GovConnect BC Towards an Open and Citizen-Centric Public Sector
|
|
- Angelina Gordon
- 5 years ago
- Views:
Transcription
1 CI JOIN THE #GovConnect The GovConnect Network Towards an Open and Citizen-Centric Public Sector 2017 Event Snapshot Date December 5th, 2017 Location Fairmont Empress Victoria, British Columbia, Canada 2017 website website CanadianInstitute.com/GovConnect-BC a C5 Group Company Business Information in a Global Context
2 Event Overview For years, citizens have enjoyed the benefits of the consumerization of technology in the private sector. Now tech-savvy citizens are holding governments to higher expectations. Governments are feeling the pressure to adapt or risk becoming less relevant. is part of the GovConnect series and offers a unique, invitation-only format for heads of IM/ IT and policy to enable direct collaboration with peers involved in public sector transformation from across BC. Participants discussed and worked through challenges relating to the adoption and implementation of new tools, technologies, and approaches to being more citizen-centric. These conversations also included strategies around change management, leadership, and team governance. The rotating roundtable sessions allowed attendees to take advantage of direct engagement with topics at the heart of BC s public sector transformation. Excellent opportunity to meet people within provincial government working on similar projects and facing similar challenges. Also opportunity to learn from those who are ahead. Kelli Kryzanowski Director, Strategic Initiatives Ministry of Environment, Province of BC Event Contacts Producer Charlotte Pedersen C.Pedersen@canadianinstitute.com (P) x 7335 Marketing and Press Ashleigh Baker A.Baker@canadianinstitute.com (P) x 7275 Sponsorship Daniel Gellman D.Gellman@canadianinstitute.com (P) x 7389 Graeme Cowlen G.Cowlen@canadianinstitute.com (P) x 7387
3 The Format The unique format of this event is structured around a series of rotating peer-to-peer discussion tables that enable in-depth discussion and thought leadership. It avoids a traditional conference style death by PowerPoint to ensure each delegate receives an experience tailored to their current situation. Moderated by experts, participants benefit from 5 rotations featuring informal, dynamic discussions with peers focusing on one aspect of digital transformation. These moderated discussions allow face-to-face interaction between delegates and speakers to focus on business challenges, implementation issues, and practical solution strategies. HOW DOES THE INTERACTIVE ROUNDTABLE WORK? 40 minute discussion Delegates allocated to a group Delegates rotate around discussion tables during the day Delegates are strategically divided into groups before the event, ensuring a diverse range of perspectives and experiences. Every group visits 5 tables, each featuring a different discussion topic, for a 40-minute discussion throughout the day. Each table is moderated by a public sector leader as well as an executive from a technology partner. After every 40-minute discussion, the groups rotate to the next roundtable to have a new conversation on a new topic.
4 Roundtable Discussion Summaries Many ideas and learnings were shared among delegates as they worked to come up with strategies and takeaways they could bring back to their teams. Explore some of the common themes and pain points that emerged from these roundtable discussions: SECURING SENSITIVE INFORMATION FOR CITIZENS PRIVACY & PEACE OF MIND Moderator: Gary Perkins Chief Information Security Officer (CISO), Information Security Branch Government of BC Co-Moderator: Douglas Santos Security Strategist Fortinet To set the stage, this table first spoke of cyber security in the global context, noting that cybercrime will cost the world in excess of $6 trillion annually by 2021; an increase from $400 billion in early As a response, the global spending on cybersecurity defence is projected to exceed $1 trillion over the next 5 years. During the discussions, delegates were asked to consider recent breaches such as Equifax, Deloitte, Accenture, and Uber, and were reminded that organizations do not get to choose whether they are attacked. As incidents are increasing in frequency in addition to getting more sophisticated and targeted than ever before, no organization is immune to attack. They noted that doing the basics well will only stop about 80% of the problems. As such, incidents have become a matter of when rather than if. Participants examined this shift as organizations are judged not only on their ability to prevent attacks, but detect and respond to them quickly as well. Moving from the what, delegates tried to identify the why why has the environment become one where cyber attacks are able to thrive? The group identified which of the commonly discussed challenges around security are true challenges, and decided: not enough resources (excuse) not enough funding (excuse) not enough people (excuse) can t get access to skills (fair) it s not a priority (fair) legacy applications (fair) technical debt, security debt (fair) lack of understanding of the word security (fair) Security was identified as a threshold capability, without which organizations will not be able to extract value out of other services as they won t be trusted. Citizens deserve to conduct their online transactions knowing the information entrusted to governments is secure. By setting a solid foundation of enterprise-wide security, it makes it possible to promote Cloud usage, mobile devices, mobile employees, Internet of Things all of which improve efficiency and help with cost savings.
