Communities
Communities
Toggle communities dropdown
All Communities
General Discussion
Cyber Security & Risk Management
Data & Analytics
Digital Government & CX
Education & Future of Learning
Health & Human Services
Local Government & Communities
National Security & Public Safety
Operational & Process Excellence
People & Culture
Smart Cities & Mobility
Technology & Transformation
Events
Upcoming Events
Past Event Highlights
Event Management Services
Sponsorship
Academy
Overview
Courses
Insights
Marketplace
Join now
Login
Menu
Learn
Upskill
Connect
Attend
Solve
Join
Become a member
Insights
Access quality content from global government thought leaders
Search text
Members-only
Public
Reset
Most Recent
Most Popular
Content Type
---------
Fundamentals
Industry Trends
Interviews
Benchmark
Case Studies
Deep Dive
Guides
On Demand
Whitepapers & Reports
Region
Select region...
Australia
Canada
New Zealand
United Kingdom
United States
Communities
Cyber Security & Risk Management
Data & Analytics
Digital Government & CX
Education & Future of Learning
General
Health & Human Services
Local Government & Communities
National Security & Public Safety
Operational & Process Excellence
People & Culture
Smart Cities & Mobility
Technology & Transformation
Cyber Security & Risk Management
NDIA's Tips on sharing a Relatable Cyber Story
In an increasingly volatile cyber landscape, one of the biggest challenges facing security leaders is communicating risk and raising cyber awareness across an organisation. In order to increase resilience and maintain good cyber hygiene, it is necessary to convey the need for cyber securi…
Local Government & Communities
Local Government & Municipalities Executive Sessions 2021
In a post-COVID world, most councils are working on a recovery strategy to survive, revive and thrive, with digital transformation at its core. Achieving whole-of-council digital transformation is a key challenge, as it is more than just technology implementation.
Operational & Process Excellence
Reimagining Business Processes to Enable the Evolving Government
“The concept of eInvoicing is actually the digital exchange of invoice information between a buyer’s and a supplier’s accounting systems, with the eInvoice automatically showing up as a bill to be paid in the accounting software. This removes the need for manual data entry, making the whole process faster, more efficient, more accurate, and more secure.” While eInvoicing has been around for a while, there are two main drivers for the current push towards greater adoption of the practice. The first is to “create an open market that enables all businesses, especially small and medium enterprises, to participate in digital …
Local Government & Communities
Using Technology to meet your Customer Needs
“To improve our customer service, we needed to make the customer experience frictionless and take the unnecessary contact out of the journey, we needed to understand our touchpoints, we needed to deliver 24/7 self-service solutions, we needed to have an unrelenting focus on continuous improvement and to embrace digital transformation, and we need to automate absolutely everything.” Jeffrey Griffith, Deputy General Manager, Devonport City Council Being on the front foot meant that Devonport looked at all their processes and decided to digitise. In terms of the touchpoints at Devonport council, “we have our reception, social media, telephone, email, and our …
Local Government & Communities
Procurement and Contract Management for Councils
A transformative process was required because a number of challenges and opportunities were identified with regards to procurement and contract management. Previously, purchasing was done from a “tactical rather than a strategic framework.” Also, although there are commercial expectations, these are hard to enforce given that there are “very rigid government policies, acts and legislations as well as probity requirements.” There are also increasing “community expectations which can drive decision making, and the definition of value means different things to different branches,” especially for minority groups. At the same time, the council is committed to being sustainable and innovative, “so …
Digital Government & CX
#GovInnovator Q&A: Deshard Stevens, CISO, NYC Commission on Human Rights
Deshard Stevens is a Chief Information Security Officer (CISO) with over 12 years of experience managing, developing, and implementing business strategies and technical solutions while leading and managing project development, cloud strategy, and information technology teams. Deshard was the recipient of the 2018 Rising Star Award from the New York City Public Sector CIO Academy. He is certified as a Project Management Professional (PMP), Certified in Risk and Information System Control (CRISC), Certified Data Privacy Solutions Engineer (CDPSE), and holds a Master of Business Administration. In his free time, Deshard is an avid runner. I am currently the Chief Information …
Cyber Security & Risk Management
Illuminating Tips on Risk Management
To illustrate the importance of cyber risk management, “let us to look at the fictional case study of a small business.” It might be fictional in that this particular business does not exist, but all the components of the case study are real and based in reality. The business is run by two entrepreneurs “who have a passion to move forward, producing beautiful and functional shoes.” They have been in business for a decade, with a “strong community of customers and they have wonderful relationships with their suppliers, their artists and producers.” As entrepreneurs, the two partners are always looking …
Cyber Security & Risk Management
Case Study Highlights : Cyber Incident Response Strategy
Apart from just providing forecasts, the BOM also “supports flood activity, cyclones, fires and all other critical weather related activities.” In many ways, “we’re primarily a data organisation, and we support a lot of critical infrastructure as well.” As such, “our data is extremely important,” and this was proven in drastic ways when “we had a major cybersecurity attack in 2016.” It is unclear exactly who was responsible, but the attack was conducted with the use of remote malicious software aimed at mining data about “who we communicate with, but also who our customers and partners are. This set the …
«
First
‹
Previous
…
93
94
95
96
97
98
99
100
101
…
Next
›
Last
»
Recommendations
Hybrid Multicloud going Mainstream: The Most Common Use Cases
Guides
2 Feb 2024
Humanizing Generative AI for a User-Centric Future
Industry Trends
8 Mar 2024
How to Stay Cyber Secure - It's Not Just About Technology
Industry Trends
28 Feb 2024
Accelerating Adoption of Data Science and Modern Data Tools within California
On Demand
15 Apr 2024
Maintaining the Human Element in Digital Government
Interviews
8 Apr 2024