2017 Featured Speakers


Trends, Threats, and Evolving Security Controls

Darren Carroll photoDarren Carroll

Practice Director, Security & Risk Management, SHI

With over 26 years of experience, Darren is a risk management and information security leader with diverse experience in operational, technical, management, and architecture roles.

Throughout his career, Darren has provided consultative thought leadership, strategic direction, and tactical response to multiple federal, state, and local agencies, most of the Fortune 100 and hundreds of mid-sized enterprises. His expertise focuses on information security and business continuity solutions, with a deep emphasis on Critical Infrastructure, He has extensive experience defining, developing, and delivering information security , including security and privacy program development, policy and procedure development, review, and alignment, security assessments, vulnerability management solutions, security operations center development, and architectural design,. As part of his architectural experience, he has designed and delivered global network and telecommunications infrastructures, unified communications, storage and virtualization platforms, firewalls, security assessment tools, intrusion detection and protection systems, encryption systems, and security information and event management systems.

Darren has performed cloud architecture design and development, cloud security readiness, gap assessments and roadmaps, and cloud strategy development. A former member of the Cloud Security Alliance Architecture working group, Darren has had significant input into defining appropriate security controls for virtualized environments.

Recently, Darren has been focusing on applicability of actionable threat intelligence against clients' environments. Gathered from numerous disparate intel sources, he has worked to align these datasets to potentially vulnerable IT assets. His experience in this arena includes numerous open-source humint and signint sources, NCIC, and other platform-specific intel data.

Darren has assisted numerous clients with their comprehensive risk management programs, including leading them from assessment and identification, to prioritization, and mitigation. He has developed solutions for risk mitigation and transformed organizations to better codify and consume risk information.

Darren brings a strong understanding and familiarity with diverse compliance and regulatory frameworks, including NIST 800 series, ISO 2700X series, HIPAA/HITECH, PCI regulations, and several industry-specific guidelines (ISA, API, CFR, etc.). Prior to joining SHI, Darren was a Director of Security Consulting for Sungard Availability Services, and the Managing Principal, Cybersecurity, Risk, & Intelligence for Verizon Security Services. Prior to Verizon, Darren spent time with EMC Consulting.

Darren's role in leading the Global Cybersecurity SME team had him providing both strategic and tactical leadership around Information Security and Risk & Compliance, providing customer-facing subject matter expertise on information security, threat intelligence and analytics, governance, risk, and compliance, aligning compliance and regulatory frameworks to business needs, and perform project delivery for GRC services (requirements definition, data gathering, gap analysis, remediation roadmap, etc).

In his spare time, Darren is a Volunteer Firefighter / Paramedic, and is currently the Assistant Chief of the Point Pleasant Fire Company.

Abstract:

Avoiding tunnel vision, why bad guys are faster than good guys, why anti-virus will always be a thing, and why brushing your teeth is so important to Information Security. Guaranteed to be the most enjoyable security discussion you’ve had all day, we’ll discuss both lessons-learned as well as lessons-not-learned, and do some deep thinking about the threat landscape and what you can do to protect yourself and your organization.

Disaster Preparedness and Recovery: Using Technology

Brian Conley photo

Brian Conley

Information Technology Director, Bryan County Commissioners

Brian Conley is the Internet Technology Director for Bryan County, Georgia. He began as the first employee in that position, and currently has grown to a team of three in the last 15 years. He has certifications in A+, CCNA, and MCP. Brian was presented with a public service award in 2010 from Coastal Health District and contributes to community service. The county district is divided in North and South ends by an Army Base, and he keeps both ends connected together. He oversees GIS, hardware, software, networking, and his current role is project planning and management. He always looks for new innovative ways that use technology for county and system improvement. Brian strongly believes in “work smarter, not harder.”

Abstract: - DOWNLOAD PRESENTATION

I will demonstrate how technology was implemented to aid in the Hurricane Matthew disaster cleanup process for our county. We used geo-tagging images of all damage caused by Hurricane Matthew. The images were collected from citizens and county employees. A drone and social media was instrumental in our data collection. Our team imported them into an interactive GIS map and made it available for GEMA and FEMA. This map located the most damaged areas in order to prioritize debris removal. Team building and department relationships will be emphasized for the success of this project. Disaster awareness and preparedness will be discussed from the IT perspective.

Enhance Citizen Experience Through Your Website

Gordon Duff photoGordon Duff

Customer Engagement Manager, CivicLive

Gordon Duff is the Customer Engagement Manager for West’s CivicLive solutions with over five years of experience in helping municipalities and K-12 districts select and implement effective websites for their communities. Gordon has extensive knowledge of government websites and CMS trends, strengthened by his client-first philosophy, which he leverages to help local governments find the best web solutions for their online communication and community engagement needs.

