IT Brief New Zealand logo
Technology news for New Zealand's largest enterprises
Story image

Top 10 strategic technologies for Government CIOs

By Shannon Williams
Mon 4 Jul 2016
FYI, this story is more than a year old

Government CIOs remain under constant pressure to further optimise IT and businesses costs, while leading digital innovation in the public sector.

That’s the word according to analyst firm Gartner, who says government CIOs face organisational and cultural challenges that are barriers to harnessing the synergistic potential of social, mobile, data analytics, cloud and the Internet of Things to drive transformational change.

Rick Howard, research vice president at Gartner, says legacy silos of systems, data and processes reinforce “business as usual” practices and behaviours that limit government participation in broader partner ecosystems capable of supporting fully digital end-to-end citizen services.

“In the digital service economy, government must make strategic investments in IT or risk perpetuating suboptimal business and service models that are financially unsustainable in the long term,” says Howard.

“Government CIOs who are too slow to adopt the technology innovations that are transforming private sector service industries will increase business risk and cost, while compromising the mission of their organisations.”

Spending by national, federal and local governments worldwide on technology products and services is forecast to grow slightly by 0.3% to $430.1 billion in 2016, growing to $476.1 billion by 2020. This is a turnaround after a 5.2% decrease in 2015, Gartner says.

To enable government transformation initiatives, Gartner has identified the top 10 strategic technologies in 2016 and provides recommendations to CIOs and IT leaders regarding adoption and benefits.

It is not a list of what government CIOs spend the most time or money on, rather it is a list of strategic technologies that Gartner recommends they should have a plan for in 2016.

1)     Digital Workplace

The government workforce is increasingly populated with digitally literate employees, from frontline workers to top-level executives. The digital workplace is a business strategy to boost employee engagement and agility through a more consumerised work environment. The digital workplace promotes collaborative work styles; supports decentralised, mobile work environments; and embraces employees' personal choice of technologies.

2)     Multichannel Citizen Engagement

Delivering an effective citizen experience requires a holistic approach to the citizen: (1) using data to capture and understand the needs and desires of the citizen; (2) leveraging effective social media and communications to actively engage citizens; (3) allowing the citizen to engage on his or her own terms; (4) understanding the citizen's preferred engagement channels; (5) affording seamless transitions among channels; and (6) ultimately delivering a more satisfying set of citizen interactions. Adopting a citizen-centric information management strategy with multichannel citizen engagement opportunities will deliver quantifiable benefits.

3)     Open Any Data

Open any data in government results from "open by default" or "open by preference" governance policies and information management practices. These make license-free data available in machine-readable formats to anyone who has the right to access it without any requirement for identification or registration. Open data is published as collected at the source ("raw") at the lowest granularity, as determined by privacy, security or data quality considerations. Open data is accessible with open APIs and is not subject to any trademark or copyright.

4)     Citizen e-ID

As government becomes more digitalised, digital identity will need to become more reliable in order to serve as the core for all digital transactions. Citizen electronic identification (e-ID) refers to the orchestrated set of processes and technologies managed by governments to provide a secure domain to enable citizens to access these core resources or services. Governments should require online authentication and identity proofing, because in-person verification methods are becoming outdated for offering citizens integrated and seamless access to resources and services. This "no wrong door" business model must be able to associate each citizen with one unique and persistent identifier within the bounds of what is culturally acceptable and legally permissible.

5)     Analytics Everywhere

Analytics is the collection and analysis of data to provide the insight that can guide actions to increase organisational efficiency or program effectiveness. The pervasive use of analytics at all stages of business activity and service delivery — analytics everywhere — allows leading government agencies to shift from the dashboard reporting of lagging indicators to autonomous business processes and business intelligence (BI) capabilities that help humans make better context-based decisions in real time.

6)     Smart Machines

In practice, smart machines are a diverse combination of digital technologies that do what we once thought only people could do. While capabilities are evolving rapidly, it already includes deep neural networks, autonomous vehicles, virtual assistants and smart advisors that interact intelligently with people and other machines. Government IT leaders must explore smart machines as enhancements to existing business practices, and possibly as foundations for new public services or ways of accomplishing business goals altogether.

7)     Internet of Things

The IoT is the network of physical objects (fixed or mobile) that contains embedded technology to communicate, monitor, sense or interact with multiple environments. The IoT architecture operates in an ecosystem that includes things, communication, applications and data analysis, and is a critical enabler for digital business applications in all private-sector and public-sector industries. The business use cases and adoption rate by government agencies vary according to service domain or program mission. Government business models are emerging that take advantage of the IoT; for example, pay-for-use or subscription-based taxation models, smart waste bin collection on city streets, and the remote monitoring of elderly patients in assisted-living settings.

8)     Digital Government Platforms

Governments face constant pressure to improve service delivery and save costs. Adopting digital platforms reduces effort and facilitates user-centric design. These platforms deliver services such as identity management and verification, payments, reusable application services, and notifications (for example, SMS and email) that are commonly used across multiple domains. Globally, governments are taking a platform approach to simplify processes, improve citizen interactions and reduce expenditures.

