How to: buy a computer system (part 2) Briefing | 12 July, 20241 May, 2019 How to: buy a computer system (part 2)
How to: buy a computer system (part 1) Briefing | 12 July, 202430 April, 2019 How to: buy a computer system (part 1)
Cyber risk (5/5) – Cyber risk futures Report | 12 July, 20245 March, 2019 Cyber risk (5/5) – Cyber risk futures
Cyber risk (4/5) – Where to start cyber planning Report | 12 July, 20244 March, 2019 Cyber risk (4/5) – Where to start cyber planning
Cyber risk (3/5) – Taking advantage of external resource Report | 12 July, 20243 March, 2019 Cyber risk (3/5) – Taking advantage of external resource
Cyber risk (2/5) – People, teams and cyber roles Report | 12 July, 20242 March, 2019 Cyber risk (2/5) – People, teams and cyber roles
Cyber risk (1/5) – The local government context Report | 12 July, 20241 March, 2019 Cyber risk (1/5) – The local government context
Cyber risk (overview) – The challenge for local government Report | 12 July, 202428 February, 2019 Cyber risk (overview) – The challenge for local government
Technology trends for the public sector 2019 Briefing | 12 July, 202422 January, 2019 Technology trends for the public sector 2019
ICT Shared Services (9/9) – Final word: shared services, the new currency Guide | 12 July, 202418 May, 2018 ICT Shared Services (9/9) – Final word: shared services, the new currency
ICT Shared Services (8/9) – Reasons why shared services fail Guide | 12 July, 202417 May, 2018 ICT Shared Services (8/9) – Reasons why shared services fail
ICT Shared Services (7/9) – Traits of successful shared services Guide | 12 July, 202416 May, 2018 ICT Shared Services (7/9) – Traits of successful shared services