The Technology in Government & The Public Sector Summit 2012

When:
Aug 13 - 14, 2012
 
Where:
Hyatt Hotel, Canberra
 
More:
 

Meet here to uncover the very latest in best-practice government and public sector ICT and forecast future developments. If there is one ICT event you attend in 2012, make it this one!

The last three years has marked a significant shift in government and public sector ICT, as the Australian Public Service has worked hard to make the move to strategic whole-of-government ICT investment.

But the work is not over, as we enter the post-Gershon era. Despite no formal response to the Reinecke Review as yet, the pressure is on for the Australian Public Service to leverage efforts of the last 3 years and take the next step in driving improved service delivery and citizen engagement.

How can the government move forward? The Technology in Government & the Public Sector Summit will address this issue head on. Once again, the 2012 Summit will bring together the game changers of government & public sector ICT to...

- Set plans in motion
- Establish objectives
- Explore new technologies
- Determine how the government can satisfy the governance arrangements and resourcing requirements

...to propel ICT-enabled service delivery and citizen engagement to the next level. Now in it's 6th year, the Summit has become the meeting place for 200+ senior level ICT decision makers from state and federal government and public sector, featuring a first-rate C-level speaker line-up, from Australia and overseas.

Meet here to uncover the very latest in best-practice government and public sector ICT and forecast future developments. If there is one ICT event you attend in 2012, make it this one!
nextmedia takes no responsibility for the accuracy of the content contained in these listings. Please contact the vendor with any enquiries.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 765

Vote