2018 NJ GMIS Technology Education Conference
Speakers & Session Information


Keynote Presentation: Talking Like A Leader – Perception is Truth!

Anthony Huey
President, Communicate Clearly

Anthony Huey is a highly-rated international speaker and communications consultant who offers session attendees pragmatic communications tools, tips and techniques they can use immediately.  His career includes tenures as a news reporter, magazine senior editor, crisis management specialist, media relations consultant and executive speech coach.

Anthony leads Reputation Management, LLC , one of the nation’s leading communications training and crisis consulting companies. He has presented nearly 2,700 paid keynote speeches, workshops and seminars on a number of timely communications topics that executives can incorporate into both their professional and personal lives.

His direct client work includes a wide variety of advertising, public relations and communications initiatives for hundreds of trade associations, municipalities and companies, including Nike, Victoria’s Secret, Eli Lilly, Nationwide Insurance, The Kroger Company, and Procter & Gamble.

Anthony received his Bachelor’s degree in Journalism from Ohio State University.

About the presentation:
The old adage, perception is reality, has never been more true than in today’s superficial, hyper-critical and social media-driven world. Studies increasingly show that perception trumps facts when people make judgements of others. For today’s business leaders, communicating clearly – both interpersonally and organizationally – is often the number one driver in controlling that perception. This session gives executives pragmatic keys to swaying internal and external perception in their favor. 

Key Take-Aways

  • The power of perception
  • Communication’s impact on perception.
  • Keys to controlling external perceptions.
  • The leader: Style vs. substance.
  • Keys to improving intrapersonal perceptions.

After A Breach: What Happens Next

Edward Cooney
Vice President and Underwriting Manager, Connor Strong & Buckelew

Shawn Melito
Management Analyst, Kivu Consulting, Inc. 

Jim DeVico
Technology Coordinator, Township of Edison

Shawn is a Management Analyst responsible for Kivu’s North American business development activities in the cyber insurance market and client relations with many of the leading data breach management and privacy specialized law firms. Shawn brings over 20 years of management experience to this role. Previously Shawn was a Management Consultant, Information Systems Analyst and business unit leader for NPC’s Immersion Data Breach Response Service group, a leading notification and call center service provider to the cyber insurance community. Other relevant prior work experience includes managing a Canadian breach response and identity theft services company, as well as Healthcare, Insurance Services and a contract with the Office of the Privacy Commissioner of Canada. Shawn is a certified information privacy professional (CIPP/US) through the International Association of Privacy Professionals (IAPP) and previous member of their Canadian Advisory Board. He has chaired multiple cyber insurance industry conferences and presented on the topics of data breach, data security and identity theft at IAPP, RIMS, NetDiligence, ACFE, CLE and the Institute of Internal Auditors events. He was also featured on SiriusXM’s radio show, When Things Go Wrong. Shawn received his B.A. from the University of Toronto, and his M.B.A. from the Richard Ivey School of Business in London, Ontario.

Many local governments have a cyber insurance policy that provides network breach coverage.  This coverage usually includes response support for a ransomware infection or if there is a possible exfiltration of personally identifiable information, among other services.  But, if you have coverage, do you know your responsibilities under the coverage, how to activate it, what happens when you, and your role in all that?  Do you know what a breach coach is and does and why they are important?  The panel consists of a representative of the Municipal Excess Liability Fund that provides cyber insurance to almost 600 NJ local government units, a technical breach response specialist, and a CIO who went through a breach and insurance response.  If you have cyber insurance and don’t know how it works, you should site in on this panel.  If time permits, we’ll also talk about some minimum technology standards that will help you prevent breaches. 


Making Sense of IT Governance

Cordell Schachter
Chief Technology Officer, New York City Department of Transportation

Cordell Schachter is the Chief Technology Officer for the New York City Department of Transportation. He leads its IT & TElecon organization and department-wide projects to innovate safety, mobility; smart and accessible infrastructure, software development, mapping, communications, public data, and customer support. IT & Telecom has earned local, state and national recognition for its work to make New York City safer, faster, smarter and more efficient. Cordell has ever 30 years of experience in New York City government and in private sector technology management. He is a certified project manager by the Project Management Institute and by IBM. He holds an MS in Management from NYU’s Wagner School of Public Service and a BA in Economics from SUNY Buffalo. Her serves on the board of directors of the Intelligent Transportation Society of America, and is an adjunct Associate Professor at NYU’s Center for Urban Science + Progress. 

