Technology Strategy April 2014
|
|
|
- Ronald Rich
- 9 years ago
- Views:
Transcription
1 Technology Strategy April 2014
2
3 Contents Overview 1 Our environment 1 Why change? 2 Our vision for technology what success looks like 3 Our approach 7 Transformation shifts how will we know we have been successful? 9 Our key partners 10 Technology Strategy iii
4 iv Technology Strategy
5 Overview This technology strategy outlines how we will transform the Australian Customs and Border Protection Service s (the Service) current technology environment to one that delivers on our vision and mission. It describes: Our current environment and drivers for change Our future vision for technology and major change areas The major transformation shifts we need to make and the partners who will help us achieve our vision. Our environment The operating environment for the Service is characterised by an increasing volume and complexity of border transactions, occurring in diverse channels across a range of physical and electronic environments, with limited resources and reduced time in which to intervene at the border. This environment will continue to evolve, presenting new challenges and opportunities. International air and sea passengers are projected to increase 25 per cent from around 34.3 million in , to some 42.9 million by Over the same period, incoming air cargo is projected to increase by 85 per cent from 28.3 million to 52.4 million, while sea cargo will increase by 20 per cent from 2.7 million to 3.24 million manifest lines. Travel and trade patterns are becoming more complex, with the range of goods, biosecurity hazards and economic risks growing. The geographic area within which the Service operates is also expanding, with more remote ports coming on line and ramping up operations. At the same time, entities trying to breach Australia s borders are becoming increasingly responsive and resilient to law enforcement interventions and tactics. Opportunities for organised crime today are unprecedented increased globalisation, escalating cross-border movements of people, goods and money, emerging international markets, and rapidly developing and converging technologies provide a fertile operating environment for organised crime. The risk of infiltration and corruption remains high, with events during demonstrating the need for us to increase our focus on such vulnerabilities. Recent high-profile overseas examples of the threat from the trusted insider have highlighted the very real damage the actions of these individuals can have. Technological advancements will impact heavily on our future operating environment. These advancements offer increasing opportunities to improve Technology Strategy 1
6 how we enable our business operations with capabilities such as biometrics for enhanced border control, egate technology to support the expansion of automated entry systems and an evolving cyber security environment to manage security risks. It also offers challenges through the exploitation of technological advances by criminal networks who may attempt to compromise the security of the border and the processes and systems used to protect it. Internet trade is also expanding globally, presenting challenges to the traditional format of trade relationships both licit and illicit, with an exponential growth in the volume of goods purchased online crossing the border. The evolving operating environment presents a range of opportunities and challenges specific to technology. A greater reliance on digitisation and automation to deliver our services to our staff and clients, along with the need for our officers to be mobile and constantly connected requires that our critical systems and the information we deliver are secure, accessible, reliable and fault tolerant. Our reliance on technology will increase even further as we redeploy officers in the field. For example, fewer officers in airports will mean that we will no longer be able to rely on humans as a contingency in the event of a technology outage. Technology innovations will provide us with opportunities to better support our officers, but we must be disciplined in evaluating the benefits and risks to ensure that capabilities are fit for purpose and aligned with business needs. Why change? Our current technical environment is at a critical stage. It has become unwieldy and complex to manage, costly, inefficient and high risk. We have large numbers of disconnected, duplicated and siloed systems to support our core operational activities. Many support stove-piped business processes, have already reached or are rapidly approaching the end of their useful life, or are dependent on individuals with skills which are becoming increasingly difficult to obtain. Over recent years, budget reductions have resulted in a serious lack of investment in critical maintenance and enhancement activities. This has meant that our existing siloed investments have been stretched beyond their limits. This has led to a technical environment that does not effectively support current business models let alone our future aspirations. With greater investment and access to new and evolving technologies, we will be able to deliver and support the fast paced, dynamic business we aspire to be. 2 Technology Strategy
