Australian Government Cloud Computing Policy

When we talk about Information and Communications Technology (ICT), we increasingly talk about how ICT is supporting innovation, driving change and transforming the way we work. This is as true for the public sector as it is for the private sector. The Australian Government recognises that the community expects government services to be responsive to their needs and available where and when they want them. Key to realising this vision is the effective use of ICT by government, including the adoption of cloud services.

Spotlight

Statens vegvesen - Norwegian Public Roads Administration

The Norwegian Public Roads Administration is responsible for the planning, construction and operation of the national and county road networks, vehicle inspection and requirements, driver training and licensing.

OTHER WHITEPAPERS
news image

IT Modernization

whitePaper | January 28, 2022

Goals and processes for improving existing technology infrastructure and avoiding the risks associated with outdated systems: a roadmap for IT Modernization within the Federal Government

Read More
news image

HOW DATA STEWARDSHIP WINS RACES!

whitePaper | July 4, 2022

Keeping a racecar running at peak performance for 24 hours straight is no easy feat. Every aspect of design, engineering, strategy, and performance is pushed to the limit. The process of finishing a race involves hundreds of team members working together round th

Read More
news image

Core Security Principles for Edge Computing in Government

whitePaper | June 27, 2022

As government agencies become digitally transformed, they are incorporating more edge technology into their operations to help improve application performance and meet mission outcomes. An IDC survey indicates that 37% of U.S. federal agency decision makers have workloads deployed at the edge and 50% have firm plans to deploy workloads at the edge within this year. Edge is fast becoming the new frontier of innovation and responsiveness, making edge data management, processing, and protection central to any agency's digital processes and customer engagements.

Read More
news image

Digital Trust

whitePaper | November 1, 2022

Digitalisation offers new approaches to trust. Competitors who do not see eye-to-eye can still transact efficiently because technologies such as privacy-enhancing technologies, distributed ledgers (also called shared ledgers), coupled with good governance in processes now enable these interactions even without parties knowing who they transact with.

Read More
news image

Government Requests for Cloud Customer Data

whitePaper | February 12, 2022

At Google, we know that transparency plays a critical role in earning and maintaining customer trust. That is why Google Cloud has taken steps to develop industry-leading product capabilities that enhance the control that our customers have over their data, and that give customers visibility into when and how their data is accessed. We think it is important to be clear at the outset about where we stand: our customers own their data and have the right to control access to it. Like other technology and communication companies, Google receives requests from governments and courts around the world for customer information, including requests for Google Cloud customer information. Google Cloud has developed a transparent, fair, and thorough process that meets international best practices when it comes to data access requests from law enforcement agencies and governments. Google provides a response on a case-by-case basis, taking into account different circumstances and informed by legal requirements, customer agreements, and privacy policies. We are committed to protecting privacy while also complying with applicable laws.

Read More
news image

SECURING THE SOFTWARE SUPPLY CHAIN

whitePaper | August 15, 2022

Cyberattacks are conducted via cyberspace and target an enterprise’s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment or infrastructure; or destroying the integrity of the data or stealing controlled information.1 Recent cyberattacks such as those executed against SolarWinds and its customers, and exploits that take advantage of vulnerabilities such as Log4j, highlight weaknesses within software supply chains, an issue which spans both commercial and open source software and impacts both private and Government enterprises. Accordingly, there is an increased need for software supply chain security awareness and cognizance regarding the potential for software supply chains to be weaponized by nation state adversaries using similar tactics, techniques, and procedures (TTPs).

Read More

Spotlight

Statens vegvesen - Norwegian Public Roads Administration

The Norwegian Public Roads Administration is responsible for the planning, construction and operation of the national and county road networks, vehicle inspection and requirements, driver training and licensing.

Events