The use of lean IT governance models can help organizations use information technology (IT) to work smarter, improve productivity, reduce cost, and increase accessibility. Since all new government and business systems are IT systems, IT teams need to reliably deliver innovative IT systems that meet their customers’ expectations.

IT Governance is a holy grail for many organizations, especially those that dedicate a significant share of their budget for innovations. Lessons learned from failed or partially successful IT projects often identify poor communication, unauthorized work, missed scope, and blown budgets as the major sources of stakeholder dissatisfaction. The use of a lean governance model can help improve IT project outcomes and improve the return on IT investments.


Managing CJIS Technology: Today and Tomorrow

Lt. Cy Bleistine
Lieutenant, New Jersey State Police – Cyber Crimes Unit

Cy Bleistine is a Lieutenant with the New Jersey State Police and currently heads the Cyber Crimes Unit.  He has over 23 years of law enforcement experience.  He began working in the field of high technology investigations in 2005.  He has instructed law enforcement officers on technology related investigations and provided instruction to the public on general guidelines for Internet Safety.  In addition to his duties as the leader of the Cyber Crimes Unit, he has been the commander for the NJ-ICAC Task Force and is currently the head of the New Jersey Cyber Terrorism Task Force.

State Police Lt. Cy Bleistine will talk about where we are today with managing criminal justice information systems, the challenge of managing CJIS silo’s and systems integrated with other municipal activities; the role of the cloud in law enforcement; security issues; and where the future of CJI management seems to be going.


Anything As A Service Considerations

John Dougherty
IT Consultant

John Dougherty has been a software developer and web developer for over 25 years. He has worked in manufacturing and finance, as well as for the government and Military. He is also an Adjunct professor at Rutgers in the field of software development. He has three children and lives in Asbury Park.

This presentation will provide an overview of cloud-based solutions for creating and maintaining software used for management of municipal/county tasks. In particular, the use of technologies to develop a system to track septic system pumping (including the notification of property owners of their upcoming need to pump their systems in a timely manner) will be discussed.


Municipal Data – Beyond The Office LAN

Jack Flood
Vice President of Operations, Spatial Data Logic

John (Jack) Flood is the Vice President of Operations and a co-founder of Spatial Data Logic (SDL).  A lifetime New Jerseyan, Jack has over 20 years of experience in project management and consulting in the areas of Government (specifically on municipalities and counties in New Jersey), Utilities, Geographical Information Systems & ESRI Technologies, Enterprise Architecture and Enterprise Software. Jack graduated from Villanova University with a BA in business.”

It can be tempting to want to keep municipal data flow within the confines of the office LAN. However, there are good reasons to share data with both officials in the field and citizens of your community. SDL’s Jack Flood will share insights gathered over the years as to what works, why it’s important, different access methods and how best practices can help you be more open and more efficient without losing control of your data.

Johnston Communications


Video Surveillance Made Easy with Cisco Meraki and CDI

Chris Clark
Director of Public Sector, Computer Design & Integration

Matthew Schaner
Product Sales Specialist, Cisco Meraki

Meraki MV is changing the way we think about video surveillance. No more NVRs to manage, no failed hard drives to replace and no software to install or viewing stations to maintain. View video anywhere, anytime, on any device — instantly. Share video with law enforcement quickly and easily, while giving the right people access to the right cameras with an intuitive interface for finding video.

This session will take a deep dive into how Cisco Meraki MV and CDI provides reliable security and valuable business insights to public sector organizations of any scale.

Chris Clark, Director of Public Sector, at Computer Design & Integration LLC, is a highly skilled and versatile technical and business professional with over 20 years of management and leadership experience. Clark’s primary focus falls within CDI’s public sector practice and in this role, he is responsible for delivering cost-effective services and scalable solutions for state and local government and education. As a professional with an eye for addressing modern IT needs for the 21st century environment, Clark’s attention to detail allows for deployment of fully integrated converged infrastructure, security, data center, business continuity and virtualization solutions across large-scale environments.

