2018 NJ GMIS Technology Education Conference
Speakers & Session Information
Keynote Presentation: Talking Like A Leader – Perception is Truth!
After A Breach: What Happens Next
Shawn is a Management Analyst responsible for Kivu’s North American business development activities in the cyber insurance market and client relations with many of the leading data breach management and privacy specialized law firms. Shawn brings over 20 years of management experience to this role. Previously Shawn was a Management Consultant, Information Systems Analyst and business unit leader for NPC’s Immersion Data Breach Response Service group, a leading notification and call center service provider to the cyber insurance community. Other relevant prior work experience includes managing a Canadian breach response and identity theft services company, as well as Healthcare, Insurance Services and a contract with the Office of the Privacy Commissioner of Canada. Shawn is a certified information privacy professional (CIPP/US) through the International Association of Privacy Professionals (IAPP) and previous member of their Canadian Advisory Board. He has chaired multiple cyber insurance industry conferences and presented on the topics of data breach, data security and identity theft at IAPP, RIMS, NetDiligence, ACFE, CLE and the Institute of Internal Auditors events. He was also featured on SiriusXM’s radio show, When Things Go Wrong. Shawn received his B.A. from the University of Toronto, and his M.B.A. from the Richard Ivey School of Business in London, Ontario.
Many local governments have a cyber insurance policy that provides network breach coverage. This coverage usually includes response support for a ransomware infection or if there is a possible exfiltration of personally identifiable information, among other services. But, if you have coverage, do you know your responsibilities under the coverage, how to activate it, what happens when you, and your role in all that? Do you know what a breach coach is and does and why they are important? The panel consists of a representative of the Municipal Excess Liability Fund that provides cyber insurance to almost 600 NJ local government units, a technical breach response specialist, and a CIO who went through a breach and insurance response. If you have cyber insurance and don’t know how it works, you should site in on this panel. If time permits, we’ll also talk about some minimum technology standards that will help you prevent breaches.
James DeVico has been the Technology Coordinator for the Township of Edison since 2011. He has a Bachelor’s of Science degree in Computer Science from Kean University. Prior to joining the Township, he worked for 16 years as the Director of Technology at the Joseph Kushner Hebrew Academy, a preK–12 private school in Livingston.
Making Sense of IT Governance
Managing CJIS Technology: Today and Tomorrow
Lt. Cy Bleistine
Cy Bleistine is a Lieutenant with the New Jersey State Police and currently heads the Cyber Crimes Unit. He has over 23 years of law enforcement experience. He began working in the field of high technology investigations in 2005. He has instructed law enforcement officers on technology related investigations and provided instruction to the public on general guidelines for Internet Safety. In addition to his duties as the leader of the Cyber Crimes Unit, he has been the commander for the NJ-ICAC Task Force and is currently the head of the New Jersey Cyber Terrorism Task Force.
State Police Lt. Cy Bleistine will talk about where we are today with managing criminal justice information systems, the challenge of managing CJIS silo’s and systems integrated with other municipal activities; the role of the cloud in law enforcement; security issues; and where the future of CJI management seems to be going.
Anything As A Service Considerations
John Dougherty has been a software developer and web developer for over 25 years. He has worked in manufacturing and finance, as well as for the government and Military. He is also an Adjunct professor at Rutgers in the field of software development. He has three children and lives in Asbury Park.
This presentation will provide an overview of cloud-based solutions for creating and maintaining software used for management of municipal/county tasks. In particular, the use of technologies to develop a system to track septic system pumping (including the notification of property owners of their upcoming need to pump their systems in a timely manner) will be discussed.
Municipal Data – Beyond The Office LAN
John (Jack) Flood is the Vice President of Operations and a co-founder of Spatial Data Logic (SDL). A lifetime New Jerseyan, Jack has over 20 years of experience in project management and consulting in the areas of Government (specifically on municipalities and counties in New Jersey), Utilities, Geographical Information Systems & ESRI Technologies, Enterprise Architecture and Enterprise Software. Jack graduated from Villanova University with a BA in business.”
It can be tempting to want to keep municipal data flow within the confines of the office LAN. However, there are good reasons to share data with both officials in the field and citizens of your community. SDL’s Jack Flood will share insights gathered over the years as to what works, why it’s important, different access methods and how best practices can help you be more open and more efficient without losing control of your data.