7 Our move towards a more agile, operationally-focused agency must be underpinned by a connected information environment supported by reliable, accessible and secure systems. Our future operating environment requires systems that are interoperable with our partners, industry and our clients. We must take advantage of technological advances if we are to enable transformation and deliver more effective and efficient services. This transformation must occur in an environment where resources and finances are tight. It will also require new structures, approaches and skillsets. Our vision for technology what success looks like Our technology vision To provide an integrated set of technology capabilities that fully support our business operations, enabling our officers to efficiently and effectively carry out their duties. By 2018, the Service will be far better supported by technology than it is today. Our corporate mission to protect Australia and support its economic prosperity by facilitating legitimate trade and travel will be enabled by secure, integrated and reliable technology capabilities. Our officers will have ubiquitous access to integrated technology capabilities that will help to manage their personal and career development, support their daily work and reduce the burden of manual data entry. There will be seamless connectivity, operational collaboration and controlled sharing of data both within and outside the Service. Collaboration and information sharing will extend across all security classifications, increasing our responsiveness in dealing with current and emerging threats. Our technology capabilities will provide real-time access to information, supporting evidencebased decision making. Our Border Force Officers and Regional Commanders will have access to mobile platforms that will allow them to be agile and highly deployable. We will provide our officers with access to visual, geospatial and social data for analytical purposes, all from their preferred device. This access will be secure and reliable. Technology Strategy 3
8 Our technology capabilities and business processes will be increasingly standardised, reducing the need for specialist product knowledge and increasing our overall efficiency. Our operations will be supported by technology that enables high levels of automation for high volume, low-value activities, freeing up our precious human resources for higher value activities that are better performed by human beings. We will integrate technology capability delivery across the Service. This will mean that accountability for delivering technology capabilities such as egates, biometrics, x-ray, forensics and officer borne technologies such as cameras, radios and mobile devices will be consolidated. We will continue as an information service provider for our partner agencies. This will ensure that they remain able to deliver on their organisational commitments through direct access to the information they require. Our external stakeholders and clients will be able to interact with the Service electronically in a secure and reliable way. Access to and submission of information will be underpinned by modern, accessible and industry standard technologies. Our long-term vision for technology capabilities will be clearly reflected in our reference architectures, patterns and standards. These will be communicated and understood by those who need to know. Our technology mission To achieve this vision, we will adopt the following mission: Provide technology capabilities that allow the Service to deliver on its mandate to protect our borders while facilitating legitimate trade and travel. 4 Technology Strategy
9 What change is needed? In order to transform our technology environment we need fundamental change in four key areas. Technology Strategy 5
10 6 Technology Strategy
11 Our approach To deliver on our vision and mission we will focus on the following Technology: Applications The applications and systems that meet corporate [whole of Service], business [one or more specific functional areas] and individual [Service staff] needs considering the broader portfolio. Infrastructure The platforms and connectivity which deliver technology capabilities across the Service considering the broader portfolio. Other supporting technology capabilities The devices to support individual and corporate needs [such as CCTV, long range communications, and video communications] and the technology to support operational business functions [such as X-ray capabilities and officer-borne technologies]. To support the transformation journey our activities and decisions must be bound by the following principles. These principles will guide our technology decisions ensuring that our vision can be achieved and that we deliver on our mission. Technology Strategy 7