Matthew Schaner, Product Sales Specialist, Cisco Meraki, is a proven performer with excellent leadership ability, strong communication / public speaking skills, and comprehensive knowledge of networking and cutting-edge technologies. With expertise in education and government development, public sector procurement, solution and architectural selling – he has been described as a dynamic, engaging presenter and a trusted advisor. Matthew is currently a product sales specialist, covering the Meraki product line in New Jersey and is a graduate of Lehigh University.

What Are You Doing Now to Ensure the Legacy You Leave Behind Is More Than Just Legacy Infrastructure? 

E. Steven Emanuel
Senior Industry Advisor, Public Sector and Regulated Industries, TenFour

New technologies in the Digital Age are transforming our industry. But what about your organization? Is the way it’s consuming technology transforming your business or holding it back? As new budgets remain cautious and cyber security is on a never-ending incline, what are you doing to ensure you’re delivering digital government services that will not only differentiate and grow your organization, but that someone behind you would be foolish to undo? The Cloud only gets you so far. The winners in the Digital Age are the companies who have changed their point of view and transformed from the ground up. Learn what you can do in the next six months to change the course of your organization.

E. Steven “Steve” Emanuel is a native of Teaneck, NJ, graduated Teaneck High School, attended Eastern College with a degree in Criminology / Sociology. His work career began in retail for Gulf Oil (1976 – 1978) leaving to work for CNA Insurance Company, Reading PA, as a Unit Supervisor. He then moved to Chicago for CNA to work in systems planning and design (1978-1985). Steve went to work for General Public Utilities as programmer trainee and moved through the IT department working as a report writer, help desk staff member and eventually to network operations. There, he lead three major network projects and moved into network management as a Network Coordinator and then assigned to Oyster Creek Nuclear Station (sister station to Three Mile Island) as the Site Manager for all power plant IT operations (1985 – 1998). He later began a career with Amtrak in 1998 as the Director, Network (Philadelphia) and was promoted in 2000 to Sr. Director, CIO of the Northeast Corridor (NEC) operations. During his tenure, Steve implemented new infrastructure designs for all NEC locations, including the implementation of fiber backbones and the expansion of Local Area Networks (LAN) through new distributed electronics, including a conversion from Token Ring to Ethernet technology. In 2004, he moved into Acting position as Amtrak’s Chief Information Officer (Washington DC) and awarded the position in April, 2005 and departed in May, 2007 after accepting the CIO position with Montgomery County. The Montgomery County Government was the first “public sector” position for Steve. After joining the County, he completed the first Enterprise Technology Strategic Plan to create the first enterprise view of technology, solutions and support. He also sponsored the County’s newest modernization plan for Public Safety identified as the Public Safety Systems Modernization. It is inclusive of a systems modernization strategy, a roadmap for CAD improvements and future improvements as well as the County’s Interoperability Communications Plan. Steve has also been a primary participant in the development of the plan and execution of the County’s Enterprise Resource Planning Project and the strategic implementation of the County’s Constituent Relationship Management project (MC311). Within Division operation, Steve implemented the first enterprise Project Management Office, developed the first comprehensive program scorecard and IT project qualification review, focused on staffing competency and succession planning as well as the validation of the County’s Enterprise Architecture and countywide application portfolio inventory. Steve went on to become the Chief Information Officer for the State of New Jersey from 2011 to 2016. He was selected to replace a long tenured CTO, the State looked for a transformation of centralized technology services through a focused approach that created two centers of excellence, one for day to day operations, the other to provide leadership strategies for governance and planning for technology innovation. Most recently, Steve joined TenFour in 2016 as the Senior Industry Advisor for Public Sector and Regulated Industries. As TenFour transforms the IT industry, this role will counsel public sector IT leaders as they evolve their infrastructures into the Digital Age. It leverages TenFour’s model to provide a true IT Total Cost of Ownership (TCO) and a consistently modern infrastructure that responds to the new challenges of digital government and economy. This most current role supports growth for TenFour’s customers and bolsters TenFour’s mission to change the way the world consumes and experiences IT; through a model that aligns with business goals and offers IT leaders the freedom to innovate.

