PSEICT

Public Sector Enterprise ICT

26 November 2020

Victoria Park Plaza

SOCIAL


LATEST TWEETS

Programme

Session one- mapping your requirements, testing your capabilities and becoming a disruptive tech leader

  • GovTech catalyst as a digital transformation enabler
  • Mapping the GovTech Catalyst Challenge
  • Data governance in the age of disruption
  • Integrating emerging tech from pilot to production
  • Building and retaining your cyber skills team
  • Deploying ethical hackers across government
  • Adopting AI to transform public service delivery
09:00
Conference Chair’s Opening Address
09:15
Digitalisation in the public sector: putting emerging technologies at the centre of your digital transformation journey

Since the advent of the GovTech Catalyst Fund, which is designed to help public sector leaders connect with tech firms in a problem-action-solution dynamic, many opportunities have arisen to share and resolve common governmental challenges.

In our opening address, we expertly map how the UK’s govtech market is now matching the popularity of fintech and what this means for central, local and devolved organisations.

09:35
Charting the future progress of the GovTech Catalyst Challenge: from implementation to progression

In this session, we explore the role that the GovTech Catalyst Challenge has played in creating a link between the identification of a workflow problem and the technology designed to address it.

We will also explore how best to manage the process by which investment is made in technology through the development of business cases in collaboration with solution providers.

 

09:50
Governing information channels: data governance in the age of disruption

New and emerging technologies are both data hungry and data generating. This presents the public sector with both a burden and an opportunity as greater insights require greater degrees of security and governance.

Whilst the private sector has traditionally been afforded the time and space to build disruption-proof governance frameworks to manage increasing data flows brought about by the adoption of disruptive technologies, the public sector has not been provided a similar degree of flexibility.

We address:

  • The data associated with exponential technologies
  • The need for cross-public sector standards-based data governance
  • Disruptive modes of citizen engagement
  • The identification of new processes, products and services
10:05
Implementing emerging tech: moving from pilot to production

For many senior decision makers and influencers, the hype of emerging tech often fails to meet reality as projects fail to move beyond the piloting to the production stage.

Mapping each key stage, from concept to scale, we address how it is possible to progress beyond the testbed stage to ensure that Govtech solutions, whether they be RPA, AI, ML, are successfully integrated into your established architecture and supporting infrastructure.

10:20
Building and retaining your cyber skills team

Whilst there exists a number of tools and techniques designed to democratise access to data and the technologies which support the sourcing, investigating and integrating of such data, attracting and maintaining a cybersecurity workforce has proven difficult for the public sector.

From not being able to meet private sector wages to not widening the scope of recruitment initiatives, each key area of concern must be analysed and a plan of action formalised.

  • Sourcing talent from previously unimagined contexts
  • Valuing a diversity of skills and backgrounds
  • Enhancing the attractiveness of the public sector
  • Developing recruitments pathways from other government sectors
10:35
Questions To The Panel Of Speakers
10:50
Refreshment Break Served in the Exhibition Area
11:30
Deploying ethical hackers across government: testing your security parameters

Designing services which are at once user-centric and secure is a difficult task. Services with a high level of user-centricity integrated into the system typically rely upon a high degree of insights gained from user interaction. This often leads to your attack surface widening as many fail to enhance the privacy features required when greater accessibility and usability is provided.

In this session, we address the value of employing ethical hackers to test your network security and the various means by which hostile actors can circumvent your security features.

11:45
Adopting AI to transform public service delivery

The efficient delivery of citizen-centric services has never been more difficult to achieve as the size, complexity and demands of modern government continues to evolve.

 

One of the ways in which central, local and devolved authorities are seeking to better manage process heavy workflows is by automating where possible through AI complemented insights.