5 In terms of solutions, participants looked to the possibilities of blockchain and hyper ledger to help with things like identity access management, and enabling citizens to be in control of their data. Another suggestion was to resist the urge to capture more information than is required. It was concluded that security is not just an IT problem, but a business enterprise risk issue. As such, security should be a top issue of concern for executives and Boards of Directors globally, as it is an enabler to the business. Executive (and policy) support is key to the success of any organization s security, and ultimately, ability to adopt new technology and stay relevant. Looking ahead to next steps and takeaways, the group was asked to think about the key pillars of security and identify what they should be focusing on for a defensible security posture within their organization. In addition to the pillars discussed throughout the roundtable conversation, what would their fourth pillar be? Defense Security Posture Mitigates Risk to an Acceptable Level to Prevent, Detect, and Respond to Attacks Education Legislation Technology? Identity? Trust? Engagement? Communication? Collaboration? People? OPEN AND ANALYTIC GOVERNMENT DATA: PUTTING DATA TO USE Moderator: Mélanie Robert Executive Director, Service and Open Government Treasury Board of Canada Secretariat The purpose of this discussion was to define what open data is, and what the benefits & outcomes of using it within government can look like. Full summary unavailable at this time.
6 ENGAGING THE DIGITAL CITIZEN Moderator: Tanya Twynstra Director, Citizen Engagement BC Government Communications and Public Engagement Co-Moderator: Brent Kennedy Account Manager, Public Sector Western Canada Adobe The purpose of this discussion was to explore how to keep up with rising expectations of tech-savvy citizens, and deliver services as painlessly and seamlessly as the private sector. Full summary unavailable at this time. UTILIZING PUBLIC CLOUD MODELS TO THEIR FULL POTENTIAL Moderator: Stephen Gordon Executive Director, Corporate Software Branch & Cloud Strategy Lead Office of the Chief Information Officer (OCIO), Ministry of Citizens Services, Government of BC Co-Moderator: David Lurie Senior Account Manager, Public Sector Government, Amazon Web Services Cloud Computing has certainly received more serious consideration from governments in the latter half of this decade, as it offers the opportunity to streamline inefficient technology, cut waste, and deliver services quicker. Despite these benefits, it can remain daunting to address the challenges around Cloud deployment in governments. The group discussions focused on three topics: people, privacy compliance, and value propositions. During the roundtable conversations, the discussion leaders noted that there is significant work ahead on the people side, for any organization considering moving forward with enterprise adoption of Cloud. In particular, many people are still wrapping their heads around the impact to their job roles. Compliance (security and privacy) also remains a hot-topic with considerable variation of understanding of how Cloud, whether private or public, meets compliance requirements. There is certainly an educational and change management piece that needs to be hammered down leading up to the adoption of this technology. Beyond compliance and change-management, value proposition was also a strong topic of interest during the discussions. Delegates were curious to learn more about actual examples in which Cloud was used, and the impacts it had. As such, sharing use-cases that speak to past cost savings and business capabilities enabled by Cloud would go a long way in helping people understand why Cloud is compelling, and also why it isn t always the answer. This educational piece is important to understanding why Cloud is (or isn t) a fit to address your organization s challenges. Throughout the roundtable rotations, a disconnect emerged between Cloud services perceptions and facts. For governments to be able to take advantage of what Cloud offers, it is essential that those at the forefront of negotiating for Cloud services, and those already using Cloud services, collaborate and share information with their colleagues and other organizations to show real-world impacts that Cloud services can have on government processes and services.