  Digital Communities – Data Architecture IoT and Blockchain

Rob Silverberg
CTO – Digital Communities, SHI

Rob is currently the CTO for Dell SHI’s Digital Communities focus. In this role, Rob works with state and local government customers across the nation to help these agencies understand how SHI’s broad portfolio of technologies and solutions can help them achieve their goals. Rob has extensive experience with enterprise data management, content management, and in systems integration design. Most recently, Rob has worked extensively on SHI’s Digital Communities data architecture and public safety solutions. As a subject matter expert and thought leader in this space, Rob speaks at conferences and events sharing current projects, innovations, and advising on strategy. Rob currently participates as a smart city board member for the City of Austin, TX and the City of San Jose, CA. Rob has been with SHI for over 14 years holding previous positions in consulting management and public sector industry marketing. Prior to SHI, Rob worked with several startups as well as Oracle and IBM/FileNet.

In this session, we will explore the innovative smart city data architecture from SHI that enables digital communities to better manage the new data streams coming from sources such as IoT sensors and devices. We will then cover the innovations and investments that SHI is making in IoT technology and how connecting IoT devices will become easier with an open source, standards based, approach. Finally, we will look at how the disruptive technology called blockchain could provide a secure distributed digital leger for digital communities use cases.

Intro to Pure Storage

Joe Mercede
Solutions Engineer, Pure Storage

Join Solutions Engineer Joe Mercede for an introductory session to Pure Storage, whose enterprise all-flash cloud data storage solutions deliver data-centric architecture to accelerate your business. This session will focus on Smart Storage for Cloud IT – Effortless, Efficient, Evergreen.
  Malware Vs. Machine

Keith Rayle
Senior Strategist, Fortinet

Over 20 years of governance and operational security experience. Executive level security consulting, to include program/portfolio creation and management. Provided board level reporting, security strategy creation and implementation, and global business security integrations. Acting CISO and Director of Security for large corporations. Led large multi-project teams at the program level, with oversight of multiple simultaneous and complex implementations of technical security projects. Designed and implemented most aspects of corporate security programs. Assisted large organizations in defining CISO responsibilities and requirements in order to provide alignment of security programs to business operations. Consulting experience includes delivery of services to include large multi-project/multiyear programs. Provided executive advisory services in a variety of industries, to include retail, aerospace engineering, national/international banking, healthcare, manufacturing, logistics and transportation, federal/state organizations, and others. A wide range of regulatory experience includes PCI, SOX, FFIEC/FIDC, HIPAA, NERC CIP, and security framework knowledge extends to ISO/IEC 27001/27001, NIST, FISMA, OCTAVE and others. Program level services for customers, including advisement to Fortune 100 executives (CIO and CISO), creation of corporate security programs and strategies, risk program operational definitions and implementation, and delivery of security/privacy framework implementations. Provided all aspects of creating and implementing multi-project technical programs, from requirements gathering to shifting systems into operational SDLC maintenance cycles. Created large risk management frameworks for global enterprises, to include complex operations such as mergers, acquisitions, and divestitures. 21-year military veteran as a nuclear weapons technician, threat officer, OH-58/AH-1/UH60 helicopter pilot and maintenance operations officer.

Malware dates back to the earliest days of connected computing. Our approach to dealing with malware has remained relatively static. The current malware management method relies on being able to determine patterns within unpacked, decrypted files. This provides a single pattern-based signature to defend against a wide range of malware attacks but is insufficient for the future. Artificial intelligence has been used to solve business and social problems using advanced data mining and compute capabilities. During this session a specific implementation of a deep learning system will be explored to give insight into how this type of technology will combat cybercriminals and the malware they create.

