EMERGING TECHNOLOGY, GOVERNMENT BUSINESS

WHITE PAPER ON NATIONAL TRANSPORT POLICY

May 27, 2022

whitepaper on Transport
Public policy-making processes are by their nature cumbersome, and not just because of the issues to be addressed. They also have to be inclusive and a myriad of competing interests need to be addressed and to an extent satisfied.

Spotlight

Department of Treasury and Finance, Tasmania

We are a central government agency aiming to improve the wellbeing of Tasmanians. Treasury is a rewarding and exciting place to work. We are currently striving to increase the number of women in our leadership roles and have a number of strategies in place to develop a more contemporary and flexible workplace.

OTHER WHITEPAPERS
news image

Customer Chronicles — Securing State and Local Government Agencies with Strong MFA

whitePaper | February 3, 2020

Protecting sensitive data and maintaining cybersecurity hygiene are top concerns for security professionals and CISOs from state and local government agencies. Government networks contain sensitive data such as social security numbers, voter registration, medical records, bank account and credit card numbers of millions of people and businesses, which can make them an attractive target for bad actors. With the increasing sophistication of cyberattacks and the lack of resources at their disposal, the IT departments across these agencies are looking for a solution that enables them to do more with less. We built Duo to be a simple, affordable and secure solution to help government agencies – and organizations of all sizes – solve to these problems.

Read More
news image

The Power of the Engaged Customer: Personalized, Multichannel, Government Experiences

whitePaper | May 1, 2022

Customer experience (CX) in government is about more than any single web form, survey, portal, or online claims submission. CX also considers the perceptions, preferences, and sentiments for an individual, business, or organization as they interact across the various channels of an agency’s program or service.

Read More
news image

The National Counterintelligence Strategy of the United States

whitePaper | February 21, 2020

Protecting our Nation’s security and continuing to enhance the prosperity of our citizens are my top priorities. Ensuring that the United States is protected against espionage and other damaging intelligence activities conducted by our foreign adversaries is essential to meeting those goals. The Nation faces an expanding array of foreign intelligence threats by adversaries who are using increasingly sophisticated methods to harm the United States.

Read More
news image

GOVERNMENT WHITE PAPER ON THE REPORT OF THE TRUTH RECONCILIATION AND REPARATIONS COMMISSION

whitePaper | May 25, 2022

On 22 July 1994, then 29-year-old army lieutenant Yahya Abdul-Aziz Jemus Junkung Jammeh came to power through a military coup d’état – having ousted the democratically elected President Sir Dawda Kairaba Jawara. For 22 years, Yahya Jammeh ruled The Gambia with an iron fist. During his regime, extrajudicial killings, rape, torture, enforced disappearances, and numerous grievous human rights violations became part and parcel of his military Junta.

Read More
news image

The Impact of the Trump Labor Market on Historically Disadvantaged Americans

whitePaper | December 19, 2019

The U.S. labor market is the strongest it has been in the last half century, as shown by economic data across various metrics. This is partly attributable to President Trump’s progrowth economic policies, the results of which are disproportionately benefiting Americans who were previously left behind. The Administration’s policies are boosting labor demand and lowering structural barriers to entering the labor market. This report provides evidence that this labor market has contributed to reduced inequality through an economic boom that is greatly benefiting historically disadvantaged groups. These groups are becoming more and more self-reliant through their economic activity, rather than remaining inactive in the labor market to qualify for means-tested government programs.

Read More
news image

SECURING THE SOFTWARE SUPPLY CHAIN

whitePaper | August 15, 2022

Cyberattacks are conducted via cyberspace and target an enterprise’s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment or infrastructure; or destroying the integrity of the data or stealing controlled information.1 Recent cyberattacks such as those executed against SolarWinds and its customers, and exploits that take advantage of vulnerabilities such as Log4j, highlight weaknesses within software supply chains, an issue which spans both commercial and open source software and impacts both private and Government enterprises. Accordingly, there is an increased need for software supply chain security awareness and cognizance regarding the potential for software supply chains to be weaponized by nation state adversaries using similar tactics, techniques, and procedures (TTPs).

Read More

Spotlight

Department of Treasury and Finance, Tasmania

We are a central government agency aiming to improve the wellbeing of Tasmanians. Treasury is a rewarding and exciting place to work. We are currently striving to increase the number of women in our leadership roles and have a number of strategies in place to develop a more contemporary and flexible workplace.

Events