Video Surveillance Made Easy with Cisco Meraki and CDI
Meraki MV is changing the way we think about video surveillance. No more NVRs to manage, no failed hard drives to replace and no software to install or viewing stations to maintain. View video anywhere, anytime, on any device — instantly. Share video with law enforcement quickly and easily, while giving the right people access to the right cameras with an intuitive interface for finding video.
This session will take a deep dive into how Cisco Meraki MV and CDI provides reliable security and valuable business insights to public sector organizations of any scale.
Chris Clark, Director of Public Sector, at Computer Design & Integration LLC, is a highly skilled and versatile technical and business professional with over 20 years of management and leadership experience. Clark’s primary focus falls within CDI’s public sector practice and in this role, he is responsible for delivering cost-effective services and scalable solutions for state and local government and education. As a professional with an eye for addressing modern IT needs for the 21st century environment, Clark’s attention to detail allows for deployment of fully integrated converged infrastructure, security, data center, business continuity and virtualization solutions across large-scale environments.
Matthew Schaner, Product Sales Specialist, Cisco Meraki, is a proven performer with excellent leadership ability, strong communication / public speaking skills, and comprehensive knowledge of networking and cutting-edge technologies. With expertise in education and government development, public sector procurement, solution and architectural selling – he has been described as a dynamic, engaging presenter and a trusted advisor. Matthew is currently a product sales specialist, covering the Meraki product line in New Jersey and is a graduate of Lehigh University.
|What Are You Doing Now to Ensure the Legacy You Leave Behind Is More Than Just Legacy Infrastructure?
E. Steven Emanuel
New technologies in the Digital Age are transforming our industry. But what about your organization? Is the way it’s consuming technology transforming your business or holding it back? As new budgets remain cautious and cyber security is on a never-ending incline, what are you doing to ensure you’re delivering digital government services that will not only differentiate and grow your organization, but that someone behind you would be foolish to undo? The Cloud only gets you so far. The winners in the Digital Age are the companies who have changed their point of view and transformed from the ground up. Learn what you can do in the next six months to change the course of your organization.
E. Steven “Steve” Emanuel is a native of Teaneck, NJ, graduated Teaneck High School, attended Eastern College with a degree in Criminology / Sociology. His work career began in retail for Gulf Oil (1976 – 1978) leaving to work for CNA Insurance Company, Reading PA, as a Unit Supervisor. He then moved to Chicago for CNA to work in systems planning and design (1978-1985). Steve went to work for General Public Utilities as programmer trainee and moved through the IT department working as a report writer, help desk staff member and eventually to network operations. There, he lead three major network projects and moved into network management as a Network Coordinator and then assigned to Oyster Creek Nuclear Station (sister station to Three Mile Island) as the Site Manager for all power plant IT operations (1985 – 1998). He later began a career with Amtrak in 1998 as the Director, Network (Philadelphia) and was promoted in 2000 to Sr. Director, CIO of the Northeast Corridor (NEC) operations. During his tenure, Steve implemented new infrastructure designs for all NEC locations, including the implementation of fiber backbones and the expansion of Local Area Networks (LAN) through new distributed electronics, including a conversion from Token Ring to Ethernet technology. In 2004, he moved into Acting position as Amtrak’s Chief Information Officer (Washington DC) and awarded the position in April, 2005 and departed in May, 2007 after accepting the CIO position with Montgomery County. The Montgomery County Government was the first “public sector” position for Steve. After joining the County, he completed the first Enterprise Technology Strategic Plan to create the first enterprise view of technology, solutions and support. He also sponsored the County’s newest modernization plan for Public Safety identified as the Public Safety Systems Modernization. It is inclusive of a systems modernization strategy, a roadmap for CAD improvements and future improvements as well as the County’s Interoperability Communications Plan. Steve has also been a primary participant in the development of the plan and execution of the County’s Enterprise Resource Planning Project and the strategic implementation of the County’s Constituent Relationship Management project (MC311). Within Division operation, Steve implemented the first enterprise Project Management Office, developed the first comprehensive program scorecard and IT project qualification review, focused on staffing competency and succession planning as well as the validation of the County’s Enterprise Architecture and countywide application portfolio inventory. Steve went on to become the Chief Information Officer for the State of New Jersey from 2011 to 2016. He was selected to replace a long tenured CTO, the State looked for a transformation of centralized technology services through a focused approach that created two centers of excellence, one for day to day operations, the other to provide leadership strategies for governance and planning for technology innovation. Most recently, Steve joined TenFour in 2016 as the Senior Industry Advisor for Public Sector and Regulated Industries. As TenFour transforms the IT industry, this role will counsel public sector IT leaders as they evolve their infrastructures into the Digital Age. It leverages TenFour’s model to provide a true IT Total Cost of Ownership (TCO) and a consistently modern infrastructure that responds to the new challenges of digital government and economy. This most current role supports growth for TenFour’s customers and bolsters TenFour’s mission to change the way the world consumes and experiences IT; through a model that aligns with business goals and offers IT leaders the freedom to innovate.