Abstract: - DOWNLOAD PRESENTATION

Your citizens looks to you for information about city services, community programs, maintenance alerts, breaking news, upcoming events and more. We’re here to help you deliver it all with ease through your website. We will begin the session by discussing the ROI your agency can get from a modern citizen-focused website. Attendees will then receive practical tips, examples and best practices for website design and content that can enhance the citizen experience by making it easier for citizens to find the information they’re looking for and engage with their government.

Reaching Your Next Summit: 7 Vertical Lessons & 1 Essential Question to Lead With Impact, Regardless of Your Title

Manley Feinberg - Keynote Speaker

Vertical Lessons

Manley is the founder of Vertical Lessons, Inc. He is an award winning international keynote speaker, business leader and author. Leveraging more than twenty years of business, professional speaking and adventure experience, his insight and energy will inspire and equip you to step up and reach your next summit.

In fact he wrote a book titled, Reaching Your Next Summit!  9 Vertical Lessons to Lead with More Impact.

Manley’s 11 years of leadership influence contributed to a workplace culture that landed Build-A-Bear Workshop on the FORTUNE 100 Best Companies to Work For® List four years in a row. Manley served two terms as the president of the St. Louis chapter of the National Speakers Association

On a personal note, Manley likes to sleep on the side of mountains. Even more shocking is that his wife has been putting up with that for more than two decades, and he has two teens that still kiss him on the cheek in front of their friends. 

Abstract:

Professionals often struggle to deliver more value under tightening business constraints and rising expectations. Add the complications of regulations, engaging a multi-generational work force, constantly evolving technology, economic pressure, plus the chaos of day to day life, and you have a serious challenge.

Manley’s Reaching Your Next Summit keynote will help equip you to lead on the edge and realize more in your life and work every day.

You will gain tools you can use immediately to develop a leadership mindset that engages, equips and inspires both you and your team members to step up and lead regardless of title. Expect team members to build relationships and serve beyond vertical and horizontal boundaries in their environment. Collaboration is just the beginning. With more accountability and increased commitment, you will see results you can measure.

Never Pay the Ransom

Kevin Fuller

Co-Founder & CTO, ThinkGard

Kevin is co-founder and Chief Technology Officer at ThinkGard, a technology risk management company in Pelham, Alabama. He oversees the design, implementation and technical support & services teams at ThinkGard. As a business owner and former business owner of a managed services provider, Kevin and his business partner, Paul Franks sold their 12 year old successful MSP (who did everything IT) to focus solely on backup and disaster recovery and business continuity. By freeing themselves up from the competing priorities in the everyday break/fix MSP world, it allowed them to give the time and attention due to the BUDR tasks for their customers. Under Kevin’s skillful and thoughtful leadership his company has maintained 100 percent customer retention & satisfaction rate.

Kevin received his Undergraduate and Masters Degree from The University of Alabama Birmingham. As an MBA graduate and Microsoft Certified Systems Engineer, he offers a unique perspective to the industry with his ability to understand both business needs and the technologies that facilitate them thus bridging the communication gap between technical teams and executives.

Over the course of his career Kevin has created and implemented disaster recovery & business continuity systems for both public sector and private sector businesses and agencies.

Kevin’s best known for making people happy, always maintaining his cool and being an all-star IT triathlete. This year he made The Birmingham Business Journal’s Top 40 under 40 professionals list in 2017 (just under the wire!). He and his wife Lori live in Birmingham with their 3 children

Abstract:

We took this seminar out on road and received AAA+ ratings! Did you know that 7 out of 10 CEO’s admit that they’ve caved to ransomware demands by cyber-criminals and a recent study says that half the payments were $20,000 and 1 in 5 were over 40,000. But did you also know that Ransomware in the public sector has tripled over the past year?

Join us as we provide insights on the latest in business continuity and disaster recovery and how you can prevent your systems from being held hostage by ransomware. We’ll cover what to do after ransomware sneaks past your security, help you understand ransomware’s common infection paths and show you how to lower your risk for infection so that you’ll never have to pay the ransom.

Interactive Session: How to Supercharge Communication With Staff & Citizens

Michael Fulvia photoMichael Fulvio

Director of Customer Success, Seamless Docs

Michael is creator and Director of the Customer Success program at SeamlessDocs. He is a trained actor who is thrilled to be performing his civic duty helping government become beautiful. Born and raised in Quarryill, PA he headed to the city with stars in his eyes. Turns out those stars were on the flag. When not helping governments create better forms, he's exploring New York City and the world.

 

  

Christina Rothman-Iliff photo

Christina Rothman-Iliff

Manager, Municipality of Princeton

Christina Rothman-Iliff, Manager - Access Princeton, has had an extensive career in Princeton supporting the community. As a 9-1-1 Communications Officer for the Princeton Township Police Department, Christina created a training program for Communications Officers encompassing hiring, training and continuing education programs for the Communications staff. She also was responsible for the daily supervision of operations within the Communications Bureau. In May of 2014 a Municipal call center was formed in Princeton, in collaboration with a vendor, to provide on line reporting of non-emergency problems in town as well as information on all Municipal services in Princeton. Christina took on the role of managing this new Department and was charged with the task of getting it up and running. This very important service, Access Princeton, was created to provide an avenue for handling questions and concerns from residents, visitors, and businesses. As a liaison, Christina coordinated efforts with the Municipal Departments to get these issues addressed. Access Princeton has validated the growing trend of citizen engagement and customer service and Christina can be credited with its success. Christina continues to focus her energies on engaging the community though social media accounts for the town such as Twitter and Facebook.