12 Principle Enterprise View Simplicity of Use Fit for Purpose Reuse Reliable and Secure Prioritised Agile Aligned with Information Environment Short Description We will adopt an enterprise-wide view of all technology issues, seeking to implement technology solutions that meet enterprise as well as specific business needs. We will maximise the wider application and reuse of the technology and promote standardisation across the Service and broader Immigration and Border Protection portfolio. We will deliver a consistent, streamlined, integrated and intuitive experience for end users. Users will be able to work across different domains using a single logon and without the need to re-learn tools. We will implement technology based on operational suitability requirements to support business needs (availability, durability, security, disaster recovery etc.). Capabilities will be proven prior to implementation. We will maximise our technology investments by re-using capabilities across multiple business lines. We will provide a reliable and secure technology environment to enable information sharing while ensuring that we meet our obligations for the proper use and protection of information. We will allocate resources in line with Service-wide priorities. We will provide systems that are flexible and responsive to changing business needs. They will be integrated, but loosely coupled to allow specific business functions to evolve and adapt supporting emerging requirements. We will deliver Technology capabilities that are directly aligned with our Information Environment Strategy. 8 Technology Strategy
13 Transformation shifts how will we know we have been successful? We know we will have delivered on the strategy when the following strategic shifts have been realised: Corporate designed systems causing operational inefficiencies Fully integrated systems based on front line operational requirements THINK A high number of duplicated and fragmented systems causing data entry rework Complex and manual environment for Staff and External Users Fewer, more integrated systems with less data entry Increased Automation and Self Service (Staff and External Users) Accessing and Processing of information is only available within the Service s physical locations and during normal business hours Accessing and Processing of information is available anywhere at anytime SUPPORT Our systems are susceptible to performance issues and outages causing major impacts to business Our officers do not have access to all the information required to perform their duties Siloed, bespoke and highly customised system systems Our systems are secure, accessible, reliable and perform well Our officers are provided with joined up data in real time Enterprise-wide Off The Shelf systems with minimal customisation. Specialisation by exception in areas that are considered differentiators D ELIVER Technology delivery accountability embedded in multiple business areas propagating fragmented solutions Environment complexity requires high operational expenditure to maintain More integrated technology delivery capability Standardisation of technology delivers efficiencies in supoort costs and resources Technology Strategy 9
14 Our key partners In addition to the engagements and partnerships within the Service, enhancing our technology environment will require the support of a number of key external partners. The following partners have been identified as key to helping us achieve our vision: Border management community National security community Law enforcement community Other Commonwealth Government partners State and territory jurisdictions International partners Technology Vendor Community Industry and The community. 10 Technology Strategy
15 Technology Strategy 11
16
Border technology strategy. Chair: Mike Milford, First Assistant Secretary, Major Capability Division
Border technology strategy Chair: Mike Milford, First Assistant Secretary, Major Capability Division Session outline Using technology to improve how we manage the flow of people and goods and identify
CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response
CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE AIIA Response 14 November 2011 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body representing
Future Directions for the Border Sector
Future Directions for the Border Sector Note about this document The Government s three border agencies (the Ministry of Agriculture and Forestry, New Zealand Customs Service and Department of Labour)
Commonwealth Organised Crime Strategic Framework: Overview
Commonwealth Organised Crime Strategic Framework: Overview Commonwealth Organised Crime Strategic Framework: Overview ISBN: 978-1-921241-94-9 Commonwealth of Australia 2009 This work is copyright. Apart