  Protect Your Network from Ransomware & Other Threats

James Sarno
Cloud Security Specialist, Cisco Systems, Inc.
Leveraging the Cloud to secure your network – both easily and affordably:
  • Common Web Security Challenges in Government
  • How to stop Ransomware and other web-born malware using DNS
  • Umbrella/OpenDNS Assessment Overview w/FREE Security Assessment
  • Top 10 Government Web Security Controls
  Virtualization Designed to Deliver Simplicity, Availability, and Scalability

Brian Bauer
Senior Systems Engineer, Scale Computing
Scale Computing’s HC3 is the IT virtualization infrastructure platform that is changing the way IT runs from the ground up. Combining servers, storage, hypervisor, and backup/DR, HC3 is helping IT administrators transform their infrastructures to be more scalable, more highly available, and more affordable. Simplicity is the not-so-secret ingredient in HC3 delivering savings over traditional infrastructure solutions and the hyperconverged competition.
HC3 and the HyperCore architecture were designed to provide highly available, scalable compute and storage services while maintaining operational simplicity through highly intelligent software automation and architecture simplification. HyperCore puts intelligence and automation in the software layer and was designed to take advantage of low cost, easily replaceable and upgradable “commodity” hardware components including the virtualization capabilities built into modern CPU architectures.
  Using Your Citizen Request System to Improve Citizen Engagement

Jason Scheper
Regional Director, CivicLive

Jason Scheper is the Region Director for CivicLive, a West Corporation brand that works with local governments to create Smart Websites. Jason is known for his expertise in new business development, client relationships, and solution-based selling within the Commercial, Government and Education markets.

Learn how to build civic engagement through your Citizen Request System. Built to improve and streamline delivery of services, a Citizen Request System makes it easy for citizens to engage and effectively communicate with their municipality–anytime, anywhere, online. Leverage your citizen request system and: • Put the control in your residents hands by enabling them to track the progress of their requests. • Make it easy for your staff to respond quickly to issues. • Set your staff up as the number one, go-to source for residents’ issues and concerns, making them leaders in citizen communication.

  Smart Cities Trends and Challenges

Jose Escobar
Senior Manager Business Development & Strategy, Verizon Smart Cities

From population growth to rapid urbanization, communities are facing new challenges to maintaining high standards of livability, resiliency and sustainability. Using innovative Internet of Things (IoT) and machine-to-machine (M2M) communication solutions, city executives can help improve efficiency and revolutionize cities to create a better quality of life for both work and play. See how our Smart Cities solutions can make a difference in your world.

Jose is focused on helping cities, universities, and corporations leverage technology to develop and deploy Smart City applications. Jose works with government and industry leaders to help identify Smart City initiatives and build a vision and roadmap with a goal to drive economic growth, enable environmental sustainability, and enhance quality of life for citizens, students and customers. Leveraging his technology and telecommunications experience in working with state & local, enterprise and small business customers; Jose takes a consultative approach to
understand challenges and requirements, develop strategy, and incorporate the right mix of partners and technologies. Previously, Jose was a Client Partner as part of Verizon’s Global Channel & Alliances organization working with technology partners in developing new product
and revenue streams utilizing Verizon’s extensive Network, Security and IOT solutions. Jose holds a Business Degree from Suffolk University and Masters of Science from Boston College.

Stop Managing Storage and Start Managing Your Business 

Victor Neno
Senior Systems Engineer, Tintri

Lou Melograna
Chief Technology Officer, StarNet Solutions

  Cyber Security: Protecting Data for the Public Good

Alpesh Shah
Solutions Architect Manager, Presidio

About the Presenter: Alpesh Shah is the Practice Director and Cyber Security Solutions Architect Manager at Presidio. He supports both fortune 500 companies and government agencies in designing leading edge, complex and enterprise level cloud and security solutions. His passion for information security encouraged him to obtain several technical and business level certifications like CISSP, CISM, CEH, CHP, Security+ and ITILv3. With over a decade of experience in the IT industry, he specializes in managed security solutions, threat and vulnerability management, governance and compliance (HIPAA, PCI, FEDRAMP, ISO 27001, NIST), Disaster Recovery and Business Continuity Planning amongst other areas.