Abstract:

Interaction between departments in local government can be frustratingly siloed. Given the modern challenges of running a government, communication is more important than ever. Breaking down the barriers to inter-departmental communication requires persistence, patience, and an understanding of how each department functions.

Join SeamlessGov for a fireside chat with Christina Rothman-Iliff, the Manager of Access Princeton at Princeton, NJ. GMIS Members are encouraged to bring their challenges related to both internal communication with staff and/or external communication with residents. During the session we will address how Princeton, NJ has tackled many of the common challenges in local government communication. The session is sure to provide actionable insights for GMIS Members to apply to their own roles.

We'll speak to Christina about her journey as she leveraged various internal resources, brought together previously unassociated departments, and ultimately succeeded in enhancing Princeton's internal communication. You'll hear about internal processes prior to Christina's work, and also learn about how things operate after her improvements. The presentation will also reveal some of the unexpected benefits of increased internal communication.

Dispatch Software Consolidation Benefits

Laura Gonzales photoLaura Gonzales

CIO Retired

Laura was born and raised in Albuquerque, NM. She attended Southern Methodist University and obtained Bachelors' degrees in Business Administration and English. During college she received scholarships to study in Spain and at Oxford University in England as well as performing volunteer work with Amigos de las Americas in Ecuador. She attended Webster University and received a Masters' in Computer Resource and Information Management and subsequently began a career spanning over 20 years in public sector Information Technology. She was Chair of the Board for REDI Net, a project to bring a fiber backbone to Northern New Mexico. She is on the curriculum committee for the Bachelor of Engineering in Computer Science for Northern New Mexico College, has worked with UNMLA on their Information Technology curriculum and on a grant for their Information Technology program. Laura believes in striving to improve your own skills and in pursuit of that belief has become a certified Project Management Professional and a Certified Government Chief Information Officer. She recently retired as CIO of Los Alamos County. She occasionally consults for different agencies within the State of NM and is President-Elect of the PMI Otowi Bridge Chapter.

Mel Lee photoMel Lee

CIO, NM Department of Public Safety

Melvin Lee an Air Force veteran began his civilian career in technology after separating from the military by proceeding to work in the education sector as an IT Director for the Albuquerque Public Schools for 14 years before taking a leap into state government as the Chief Information Officer (CIO) for the Department of Public Safety.

In regards to education, Melvin Lee have a Bachelors Science Business Administration, Masters Business Administration in Technology Management and currently a Ph.D. candidate in pursuit of a specialization degree in Information Systems Management.

Abstract: - DOWNLOAD PRESENTATION

The State of New Mexico Department of Public Safety is in the process of implementing a computer aided dispatch system for both State Police, federal and local jurisdictions. The coordination, outreach and logistics of this endeavor have been complex to say the least. The resulting dispatch system will improve the response to incidents and knowledge sharing across New Mexico. The first step in this process was the political will to share data. The project started as an individual agency project, but State Police Chief Kassetas had the vision to see the value of a shared system throughout the State. This presentation will take the audience through the process of implementing the system, while at the same time bringing on additional agencies, setting the governance for future agencies to join, creating a statewide routable map and going live.

Understanding Government Technology Ethics and Conflict of Interest

Bernadette Kucharczuk photoBernadette Kucharczuk

Director, CGCIO - City of Jersey City

Bernadette is a Certified Government Chief Information Officer currently serving the City of Jersey City, NJ. She previously held this role in the City of Atlantic City, NJ, the City of East Orange, NJ and the County of Sutter, CA. She has also served as Deputy County Administrator in Sutter County, CA and as Assistant Director of Public Works for the County of Tehama, CA. Susan and Bernadette presented this topic from the legal/admin and practitioner perspective at the April 2017 NJGMIS Technology Education Conference and are pleased to offer it again to the entire GMIS International audience.

Abstract: - DOWNLOAD PRESENTATION

What happens when a vendor offers you bonus equipment to close an equipment purchase? Can a vendor offer you a price break over the amount in a state contract? Can you do extra work on a contract with your employer? Do you have to disclose your finances to your employer? These and other questions related to the Local Government and Public School Ethics Law, and other laws related to government ethics will be presented by an expert; taking questions from the audience will be integral part of the discussion.

Mobile First Government: How Apple and MobileIron Secure our Most Vital Institutions

Dave McKinney

Partner Alliances, MobileIron Public Sector

Dave McKinney has over 20 years of technology industry experience and is responsible for Partner Alliances at MobileIron Public Sector, an industry leading company that helps government organizations protect and secure their cloud and mobile environments. He brings together the people, resources and tools to enable agencies and departments to achieve mission success.