7 BUILDING THE AGILE NATION IN PUBLIC SECTOR Speaker: Evan Leybourn Senior ICT Executive, Business Transformation Leader & Author (Formerly Business Intelligence Transformation Program Agile Lead, Department of Immigration and Citizenship, Australian Government) Comparing conversations to those had in Asia-Pacific regions where the discussion leader is from, the level of discourse was quite innovative and forward-thinking for most of the Canadian teams. The conversations explored 4 key challenges relating to Agile adoption: Theory of Constraints The groups looked at how the biggest limitation to government organisations achieving agility isn t the IT teams. In fact, there are diminishing returns on the investment in this space because the leadership, governance, HR or finance are the biggest constraints. As the discussion leader noted in one of his articles on the topic, An organisation can only be as agile as its least agile division! Governance Participants explored the different types of governance (approval vs audit) and the fact that most government organisations do not have a clear understanding of risk management. Therefore, they take the hardest governance approach (approval) which includes stopping all work before deciding to continue. This causes significant delays and inefficiencies compared to the audit approach where work is allowed to proceed, but there is a feedback loop to ensure the right work is being done. Journey Thinking Delegates discussed the different models that organisations are using to align their work with customer journeys and experience rather than internal processes. Participants looked at the benefits of that approach and a few tips of how to get started (empathy mapping, journey mapping, user centric design and design thinking). The group looked at use-cases, such as The Development Bank of Singapore s journey approach, to dig deeper on the topic of successful journey thinking. #NoProjects Finally, the group discussions concluded with the exploration of different ways of funding and approaching work. The fact that project thinking is by nature temporary, as is analyzed in this article, means that continuous improvement becomes less of a possibility and certainly more costly. Addressing IT needs using project thinking can cause loss of knowledge, can be expensive, and responds only to a static need. Additionally, project thinking does not result in the predictability that executives are looking for when it comes to continuous improvement and change. As such, the group talked about the continuous improvement culture that has emerged around the world and how they can structure their work accordingly.
8 CI Attendee Feedback I met a lot of interesting people who I will stay in touch with so the networking component was great as usual. Sara Bergquist Online Communications Manager Government of Yukon The speakers were great and the round tables were very informative. Guy Landry Service Design Analyst Ministry of Justice, Province of BC The range of speakers brought a good balance of topics within an overall framework. The real world examples and experiences resonated with the direction that our organization is going and has practical discussion areas for further research within out organization. Gordon McLean Client Business Manager Ministry of Finance, Province of BC
9 Attendees TITLE Executive Director, Strategic Projects Director, ITS Service Delivery Program Manager, IT Director, Information Security & Privacy Executive Director, People & Workplace Strategies Director, Business Intelligence Project Director Director, Security Privacy & Compliance Director, Strategic Initiatives Information Management Technology Director, Information Management & Architecture Senior Economist Director, Digital Systems Executive Director, Corporate Software & Cloud Strategy Lead Director, Organizational Effectiveness Director, Information Technology Director, Operation Analysis Director, Records & Information Management Manager, Business Intelligence Research & Analytics