Cyber-attacks in the local government sector are becoming more common, more dangerous, and more sophisticated. In today’s rapidly evolving digital world, regulatory compliance, customer confidence and the bottom line depend on your organization getting cyber security right. It’s no secret that government agencies are a serious target for their intellectual property and confidential data. Those in the public and private sector face significant challenges such as tight budgets and limited access to the newest technologies to protect data, which contribute to weak IT infrastructures. This presentation will showcase how legacy architecture isn’t enough to safeguard mobile devices, IoT networks and cloud data. When it comes to storing sensitive data such as Social Security numbers, health care records and driver license numbers, cyber security should be a priority. Speaker Alpesh Shah will take a deep dive into why reactive solutions won’t give your organization the comprehensive protection it needs to stay compliant, maintain business continuity and anticipate threats on the horizon. Join Alpesh Shah to gain a more holistic approach to cyber security and protect your organization from potential threats in the future.



  Avaya: The Foundation of Agile Communication Solutions in a Transformational Environment

Steve Haley
Digital Transformation Strategist, Avaya

Steve has 18 years of experience working in the contact center space, with the last five years spent at Avaya supporting Enterprise and Global accounts. He is currently a Digital Transformation Strategist focusing on partnering with customers to identify initiatives to transform them from traditional Unified Communications and Contact Center solutions to the future of communications utilizing the Avaya platform.

Stepping up to the digital transformation mandate, developers need a better way to connect people throughout the business. Slash the hours and effort it takes to communications-enable your applications and workflows. Build apps from reusable parts, integrate your apps with other apps, even start from scratch. Use the visual workflow-building tool to automate manual processes. Incorporate any communications method. Be a problem solver. Efficiencies and savings will pile up.


Michael Geraghty
Director of Cybersecurity and State CISO, NJCCIC

Michael Geraghty is New Jersey’s Chief Information Security Officer and the first Director of the New Jersey Cybersecurity & Communications Integration Cell (NJCCIC) located at the Regional Operations Intelligence Center. Director Geraghty manages the day-to-day functions of the NJCCIC, the State’s central hub for cyber operations and resources.

Geraghty brings a wealth of public- and private-sector experience to this role, having served as Chief Information Security Officer (CISO) of the Hudson’s Bay Company, Chief Information Officer of the National Center for Missing and Exploited Children, and Vice President of High Technology Investigations at Prudential Financial. Previously, Geraghty served 12 years with the New Jersey State Police, where he led the formation and development of the High Technology Crimes Investigations Unit.

Geraghty has lectured extensively throughout the world on the topic of cybersecurity, high tech investigations and computer forensics, providing technical and investigative assistance to law enforcement agencies both domestically and internationally, including the FBI, Secret Service, Department of Homeland Security, Naval Intelligence, New Scotland Yard, and the Royal Newfoundland Constabulary Service. He has provided expert testimony before Congress and in federal, state, and international courts on computer crime investigations and forensics. Geraghty is also a past president of the Northeast Chapter of the High Technology Crimes Investigation Association and has held leadership roles in the National Strategic Policy Council on Cyber and Electronic Crime.

Geraghty earned his Bachelor’s Degree from Thomas Edison State College. 

 This presentation by the State of NJ’s CISO and Director of the NJ Cybersecurity & Communications Integration Cell will illustrate how an adversary can use easily accessible applications and information to select targets for exploitation.

From the Basement to the Boardroom: Moving On Up! 

Shannon Tufts
Associate Professor of Public Law and Government and Director, Center for Public Technology

Shannon Tufts designed and implemented the first local government Chief Information Officers Certification program in the nation and continues to run CIO certification programs for local and state government IT professionals. She created a National Certified Government Chief Information Officer program in 2007, in order to serve the growing needs of public sector IT professionals across the nation. Tufts has taught numerous courses on public sector information systems across the United States, including IT investment strategies, embracing technology, project management, and stakeholder engagement in technology-enabled government. She serves on several federal, state, and local government committees to promote the effective use of technology in the public sector. Her publications in the area of e-government and public sector information technology include Humanizing IT: Advice from the Experts with G. David Garson, numerous book chapters, and articles in Social Sciences Computer Review and Popular Government. She was named Albert and Gladys Coates Distinguished Term Assistant Professor for 2012–2014. Tufts earned a BA from UNC-Chapel Hill, an MPA from UNC-Charlotte, and a PhD in public administration with a concentration in public sector information systems from North Carolina State University.