Balance collections with retention for each customer. Decision Analytics for debt management in telecommunications
Balance collections with retention for each customer Decision Analytics for debt management in telecommunications Debt management for telecommunications The dynamic telecommunications market is seeing
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
Information Communication Technology
Information Communication Technology Strategic Plan 2011 15 BTS11/00102 Commonwealth of Australia 2011 This work is copyright. You may download, display, print and reproduce this material in unaltered
Criteria for adopting International Standards and Risk Assessments
Criteria for adopting International Standards and Risk Assessments February 2016 Criteria for Accepting International Standards and Risk Assessments 1 Table of Contents 1 About the Department... 3 2 The
INFORMATION TECHNOLOGY STRATEGY 2015-2017. Information Technology Services
INFORMATION TECHNOLOGY STRATEGY 2015-2017 Information Technology Services THE VISION FOR INFORMATION TECHNOLOGY AT ANU The Australian National University (ANU) has developed an institution-wide strategy
Information Technology Strategic Plan
Information Technology Strategic Plan Delivers solutions that are planned, anticipate the future and valued by customers Introduction Our Information Technology Strategy supports the Corporate Plan by
Surveillance and Security Systems
Surveillance and Security Systems Surveillance & Security Systems Surveillance Company Overview and Security Systems Company Overview Company Overview Ultra Electronics Surveillance and Security Systems
Information Services Strategy 2011-2013
Information Services Strategy Issue 1 1 Introduction The States of Jersey public sector is facing significant pressure for efficiencies and savings. This has created the context to take a fresh look at
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
Intuitive Application Performance Management
Gallium The HP IT Performance Suite Intuitive Performance The need for speed The demand for fast is growing, technology has provided an expanding market with the tools and infrastructure it needs to implement
The National Commission of Audit
CA Technologies submission to The National Commission of Audit November, 2013 Kristen Bresch CA Technologies Executive Summary CA Technologies is pleased to present the National Commission of Audit the
l e a r n i n g a r c h i t e c t u r e f r a m e w o r k MCEETYA A u s t r a l i a - N e w Z e a l a n d
l e a r n i n g a r c h i t e c t u r e f r a m e w o r k MCEETYA A u s t r a l i a - N e w Z e a l a n d Learning architecture delivers learner-centred schooling anywhere, anytime by designing the connections
Information and Communications Technology Strategy 2014-2017
Contents 1 Background ICT in Geoscience Australia... 2 1.1 Introduction... 2 1.2 Purpose... 2 1.3 Geoscience Australia and the Role of ICT... 2 1.4 Stakeholders... 4 2 Strategic drivers, vision and principles...
GLOBAL Service Desk. From Computacenter
From Computacenter CONTENTS 03 04 05 06 07 08 09 11 First class; all the way Great expectations Safety in numbers Choice and flexibility Our next generation service desk Why Computacenter Our customer
Compliance Guide: ASD ISM OVERVIEW
Compliance Guide: ASD ISM OVERVIEW Australian Information Security Manual Mapping to the Principles using Huntsman INTRODUCTION In June 2010, The Australian Government Protective Security Policy Framework
ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.
ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service
Griffith IT Plan 2013-2017 Delivering alignment and agility
Griffith IT Plan 2013-2017 Delivering alignment and agility Sir Samuel Griffith Centre Nathan Campus Background IT Plan 2013-2017: Delivering alignment and agility In August 2012 the University Council
Cloud Services for Microsoft
The success of your business depends on your ability to adapt to a dynamic market environment, where globalisation and economic pressures are reshaping the landscape. To remain competitive, your organisation
Information Technology Strategy
Information Technology Strategy ElectraNet Corporate Headquarters 52-55 East Terrace, Adelaide, South Australia 5000 PO Box, 7096, Hutt Street Post Office, Adelaide, South Australia 5000 Tel: (08) 8404
Defending against modern cyber threats
Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation
BUILDING THE CASE FOR CLOUD: HOW BUSINESS FUNCTIONS IN UK MANUFACTURERS ARE DRIVING PUBLIC CLOUD ADOPTION
BUILDING THE CASE FOR CLOUD: HOW BUSINESS FUNCTIONS IN UK MANUFACTURERS ARE DRIVING PUBLIC CLOUD ADOPTION Industry Report Contents 2 4 6 Executive Summary Context for the Sector Key Findings 3 5 9 About
BLUEPRINT FOR INTEGRATION
BLUEPRINT FOR INTEGRATION Commonwealth of Australia 2014 With the exception of the Commonwealth Coat of Arms, all material presented in this publication is provided under a Creative Commons Attribution
