Recommendations for mobile workers, cloud services, and devices related to identity-centric security through identity-driven cyber resilience, comprehensive directory threat monitoring, detection, and response.
|
Development, establishment, amendment or termination of any program, policy, directive or guideline of the government of British Columbia or a Provincial entity, Awarding, amendment or termination of any contract, grant or financial benefit by or on behalf of the government of British Columbia or a Provincial entity
|
Information Technology
|
To communicate with a public office holder (procurement, infrastructure, IT, health, insurance, transportation) to educate and propose IT and security infrastructure solutions where siloed IT or multiple players across private and public sectors might be vulnerable to cyberattacks (due to legacy technologies, outdated security practices, limited budgets, etc.)
|
Awarding, amendment or termination of any contract, grant or financial benefit by or on behalf of the government of British Columbia or a Provincial entity, Development, establishment, amendment or termination of any program, policy, directive or guideline of the government of British Columbia or a Provincial entity
|
Information Technology
|