Abstract:

Cloud and Mobile has become a key priority in State, Local and Federal government agencies. To empower the mobile workforce, government agencies are moving decisively toward cloud computing, which helps them shift work to the optimal location, time and resource needed. As workplace mobility becomes more widespread, many agency employees are using devices such as smartphones and tablets to complete their work. How do government agencies secure the data that travel through these environments? The stakes for government users are high - threats range from advanced nation state attacks, to organized crime using advanced fraud technologies, to simple theft of mobile phones. Additionally, Personally Identifiable Information (PII) could be used to compromise our citizen’s finances, privacy and well-being. This session will discuss what the issues are and what potential solutions can be used to increase security assurance and protect government systems and constituents.

Pre-Conference Training - Virtualization: Public, Private and Hybrid

Lou Melograna

Chief Technology Officer, StarNet Solutions

Lou Melograna started in WAN technology back in the early 1990s. Since then he has worked with every major vendor in the field and has been involved in thousands of installations, troubleshoots and consulting jobs. He started StarNet Solutions 15 years ago to provide customers with a superb experience with a company that puts their customers' needs first. Our goal is to truly provide the best possible solution with the best customer service possible with open communication.

View Pre-Conference Training details and agenda.

Destination: You

Ben Moebes photoBen Moebes

Regional Sales Director, Ruckus

Ben is a wireless networking industry veteran with 20 years of experience. He started his IT career as a Network Manager for a steel manufacturing company and later moved into the sales and marketing world with networking manufacturers. He has worked with companies and government agencies of all sizes in the US and around the world. Ben lives in the Atlanta area with his family and, when not helping build great networks, he enjoys cycling and coaching hockey.

Abstract:

Your phones, your tablets, your laptops, your lights and even your cameras deserve the best connectivity. Today’s connectivity is, in fact, all about you. We’ve been developing our solution portfolio with you in mind, to help you keep up with the tidal wave of devices joining your network every year. Ruckus is coming to share our vision for connecting everywhere we live, work and play. Your satisfaction is the foundation of our success. After all, it’s all about you!

Hyperconvergence

Jon Palmer photoJon Palmer

Vmware Solutions Architect, SHI

Jon Palmer is the VMware Solutions Architect at SHI for the past 3 years focusing on the entire VMware portfolio from a technical perspective. Jon is responsible for technical design validation, product questions, assessments, licensing, product demos, and some VMware road mapping. Prior to this he was a VMware Administrator for a cloud hosting company called Capgemini as well as spent 3 years with General Dynamics as a Systems Engineer focusing on building a virtual infrastructure for a large scale communication system for the military.

Abstract:

Join SHI to learn about hyperconvergence. Jon Palmer, VMware Solutions Architect at SHI, will delve into the definition of hyperconverged, discuss where it is seen in the market, explore challenges and use cases and review SHI offerings around hyperconverged.

The Albatross of Legacy Storage and the Promise of Future-proof Government

Nick Psaki photoNick Psaki

Principal Engineer, Americas - Federal, Pure Storage

Nick Psaki is the Principal Engineer, Americas - Federal for Pure Storage and based in the Washington, DC area. Nick is Pure Storage's senior technical resource for Public Sector customers, providing deep technical knowledge of flash storage system architectures that enable business and technological transformation for government enterprises.

A 20-year veteran of the United States Army, Nick has extensive experience in designing, developing, deploying and operating information systems for data analysis, sensor integration and large-scale server virtualization. He was the Intelligence Architectures Chief for the Army G2 (Intelligence), and the Technology and Integration Director for Army G2 Futures directorate. He has served in multiple peacekeeping and combat operations ranging from the Balkans in the 1990's (Operation Able Sentry VI and Operation Joint Endeavor/Joint Guard) to Iraq and Afghanistan in the post-9/11 era. For the past several years, Nick has been focused on ways in which new and emerging technologies can enable more rapid and cost-efficient analysis of ever-growing bodies of data.

Abstract:

Of all the incredible innovations that have happened in the datacenter, storage missed the boat.  As a result, storage turned into a commodity product that became nothing but a burden - hogging not only precious resources, but an unfair share of the IT budget.  But with innovations in all-flash technology and new business models that allow storage to stay modern, storage is now back in the CIO’s office.  All-flash storage is driving significant transformation in government organizations across the country, accelerating critical functions like constituent services, emergency response and data analytics.  Learn from your peers how storage has added strategic value to the organization, reduced storage footprint, reduced power/cooling costs and most importantly, redefined simplicity. See how other agencies are embracing flash to achieve some of their most challenging goals and evolve into a more modern and future-proof government.  The Albatross can be ancient history.