9)     Software-Defined Architecture

Software-defined architecture (SDA) inserts an intermediary between the requester and the provider of a service so that the service can change more dynamically — in other words, it is the IT equivalent of changing the tires while the car is moving. Adding a layer of software to abstract and virtualise networks, infrastructure or security has proved to be a useful way of deploying and utilising infrastructure. Applying the same technique to software architecture improves the manageability and agility of the code so that the organisation can respond to the fluidity requirements of digital government and the IoT. Some government organisations have begun implementing software-designed infrastructure (SDI), but most are still operating in traditional data centers.

10)   Risk-Based Security

The cybersecurity threat environment is constantly evolving, but it represents only one dimension of a complex, multifaceted set of threats and risks. Government CIOs must adopt a threat-aware, risk-based security approach that allows governments to make knowledgeable and informed decisions about risks in a holistic fashion, allowing for a wiser allocation of resources; more sound decisions about risks and their impacts on government missions, operations, assets and people; and engagement of senior leadership in risk-based decisions.

According to Gartner, four new trends emerged in 2016 with the potential to significantly benefit government performance within the next three to five years. Analytics everywhere, smart machines, software-defined architecture and risk-based security will each challenge governance, human resources management, sourcing and financing practices.

“Many of these technology trends change business models in ways that need to be reflected in more modern policies, especially those related to privacy or regulation,” Howard says.

“CIOs will need to be front and center in providing advice to policymaking bodies and working with industry experts who can consult on options and impacts.”

