2019

AG 2000 Computer System Directive

 

Conference Presentations:

2018

Keynote Presentation: Talking Like A Leader – Perception is Truth!
Anthony Huey – President, Communicate Clearly

View Anthony’s communication tips


After A Breach: What Happens Next
Edward Cooney – Vice President and Underwriting Manager, Connor Strong & Buckelew
Shawn Melito – Management Analyst, Kivu Consulting, Inc. 
Jim DeVico – Technology Coordinator, Township of Edison

Download Presentation

Download Presentation 2


Making Sense of IT Governance
Cordell Schachter – Chief Technology Officer, New York City Department of Transportation

Download Presentation


Anything As A Service Considerations
John Dougherty – IT Consultant

Download Presentation


Municipal Data – Beyond The Office LAN
Jack Flood – Vice President of Operations, Spatial Data Logic

Download Presentation


What Are You Doing Now to Ensure the Legacy You Leave Behind Is More Than Just Legacy Infrastructure
E. Steven Emanuel – Senior Industry Advisor, Public Sector and Regulated Industries, TenFour

Download Presentation


Intro to Pure Storage
Joe Mercede – Solutions Engineer, Pure Storage

Download Presentation


From the Basement to the Boardroom: Moving On Up!
Shannon Tufts – Assoc. Professor of Public Law and Government and Director, Center for Public Technology, UNC

Download Presentation 


How Blockchain Will Provide Greater Governmental Efficiency and Security
Kurt M. Waktins – Esquire, Lowenstein Sandler

Download Presentation


2016

NJMMA 2016 Spring Conference – “Cyber Security”

Emergency Notification Systems and Social Media for Emergencies

Ransomeware Detection Recovery Remediation

Security Lessons

Emergency Communication

Using SDL Portal and SDL Mobil for Improved Efficiency in Local Government

Preparing for Disaster Events and Continuation of Operations with Disaster-Recovery as a Service


2015

Mobile Government

The Truth Behind the Myths of Technology

Improving Your Digital Communications Strategy

An Introduction to Social Media and It’s Uses


2014

IT Strategic Planning

Franklin Township Vision Internet


2013

Minimum Technology Security Requirements


2012

Cloud Computing in Government


2011

Ways To Save Money With Technology

Thank you to all who participated in our fourth annual cyber security seminar yesterday! Attendees and sponsors can… https://t.co/KX6gjj5XjG
Have you experienced a ransomware attack? Mike McClintock from Atlantic County Utilities Authority has and been ha… https://t.co/iV9yxDgFF6
Great resources from Chris Baker #CyberSecurity https://t.co/OYxvaXbYuh
Current Cyber Threats from @FBI Task Force Officer Chris Baker #CyberSecurity https://t.co/PNAKmld4B5
A quick break and we are getting ready to start the next round of sessions. We still have donuts! https://t.co/qqFScbNpzv
Thank you for being here with us! And you heard it people, there’s prizes! https://t.co/yp4znwlRea
Hey-if you are at our Cycber Security event at @TCNJ let us know and check in to our event https://t.co/4ShE7Oyd4K
Take away from the first session- NEVER underestimate the hackers. #CyberSecurity https://t.co/NufwbiRkI9
We have kicked off the day with opening remarks from our President Bernadette Kucharczuk and our first session with… https://t.co/XorGFqHSFW
Janice Zelnock shares her experience with Emotet for the good of her fellow NJGMIS members. Collaboration is key in… https://t.co/uwkHbaPq81
Is your name here? Don’t worry you can register onsite and we have donuts! #CyberSecurityhttps://t.co/3X9kMrxGfK
You’ve read about it again and again, but what’s it REALLY like for a government org to get hacked? What do you do?… https://t.co/4FNKlVHRGP
Sponsor roll call! Who is excited for the NJ-GMIS cyber security event in Ewing, NJ tomorrow?! Our public sector at… https://t.co/Lv2ehO18g0
NJ CIOs: catch @SHI_Intl’s security arm at our upcoming cyber event on 10/22! https://t.co/Bti0127OhU