|Digital Communities – Data Architecture IoT and Blockchain
Rob is currently the CTO for Dell SHI’s Digital Communities focus. In this role, Rob works with state and local government customers across the nation to help these agencies understand how SHI’s broad portfolio of technologies and solutions can help them achieve their goals. Rob has extensive experience with enterprise data management, content management, and in systems integration design. Most recently, Rob has worked extensively on SHI’s Digital Communities data architecture and public safety solutions. As a subject matter expert and thought leader in this space, Rob speaks at conferences and events sharing current projects, innovations, and advising on strategy. Rob currently participates as a smart city board member for the City of Austin, TX and the City of San Jose, CA. Rob has been with SHI for over 14 years holding previous positions in consulting management and public sector industry marketing. Prior to SHI, Rob worked with several startups as well as Oracle and IBM/FileNet.
In this session, we will explore the innovative smart city data architecture from SHI that enables digital communities to better manage the new data streams coming from sources such as IoT sensors and devices. We will then cover the innovations and investments that SHI is making in IoT technology and how connecting IoT devices will become easier with an open source, standards based, approach. Finally, we will look at how the disruptive technology called blockchain could provide a secure distributed digital leger for digital communities use cases.
|Intro to Pure Storage
Join Solutions Engineer Joe Mercede for an introductory session to Pure Storage, whose enterprise all-flash cloud data storage solutions deliver data-centric architecture to accelerate your business. This session will focus on Smart Storage for Cloud IT – Effortless, Efficient, Evergreen.
|Malware Vs. Machine
Over 20 years of governance and operational security experience. Executive level security consulting, to include program/portfolio creation and management. Provided board level reporting, security strategy creation and implementation, and global business security integrations. Acting CISO and Director of Security for large corporations. Led large multi-project teams at the program level, with oversight of multiple simultaneous and complex implementations of technical security projects. Designed and implemented most aspects of corporate security programs. Assisted large organizations in defining CISO responsibilities and requirements in order to provide alignment of security programs to business operations. Consulting experience includes delivery of services to include large multi-project/multiyear programs. Provided executive advisory services in a variety of industries, to include retail, aerospace engineering, national/international banking, healthcare, manufacturing, logistics and transportation, federal/state organizations, and others. A wide range of regulatory experience includes PCI, SOX, FFIEC/FIDC, HIPAA, NERC CIP, and security framework knowledge extends to ISO/IEC 27001/27001, NIST, FISMA, OCTAVE and others. Program level services for customers, including advisement to Fortune 100 executives (CIO and CISO), creation of corporate security programs and strategies, risk program operational definitions and implementation, and delivery of security/privacy framework implementations. Provided all aspects of creating and implementing multi-project technical programs, from requirements gathering to shifting systems into operational SDLC maintenance cycles. Created large risk management frameworks for global enterprises, to include complex operations such as mergers, acquisitions, and divestitures. 21-year military veteran as a nuclear weapons technician, threat officer, OH-58/AH-1/UH60 helicopter pilot and maintenance operations officer.
Malware dates back to the earliest days of connected computing. Our approach to dealing with malware has remained relatively static. The current malware management method relies on being able to determine patterns within unpacked, decrypted files. This provides a single pattern-based signature to defend against a wide range of malware attacks but is insufficient for the future. Artificial intelligence has been used to solve business and social problems using advanced data mining and compute capabilities. During this session a specific implementation of a deep learning system will be explored to give insight into how this type of technology will combat cybercriminals and the malware they create.
|Protect Your Network from Ransomware & Other Threats
Cloud Security Specialist, Cisco Systems, Inc.