Municipal Drone Operations

Ben Roper photoBen Roper

IT Director, City of College Station

Ben Roper is a native Texan who hails from Clifton, Texas. Ben graduated from Stephen F. Austin State University and worked in industry for two years prior to being commissioned as an officer in the United States Navy He specialized in communications during his last 10 years in the military holding positions of Deputy Director of Command and Control, Communications, Computers and Combat Systems for United States Fleet Forces Command in Norfolk, VA; Assistant Chief of Staff for Communications and Information Systems for the United States Sixth Fleet based in Gaeta, Italy; and Satellite Communications Analyst for the Command, Control, Communications, Computer and Intelligence (C4I) Directorate of the Joint Staff, Washington, D.C. He served numerous shipboard assignments and was Commanding Officer of the USS RENTZ (FFG-46) based in San Diego, CA. Ben was twice selected by the Navy for the NASA astronaut candidate program as a Mission Specialist. Ben achieved the rank of Captain, and retired from the U. S. Navy with 25 years of service before joining the City of College Station as Assistant IT Director in September 2004. He was selected as Director in June 2007. As IT Director for the City of College Station he is responsible for ensuring that all communications and data infrastructure, systems, applications and equipment support Council Strategic goals, city staff needs, and the delivery of timely and relevant information to citizens. Ben is a graduate of the Naval Postgraduate School, holding dual Master's degrees in Systems Technology (Space System Operations) and Engineering Science. In 2009 he received his MBA from Sam Houston State University. Ben is an active member of the Texas Association of Governmental Information System Managers (TAGITM), previously serving as President, and a member of GMIS. Ben and his wife, Patricia, have three children, Matthew, a 2006 graduate of Texas A&M University, Christopher, and Sean.

Abstract: - DOWNLOAD PRESENTATION

The City of College Station has developed a small unmanned aircraft system (sUAS) program. The UAS will be used by various city departments when surveillance and enhanced situational awareness is needed, or when it may be hazardous to send personnel to the scene. Examples may include critical incident surveillance, hostage situations, search and rescue, hazardous spill response (i.e. derailment), and inspection of vertical surfaces and inaccessible locations. This presentation describes the process and procedures needed to obtain FAA approval for operations, and progress to date on developing this concept.

Getting your Town Started on Social Media with No Budget and One Person

Christina Rothman-Iliff photo

Christina Rothman-Iliff

Manager, Municipality of Princeton

Christina Rothman-Iliff, Manager - Access Princeton, has had an extensive career in Princeton supporting the community. As a 9-1-1 Communications Officer for the Princeton Township Police Department, Christina created a training program for Communications Officers encompassing hiring, training and continuing education programs for the Communications staff. She also was responsible for the daily supervision of operations within the Communications Bureau. In May of 2014 a Municipal call center was formed in Princeton, in collaboration with a vendor, to provide on line reporting of non-emergency problems in town as well as information on all Municipal services in Princeton. Christina took on the role of managing this new Department and was charged with the task of getting it up and running. This very important service, Access Princeton, was created to provide an avenue for handling questions and concerns from residents, visitors, and businesses. As a liaison, Christina coordinated efforts with the Municipal Departments to get these issues addressed. Access Princeton has validated the growing trend of citizen engagement and customer service and Christina can be credited with its success. Christina continues to focus her energies on engaging the community though social media accounts for the town such as Twitter and Facebook.

Abstract: - DOWNLOAD PRESENTATION

Social media is a way of life. Not only is it a source of information it is also a way of communicating. This can be frightening for government agencies as it is unfamiliar territory. It opens up a new way of communicating with constituents that is terrifying! Is it that hard to create a Twitter account or make a Facebook page? Who will monitor it? These are questions a lot of governments have when trying to decide if social media is right for them. All are valid concerns especially for a government. The truth is getting started on social media can be an added benefit to all the other services provided and Princeton did it with one person.

Can you get your town on social media alone? Yes you can.

Where to start? Consider your demographics. Who do you want to reach? What are people using? What are they using it for? What message do you want to send? Pick a platform and run with it. Facebook is always a good start, easy to set up the pages, get verified, minimal limits on posting. Use the technology offered on the platforms-live stream on Facebook, Periscope posts to twitter.

Comments! What do we do if they actually comment on something? Make a policy and post it. Linked it from our Twitter page (only allowed 140 characters to describe the town) and posted it in notes on Facebook.

What about staff? Who can post, what can they post? Again, make a policy. Work with a committee of key staff (CIO, Administrator, legal) and have a policy in place on use of social media, personal and town pages.

Policy - Before going live, make that policy. Include archiving posts, approval process, and content. Inform staff of the policy.