SOPHISTICATED COLLABORATION MADE SIMPLE. TELSTRA ivision AUDIO VISUAL ROOM SOLUTIONS
TELSTRA ivision AUDIO VISUAL ROOM SOLUTIONS SOPHISTICATED COLLABORATION MADE SIMPLE Enhance your discussions and decision making with our range of fully managed audio visual and video conferencing solutions
Connect Renfrewshire
How the council will use its information and technology assets to achieve successful change Contents Strategy Context 2 Digital Delivery and Citizen Engagement 4 Operational Excellence and Transformation
Logicalis Unified Communications and Collaboration. Collaborate anytime, anywhere, on any device
Logicalis Unified Communications and Collaboration Collaborate anytime, anywhere, on any device Logicalis Unified Communications and Collaboration Solutions & Services Are you struggling to support today
, Head of IT Strategy and Architecture. Application and Integration Strategy
IT Strategy and Architecture Application DOCUMENT CONTROL Document Owner Document Author, Head of IT Strategy and Architecture, Enterprise Architect Current Version 1.2 Issue Date 01/03/2013 VERSION CONTROL
Information and Communication Technology (ICT) Strategy
Information and Communication Technology (ICT) Strategy 2014 15 Table of Contents Secretary s foreword Executive summary Introduction Vision Future direction Expected benefits Strategic priorities Business
Greater Manchester Police. Police service becomes more agile
Greater Manchester Police Police service becomes more agile the customer overview Customer Greater Manchester Police Website Greater Manchester Police Number of employees Approx 170 Country or region Manchester,
Agency for State Technology
Agency for State Technology 2015-2018 Statewide Information Technology Security Plan The Way Forward Rick Scott, Governor Jason M. Allison, State CIO Table of Contents From the Desk of the State Chief
Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board
Comprehensive European Security Approaches: EU Security Programmes Robert HAVAS EOS Chairman of the Board INTRODUCTION the EOS Programmes rationale Why implementing EU Security Programmes / ASPIDA approach?
Business Process Management in the Finance Sector
Business Process Management in the Finance Sector Leveraging the power of processes for profit oracle.com Introduction It is vital for financial services companies to ensure the rapid implementation of
National Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee
National Surface Transport Security Strategy September 2013 Transport and Infrastructure Senior Officials Committee Transport Security Committee 1 National Surface Transport Security Strategy (NSTSS) Foreword
Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL:
Module Db Technical Solution Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Cost is reduced through greater economies of scale, removal of duplication
Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
The South Staffordshire and Shropshire Health Care NHS Foundation Trust Digital Strategy 2014 2019
The South Staffordshire and Shropshire Health Care NHS Foundation Trust Digital Strategy 2014 2019 Peter Kendal Associate Director for Information Management and Technology Development 01/12/2014 1 Page
Cambridge University Library. Working together: a strategic framework 2010 2013
1 Cambridge University Library Working together: a strategic framework 2010 2013 2 W o r k i n g to g e t h e r : a s t r at e g i c f r a m e w o r k 2010 2013 Vision Cambridge University Library will
Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical
Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation
4net Technologies. Managed Services and Cloud Solutions
4net Technologies Managed Services and Cloud Solutions Managed Services and Cloud Solutions Managed Services and Cloud Solutions are an opportunity for organisations to bring control to complexity by managing
DSDM Case Study. An Agile Approach to Software Systems Development for the Highways Agency
DSDM Case Study An Agile Approach to Software Systems Development for the Highways Agency Government agencies are constantly striving to develop software systems that support business objectives, deliver
Information & Communication Technology Strategy 2012-15
Information & Communication Technology Strategy 2012-15 Information & Communication Technology (ICT) 2 Our Vision To provide a contemporary and integrated technological environment, which sustains and
Report to the Council of Australian Governments. A Review of the National Identity Security Strategy
Report to the Council of Australian Governments A Review of the National Identity Security Strategy 2012 Report to COAG - Review of the National Identity Security Strategy 2012 P a g e i Table of contents
Oxford City Council ICT Strategy 2015 2018
Oxford City Council ICT Strategy 2015 2018 1 Contents 2 Overview... 2 3 OCC Business Drivers... 2 4 ICT Principles... 3 4.1 Business Requirements... 3 4.2 Information Management... 3 4.3 Applications...