“Crying employees??  But none of my educational experience or technical training prepared me for CRYING EMPLOYEES!!!”  Sound familiar?  One of the biggest challenges facing IT professionals is making a successful transition from techie to manager without proper training for this transition.  Most of us enjoy the very satisfying process of delivering tangible, real-time results through the skillful application of our technical prowess.  But in order to progress up the career ladder, eventually you have to jump out of the fun, immediate gratification world of programming, networking and the like, and move into the world of human beings and all of their quirks and emotions.  This session will cover several strategies to guide you through this transition and prepare you for “moving on up”!

E-mail Retention and Implementation Strategy

Elizabeth Hartmann
NJ State Division of Revenue and Enterprise Services/ Records Management Services

Bill Kosinetz
Director of IT, Sussex County 

Dan Freed
Records Manager, Sussex County

Robert H. Thurgarland – Manager, County of Hunterdon Division of Information Services and Committeeman, Township of Holland, Hunterdon County New Jersey

Elizabeth is responsible for the implementation and management of the State’s Records Management Services which involves all State, County, and Municipal document retention schedules. As part of these responsibilities she was directly involved with the development of the proposed E-Mail Retention Schedules that have been adopted by the State Records Committee (SRC) in December 2017.

As Chief Information Officer for the County of Sussex New Jersey and steward of critical business assets, Bill works collaboratively with integrated teams within the entire enterprise of Sussex County to ensure that those resources are effectively, equitably, and professionally maintained and applied. His efforts to reduce cost and improve business processes are continuous. William Kosinetz is envisioning the future of computing and communications technologies, anticipating a new path to business process management. Visualizing and comparing business
processes that aim to improve new process techniques and deployment are the main goals. Enterprise integration and enterprise resource planning is the core of adapting change and business process management. By creating a new infrastructure, business decisions made today, now become key strategic advantages and capabilities of tomorrow. William Kosinetz is pleased to have the National Association of Counties present a 2013
Achievement Award for his business model on Shared Services in the Private Cloud. The GMIS International award winning the Best Practices Award and the Center for Digital Government has also awarded Sussex County 1st place in 2012 for his Private Cloud Initiative business model.
Information Week Elite 100 for 2015 for applying emerging technology. William has been noted in Public CIO magazine and Digital Communities magazine. Sussex County’s achievements and recognitions can be found @ Sussex.nj.us under the Information Technology Department.

Dan is responsible for the enterprise eContent management strategy that has been implemented at the County based on an integrated approach to managing technology, information, and business process, across Department and Municipal boundaries. Dan is also the Vise President of the County Archives and Records Management Association of New Jersey (CARMA-NJ). In that capacity he has an intimate understanding of the records management challenges faced by Municipal and County agencies across the State. During the past two years, Dan actively participated in the discussion that lead to the adoption of the new E-Mail Retention Schedule that was adopted by the State Records Committee in December 2017.

Robert has twenty three years of public service having worked for the County of Hunterdon since 1995. Member of the County’s Shared Services Committee; Facilities Evaluation Committee, Risk Management Committee and sit on the County’s budget evaluation Committee to review and recommend technology and software requests. Direct operational oversite for the County’s Information Technology Division, GIS Division, Central Printing/Mail and Records Management Divisions and work in cooperation with County Counsel’s Office to direct the receipt and disposition of open public records request (OPRA) for the County.

Elected in 2015 as Committeeman for the Township of Holland in Hunterdon County. Municipal responsibilities and assignments include Website/IT, Assistant Public Safety (Police/OEM/Fire/Rescue), Liaison Environmental Commission, Buildings and Grounds, Assistant Parks/Recreation/Pool and Recycling services and voting Liaison/member of the Township Board of Health; Past Vice-President Holland Township Parks Association.