Defend Your Turf in Cyber Space: Free Education, Training, and Cybersecurity Resources

Daniel Stein

National Cybersecurity Training/Education Program Director, U.S. Department of Homeland Security

Dan Stein is the Program Lead of the National Cybersecurity Education and Training Program (NCTEP) within the Department of Homeland Security's (DHS) Cybersecurity Education and Awareness Branch. NCTEP's portfolio includes the nationally-focused Federal Virtual Training Environment and Cybersecurity Training Events (FedVTE/CTE) Program. NCTEP also oversees DHS's partnerships with the National Security Agency on the National Centers of Academic Excellence programs and with the National Science Foundation for the CyberCorps®: Scholarship for Service (SFS) program. Mr. Stein has supported DHS's interests in cybersecurity education and training for eight years, both as a Federal employee and as a contractor. He has also been active in federal government information security efforts for the past eleven years. Mr. Stein recently graduated from the U.S. National War College with a Master of Science in National Security Strategy. He also holds two master's degrees from the University of Texas at Austin and a bachelor's degree from the University of Rochester.

Eugene Kipniss photoEugene Kipniss

Program Specialist, Multi-State ISAC

Eugene Kipniss is a Program Specialist for the Multi-State Information Sharing and Analysis Center, a division of the Center for Internet Security. He works on the Stakeholder Engagement team with our nation's State, Local, Territorial, and Tribal (SLTT) governments in order to provide them with access to the many MS-ISAC services and information products which support organizational security posture and awareness. Eugene focuses on managing the accounts of hundreds of MS-ISAC member governments and organizations across the Northeastern and Midwestern U.S. With a degree in International Relations concentrated on Global Security from the University of Rochester, he sees the importance of securing our nation's many SLTT entities as a component of the larger national cybersecurity program.

Abstract: DOWNLOAD PRESENTATION

Cybersecurity is not an isolated concern to be addressed across each level of government individually. It requires a join effort to increase cybersecurity awareness, training, and education. As Michael Kaiser had once mentioned, “As larger entities have become better defended, cybercriminals are moving down the business food chain. Criminals are looking for what’s the easiest door they can break down to get the stuff they want” (Kaplan, 2010). State, local, tribal, and territorial (SLTT) governments are the smaller entities that are often targeted, and face increasingly complex cyber threats and attacks from many different sources. Their variant governance structures, technical connectivity, and limited resources such as tools and manpower to secure systems and information can invite cybercriminals to channel their sophisticated attacks to infiltrate these variant cybersecurity landscapes.

In this session, we will explore how to address these threats and the actors behind them with the FREE resources available through the Multi-State Information Sharing and Analysis Center (MS-ISAC) and Department of Homeland Security (DHS). Both organizations are dedicated to offering cybersecurity resources and tools that enable SLTT governments to collaboratively work within their communities to increase resiliency and defense in cyber space.

Finding al-Qaeda

Cynthia Storer photo

Cynthia Storer - Keynote Speaker

Former CIA Senior Counterterrorism Analyst

Cynthia Storer, formerly a Senior Analyst at the Central Intelligence Agency, was among the “sisterhood” of analysts who first identified and warned about al-Qaeida in the mid-1990s. Cindy was featured, and talks about this part of her career, in the Emmy Award-winning HBO documentary Manhunt. As an analyst at CIA, Cindy also researched, wrote, and briefed about Afghanistan, Islamic Extremism, and various other aspects of the “War on Terror” to senior policymakers. Her original model for understanding terrorism was featured as one of the Best Ideas of 2006 by the New York Times Magazine. Since leaving the CIA in 2007, Cindy has been a Fellow at the Center for the Study of Terrorism and Responses to Terrorism at the University of Maryland, provided analysis training and education to US federal, state, and local agencies, and taught intelligence and terrorism courses at Coastal Carolina University. She is currently an adjunct instructor at John’s Hopkins University and is consulting with the International Spy Museum in Washington, DC.

Abstract:

Cindy tells the inside story of how analysts partnered with information specialists and evolving technology to identify, assess, track, and often thwart al-Qeada, and the challenges of communicating the threat to a skeptical audience.

Ransomware & Modern DR Strategies = Risky Business

Matt Tyrer photoMatt Tyrer

Solutions Marketing Manager, Commvault

Having worked at Commvault for over nine years, Matt is currently serving as the Solutions Marketing lead for the Americas. His other roles included Senior Enterprise Systems Engineer for the Canadian private and public sectors, Canadian Technical Lead for Information Management, as well as member of the Commvault Systems Engineering Advisory Council.

He has over 15 years’ experience in the IT industry, including within the fields of data and information management, cloud, compliance, enterprise storage, data centre consolidation and migration, disaster recovery, and ultimately both implementing and supporting those projects and endeavours for public and private sector clients across Canada and around the globe.

Matt’s passion, deep product knowledge, and broad field experiences have enabled him to translate Commvault technology and vision such that their value is easily understood in the market and amongst client and partner families.

A self-described geek, he understands the importance of Han shooting first, why being “shiny” is a good thing, that boxes are excellent camouflage, and why one should always be afraid when it’s Buffy’s birthday. Beyond this, he loves to travel, plays golf (poorly), tries to find time for the dusty PS4, and always makes time for his 2 lovely daughters.

