2019

AG 2000 Computer System Directive

 

Conference Presentations:

2018

Keynote Presentation: Talking Like A Leader – Perception is Truth!
Anthony Huey – President, Communicate Clearly

View Anthony’s communication tips


After A Breach: What Happens Next
Edward Cooney – Vice President and Underwriting Manager, Connor Strong & Buckelew
Shawn Melito – Management Analyst, Kivu Consulting, Inc. 
Jim DeVico – Technology Coordinator, Township of Edison

Download Presentation

Download Presentation 2


Making Sense of IT Governance
Cordell Schachter – Chief Technology Officer, New York City Department of Transportation

Download Presentation


Anything As A Service Considerations
John Dougherty – IT Consultant

Download Presentation


Municipal Data – Beyond The Office LAN
Jack Flood – Vice President of Operations, Spatial Data Logic

Download Presentation


What Are You Doing Now to Ensure the Legacy You Leave Behind Is More Than Just Legacy Infrastructure
E. Steven Emanuel – Senior Industry Advisor, Public Sector and Regulated Industries, TenFour

Download Presentation


Intro to Pure Storage
Joe Mercede – Solutions Engineer, Pure Storage

Download Presentation


From the Basement to the Boardroom: Moving On Up!
Shannon Tufts – Assoc. Professor of Public Law and Government and Director, Center for Public Technology, UNC

Download Presentation 


How Blockchain Will Provide Greater Governmental Efficiency and Security
Kurt M. Waktins – Esquire, Lowenstein Sandler

Download Presentation


2016

NJMMA 2016 Spring Conference – “Cyber Security”

Emergency Notification Systems and Social Media for Emergencies

Ransomeware Detection Recovery Remediation

Security Lessons

Emergency Communication

Using SDL Portal and SDL Mobil for Improved Efficiency in Local Government

Preparing for Disaster Events and Continuation of Operations with Disaster-Recovery as a Service


2015

Mobile Government

The Truth Behind the Myths of Technology

Improving Your Digital Communications Strategy

An Introduction to Social Media and It’s Uses


2014

IT Strategic Planning

Franklin Township Vision Internet


2013

Minimum Technology Security Requirements


2012

Cloud Computing in Government


2011

Ways To Save Money With Technology

Our tables are sold out for TEC2020! We still have some non-table sponsorships available. Get in while you can! https://t.co/45LmOT3B12
Sometimes you have to just take baby steps to develop greater things. https://t.co/we4pNZ1KLj
Many teams today immediately say some ideas are impossible and can't be achieved with the resources they have. Regi… https://t.co/Em4h8EogrT
We are excited to announce that registration is NOW OPEN for the NJ-GMIS TEC 2020! Visit https://t.co/9FvPbuEK7E to… https://t.co/6T2vNTzNiA
Submission deadline is Wednesday, February 5, 2020 https://t.co/9RJLTjDcoO
Interested in a speaking session at TEC 2020 ? Let us know by completing this form https://t.co/BEESySzeoI https://t.co/oU7cp9Ih9y
Call for speakers for our annual TEC conference. Have you moved your way up from tech support to CIO? How is techn… https://t.co/EtKcECX95A
We love the #GMISGEM! This is not just another newsletter in your inbox. The GEM is full of excellent updates and b… https://t.co/IKgHAKANiW
Cybersecurity. We’re all versed on the threats and the importance of security controls. But what do you do first? J… https://t.co/fJHyruy7RN
Members: what training could we help you with? We are always learning in this profession, & we’d love to help you g… https://t.co/vLKLVxvmRp
Are you planning on joining us at TEC 2020? If not, you should. We have an amazing keynote who will impress and mo… https://t.co/OteKD6v1wN