TABLE 1

AI and Automation: Exploring Opportunities to Augment Operations and Service Delivery

  • Enabling public sector teams to achieve efficiencies through automation innovation
    • Exploring opportunities to digitize, and build apps that will support teams in focusing on higher value tasks
  • Modernizing information and data management through automation tools
  • Demystifying generative AI, the pros, cons, and future considerations for use
    • Examining the cyber security and privacy considerations
    • Determining how it can augment public sector IT/IM projects
    • Exploring potential use cases and cautionary areas

TABLE 2

Citizen Centred Design: Creating an Inclusive, Accessible Digital Service Experience

  • Identifying opportunities to simplify the end user experience
  • Using journey mapping as a team to identify and generate solutions to service delivery challenges
    • Ensuring the citizen experience with government services is consistently secure and efficient both digitally and in person
    • Designing services with accessibility, and inclusivity in mind
  • Integrating the front and back ends of services, ensuring the right internal processes, capabilities, and policies are in place to support the delivery of your services
  • Anticipating how digital service expectations will evolve with the next generation
  • Sharing and analyzing examples of private sector service experiences, what was learned and how it can be applied to public sector service delivery

TABLE 3

Next Generation Workforce: Structuring Teams, and Leveraging Digital Tools for Project Success in a Hybrid Environment

  • Identifying the biggest pitfalls when integrating digital tools into workflows and how to avoid them
  • Determining the appropriate tool for the task
  • Assessing how collaborative tools continue to change how employees work – future opportunities, and current challenges including privacy considerations and hybrid work arrangements

TABLE 4

Data Storytelling is Your Superpower: The Value of Data and Communicating it Effectively within Government

  • Developing data skills for the public sector
    • Examining types of data and the data process
    • Assessing the value of the data you have
    • Best practices for becoming a data communicator, and leveraging digital visualization tools
  • Exploring how different departments, employees are using data to derive actionable insights for the organization
  • Delve deeper into practical examples of challenges that come up on the data journey and how to work through them

TABLE 5

Navigating the Ins and Outs of Digital Communications and Social Media in the Public Sector

  • Balancing the citizen engagement, and increased transparency with cyber security and privacy considerations
    • Assessing which online platforms and tools align with these goals
  • Determining the parameters of use – who can communicate, and on what channels?
    • Best practices, and risk mitigation measures
  • Measuring ROI from digital communications initiatives
TABLE 1

Artificial Intelligence: Assessing the Implications for the Organization

  • How to improve secure posture
    • Privacy measures and protected information
  • Employee security considerations when using ChatGPT
    • Determining what data about the employee is safe to input
    • Examining risks of using it to assist with public sector projects

TABLE 2

Threat Hunting and Cyber Threat Intelligence: Strategies for Tracking Down Advanced Cyber Adversaries

Moderator: Hamza Ahmed, Senior Cyber Security Specialist, Government of Canada

  • Assessing current threats and anticipating future tactics
    • Phishing—trends in how employees are being compromised including threat actors pretending to be employees, the use of malware
    • Creating robust employee cyber security training on these risks
  • Leveraging the latest tools and technology, API and AI

TABLE 3

Securing the Cloud: Top Considerations for Creating a Safe Cloud Environment


TABLE 4

Hybrid Workforce: Top Security and Privacy Pitfalls

  • Breaking-down usability barriers while ensuring protection
    • Application containment
    • Segmentation and limited access to legacy applications
    • Secure mobility for users
  • Examining how the creation of digital identities support the security ecosystem
  • Predicting infrastructure pain points and working through them
  • Creating a security roadmap for remote work: What safety practices and tools should be implemented?
  • VPN vs VDI
  • Remote Desktop Patching

TABLE 5

Insider Threats – Detection and Prevention