Director, IT Services Branch & CSO VP, Transformation Information Services Manager, Client Business Privacy & Information Security Officer Founder General Manager, Corporate Services Manager, IT Chair President Director, Corporate Planning & Event Leader DEPARTMENT Attorney General & Public Safety Sector BC Assessment BC Housing Management Commission BC Justice Sector BC Ministry of Advanced Education BC Ministry of Advanced Education Skills & Training BC Ministry of Attorney General BC Ministry of Citizens Services BC Ministry of Environment BC Ministry of Finance BC Ministry of Forest Lands Natural Resource Operations & Rural Development BC Ministry of Justice BC Ministry of Technology Innovation & Citizens Services BC Ministry of Technology Innovation and Citizens Society BC Oil & Gas Commission BC Oil & Gas Commission BC Oil & Gas Commission BC Oil & Gas Commission BC Pension Corp BC Pension Corporation BC Public Service Ministry of Finance BC Public Service Ministry of Finance Business Agility Institute Comox Valley Regional District Cowichan Valley Regional District Digital Hamilton Task Force Digital ID & Authentication Council of Canada Elections BC
10 TITLE Senior Programmer Analyst Director, Citizen Engagement Manager, Online Communications Chief Information & Technology Officer Service Design Analyst Director Business Application Analyst Business Application Analyst Manager, Business Innovation Analyst, Security & Privacy Director, Information Management Security & Privacy Director, Communications & Engagement Executive Director Learning & Development Strategist Natural Resources Transformation Secretariat Team Lead, Change Management Lead, Cloud Strategy Engagement Assistant Auditor General Chief Information Security Officer Chief Strategist Manager, Program Planning & Implementation Manager, Information Management & Privacy Chief Information Officer Chief Information Officer Director, Corporate Administration Executive Director, Service & Open Government DEPARTMENT Elections BC Government Communications & Public Engagement Government of Yukon ICBC Ministry of Attorney General BC Ministry of Children & Family Development Ministry of Children and Family Development Ministry of Children and Family Development Ministry of Children and Family Development Ministry of Transportation & Infrastructure Ministry of Transportation & Infrastructure Natural Resource Transformation Secretariat Natural Resource Transformation Secretariat Natural Resource Transformation Secretariat Natural Resource Transformation Secretariat Natural Resource Transformation Secretariat OCIO Ministry of Citizens Services Office of the Auditor General BC Office of the Chief Information Officer Open Innovation Environment and Climate Change Canada Province of BC Province of British Columbia Simon Fraser University The Representative for Children & Youth Township of Langley Treasury Board of Canada Secretariat
GovConnect Ontario Event Snapshot. Date. Location website website. Building a Digital Platform to Better Serve Citizens
2017 Event Snapshot Date Location 2017 website May 9, 2017 One King West Hotel & Residence Toronto, Ontario, Canada https://www.canadianinstitute.com/govconnect-ontario/ 2018 website https://www.canadianinstitute.com/3rd-govconnect-ontario/
More informationCybersecurity. Securely enabling transformation and change
Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why
More informationArchitecture and Standards Development Lifecycle
Architecture and Standards Development Lifecycle Architecture and Standards Branch Author: Architecture and Standards Branch Date Created: April 2, 2008 Last Update: July 22, 2008 Version: 1.0 ~ This Page
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More information13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)
AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft
More informationKey Findings from the Global State of Information Security Survey 2017 Indonesian Insights
www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.