Leveraging the Cloud to secure your network – both easily and affordably:
|Virtualization Designed to Deliver Simplicity, Availability, and Scalability
Senior Systems Engineer, Scale Computing
Scale Computing’s HC3 is the IT virtualization infrastructure platform that is changing the way IT runs from the ground up. Combining servers, storage, hypervisor, and backup/DR, HC3 is helping IT administrators transform their infrastructures to be more scalable, more highly available, and more affordable. Simplicity is the not-so-secret ingredient in HC3 delivering savings over traditional infrastructure solutions and the hyperconverged competition.
HC3 and the HyperCore architecture were designed to provide highly available, scalable compute and storage services while maintaining operational simplicity through highly intelligent software automation and architecture simplification. HyperCore puts intelligence and automation in the software layer and was designed to take advantage of low cost, easily replaceable and upgradable “commodity” hardware components including the virtualization capabilities built into modern CPU architectures.
|Using Your Citizen Request System to Improve Citizen Engagement
Jason Scheper is the Region Director for CivicLive, a West Corporation brand that works with local governments to create Smart Websites. Jason is known for his expertise in new business development, client relationships, and solution-based selling within the Commercial, Government and Education markets.
Learn how to build civic engagement through your Citizen Request System. Built to improve and streamline delivery of services, a Citizen Request System makes it easy for citizens to engage and effectively communicate with their municipality–anytime, anywhere, online. Leverage your citizen request system and: • Put the control in your residents hands by enabling them to track the progress of their requests. • Make it easy for your staff to respond quickly to issues. • Set your staff up as the number one, go-to source for residents’ issues and concerns, making them leaders in citizen communication.
| Smart Cities Trends and Challenges
From population growth to rapid urbanization, communities are facing new challenges to maintaining high standards of livability, resiliency and sustainability. Using innovative Internet of Things (IoT) and machine-to-machine (M2M) communication solutions, city executives can help improve efficiency and revolutionize cities to create a better quality of life for both work and play. See how our Smart Cities solutions can make a difference in your world.
Jose is focused on helping cities, universities, and corporations leverage technology to develop and deploy Smart City applications. Jose works with government and industry leaders to help identify Smart City initiatives and build a vision and roadmap with a goal to drive economic growth, enable environmental sustainability, and enhance quality of life for citizens, students and customers. Leveraging his technology and telecommunications experience in working with state & local, enterprise and small business customers; Jose takes a consultative approach to
|Stop Managing Storage and Start Managing Your Business
| Cyber Security: Protecting Data for the Public Good
About the Presenter: Alpesh Shah is the Practice Director and Cyber Security Solutions Architect Manager at Presidio. He supports both fortune 500 companies and government agencies in designing leading edge, complex and enterprise level cloud and security solutions. His passion for information security encouraged him to obtain several technical and business level certifications like CISSP, CISM, CEH, CHP, Security+ and ITILv3. With over a decade of experience in the IT industry, he specializes in managed security solutions, threat and vulnerability management, governance and compliance (HIPAA, PCI, FEDRAMP, ISO 27001, NIST), Disaster Recovery and Business Continuity Planning amongst other areas.
Cyber-attacks in the local government sector are becoming more common, more dangerous, and more sophisticated. In today’s rapidly evolving digital world, regulatory compliance, customer confidence and the bottom line depend on your organization getting cyber security right. It’s no secret that government agencies are a serious target for their intellectual property and confidential data. Those in the public and private sector face significant challenges such as tight budgets and limited access to the newest technologies to protect data, which contribute to weak IT infrastructures. This presentation will showcase how legacy architecture isn’t enough to safeguard mobile devices, IoT networks and cloud data. When it comes to storing sensitive data such as Social Security numbers, health care records and driver license numbers, cyber security should be a priority. Speaker Alpesh Shah will take a deep dive into why reactive solutions won’t give your organization the comprehensive protection it needs to stay compliant, maintain business continuity and anticipate threats on the horizon. Join Alpesh Shah to gain a more holistic approach to cyber security and protect your organization from potential threats in the future.
|Avaya: The Foundation of Agile Communication Solutions in a Transformational Environment
Steve has 18 years of experience working in the contact center space, with the last five years spent at Avaya supporting Enterprise and Global accounts. He is currently a Digital Transformation Strategist focusing on partnering with customers to identify initiatives to transform them from traditional Unified Communications and Contact Center solutions to the future of communications utilizing the Avaya platform.