Abstract: - DOWNLOAD PRESENTATION

Perhaps a better term is “The Business of Risk”. With the challenges facing the hybrid datacenter, the need to not only protect your data, but to have a well-oiled machine ready to recover it is paramount. The risks associated with migrating workloads, ever-increasingly interdependent applications, and the constant evolution of malware (WannaCry, [Not]Petya) are not going away. Add to this a more demanding and mobile workforce and you have a definite sense of chaos.

A well-planned data management strategy provides the tools you need to find, move, and use your data no matter where it resides, while mitigating risk and increasing value and control. In this discussion we will share customer experiences with Ransomware recovery, mult-faceted DR strategies, and best practices to secure and recover your data when and where it is needed. Manage your data risk properly and make hybrid cloud a part of that strategy.

Around the Horn: Authentication, Encryption, and Information Assurance: Navigating the Turbulent Waters of Security

Shannon Tufts photo

Shannon Tufts

Assistant Professor of Public Law & Government & Director, Center for Public Technology, UNC School of Government

Shannon Tufts designed and implemented the first local government Chief Information Officers Certification program in the nation and continues to run CIO certification programs for local and state government IT professionals. She created a National Certified Government Chief Information Officer program in 2007, in order to serve the growing needs of public sector IT professionals across the nation. Tufts has taught numerous courses on public sector information systems across the United States, including IT investment strategies, embracing technology, project management, and stakeholder engagement in technology-enabled government. She serves on several federal, state, and local government committees to promote the effective use of technology in the public sector. Her publications in the area of e-government and public sector information technology include Humanizing IT: Advice from the Experts with G. David Garson, numerous book chapters, and articles in Social Sciences Computer Review and Popular Government. She was named Albert and Gladys Coates Distinguished Term Assistant Professor for 2012–2014. Tufts earned a BA from UNC-Chapel Hill, an MPA from UNC-Charlotte, and a PhD in public administration with a concentration in public sector information systems from North Carolina State University.

Darren Carroll photoDarren Carroll

Practice Director, Security & Risk Management, SHI

With over 26 years of experience, Darren is a risk management and information security leader with diverse experience in operational, technical, management, and architecture roles.

Throughout his career, Darren has provided consultative thought leadership, strategic direction, and tactical response to multiple federal, state, and local agencies, most of the Fortune 100 and hundreds of mid-sized enterprises. His expertise focuses on information security and business continuity solutions, with a deep emphasis on Critical Infrastructure, He has extensive experience defining, developing, and delivering information security , including security and privacy program development, policy and procedure development, review, and alignment, security assessments, vulnerability management solutions, security operations center development, and architectural design,. As part of his architectural experience, he has designed and delivered global network and telecommunications infrastructures, unified communications, storage and virtualization platforms, firewalls, security assessment tools, intrusion detection and protection systems, encryption systems, and security information and event management systems.

Darren has performed cloud architecture design and development, cloud security readiness, gap assessments and roadmaps, and cloud strategy development. A former member of the Cloud Security Alliance Architecture working group, Darren has had significant input into defining appropriate security controls for virtualized environments.

Recently, Darren has been focusing on applicability of actionable threat intelligence against clients' environments. Gathered from numerous disparate intel sources, he has worked to align these datasets to potentially vulnerable IT assets. His experience in this arena includes numerous open-source humint and signint sources, NCIC, and other platform-specific intel data.

Darren has assisted numerous clients with their comprehensive risk management programs, including leading them from assessment and identification, to prioritization, and mitigation. He has developed solutions for risk mitigation and transformed organizations to better codify and consume risk information.

Darren brings a strong understanding and familiarity with diverse compliance and regulatory frameworks, including NIST 800 series, ISO 2700X series, HIPAA/HITECH, PCI regulations, and several industry-specific guidelines (ISA, API, CFR, etc.). Prior to joining SHI, Darren was a Director of Security Consulting for Sungard Availability Services, and the Managing Principal, Cybersecurity, Risk, & Intelligence for Verizon Security Services. Prior to Verizon, Darren spent time with EMC Consulting.

Darren's role in leading the Global Cybersecurity SME team had him providing both strategic and tactical leadership around Information Security and Risk & Compliance, providing customer-facing subject matter expertise on information security, threat intelligence and analytics, governance, risk, and compliance, aligning compliance and regulatory frameworks to business needs, and perform project delivery for GRC services (requirements definition, data gathering, gap analysis, remediation roadmap, etc).

In his spare time, Darren is a Volunteer Firefighter / Paramedic, and is currently the Assistant Chief of the Point Pleasant Fire Company.

Justin Heyman photoJustin Heyman

Director of Technology, Township of Franklin, NJ; President, GMIS International

Justin Heyman, CGCIO is the Director of Information Technology for the Township of Franklin in Somerset County New Jersey. Justin has served as a public official for over 13 years with the Township. He obtained his Bachelor of Science in Computer Science from The College of New Jersey. Currently Justin serves as President of GMIS International and like many of his peers has a avid interest in securing technology infrastructure for the improvement of public sector operations.