More informationIDC FutureScape: Worldwide Security Products and Services 2017 Predictions
IDC FutureScape: Worldwide Security Products and Services 2017 Predictions Sean Pike, Program Vice President, Robert Ayoub, Research Director IDC Web Conference December, 7, 2016 Logistics Submit any questions
More informationCybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce
Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution
More informationState Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017
State Governments at Risk: State CIOs and Cybersecurity CSG Cybersecurity and Privacy Policy Academy November 2, 2017 About NASCIO National association representing state chief information officers and
More informationTrack 1 // Collaboration & Partnerships
Track 1 // Collaboration & Partnerships 1.1 Designate Single Point of Contact to serve as an consistent entry point for companies seeking to deploy in San Francisco. There is often a lack of trust and
More informationDELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS
DELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS Building digital trust and cyber security resilience is no longer just an IT issue, it s a business mandate. Fusion brings a simplified approach to our client
More informationBENEFITS of MEMBERSHIP FOR YOUR INSTITUTION
PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment
More informationPONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY
PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on
More informationWebinars INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America
Webinars INSPIRING A SAFE AND SECURE CYBER WORLD 2018 Media Kit - North America 1 THE (ISC) 2 SECURE WEBINARS (ISC) 2 Secure Webinars are a proven method of reaching high-level IT security executives in
More informationSecurity in Today s Insecure World for SecureTokyo
Security in Today s Insecure World for SecureTokyo David Shearer (ISC) 2 Chief Executive Officer dshearer@isc2.org www.isc2.org I m Influenced by a Mission Driven Background U.S. Maritime Transportation
More informationWEBINARS INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America
INSPIRING A SAFE AND SECURE CYBER WORLD 2019 Media Kit - North America THE (ISC) 2 (ISC) 2 Webinars are a proven method of reaching high-level IT security executives in an intimate setting. Members advance
More information5 Challenges to Government IT Modernization: In Brief. Quick tips & facts about IT modernization across federal, state and local governments
5 Challenges to Government IT Modernization: In Brief Quick tips & facts about IT modernization across federal, state and local governments Executive Summary Information technology (IT) modernization can
More informationDATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI
DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill
More informationIMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES
IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES Introductions Agenda Overall data risk and benefit landscape / shifting risk and opportunity landscape and market expectations Looking at data
More informationHow Your Organization Can Drive Success in the Age of Digital Disruption
How Your Organization Can Drive Success in the Age of Digital Disruption Produced by How Your Organization Can Drive Success in the Age of Digital Disruption Digital success isn t just about technology,
More informationFundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL
Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Shifting budgets and responsibilities require IT and physical security teams to consider fundamental change in day-to-day
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationLeading the Digital Transformation from the Centre of Government
37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00
More informationSecuring Your Digital Transformation
Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,
More informationIT Risk & Compliance Federal
Dell UnisysSoftware Modernization Revolution Survey IT Risk & Compliance Federal Summary Report PulsePoll Results September 2017 JULY 10, 2014 RESPONDENT CLASSIFICATIONS 2 Current Employer From June 19,
More informationSPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG
SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG THE WORLD S LEADING CYBERSECURITY AND IT SECURITY PROFESSIONAL ORGANIZATION How to face the immense
More informationSales Presentation Case 2018 Dell EMC
Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations
More informationManaging complexity and rapid change in 2019
2019 Predictions Managing complexity and rapid change in 2019 No-one has a crystal ball, but here at NTT Security we ve worked with our security experts around the world to identify trends that affect
More informationDefensible Security DefSec 101
Defensible Security DefSec 101 Security Day November 2017 Information Security Branch Paul Falohun Senior Security Analyst Dan Lathigee Senior Project Manager Content 1 Introduction 2 DefSec for PSO 3
More informationDynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION
9 th ANNUAL A select group of C-suite panelists and key stakeholders will engage participants in dynamic discussion and debate about the transformational change taking place in today s energy industry.
More informationMapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective
Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better
More informationENISA EU Threat Landscape
ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key
More informationACTIONABLE SECURITY AWARENESS: CONVERT THE WEAKEST LINK INTO THE SAFETY FORCE
ACTIONABLE SECURITY AWARENESS: CONVERT THE WEAKEST LINK INTO THE SAFETY FORCE Cybersecurity Awareness by gamification: Kaspersky CyberSafety Training 2017 Kaspersky Lab. All rights reserved. 1 HUMAN MISTAKES
More informationYour Challenge. Our Priority.
