Subscribe to CIO Magazine »

NZ Transport Agency (MIS100 2012)

2011 rating: 22

Senior IS executive: Craig Soutar, CIO

Address: 50 Victoria Street, Wellington


NoneUnder the wider umbrella of the NZ Transport Agency (NZTA) are a number of external sites requiring differing levels of ICT support, service delivery and planning. This number includes independent and NZTA authorised garages/workshops for warrant of fitness (WoF) online, vehicle traders and councils for Motochek enquiries, motor vehicle re-licensing and driver licensing outlets.

This year, the NZTA will prioritise 40 to 50 projects across three portfolios: State Highways (for maximising safe throughput of people and freight), registers (for managing access to and use of the network, including managing changes to motor vehicle, driver license and related external systems), and enterprise (for improving the effectiveness of public transport, and for improving customer service and reducing compliance costs). The overarching goal, says CIO Craig Soutar is “creating transport solutions for a thriving New Zealand”. Smartphone devices connected to the NZTA system span iPads, iPhones, Windows Mobile 7 smartphones and Androids. Twenty of the 140 ICT-managed iPads are part of a NZTA BYOD (bring your own device) programme. The organisation has recently initiated a mobile device management capability project.

Though budgets are down slightly for 2012, successful value-for-money initiatives and innovative strategies have led to an increased number of ICT projects and staff. Recent examples include leveraging all of government ICT capabilities, paperless governance (including the NZTA Board) meetings and systems modernisation.

Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: MIS100
  • The F5 DDoS Protection Reference Architecture part 3 of 3
    This whitepaper is the third in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section refers to case studies of different approaches to deploying protection architecture, including an enterprise customer scenario, an FSI customer scenario and an SMB customer scenario. The paper explains how these options should provide the flexibility and needed to combat the modern DDoS threat.
    Learn more »
  • Top 20 Critical Security Controls - Compliance Guide
    Simply being compliant is not enough to mitigate attacks and protect critical information. Organizations can reduce chances of compromise by shifting away from a compliance-driven approach. This guide provides the Top 20 Critical Security Controls (CSCs) developed by the SANS Institute to address the need for a risk-based approach to security.
    Learn more »
  • 4 Secrets to Meaningful Security Discussions with the Board of Directors
    Corporate boards are more interested in security than ever before. Here’s how to engage them in a strategic dialogue about a topic with bottom-line implications.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Recent comments