 

Chuck Horton photoChuck Horton

Chief Technical Officer, York County Government

Chuck Horton is the Chief Technology Officer for York County, SC, providing oversight of the systems, security, networking, programming, database administration and helpdesk. He has served in this capacity for the past six years.

Horton began his career with the County 11 years ago as the County’s IT Programmer. He has extensive experience in programming; as well as, coordinating infrastructure and service delivery that solves organizational issues through the use of technology.

Horton has a degree in Information Technology from York Technical College.

Eugene Kipniss photoEugene Kipniss

Program Specialist, Multi-State ISAC

Eugene Kipniss is a Program Specialist for the Multi-State Information Sharing and Analysis Center, a division of the Center for Internet Security. He works on the Stakeholder Engagement team with our nation's State, Local, Territorial, and Tribal (SLTT) governments in order to provide them with access to the many MS-ISAC services and information products which support organizational security posture and awareness. Eugene focuses on managing the accounts of hundreds of MS-ISAC member governments and organizations across the Northeastern and Midwestern U.S. With a degree in International Relations concentrated on Global Security from the University of Rochester, he sees the importance of securing our nation's many SLTT entities as a component of the larger national cybersecurity program.

Abstract:

In a world with almost limitless connectivity where cyberattacks are constantly emerging, government agencies are facing unprecedented vulnerabilities. Join us for this hot topic covering Information Assurance, Authentication, and Encryption. Information Assurance (IA) focuses on protecting and defending information, data, and technology systems to ensure availability, integrity, authentication, confidentiality, and nonrepudiation. Authentication and encryption are two intertwined technologies that help to protect and secure your government’s most critical resource, its data, and are part of any IA approach. Don’t miss this exciting panel discussion about the constantly evolving world of cyber security!

Freaks, Innovators and Great Thinkers Unite

Shannon Tufts photo

Shannon Tufts

Assistant Professor of Public Law & Government & Director, Center for Public Technology, UNC School of Government

Shannon Tufts designed and implemented the first local government Chief Information Officers Certification program in the nation and continues to run CIO certification programs for local and state government IT professionals. She created a National Certified Government Chief Information Officer program in 2007, in order to serve the growing needs of public sector IT professionals across the nation. Tufts has taught numerous courses on public sector information systems across the United States, including IT investment strategies, embracing technology, project management, and stakeholder engagement in technology-enabled government. She serves on several federal, state, and local government committees to promote the effective use of technology in the public sector. Her publications in the area of e-government and public sector information technology include Humanizing IT: Advice from the Experts with G. David Garson, numerous book chapters, and articles in Social Sciences Computer Review and Popular Government. She was named Albert and Gladys Coates Distinguished Term Assistant Professor for 2012–2014. Tufts earned a BA from UNC-Chapel Hill, an MPA from UNC-Charlotte, and a PhD in public administration with a concentration in public sector information systems from North Carolina State University.

Abstract: DOWNLOAD PRESENTATION

What can you learn from hot dog eating champion, Takeru Kobayashi, and how can it transform your approach to innovative thinking? This session will focus on the principles found in thought-provoking books, such as Think Like a Freak and Great by Choice, to facilitate a mindset shift to help you tackle daily challenges with a new and refreshing outlook. Problem solving will never be the same once you become a Great Freak!

Intentional Leadership

Carolyn Yon photo

Carolyn Yon

Application Development Manager, Richland County Government

With 25 years in Information Technology and 10 years in the Agile space where she has led multiple award-winning teams, Carolyn Yon is also a Certified John Maxwell Team Leadership speaker, teacher and coach. She is passionate about taking good to great, and helping individuals and organizations create an environment where excellence is repeatable and reproduceable.

Abstract: - DOWNLOAD PRESENTATION

Growth of any kind doesn't just happen naturally. It takes intentional action to bring together the elements needed to cultivate a climate in which creative, smart people can thrive and grow into their leadership strengths. Come along as we learn the action steps needed to create such a climate for yourself and for your teams.

In this session, we’ll discuss the differences between leadership and management and why it’s important for an organization to know the difference. We’ll walk through the “Five A’s Inventory” to assess what the organization needs in order to fulfill its purpose, and identify those leadership candidates who get things done and are ready, willing and able to take on the responsibility of leadership.

We’ll dive into the specific action steps and along-the-way guidelines for the process of equipping and developing those candidates into Leaders, and creating a framework for aligning Leaders and their teams. While we work in a hard-skill, technological world and the process of cultivating technical skills may be something that we’re used to, in some ways, the process for cultivating soft skills can be similar and we’ll see how we can leverage what we already know, and how to supplement what we don’t.

The session will culminate in a blueprint for developing Leaders, aligning their strengths to organizational purpose, and structuring teams for sustainable organic growth.

GMIS data drive Facebook Twitter linkedin Google+

© 2017 GMIS International Headquarters
PO Box 27923 Austin, TX 78755 | Phone 877.963.4647 | headquarters@gmis.org