8 May 2024 Protecting government organisations against ransomware by extending your existing MFA solution to legacy on-prem environmentsWebinarVirtual (Teams)Virtual (Teams)
8 May 2024 Protecting government organisations against ransomware by extending your existing MFA solution to legacy on-prem environmentsWebinarVirtual (Teams)Virtual (Teams)
Harnessing geospatial information – the local dimension Briefing | 2 November, 2018 Harnessing geospatial information – the local dimension
Data Protection Impact Assessments (DPIAs) Briefing | 20 July, 2018 Data Protection Impact Assessments (DPIAs)
ICT Shared Services (9/9) – Final word: shared services, the new currency Guide | 18 May, 2018 ICT Shared Services (9/9) – Final word: shared services, the new currency
ICT Shared Services (8/9) – Reasons why shared services fail Guide | 17 May, 2018 ICT Shared Services (8/9) – Reasons why shared services fail
ICT Shared Services (7/9) – Traits of successful shared services Guide | 16 May, 2018 ICT Shared Services (7/9) – Traits of successful shared services
ICT Shared Services (6/9) – A review of ICT shared services Guide | 23 April, 2018 ICT Shared Services (6/9) – A review of ICT shared services
ICT Shared Services (5/9) – The importance of ICT Guide | 15 March, 2018 ICT Shared Services (5/9) – The importance of ICT
ICT Shared Services (4/9) – Shared service types Guide | 16 February, 2018 ICT Shared Services (4/9) – Shared service types
ICT Shared Services (3/9) – The RASP model and how to use it Guide | 10 December, 2017 ICT Shared Services (3/9) – The RASP model and how to use it
8 May 2024 Protecting government organisations against ransomware by extending your existing MFA solution to legacy on-prem environmentsWebinarVirtual (Teams)Virtual (Teams)