A Ready Business has total visibility and control. Seamlessly manage your global telecommuncations in a secure environment
A Ready Business has total visibility and control Seamlessly manage your global telecommuncations in a secure environment 2 We live in a world of rapid and unpredictable change 22% Only 22% of businesses
SCHOOL ONLINE SAFETY SELF REVIEW TOOL
SCHOOL ONLINE SAFETY SELF REVIEW TOOL UPDATED February 2016 The South West Grid for Learning, Belvedere House, Woodwater Park, Pynes Hill, Exeter, EX2 5WS. Tel: 0844 381 4772 Email: [email protected]
CRIME PROFILE SERIES ORGANISED CRIME IN PROFESSIONAL SPORT
Threats to the integrity of professional sport in Australia Organised criminal groups currently have a limited presence in professional sports in Australia. However, there are vulnerabilities within the
BBC Technology Strategy
BBC Technology Strategy Issued: January 2010 For more information contact: [email protected] Copyright 2010 BBC All Rights Reserved TECHNOLOGY STRATEGY Introduction This paper defines the BBC s
Managed Hosting: Best Practices to Support Education Strategy in the Career College Sector
Managed Hosting: Best Practices to Support Education Strategy in the Career College Sector Online learning is playing a critical role in the delivery of Teaching and Learning and the overall experience
The Scottish Wide Area Network Programme
The Scottish Wide Area Network Release: Issued Version: 1.0 Date: 16/03/2015 Author: Andy Williamson Manager Owner: Anne Moises SRO Client: Board Version: Issued 1.0 Page 1 of 8 16/04/2015 Document Location
Consolidated Afloat Networks and Enterprise Services (CANES)
Consolidated Afloat Networks and Enterprise Services (CANES) Re-architecting the Navy s s C4I Network Infrastructure Lockheed Martin SNA Media Brief 11 January 2010 Lockheed Martin Proprietary Information
How To Use Ncr Aptra Clear
NCR APTRA CLEAR National payment hub for clearing and settlement Shifting payment dynamics: The international scope Every country has some form of unique payment system based on its own financial practices,
THE BRITISH LIBRARY. Unlocking The Value. The British Library s Collection Metadata Strategy 2015-2018. Page 1 of 8
THE BRITISH LIBRARY Unlocking The Value The British Library s Collection Metadata Strategy 2015-2018 Page 1 of 8 Summary Our vision is that by 2020 the Library s collection metadata assets will be comprehensive,
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
19/10/12 1:50 PM DELIVERING WORLD CLASS IT SOLUTIONS
19/10/12 1:50 PM DELIVERING WORLD CLASS IT SOLUTIONS ABOUT LINCOM SOLUTIONS We are a privately owned Australian IT Solutions Company established in 2006, consisting of an immensely talented and cohesive
Functional and technical specifications. Background
Functional and technical specifications Background In terms of the Public Audit Act, 2004 (Act No. 25 of 2004) (PAA), the deputy auditor-general (DAG) is responsible for maintaining an effective, efficient
ENTERPRISE ARCHITECTUE OFFICE
ENTERPRISE ARCHITECTUE OFFICE Date: 12/8/2010 Enterprise Architecture Guiding Principles 1 Global Architecture Principles 1.1 GA1: Statewide Focus 1.1.1 Principle Architecture decisions will be made based
Overview TECHIS60241. Carry out risk assessment and management activities
Overview Information in all its forms is a vital component of the digital environment in which we live and work. The protection of information in its physical form is well understood but the protection
Unlocking the potential of Airport Infrastructure. Rob Watkins SITA Regional Vice President
Unlocking the potential of Airport Infrastructure Rob Watkins SITA Regional Vice President Healthcheck 2010 ACI Conference Sept 2010 2. 2010 SITA All rights reserved. Today s objectives Share our industry
Confident in our Future, Risk Management Policy Statement and Strategy
Confident in our Future, Risk Management Policy Statement and Strategy Risk Management Policy Statement Introduction Risk management aims to maximise opportunities and minimise exposure to ensure the residents
Business Analyst Position Description
Business Analyst Position Description About the employer Who is the National Heavy Vehicle Regulator? From January 2013, the new National Heavy Vehicle Regulator (NHVR) commenced operations as an independent
