14 May 2025 EventWebinar Virtual (Teams) Vulnerability Management is the past, Exposure Management is the future
14 May 2025 EventWebinar Virtual (Teams) Vulnerability Management is the past, Exposure Management is the future
Cyber risk (overview) – The challenge for local government Report | 29 January, 202528 February, 2019 Cyber risk (overview) – The challenge for local government
Leadership, diversity and skills: Preparing tomorrow’s digital leaders Briefing | 1 February, 20257 February, 2019 Leadership, diversity and skills: Preparing tomorrow’s digital leaders
Creating a culture of digital accessibility Briefing | 29 January, 202531 January, 2019 Creating a culture of digital accessibility
Technology trends for the public sector 2019 Briefing | 30 January, 202522 January, 2019 Technology trends for the public sector 2019
Data Protection Impact Assessments (DPIAs) Briefing | 24 January, 202520 July, 2018 Data Protection Impact Assessments (DPIAs)
ICT Shared Services (9/9) – Final word: shared services, the new currency Guide | 29 January, 202518 May, 2018 ICT Shared Services (9/9) – Final word: shared services, the new currency
ICT Shared Services (8/9) – Reasons why shared services fail Guide | 29 January, 202517 May, 2018 ICT Shared Services (8/9) – Reasons why shared services fail
ICT Shared Services (7/9) – Traits of successful shared services Guide | 29 January, 202516 May, 2018 ICT Shared Services (7/9) – Traits of successful shared services
ICT Shared Services (6/9) – A review of ICT shared services Guide | 29 January, 202523 April, 2018 ICT Shared Services (6/9) – A review of ICT shared services
14 May 2025 EventWebinar Virtual (Teams) Vulnerability Management is the past, Exposure Management is the future