Your Challenge. Our Priority. Building trust and Confidence. When Federal managers and military leaders face tough challenges in cyber, data collection & analytics, enterprise IT or systems and software
More informationTHE POWER OF TECH-SAVVY BOARDS:
THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES
More informationHow Cisco IT Improved Development Processes with a New Operating Model
How Cisco IT Improved Development Processes with a New Operating Model New way to manage IT investments supports innovation, improved architecture, and stronger process standards for Cisco IT By Patrick
More informationDIGITAL TRANSFORMATION IN FINANCIAL SERVICES
DIGITAL TRANSFORMATION IN FINANCIAL SERVICES Global Priorities, Progress, and Obstacles Insights from business and IT executives at financial services institutions worldwide reveal that while digital transformation
More informationPEOPLE INNOVATION CAPITAL INFRASTRUCTURE AGILITY. New Brunswick Growth Opportunity. Cybersecurity
PEOPLE INNOVATION CAPITAL INFRASTRUCTURE AGILITY New Brunswick Growth Opportunity New Brunswick Growth Opportunity Province of New Brunswick PO 6000, Fredericton NB E3B 5H1 Canada ISBN 978-1-4605-1669-0
More informationINTELLIGENCE DRIVEN GRC FOR SECURITY
INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to
More informationCyber Security: Threat and Prevention
Expand Your Horizons Webinar Series Cyber Security: Threat and Prevention February 24, 2015 1:00 1:45pm The Webinar will begin shortly. You can ask a question in the box on the right hand side. We will
More informationGovernment IT Modernization and the Adoption of Hybrid Cloud
Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments
More informationTransformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018
Transformation in Technology Barbara Duck Chief Information Officer Investor Day 2018 Key Takeaways 1Transformation in Technology driving out cost, supporting a more technologyenabled business Our new
More informationthe steps that IS Services should take to ensure that this document is aligned with the SNH s KIMS and SNH s Change Requirement;
Shaping the Future of IS and ICT in SNH: 2014-2019 SNH s IS/ICT Vision We will develop the ICT infrastructure to support the business needs of our customers. Our ICT infrastructure and IS/GIS solutions
More informationSECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE
SESSION ID: SBX4W5 SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE Dara Such VP & Publisher, Security Networking and IoT TechTarget @darasuch What we ll cover today State of SecOps:
More informationRisk Advisory Academy Training Brochure
Academy Brochure 2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty
More informationU.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan
U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders
More informationUpdate on the Government of Canada s Information Technology Transformation Plan
Update on the Government of Canada s Information Technology Transformation Plan Presentation to the Information Technology Infrastructure Roundtable June 27, 2016 Peter Bruce, Senior Assistant Deputy Minister,
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationBuilding a Resilient Security Posture for Effective Breach Prevention
SESSION ID: GPS-F03B Building a Resilient Security Posture for Effective Breach Prevention Avinash Prasad Head Managed Security Services, Tata Communications Agenda for discussion 1. Security Posture 2.
More information13967/16 MK/mj 1 DG D 2B
Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:
More informationDefensible and Beyond
TELUS Defensible and Beyond Mike Vamvakaris Director and Head of Cyber Security Consulting November 2017 Digital transformation brings many benefits Communication and Collaboration Autonomous and Artificial
More informationCybersecurity & Digital Privacy in the Energy sector
ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European
More informationPublic Sector Cyber Security Series
2018 Staying ahead of evolving threats Public Sector Cyber Security Series program Sydney 10 th September Melbourne 11 th September Canberra 12 th September Brisbane 19 th September Wellington 20 th September
More informationBuild confidence in the cloud Best practice frameworks for cloud security
Build confidence in the cloud Best practice frameworks for cloud security Cloud services are rapidly growing and becoming more of a focus for business. It s predicted that more than $1 trillion in IT spending
More informationInformation Security and Cyber Security
Information Security and Cyber Security Policy NEC recognizes that it is our duty to protect the information assets entrusted to us by our customers and business partners as well as our own information
More informationBundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved. FlyntGroup.
Bundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved FlyntGroup.com Flynt Group White Paper Bundling Arrows: Making a Business
More informationThe Mission of the Abu Dhabi Smart Solutions and Services Authority. Leading ADSSSA. By Michael J. Keegan
Perspective on Digital Transformation in Government with Her Excellency Dr. Rauda Al Saadi, Director General, Abu Dhabi Smart Solutions and Services Authority By Michael J. Keegan Today s digital economy
More informationSTRATEGIC PLAN
STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology
More informationBRING EXPERT TRAINING TO YOUR WORKPLACE.
BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique
More informationHOW BUSINESS FUNCTIONS ARE DRIVING PUBLIC CLOUD ADOPTION ACROSS THE TECHNOLOGY, MEDIA & ENTERTAINMENT INDUSTRY
HOW BUSINESS FUNCTIONS ARE DRIVING PUBLIC CLOUD ADOPTION ACROSS THE TECHNOLOGY, MEDIA & ENTERTAINMENT INDUSTRY Telecoms, Media & Entertainment Industry Report Contents 2 4 6 Executive Summary Context for
More informationData Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016
Data Protection Practical Strategies for Getting it Right Jamie Ross Data Security Day June 8, 2016 Agenda 1) Data protection key drivers and the need for an integrated approach 2) Common challenges data
More informationA company built on security
Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for
More informationProtecting information across government
Report by the Comptroller and Auditor General Cabinet Office Protecting information across government HC 625 SESSION 2016-17 14 SEPTEMBER 2016 4 Key facts Protecting information across government Key facts
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationCyber Resilience: Developing a Shared Culture. Sponsor Guide
Lead : Cyber Resilience: Developing a Shared Culture Guide ISfL Annual Cyber Security Conference This ISfL Conference has been made possible by the exhibitors who kindly sponsored the event. Please show
More informationPOSITION DESCRIPTION
POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose
More informationLeadership and Innovation to Every Building Greener THREE-YEAR STRATEGIC DIRECTION TO 2019
Leadership and Innovation to Every Building Greener THREE-YEAR STRATEGIC DIRECTION - 2017 TO 2019 TELUS Garden Office Tower- LEED Platinum Leadership and Innovation to Make Every Building Greener outlines
More informationInstitute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI
Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee
More informationPublic Sector Cyber Security Series
2019 program Public Sector Cyber Security Series Enabling Business Outcomes with Risk-Based Security TORONTO May 2 nd Ottawa May 3 rd Victoria May 6 th Edmonton May 8 th 01 / introduction What to expect
More informationTRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING
TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING In 2014, West Midlands Police (WMP) committed to a striking transformation programme that would help the force meet current and future policing
More informationJanuary 25, Digital Governments. From KPMG s Harvey Nash survey to a future of opportunities
January 25, 2018 Digital Governments From KPMG s Harvey Nash survey to a future of opportunities About the Survey 4,500 Responses 2 Decades $1-3trn IT budget 86 Countries 118 Government agencies 2 Digital
More informationCyber Security 2018: Building Resilience Now and For the Future Mar 1 2, 2018 Ottawa
Agenda and Speakers Cyber Security 2018: Building Resilience Now and For the Future Mar 1 2, 2018 Ottawa Thursday, March 01, 2018 7:30 am Registration and Continental Breakfast 8:00 am Opening Remarks
More informationAccelerating Cloud Adoption
Accelerating Cloud Adoption Ron Stuart July 2016 Disruption Disruption is the new normal Globally interconnected, convenient and more efficient than ever before NZ Government challenge is to use disruptive
More informationISACA MOSCOW CHAPTER Chapter meeting 22 September 2016
ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,
More informationThe Information Technology Program (ITS) Contents What is Information Technology?... 2
The Information Technology Program (ITS) Contents What is Information Technology?... 2 Program Objectives... 2 ITS Program Major... 3 Web Design & Development Sequence... 3 The Senior Sequence... 3 ITS
More informationCertified Business Analysis Professional (CBAP )
Certified Business Analysis Professional (CBAP ) 3 Days Classroom Training PHILIPPINES :: MALAYSIA :: VIETNAM :: SINGAPORE :: INDIA Content Certified Business Analysis Professional - (CBAP ) Introduction
More informationClarity on Cyber Security. Media conference 29 May 2018
Clarity on Cyber Security Media conference 29 May 2018 Why this study? 2 Methodology Methodology of the study Online survey consisting of 33 questions 60 participants from C-Level (CISOs, CIOs, CTOs) 26
More informationGOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES
GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for
More informationCognizant Cloud Security Solution
CLOUD SECURITY OVERVIEW Cognizant Cloud Security Solution Transform your security operation to protect your business across public and hybrid cloud environments. December 2017 The advantages of moving
More informationMNsure Privacy Program Strategic Plan FY
MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term
More informationPosition Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.
