2020 Schedule

PA TechCon Seminar Tracks & Speakers

WELCOME – HARRISBURG UNIVERSITY: 9:00 AM – 9:10 AM

Eric Darr, PhD
President
Harrisburg University of Science & Technology

 

Kelly Powell Logan
Vice President for Strategic Workforce Development and University Centers
Harrisburg University of Science & Technology

WELCOME – Commonwealth of Pennsylvania: 9:10 AM – 9:20 AM

Michael Newsome,
Secretary of Administration,
Commonwealth of Pennsylvania

COMMONWEALTH KEYNOTE: 9:20 AM – 9:45 AM

John MacMillan,
Deputy Secretary for Information Technology and Chief Information Officer,
Commonwealth of Pennsylvania

BREAK: 9:45 AM – 10:00 AM

Keynote: 10:00 AM – 10:45 AM

Culture of Innovation

Hardik Bhatt,
Leader, Digital Government, US State & Local Governments,
AWS

BREAK: 10:45 AM – 11:00 AM

SESSION 1: 11:00 AM – 11:45 AM

TRACK 1

Workforce of The Future

Navigating the Future of Work as a Government Agency


This session will zoom out to explore disruptive trends in government, technology, and the workforce that are driving government leaders to think differently about how to prepare their agencies for the future and meet the needs of their citizens. What does the Future of Work mean for the trifecta of the work, workforce, and workplace in government, and how will the IT function evolve to support it? Then, we’ll zoom in to explore Deloitte’s perspective on new technologies that are changing government work and opportunities to access, curate, and engage the right talent to perform that work in an increasingly competitive talent landscape.

Nicole Overley, MA, PMP
Human Capital Manager
Deloitte

TRACK 2

Managing Data & Systems to Ensure Availability

Paper to Pixels – Preserve, Protect, Present

An essential function of government is the preservation of critical documents such as birth certificates, property deeds and historical artifacts.
Today, instead of reliance on hardcopy, many of these documents are preserved and accessed in electronic form. Therefore, properly managing and archiving electronic documents is a crucial responsibility of government IT leaders.
In this session, you will learn the requirements that governments must follow to preserve critical documents from Linda Avetta (the Digital Archives and Records Division Chief of the Pennsylvania Historical and Museum Commission), the vision of Phillip Walter (the Chief Information Officer of Adams County, home of the Gettysburg Battlefield) regarding the plan to archive documents that are important to citizens and beyond, and the broader industry perspective from Clifford Shier (Managing Principal, Unisys).

Linda F. Avetta
Supervisor, Contract Management Section
PA Office of Administration, Health and Human Services Delivery Center

Philip Walter
CIO
Adams County

Clifford Shier
Managing Principal, Enterprise Solutions
Unisys

TRACK 3

Securing Citizens’ and Customers’ Identity Data

AT&T Cybersecurity Presents: Tour of the Dark Web Redux & Steps to Protect Your Agency

The infamous “Dark Web”. Is it real or a myth? Rest assured it is real and is the underbelly of the Internet where criminals operate with near impunity.
AT&T Cybersecurity experts will take you on a live tour of the deep and dark web and demonstrate how vulnerable your agency and employees may be. Most importantly how to protect citizens. See firsthand how simple it is for criminals to purchase fake passports, credit cards, drugs, guns, and even order cyber-attacks. This presentation will leave an impression on even the most experienced security veterans.
Now What Should I Do?
AT&T Cybersecurity will provide a simplified approach and steps you should be taking to protect your agency. Highlights will include assessing your current vulnerability, testing your perimeter, and who do you call if you have a breach or ransomware attack? We will end with simple steps to protect your WAN, Customer Data, Internet, and Mobility.

