Cyber risk (3/5) – Taking advantage of external resource Report | 18 December, 20243 March, 2019 Cyber risk (3/5) – Taking advantage of external resource
Cyber risk (2/5) – People, teams and cyber roles Report | 18 December, 20242 March, 2019 Cyber risk (2/5) – People, teams and cyber roles
Cyber risk (1/5) – The local government context Report | 18 December, 20241 March, 2019 Cyber risk (1/5) – The local government context
Cyber risk (overview) – The challenge for local government Report | 18 December, 202428 February, 2019 Cyber risk (overview) – The challenge for local government
Technology trends for the public sector 2019 Briefing | 12 July, 202422 January, 2019 Technology trends for the public sector 2019
ICT Shared Services (9/9) – Final word: shared services, the new currency Guide | 12 July, 202418 May, 2018 ICT Shared Services (9/9) – Final word: shared services, the new currency
ICT Shared Services (8/9) – Reasons why shared services fail Guide | 12 July, 202417 May, 2018 ICT Shared Services (8/9) – Reasons why shared services fail
ICT Shared Services (7/9) – Traits of successful shared services Guide | 12 July, 202416 May, 2018 ICT Shared Services (7/9) – Traits of successful shared services
ICT Shared Services (6/9) – A review of ICT shared services Guide | 12 July, 202423 April, 2018 ICT Shared Services (6/9) – A review of ICT shared services
ICT Shared Services (5/9) – The importance of ICT Guide | 12 July, 202415 March, 2018 ICT Shared Services (5/9) – The importance of ICT
ICT Shared Services (4/9) – Shared service types Guide | 12 July, 202416 February, 2018 ICT Shared Services (4/9) – Shared service types
ICT Shared Services (3/9) – The RASP model and how to use it Guide | 12 July, 202410 December, 2017 ICT Shared Services (3/9) – The RASP model and how to use it