Position Description Engagement Manager Business unit: Position purpose: Direct reports: Directorate overview: Business Unit Overview Remuneration indicator: Outreach & Engagement Information Assurance
More informationManager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre
IDENTIFICATION Department Position Title Infrastructure Manager, Infrastructure Services Position Number Community Division/Region 32-11488 Yellowknife Technology Service Centre PURPOSE OF THE POSITION
More informationPartnership Information
SECOND INTERNATIONAL CONFERENCE ON ISO 31000 STANDARD USING ISO 31000 RISK MANAGEMENT STANDARD TO ACHIEVE OPTIMAL PERFORMANCE Conference Date: 28-29 May 2013 Master Classes Date: 30-31 May 2013 Location:
More informationPreparing your network for the next wave of innovation
Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt
More informationBUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE
BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not
More informationCloud for Government: A Transformative Digital Tool to Better Serve Communities
Cloud for Government: A Transformative Digital Tool to Better Serve Communities 1 005181004 From state to local agencies, government organizations crave access to the same cloud-based tools enabling digital
More informationEUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE
EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile
More informationThe Government IT Profession: Embedding IT Professionalism in Your Organisation
Government IT Profession The Government IT Profession: Embedding IT Professionalism in Your Organisation Anne-Marie Grafton Implementation Manager Government IT Profession Team 020 7276 3462 / 07909 893369
More informationCisco Start. IT solutions designed to propel your business
Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationCOMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN
COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING
More informationCHAIR AND MEMBERS CIVIC WORKS COMMITTEE MEETING ON NOVEMBER 29, 2016
TO: FROM: SUBJECT: CHAIR AND MEMBERS CIVIC WORKS COMMITTEE MEETING ON NOVEMBER 29, 2016 KELLY SCHERR, P.ENG., MBA, FEC MANAGING DIRECTOR ENVIRONMENTAL & ENGINEERING SERVICES AND CITY ENGINEER SHIFT RAPID
More informationAwareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB
Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB 2 OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB In today s digital world, safeguarding data, intellectual property, financial
More informationSwedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation
Think Cloud Compliance Case Study Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation Customer details : Collector Bank - Sweden 329 employees www.collector.se/en Banking
More informationSELLING YOUR ORGANIZATION ON APPLICATION SECURITY. Navigating a new era of cyberthreats
SELLING YOUR ORGANIZATION ON APPLICATION SECURITY Navigating a new era of cyberthreats Selling Your Organization on Application Security 01 It's no secret that cyberattacks place organizations large and
More informationTX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark
TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark Stone Texas A&M University System Moderator Anh Selissen
More informationSecurity Director - VisionFund International
Security Director - VisionFund International Location: [Europe & the Middle East] [United Kingdom] Category: Security Job Type: Open-ended, Full-time *Preferred location: United Kingdom/Eastern Time Zone
More informationLegal and Regulatory Developments for Privacy and Security
Legal and Regulatory Developments for Privacy and Security Rodney Petersen Government Relations Officer and Director of EDUCAUSE Cybersecurity Initiative Overview Context for Federal Policy Policy Directions
More information29-31 OCTOBER cyberethicaldays.com THE BEST WAY TO PROMOTE YOUR CYBER SECURITY SOLUTIONS IN EUROPE
29-31 OCTOBER 2019 cyberethicaldays.com THE BEST WAY TO PROMOTE YOUR CYBER SECURITY SOLUTIONS IN EUROPE CYBERSECURITY AND ETHICAL HACKING CONGRESS The Barcelona Cyber Ethical Days Congress will be the
More informationSupporting the Cloud Transformation of Agencies across the Public Sector
SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter
More information