 2, 2018 Ottawa

Cyber Security 2018: Building Resilience Now and For the Future Mar 1 2, 2018 Ottawa Agenda and Speakers Cyber Security 2018: Building Resilience Now and For the Future Mar 1 2, 2018 Ottawa Thursday, March 01, 2018 7:30 am Registration and Continental Breakfast 8:00 am Opening Remarks

More information

Accelerating Cloud Adoption

Accelerating Cloud Adoption Accelerating Cloud Adoption Ron Stuart July 2016 Disruption Disruption is the new normal Globally interconnected, convenient and more efficient than ever before NZ Government challenge is to use disruptive

More information

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,

More information

The Information Technology Program (ITS) Contents What is Information Technology?... 2

The Information Technology Program (ITS) Contents What is Information Technology?... 2 The Information Technology Program (ITS) Contents What is Information Technology?... 2 Program Objectives... 2 ITS Program Major... 3 Web Design & Development Sequence... 3 The Senior Sequence... 3 ITS

More information

Certified Business Analysis Professional (CBAP )

Certified Business Analysis Professional (CBAP ) Certified Business Analysis Professional (CBAP ) 3 Days Classroom Training PHILIPPINES :: MALAYSIA :: VIETNAM :: SINGAPORE :: INDIA Content Certified Business Analysis Professional - (CBAP ) Introduction

More information

Clarity on Cyber Security. Media conference 29 May 2018

Clarity on Cyber Security. Media conference 29 May 2018 Clarity on Cyber Security Media conference 29 May 2018 Why this study? 2 Methodology Methodology of the study Online survey consisting of 33 questions 60 participants from C-Level (CISOs, CIOs, CTOs) 26

More information

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for

More information

Cognizant Cloud Security Solution

Cognizant Cloud Security Solution CLOUD SECURITY OVERVIEW Cognizant Cloud Security Solution Transform your security operation to protect your business across public and hybrid cloud environments. December 2017 The advantages of moving

More information

MNsure Privacy Program Strategic Plan FY

MNsure Privacy Program Strategic Plan FY MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term

More information

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate. Position Description Engagement Manager Business unit: Position purpose: Direct reports: Directorate overview: Business Unit Overview Remuneration indicator: Outreach & Engagement Information Assurance

More information

Manager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre

Manager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre IDENTIFICATION Department Position Title Infrastructure Manager, Infrastructure Services Position Number Community Division/Region 32-11488 Yellowknife Technology Service Centre PURPOSE OF THE POSITION

More information

Partnership Information

Partnership Information SECOND INTERNATIONAL CONFERENCE ON ISO 31000 STANDARD USING ISO 31000 RISK MANAGEMENT STANDARD TO ACHIEVE OPTIMAL PERFORMANCE Conference Date: 28-29 May 2013 Master Classes Date: 30-31 May 2013 Location:

More information

Preparing your network for the next wave of innovation

Preparing your network for the next wave of innovation Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

Cloud for Government: A Transformative Digital Tool to Better Serve Communities Cloud for Government: A Transformative Digital Tool to Better Serve Communities 1 005181004 From state to local agencies, government organizations crave access to the same cloud-based tools enabling digital

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

The Government IT Profession: Embedding IT Professionalism in Your Organisation

The Government IT Profession: Embedding IT Professionalism in Your Organisation Government IT Profession The Government IT Profession: Embedding IT Professionalism in Your Organisation Anne-Marie Grafton Implementation Manager Government IT Profession Team 020 7276 3462 / 07909 893369

More information

Cisco Start. IT solutions designed to propel your business

Cisco Start. IT solutions designed to propel your business Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

CHAIR AND MEMBERS CIVIC WORKS COMMITTEE MEETING ON NOVEMBER 29, 2016

CHAIR AND MEMBERS CIVIC WORKS COMMITTEE MEETING ON NOVEMBER 29, 2016 TO: FROM: SUBJECT: CHAIR AND MEMBERS CIVIC WORKS COMMITTEE MEETING ON NOVEMBER 29, 2016 KELLY SCHERR, P.ENG., MBA, FEC MANAGING DIRECTOR ENVIRONMENTAL & ENGINEERING SERVICES AND CITY ENGINEER SHIFT RAPID

More information

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB 2 OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB In today s digital world, safeguarding data, intellectual property, financial

More information

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation Think Cloud Compliance Case Study Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation Customer details : Collector Bank - Sweden 329 employees www.collector.se/en Banking

More information

SELLING YOUR ORGANIZATION ON APPLICATION SECURITY. Navigating a new era of cyberthreats

SELLING YOUR ORGANIZATION ON APPLICATION SECURITY. Navigating a new era of cyberthreats SELLING YOUR ORGANIZATION ON APPLICATION SECURITY Navigating a new era of cyberthreats Selling Your Organization on Application Security 01 It's no secret that cyberattacks place organizations large and

More information

TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark

TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark Stone Texas A&M University System Moderator Anh Selissen

More information

Security Director - VisionFund International

Security Director - VisionFund International Security Director - VisionFund International Location: [Europe & the Middle East] [United Kingdom] Category: Security Job Type: Open-ended, Full-time *Preferred location: United Kingdom/Eastern Time Zone

More information

Legal and Regulatory Developments for Privacy and Security

Legal and Regulatory Developments for Privacy and Security Legal and Regulatory Developments for Privacy and Security Rodney Petersen Government Relations Officer and Director of EDUCAUSE Cybersecurity Initiative Overview Context for Federal Policy Policy Directions

More information

29-31 OCTOBER cyberethicaldays.com THE BEST WAY TO PROMOTE YOUR CYBER SECURITY SOLUTIONS IN EUROPE

29-31 OCTOBER cyberethicaldays.com THE BEST WAY TO PROMOTE YOUR CYBER SECURITY SOLUTIONS IN EUROPE 29-31 OCTOBER 2019 cyberethicaldays.com THE BEST WAY TO PROMOTE YOUR CYBER SECURITY SOLUTIONS IN EUROPE CYBERSECURITY AND ETHICAL HACKING CONGRESS The Barcelona Cyber Ethical Days Congress will be the

More information

Supporting the Cloud Transformation of Agencies across the Public Sector

Supporting the Cloud Transformation of Agencies across the Public Sector SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter

More information