We address the value of integrating AI applications into your workflows:

  • Reduce backlogs
  • Cut costs
  • Overcome resource constraints
  • Free workers from mundane tasks
  • Improve the accuracy of projections
  • Inject intelligence into scores of processes and systems
12:00
Questions to the Panel of Speakers and Delegates move to the Seminar Rooms
12:15
Seminar Sessions

Delegates have the chance to attend one seminar session CLICK HERE TO VIEW

13:00
Networking Lunch Served in the Exhibition Area

Session TWO

  • Citizen personalisation: Self-sovereign identity for government
  • Adopting big data analytics to inform public policy formulation
  • Service delivery: Deploying deep learning algorithms
  • Continuous delivery: DevOps in government
  • The Internet of Things: connected government
  • Cloud first: supporting the design and delivery of digital solutions
14:00
Conference Chair’s Afternoon Address
14.:05
Citizen personalisation: Self-sovereign identity for government

When we add the complexity of modern governance with the binding of the physical and digital, the measures by which authorities seek to verify the identities, and the manage the access demands, of both business and end users requires a conceptual reframing.

It all starts with changing the ways in which we collect and process data when personalising services.

We address, how incorporating SSID, ZKP and user managed disclosure allows government to personalise services without putting citizens at risk.

14:20
Adopting big data analytics to inform public policy formulation

Big data analytics presents policy leaders and data scientists with both an opportunity and a challenge. The opportunity being the ability to move beyond perception, public polling and human led statistical analysis, to refined, machine-led production of data analysis. The challenge being how to implement, deliver and manage the process.

We address:

  • How big data analytics can contribute to policy processes
  • Accommodating different stages and different domains
  • Illustrating the potential and challenges linked to existing use cases
  • Identify the lessons learnt from real world examples
  • Investigate the potential for further initiatives
14:35
Identifying inconsistencies in service delivery: deploying deep learning algorithms

Many believe that the era of massive data accumulation means that we now have the technology needed to ensure a truly panoptic understanding of service user profiles. Whilst big data analytics has advanced the means by which we establish an understanding of societal needs and demands, it is through the deployment of deep learning algorithms that we can best identify inconsistencies in service delivery designs.

We address:

  • Analysis of process specific data sets
  • Better assessment of data quality
  • Better maintain control of your data
  • Reconfigure your workflows when necessary
  • Embed AI into your system to support real time feedback into your processes
14:50
Questions to the Panel of Speakers
15:00
Afternoon Networking and Refreshments served in the Exhibition Area
15:30
Continuous delivery: DevOps in government

In order to meet the demand for digitalisation of government services and solutions at speed and scale, many are turning to agile workflows which are baked in and scaled by DevOps practices. Whilst having the ability to create or improve a service without impacting on productivity and efficiency is of immense value, within a public sector setting it is important to remember the impact on privacy and security due to the cross-agency nature of public service delivery.

We highlight how you can:

  • Embrace a transparent, collaborative development process
  • Evolving to a DevSecOps posture
  • Protect sensitive information in a lengthy and rigid procurement structure
  • Reduce System Complexity
  • Deliver Better Services
15:45
The Internet of Things: connected government

Service based queries which have historically been answered by helpline staff are now being directed towards IoT devices which collect data at an ‘always on’ rate. From asking how to apply for a passport, how to apply for free childcare to more serious concerns regarding personal health, questions are asked and answered within a matter of seconds rather than the lengthy process of person to person exchanges.

As we move towards layered queries which require a more detailed and prolonged dialogue, departments are seeking to simplify people’s interactions with government by making information clear and accessible to everyone.

We explore the evolving digital-government landscape and highlight early examples of adoption as well as new and emerging piloting projects.

16:00
Cloud first: supporting the design and delivery of digital solutions

Using the example of the Home Office cloud adoption strategy which formed a key part of its digital transformation project, we highlight the role it played in providing a technological upgrade to the way in which immigration services are delivered and the cross-agency value this presents.

We address how the Immigration Technology Team:

  • Identified the lack of scalability and stability in its previous platform
  • Improved the delivery efficiency, test capabilities and service performance
  • Managed migration of a large infrastructure and vast amounts of data with continuous delivery
  • Secured a 35% reduction in weekly incident volume
  • Reduced on-demand deployment of big data infrastructure from two days to one hour
  • End-to-end environment build time reduced from four weeks to two days
16:15
Questions to the Panel of Speakers
16:25
Closing Remarks from the Conference Chair
16:30
Conference Close, Delegates Depart

Please note:
Whitehall Media reserve the right to change the programme without prior notice.