After hearing a bit about the state of electronic government information, the group at table 3 set out to identify gaps where information might get lost and identify the information most at risk of loss and what threats might lead to that loss.
Read More