Stepping up to the digital transformation mandate, developers need a better way to connect people throughout the business. Slash the hours and effort it takes to communications-enable your applications and workflows. Build apps from reusable parts, integrate your apps with other apps, even start from scratch. Use the visual workflow-building tool to automate manual processes. Incorporate any communications method. Be a problem solver. Efficiencies and savings will pile up.
From the Basement to the Boardroom: Moving On Up!
|E-mail Retention and Implementation Strategy
Robert H. Thurgarland – Manager, County of Hunterdon Division of Information Services and Committeeman, Township of Holland, Hunterdon County New Jersey
Elizabeth is responsible for the implementation and management of the State’s Records Management Services which involves all State, County, and Municipal document retention schedules. As part of these responsibilities she was directly involved with the development of the proposed E-Mail Retention Schedules that have been adopted by the State Records Committee (SRC) in December 2017.
As Chief Information Officer for the County of Sussex New Jersey and steward of critical business assets, Bill works collaboratively with integrated teams within the entire enterprise of Sussex County to ensure that those resources are effectively, equitably, and professionally maintained and applied. His efforts to reduce cost and improve business processes are continuous. William Kosinetz is envisioning the future of computing and communications technologies, anticipating a new path to business process management. Visualizing and comparing business
Dan is responsible for the enterprise eContent management strategy that has been implemented at the County based on an integrated approach to managing technology, information, and business process, across Department and Municipal boundaries. Dan is also the Vise President of the County Archives and Records Management Association of New Jersey (CARMA-NJ). In that capacity he has an intimate understanding of the records management challenges faced by Municipal and County agencies across the State. During the past two years, Dan actively participated in the discussion that lead to the adoption of the new E-Mail Retention Schedule that was adopted by the State Records Committee in December 2017.
Robert has twenty three years of public service having worked for the County of Hunterdon since 1995. Member of the County’s Shared Services Committee; Facilities Evaluation Committee, Risk Management Committee and sit on the County’s budget evaluation Committee to review and recommend technology and software requests. Direct operational oversite for the County’s Information Technology Division, GIS Division, Central Printing/Mail and Records Management Divisions and work in cooperation with County Counsel’s Office to direct the receipt and disposition of open public records request (OPRA) for the County.
Elected in 2015 as Committeeman for the Township of Holland in Hunterdon County. Municipal responsibilities and assignments include Website/IT, Assistant Public Safety (Police/OEM/Fire/Rescue), Liaison Environmental Commission, Buildings and Grounds, Assistant Parks/Recreation/Pool and Recycling services and voting Liaison/member of the Township Board of Health; Past Vice-President Holland Township Parks Association.
This presentation will cover the following topics regarding the new retention regulations for E-Mail which was adopted by the State Records Committee at their meeting in December, 2017. This session will be structured as a panel discussion. It will present an overview of the topic and examples of implementation strategies that are being developed by County IT and Records Management groups.
|How Blockchain Will Provide Greater Governmental Efficiency and Security
Kurt M. Waktins
Kurt focuses primarily on blockchain, with additional emphasis on technology, intellectual property, and privacy matters. He brings in-depth experience in technology and cybersecurity law to his practice, helping tech companies effectively navigate the intricacies of these rapidly evolving fields. Prior to joining Lowenstein Sandler, Kurt was an associate at a business law firm in New Jersey, where he developed cybersecurity and data protection training programs and manuals for school districts. Since building his own computer at age 12, Kurt has been immersed in the tech world from many different angles. He is a cryptocurrency investor and conversant in various computer codes–from C++ to Java, Go, and Python–and successfully programmed a smart contract in Solidity. He also provided the statistical analysis that linked exposure to burn pits in Iraq with serious medical ailments, leading the U.S. Department of Veterans Affairs to cover medical care for affected veterans.
Blockchain technology is sweeping major industries with the promise of greater data reliability and security. While Bitcoin and Ethereum currently occupy the imagination of many, enterprise blockchain deployments are the future of this revolutionary technology. The technology is fundamentally different than traditional internet and network technologies in that it distributes, synchronizes, and secures data across the computers in a network rather than in central servers. This flexibility, security, and, where needed, transparency will be able to coordinate governmental units, automate work flows, and provide the public a secure system to interact with government in a more meaningful and seamless way. In this session, we will review what this technology is, how it works, how it can be integrated into present systems, and its current and future applications.