This presentation will cover the following topics regarding the new retention regulations for E-Mail which was adopted by the State Records Committee at their meeting in December, 2017. This session will be structured as a panel discussion. It will present an overview of the topic and examples of implementation strategies that are being developed by County IT and Records Management groups.
1. State Division of Revenue and Enterprise Services (DORES) will present a summary of the new EMail retention requirements
2. DORES will also provide an overview of the process of using their online “ARTEMIS” system for submitting requests to the State for authorization to destroy E-Mail documents.
3. DORES will summarize the technical and business process solutions currently being implemented by the State to satisfy the new E-Mail retention requirements.
4. County IT and Records Manager will present a summary of their implementation strategy for organizing and segregating E-Mail within individual Department/Agencies. This will also cover the combination of technologies and business process revisions that will be employed by the County.
5. The session will close with open discussion regarding the policies and implementation strategies.

  How Blockchain Will Provide Greater Governmental Efficiency and Security

Kurt M. Waktins
Esquire, Lowenstein Sandler

Kurt focuses primarily on blockchain, with additional emphasis on technology, intellectual property, and privacy matters. He brings in-depth experience in technology and cybersecurity law to his practice, helping tech companies effectively navigate the intricacies of these rapidly evolving fields. Prior to joining Lowenstein Sandler, Kurt was an associate at a business law firm in New Jersey, where he developed cybersecurity and data protection training programs and manuals for school districts. Since building his own computer at age 12, Kurt has been immersed in the tech world from many different angles. He is a cryptocurrency investor and conversant in various computer codes–from C++ to Java, Go, and Python–and successfully programmed a smart contract in Solidity. He also provided the statistical analysis that linked exposure to burn pits in Iraq with serious medical ailments, leading the U.S. Department of Veterans Affairs to cover medical care for affected veterans.

Blockchain technology is sweeping major industries with the promise of greater data reliability and security. While Bitcoin and Ethereum currently occupy the imagination of many, enterprise blockchain deployments are the future of this revolutionary technology. The technology is fundamentally different than traditional internet and network technologies in that it distributes, synchronizes, and secures data across the computers in a network rather than in central servers. This flexibility, security, and, where needed, transparency will be able to coordinate governmental units, automate work flows, and provide the public a secure system to interact with government in a more meaningful and seamless way. In this session, we will review what this technology is, how it works, how it can be integrated into present systems, and its current and future applications.


President Bernadette Kucharczuk kicks off day 2 of #njdigitalsummit19 https://t.co/fJ5SUQSGsb
Board member and membership committee member, Janice, spreading the word about the greatness that is NJGMIS! Find o… https://t.co/9CCA60KBuG
Jean-Guy, NJ GMIS member, introduces the afternoon keynote @dustinhaisler from @govtechnews #govtech #FutureReadyhttps://t.co/zx38gTPnq9
What are we all about? Membership Committee member Janice Zelnock presented some great insights on why joining NJG… https://t.co/tuE1kL7a8a
Keynote at NJ Digital Government Summit Kelly Swanson @motivationspkr tells us the importance of storytelling, even… https://t.co/1QCJgdh8Ia
Packed house from all levels of government at #govtechlive in New Jersey this morning! #collaboration https://t.co/zHQILsI398
We are proud to partner with GovTech as the facility sponsor for this year’s #govtechlive! How stunning is the War… https://t.co/bb2Wj6EwYZ
It’s #govtechlive day 1 in New Jersey! Innovation, big data, cyber security and privacy are all on our list of topi… https://t.co/xUf5D8tEDp
With tech innovation comes the governance to manage it. What are your thoughts here? https://t.co/ivfGZbXB1A
Our members find great value in collaborating with the NJ Assoc. of Counties throughout the year. Board Member John… https://t.co/thWYeE7OA6
Will you be at GMIS MEETS? ⁦@NJGMIS⁩ will! Hope to see you there. https://t.co/7vEDRX42Kd
To password or not to password, what do you think? #cybersecurity #technology #publicsector https://t.co/BOdyJ9WjG0
Here is an interesting one.. #CyberSecurity https://t.co/yzyGrvWEmC
Attention @NJGMIS members! You are invited to attend this fun technology networking event with vendor member,… https://t.co/okx1crioLy