2019

AG 2000 Computer System Directive

 

Conference Presentations:

2018

Keynote Presentation: Talking Like A Leader – Perception is Truth!
Anthony Huey – President, Communicate Clearly

View Anthony’s communication tips


After A Breach: What Happens Next
Edward Cooney – Vice President and Underwriting Manager, Connor Strong & Buckelew
Shawn Melito – Management Analyst, Kivu Consulting, Inc. 
Jim DeVico – Technology Coordinator, Township of Edison

Download Presentation

Download Presentation 2


Making Sense of IT Governance
Cordell Schachter – Chief Technology Officer, New York City Department of Transportation

Download Presentation


Anything As A Service Considerations
John Dougherty – IT Consultant

Download Presentation


Municipal Data – Beyond The Office LAN
Jack Flood – Vice President of Operations, Spatial Data Logic

Download Presentation


What Are You Doing Now to Ensure the Legacy You Leave Behind Is More Than Just Legacy Infrastructure
E. Steven Emanuel – Senior Industry Advisor, Public Sector and Regulated Industries, TenFour

Download Presentation


Intro to Pure Storage
Joe Mercede – Solutions Engineer, Pure Storage

Download Presentation


From the Basement to the Boardroom: Moving On Up!
Shannon Tufts – Assoc. Professor of Public Law and Government and Director, Center for Public Technology, UNC

Download Presentation 


How Blockchain Will Provide Greater Governmental Efficiency and Security
Kurt M. Waktins – Esquire, Lowenstein Sandler

Download Presentation


2016

NJMMA 2016 Spring Conference – “Cyber Security”

Emergency Notification Systems and Social Media for Emergencies

Ransomeware Detection Recovery Remediation

Security Lessons

Emergency Communication

Using SDL Portal and SDL Mobil for Improved Efficiency in Local Government

Preparing for Disaster Events and Continuation of Operations with Disaster-Recovery as a Service


2015

Mobile Government

The Truth Behind the Myths of Technology

Improving Your Digital Communications Strategy

An Introduction to Social Media and It’s Uses


2014

IT Strategic Planning

Franklin Township Vision Internet


2013

Minimum Technology Security Requirements


2012

Cloud Computing in Government


2011

Ways To Save Money With Technology

NJ CIOs: catch @SHI_Intl’s security arm at our upcoming cyber event on 10/22! https://t.co/Bti0127OhU
Learn more on cyber security from @virtuitsystems, a sponsor at our upcoming NJGMIS Cyber Security Event on 10/22! https://t.co/ghsnm01is8
Just 3 vendor spots remaining for our annual cyber event! Contact us today to reserve your space among 70+ public s… https://t.co/cNoSnjMFdp
Hey members! Do you subscribe to the @GMISInt GEM? If you don’t, you’re missing out. Every issue is packed with fan… https://t.co/KmLu1Jtwr2
Cybersecurity: Why you should hire staff from firms that have fallen victim to hackers https://t.co/zb6CoQu84S via… https://t.co/PIm1s9LTD5
Efficient, or privacy concern? Where do you stand on the Smart Cities debate? https://t.co/IRYW20roYj #privacyhttps://t.co/eiRcbxwigK
How Artificial Intelligence Is Changing Cyber Security Landscape and Preventing Cyber Attacks via @EntrepreneurINDhttps://t.co/rZqgcw3iuS
Have you marked your calendar for the 4th annual Cybersecurity Awareness Seminar? October 22 at @TCNJhttps://t.co/lZgBp1quFO