Glenn Archer to become the next Australian Gov CIO
- 18 December, 2012 12:54
Glenn Archer, deputy and first assistant secretary to former federal government CIO Ann Steward, will step into the Australian Government CIO role, the Australian Government Information Management Office (AGIMO) has announced.
Following Steward’s retirement after being in the position for seven years, AGIMO said it will take a whole-of-government approach to its ICT operations as part of a restructure, which is to be effective from 4 February 2013.
Archer will be responsible for providing governance and policy advice for ICT for the whole of government.
“As the AGCIO, Glenn will be the Chair of the CIO Committee (CIOC), the Authentication Governance Committee (AGC) and the Cross-Jurisdictional CIO Committee. He will provide support and advice to the Secretaries’ ICT Governance Board (SIGB), which will remain the premier governance mechanism for government ICT,” a spokesperson from the Department of Finance and Deregulation told CIO Australia.
“In addition to his current roles, Mr Archer will also assume the responsibilities currently held by Ms Steward in relation to various interdepartmental, intergovernmental and international committees and forums.”
The spokesperson said there will be no changes to budgets and no job losses as a result of the restructure, and expects the changes to make ICT operations more efficient in the long term.
The spokesperson said Archer has an “impressive background”, having worked in both the public and private sector. Archer became the first assistant secretary of the policy and planning division of AGIMO in June 2010.
AGIMO also announced the appointment of John Sheridan, first assistant secretary agency services at AGIMO, as the Australian Government chief technology officer. He will also have a central role in the restructure and will be responsible for the delivery and support of services, including networks, online services and ICT procurement.
AGIMO said it will provide further information on the restructure and will engage stakeholders and the public in a discussion in the coming months.
Follow Rebecca Merrett on Twitter: @Rebecca_Merrett
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Deploying Flash in the Enterprise
Flash is quickly emerging as the preferred way to overcome the nagging performance limitations of hard disk drives. However, because flash comes at a significant price premium, outright replacement of HDDs with flash only makes sense in situations in which capacity requirements are relatively small and performance requirements are high. Learn how deployment approaches-including hybrid storage arrays, server flash, and all-flash arrays-that combine the performance of flash with the capacity of HDDs can be cost effective for a broad range of performance requirements.
Implementing A Security Analytics Architecture
According to the 2012 Verizon Data Breach Investigations report, 99% of breaches led to data compromise within “days” or less, whereas 85% of breaches took “weeks” or more to discover. This presents a significant challenge to security teams as it grants attackers extended periods of time within a victim’s environment. More “free time” leads to more stolen data and more digital damage. Principally, this is because today’s security measures aren’t designed to counter today’s more advanced threats. Read on.
Customer Success - Slater & Gordon Lawyers
Lawyers work hard, and they work fast. Any activity that takes their focus away from the task at hand represents lost productivity and lost revenue. Slater & Gordon Lawyers needed to filter spam and email-borne malware and provide high availability for email. Results from the business solution they chose include 250 hours of IT staff time reclaimed annually for other tasks, long delays in email delivery alleviated, reduced email-related storage costs, and email failover to the cloud in minutes, avoiding hours-long outages. Find out how they got these results.