2019

AG 2000 Computer System Directive

 

Conference Presentations:

2018

Keynote Presentation: Talking Like A Leader – Perception is Truth!
Anthony Huey – President, Communicate Clearly

View Anthony’s communication tips


After A Breach: What Happens Next
Edward Cooney – Vice President and Underwriting Manager, Connor Strong & Buckelew
Shawn Melito – Management Analyst, Kivu Consulting, Inc. 
Jim DeVico – Technology Coordinator, Township of Edison

Download Presentation

Download Presentation 2


Making Sense of IT Governance
Cordell Schachter – Chief Technology Officer, New York City Department of Transportation

Download Presentation


Anything As A Service Considerations
John Dougherty – IT Consultant

Download Presentation


Municipal Data – Beyond The Office LAN
Jack Flood – Vice President of Operations, Spatial Data Logic

Download Presentation


What Are You Doing Now to Ensure the Legacy You Leave Behind Is More Than Just Legacy Infrastructure
E. Steven Emanuel – Senior Industry Advisor, Public Sector and Regulated Industries, TenFour

Download Presentation


Intro to Pure Storage
Joe Mercede – Solutions Engineer, Pure Storage

Download Presentation


From the Basement to the Boardroom: Moving On Up!
Shannon Tufts – Assoc. Professor of Public Law and Government and Director, Center for Public Technology, UNC

Download Presentation 


How Blockchain Will Provide Greater Governmental Efficiency and Security
Kurt M. Waktins – Esquire, Lowenstein Sandler

Download Presentation


2016

NJMMA 2016 Spring Conference – “Cyber Security”

Emergency Notification Systems and Social Media for Emergencies

Ransomeware Detection Recovery Remediation

Security Lessons

Emergency Communication

Using SDL Portal and SDL Mobil for Improved Efficiency in Local Government

Preparing for Disaster Events and Continuation of Operations with Disaster-Recovery as a Service


2015

Mobile Government

The Truth Behind the Myths of Technology

Improving Your Digital Communications Strategy

An Introduction to Social Media and It’s Uses


2014

IT Strategic Planning

Franklin Township Vision Internet


2013

Minimum Technology Security Requirements


2012

Cloud Computing in Government


2011

Ways To Save Money With Technology

Submission deadline is Wednesday, February 5, 2020 https://t.co/9RJLTjDcoO
Interested in a speaking session at TEC 2020 ? Let us know by completing this form https://t.co/BEESySzeoI https://t.co/oU7cp9Ih9y
Call for speakers for our annual TEC conference. Have you moved your way up from tech support to CIO? How is techn… https://t.co/EtKcECX95A
We love the #GMISGEM! This is not just another newsletter in your inbox. The GEM is full of excellent updates and b… https://t.co/IKgHAKANiW
Cybersecurity. We’re all versed on the threats and the importance of security controls. But what do you do first? J… https://t.co/fJHyruy7RN
Members: what training could we help you with? We are always learning in this profession, & we’d love to help you g… https://t.co/vLKLVxvmRp
Are you planning on joining us at TEC 2020? If not, you should. We have an amazing keynote who will impress and mo… https://t.co/OteKD6v1wN
Hey, that’s us! It was great to see so many public and private sector members at the #njleague this week! https://t.co/euaYKD9E6B
Be there or be un-secured! Join us for this critical session on cyber security and let us help you navigate the eve… https://t.co/9CI4G0cQU8
Word on the #njleague exhibit floor is we’ve got the coolest swag in town! Come stop by booth #1936 to see what the… https://t.co/5bXOt81Whg
Govt orgs have critical data to protect. How do you do it? What happens if you don’t? You will not want to miss thi… https://t.co/0RWUnjguSE