NSW Government. Cloud Services Policy and Guidelines
NSW Government Cloud Services Policy and Guidelines August 2013 1 CONTENTS 1. Introduction 2 1.1 Policy statement 3 1.2 Purpose 3 1.3 Scope 3 1.4 Responsibility 3 2. Cloud services for NSW Government 4
MANAGING USER DATA IN A DIGITAL WORLD
MANAGING USER DATA IN A DIGITAL WORLD AIRLINE INDUSTRY CHALLENGES AND SOLUTIONS WHITE PAPER OVERVIEW AND DRIVERS In today's digital economy, enterprises are exploring ways to differentiate themselves from
Cisco Unified Data Center: The Foundation for Private Cloud Infrastructure
White Paper Cisco Unified Data Center: The Foundation for Private Cloud Infrastructure Providing Agile and Efficient Service Delivery for Sustainable Business Advantage What You Will Learn Enterprises
EXECUTIVE REPORT. 4 Critical Steps Financial Firms Must Take for IT Uptime, Security, and Connectivity
EXECUTIVE REPORT 4 Critical Steps Financial Firms Must Take for IT Uptime, Security, and Connectivity When Millions of Dollars of Financial Transactions are On the Line, Downtime is Not an Option The many
Audit Results by Transport Sector
Regulatory Audit Results by Transport Sector As part of the Government s Red Tape Reduction Programme the Infrastructure and Regional Development portfolio (the portfolio) has undertaken an Audit of its
E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION
1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information
Enterprise Information Management
Enterprise Information Management A Key Business Enabler July 2012 The Vision Auckland Council s vision is for Auckland to become the worlds most liveable city. In order to achieve this vision, it needs
ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE
ITA Strategic Plan FY 2011 - FY 2016 U.S. Army Information Technology Agency REALIZING The DoD ENTERPRISE COMPUTING ENVIRONMENT Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE Provide Quality
Enabling Data Quality
Enabling Data Quality Establishing Master Data Management (MDM) using Business Architecture supported by Information Architecture & Application Architecture (SOA) to enable Data Quality. 1 Background &
The Australian EMR specialist Proud creators of
POWERFUL INTUITIVE RESPONSIVE The Australian EMR specialist Proud creators of The leading Australian EMR specialist Core Medical Solutions is a leading provider of Electronic Medical Records (EMR) solutions
Incident Reporting & Management
Rivo Software Solution Layer allows you to report and manage incidents such as injuries, accidents and theft. With powerful capabilities including analytical trending you can make better decisions to reduce
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
Cyber intelligence exchange in business environment : a battle for trust and data
Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building
Action Plan 2010-2015 for Canada s Cyber Security Strategy
Action Plan -2015 for Canada s Cyber Security Strategy Her Majesty the Queen in Right of Canada, 2013 Cat: PS9-1/2013E-PDF ISBN: 978-1-100-21895-3 ii Introduction Information technology is highly integrated
Balance collections with retention for each customer. Decision Analytics for debt management in retail banking
Balance collections with retention for each customer Decision Analytics for debt management in retail banking Debt management for retail banking In the highly competitive retail banking environment, banks
AD Management Survey: Reveals Security as Key Challenge
Contents How This Paper Is Organized... 1 Survey Respondent Demographics... 2 AD Management Survey: Reveals Security as Key Challenge White Paper August 2009 Survey Results and Observations... 3 Active
IBM System x and VMware solutions
IBM Systems and Technology Group Cross Industry IBM System x and VMware solutions Enabling your cloud journey 2 IBM System X and VMware solutions As companies require higher levels of flexibility from
Quattra s Cloud Vision & Framework Value
Quattra s Cloud Vision & Framework Value Data centers provide the foundation for the applications and services that organizations deliver, and companies need their IT facilities to be reliable, compliant