Related stories
Top stories
Story image
Digital Transformation
SAP partners with New Zealand Rugby for digital transformation
The multi-year partnership will see SAP advance NZR with its organisational operations, team performance, fan experience and sustainability goals.
Story image
Microsoft
Microsoft NZ and TupuToa to boost diversity in cybersecurity sector
Microsoft NZ has teamed up with TupuToa to co-develop a cyber security employment programme specifically aimed at creating more diversity in Aotearoa's cybersecurity sector.
Story image
Customer experience
The importance of service level management to customer experience
Staffing shortages have impacted site reliability engineers in particular since they are under extreme pressure to ensure that digital assets perform at optimum levels 24/7.
Story image
DevOps
Deloitte expands cloud observability practice with Dynatrace
Deloitte is expanding its cloud observability practice, including DevOps principles, AI/ML, cloud complexity management and software engineering.
Story image
Infosys
Consumer relationships with digital services continues to change
Two years of pandemic-induced reliance on technology for work has altered our relationship with digital apps and services, new research has found.
Story image
Microsoft
Microsoft previews Power Platform website design offering
Microsoft has announced the preview of Power Pages, the fifth product in its Power Platform family, designed for low-code makers and professional developers.
Story image
Cyber attacks
Devastating cyber attacks expected to hit energy sector
Energy executives anticipate life, property, and environment-compromising cyber attacks on the sector within the next two years.
Story image
Contact Centre
Leveraging technology in contact centres to reduce attrition rates
Many organisations worldwide have accelerated DX to better respond to changing market drivers and business environments after the disruption of the pandemic.
Exabeam
Find out how a behavioural analytics-driven approach can transform security operations with the new Exabeam commissioned Forrester study.
Link image
Story image
Data Protection
Information management capabilities to meet privacy requirements
Organisations with customers or operations across more than one country face a spate of new and proposed privacy and data protection laws.
Story image
Check Point
Check Point and CCTV expert join forces to boost protection
The partnership will involve Check Point Quantum IoT Protect Nano Agent being embedded in Provision-ISR’s CCTV cameras for on-device runtime protection.
Story image
Data Center
Preventing downtime costs and damage with Distributed Infrastructure Management
Distributed Infrastructure Management (DIM) can often be a lifeline for many enterprises that work with highly critical ICT infrastructure and power sources.
Story image
Sustainability
SoftIron named global leader for efficient DC infrastructure solutions
SoftIron has been named a global leader for supplying energy-efficient data infrastructure solutions for core-to-edge data centers after an assessment by Earth Capital Ltd.
Story image
Cybersecurity
Accenture - a collective security approach a driving factor for cyber resilience
With the approaching Davos World Economic Forum upon us, it is even more imperative to discuss the impact of cybersecurity on business operations leading into the future.
Story image
Digital Signage
MAXHUB's Digital Signage range to bolster boardroom productivity
The new MAXHUB Digital Signage technology is purpose-built to make every kind of team meeting more effective.
Story image
Malware
Fortinet introduces self-learning AI in latest offering
Fortinet is introducing self-learning AI capabilities in its new network detection and response offering, FortiNDR.
Story image
Artificial Intelligence
Gartner reveals top three tech trends for banks this year
Gartner says generative artificial intelligence, autonomic systems and privacy-enhancing computation are gaining traction in banking and investment services.
Story image
Red Sift
Entrust expands strategic partnership with Red Sift
Entrust has expanded its strategic partnership with Red Sift to make it easier for businesses to adopt Brand Indicators for Message Identification (BIMI) standards for email identification and security.
Darktrace
Threat actors are exploiting weaknesses in interconnected IT/OT ecosystems. Darktrace illuminates your entire business and takes targeted action to stop emerging attacks.
Link image
Story image
Sustainability
Aligned Data Centers increases sustainability-linked loan
Aligned Data Centers has increased its sustainability-linked loan from $375 million to $1.75 billion to speed up the next phase of its strategic growth.
Story image
APAC
Top data and tech challenges for APAC banks - report
InterSystems’ new report finds that 87% of A/NZ banks experience frustrations and concerns in using their data to drive decision-making.
Story image
Rackspace
Skills shortages hold orgs back from capitalising on cloud 2.0
Organisations are becoming more comfortable with sophisticated 'cloud 2.0' technologies, even as they confront difficulties in hiring and retaining IT talent.
Story image
Microsoft
Microsoft NZ announces initiative for local SaaS businesses
Microsoft has announced a new initiative, bringing together all of its tools to help local SaaS businesses build, sell and grow their companies at scale.
Story image
DaaS
NetApp launches Spot PC, a new Desktop-as-a-Service solution
This is a new managed cloud DaaS solution with security, automation, observability and optimisation capabilities, designed for the needs of today.
Story image
Microsoft
Elevation of Privilege the top 2021 Microsoft vulnerability
BeyondTrust has released its 2022 Microsoft Vulnerabilities Report, finding that Elevation of Privilege is the top vulnerability category for the second consecutive year.
Story image
Surveillance
i-PRO releases smallest AI-based surveillance camera on the market
The new i-PRO mini network camera is now available, with a pocket-sized form factor and full AI analytics functionality.
Story image
Informatica
Informatica, Oracle enter strategic global cloud partnership
Oracle named Informatica as a preferred partner for enterprise cloud data integration and data governance for data warehouse and lakehouse solutions on OCI. 
Story image
Digital Transformation
Harnessing digital innovations to maximise loyalty programmes and improve CX
When it comes to the retail sector, merchants have never had access to so many different client touchpoints and data to understand their customers better.
Story image
Ransomware
CERT NZ releases first Cyber Security Insights for 2022
CERT NZ has released Quarter One: Cyber Security Insights 2022, which offers an overview of reports about cybersecurity incidents affecting New Zealanders.
Story image
Identity and Access Management
The post-pandemic workforce requires secure IAM capabilities
HID Global discusses what identity and access management means for organisations in today's convoluted digital world.
Story image
SaaS
The paradox of change, and how to get around it
The business decision to technologically transform should not come from an IT department but from the business itself.
Story image
Training
Infosec unveils role-guided cybersecurity training roadmaps
Infosec Skills Roles maps hands-on training and certifications to the 12 most in-demand cybersecurity roles to maximise training efficiency.
Story image
Silver Peak
The path to an adaptive, modern network
Managing and securing the network looks different than it did just two years ago—especially given that most of these networks are made up of multi-generations of infrastructure stitched together over time.
Story image
Multi Cloud
Red Hat updates dev tools, empowers use of hybrid and multicloud
Red Hat has unveiled updates across its portfolio of developer tools, designed to help organisations build and deliver applications faster.
Story image
MEC
MEC spending for private cellular networks to reach $5.8b
A new ABI Research report finds the revenue for Multi Access Edge Compute (MEC) deployments for private cellular networks will reach USD$5.8 billion by 2030.
Story image
Microsoft
Microsoft, Cloudian partnership offers data center flexibility
Cloudian’s HyperStore object storage platform is now integrated and validated to work with Microsoft SQ Server 2022, offering more flexible and scalable data centers.
Story image
Cybersecurity
What every CISO must answer to enable a best-in-class security operations program
It has been widely reported recently that South Australian government employees have been the victims of a cyberattack.
Story image
Sift
Sift shares crucial advice for preventing serious ATO breaches
Are you or your business struggling with Account Takeover Fraud (ATO)? One of the latest ebooks from Sift can provide readers with the tools and expertise to help launch them into the new era of account security.
Story image
Symbio
Symbio consolidates TNZI business to support APAC expansion
Symbio has recently announced the consolidation of its international business (TNZI) under the Symbio brand to support its Asia Pacific expansion strategy.
Story image
NVIDIA
NVIDIA announces a spate of new innovations at Computex 2022
NVIDIA has announced its latest innovations in data center, robotics, content creation, and gaming in a virtual keynote address on the opening day of Computex 2022 in Taipei.
Story image
Cybercrime
The ups and downs and runarounds of catching cybercriminals in NZ
We're becoming more and more aware of cybercrimes but how many criminals actually get caught? The New Zealand police explain why the answer is complicated.
Story image
BYOD / Bring Your Own Device
How zero trust can lead the battle against ransomware
SecOps teams champion a zero trust strategy to support the fight against the escalating risk of cybercrime and help monitor threat actors across a network.
Story image
Transport
Third-party automotive apps bear significant privacy risks
Mobile applications for connected cars provide various features to make life easier for motorists, but they can also be a source of risk.
Story image
GapMaps
GapMaps Live to improve brand decisions on physical locations
GapMaps has released its latest service GapMaps Live, giving more insights and features to help brands make better decisions about physical locations.