Cyber risk (3/5) – Taking advantage of external resource Report | 29 January, 20253 March, 2019 Cyber risk (3/5) – Taking advantage of external resource
Cyber risk (2/5) – People, teams and cyber roles Report | 29 January, 20252 March, 2019 Cyber risk (2/5) – People, teams and cyber roles
Cyber risk (1/5) – The local government context Report | 29 January, 20251 March, 2019 Cyber risk (1/5) – The local government context
Cyber risk (overview) – The challenge for local government Report | 29 January, 202528 February, 2019 Cyber risk (overview) – The challenge for local government
Leadership, diversity and skills: Preparing tomorrow’s digital leaders Briefing | 1 February, 20257 February, 2019 Leadership, diversity and skills: Preparing tomorrow’s digital leaders
Creating a culture of digital accessibility Briefing | 29 January, 202531 January, 2019 Creating a culture of digital accessibility
Technology trends for the public sector 2019 Briefing | 30 January, 202522 January, 2019 Technology trends for the public sector 2019
Data Protection Impact Assessments (DPIAs) Briefing | 24 January, 202520 July, 2018 Data Protection Impact Assessments (DPIAs)
ICT Shared Services (9/9) – Final word: shared services, the new currency Guide | 29 January, 202518 May, 2018 ICT Shared Services (9/9) – Final word: shared services, the new currency
ICT Shared Services (8/9) – Reasons why shared services fail Guide | 29 January, 202517 May, 2018 ICT Shared Services (8/9) – Reasons why shared services fail