Scott Sweren
PCI QSA, PCIP, CISSP, CISM, CRISC, GIAC GSEC & GSNA, PMP
AT&T Cybersecurity

TRACK 4

Emerging Technologies That Support Effective Customer Interactions

Customer Interactions 2.0 – Attack of the Drones

We want to present on the utilization of drones in public safety operations to support effective customer interactions. Drones are unmanned aerial devices with the capability to navigate autonomously, beyond the line of vision, and they are increasingly being used in various sectors of the economy to streamline processes. Drones can have sensors attached to them (LiDAR, RGB cameras, temperature sensors, etc.) to best serve whatever application is desired from them. The technology is continuously evolving and their usage is expected to keep on growing over time.
Customer satisfaction can be significantly enhanced by employing drones in Public Safety operations. Drones, specifically micro drones, have the capability to reach places where it might be difficult or even life threatening to send a human public safety responder to. This makes them highly valuable in search and rescue operations. In moments of natural disasters or other crises where humans are stranded, drones can collect information through visuals, heat signatures and other means to significantly enhance and speed up the process of identifying and locating stranded citizens. This helps public safety officers reach them faster and remove them from harm’s way sooner. Drones can also be used to remotely monitor temperature and toxic gas concentrations to safeguard the security of citizens. It is possible to communicate with citizens through drones equipped with speakers and microphones, even before officers have physically reached them. This enables officers to tend to the needs and concerns of citizens, better and faster. Furthermore, lightweight packages can be delivered using drones, enabling a safe, environmentally friendly and fast transport of goods by air to citizens in need of immediate assistance. Drones enable public safety teams to maintain satisfactory levels of customer interaction and satisfaction even in the tightest scenarios. This is truly revolutionary in the world of customer interaction.

Indu Singh, PhD
Senior Scientist
OST, Inc.

 

Renu Chaudhry
Chief Strategy Officer
OST, Inc.

LUNCH: 11:45 AM – 12:45 PM

SESSION 2: 12:45 PM – 1:30 PM

TRACK 1

Workforce of The Future

Planning Today for Tomorrow’s Future


It’s not enough to simply plan for succession, you must plan for succession that also follows your strategic vision, technological changes, and anticipated challenges. We’ll look at the difference between “succession planning” and “strategic succession planning.” We’ll then highlight techniques that will help you form, implement, and maintain a strategic succession plan.

Curt Mills
Director of Service Delivery
Momentum, Inc.

 

Amy Towson, PMP, SA, CSM, ITIL (v4)
Senior Advisor
Momentum, Inc.

TRACK 2

Managing Data & Systems to Ensure Availability

Information coming soon.

Information coming soon.

TRACK 3

Securing Citizens’ and Customers’ Identity Data

Privileged Access Management (PAM) Best Practices – Back to the Basics

Please join IBM and Thycotic for a “back to the basics” session on Privileged Access Management best practices. For the past two years, PAM has been the number one IT security priority according to Gartner. Privileged Access is a top target for attackers and once they gain privileged access, they move around the organization appearing as a trusted insider avoiding traditional perimeter defenses. With more and more catastrophic breaches, organizations are looking closer at PAM Best Practices and how they fit into their defense-in-depth program.
  • This session describes best practices for Privileged Access Management including defining PAM, understanding the PAM Maturity Model and actionable tasks you can take to begin or mature your PAM program
  • The risk and possible impact of weak privileged access controls
  • Simple best practices to reduce risk from both a technical and policy level for your Privileged Access Management program

Richard Swain, ISSP, CCSP, CRISC and CIPM, Open Group Certified IT Architect
Senior Security Architect
IBM

 

Katie McCroskey, MBA
Director of Knowledge Mgmt. & Training
Thycotic

TRACK 4

Emerging Technologies That Support Effective Customer Interactions

Reducing Recidivism, Relapse, Homelessness Through Mobile-Edge Technologies

This presentation will show the way in which different local and state agencies across the country are approaching services delivery to  social and community issues of homelessness, opioid/drug addiction and Community Corrections to reduce recidivism, relapse rates and homelessness.

Daniel Stewart
Hon. Senior Advisor – State and Local Government
Cisco Systems Inc

Ben Williams
BDMTRACKtech

NETWORKING: 1:30 PM – 2:00 PM

SESSION 3: 2:00 PM – 2:45 PM

TRACK 1

Workforce of The Future

The Convergence of Security, Automation, and Engagement

In this session, attendees will take a journey to the future and learn about the technologies that are transforming the modern digital workplace.  We’ll take a look at future technologies from all sides so attendees will have a solid understanding of the best investments to improve their enterprise and employee experience while considering security and efficiencies.

Shamlan Siddiqi, MS
CTO
NTT DATA

TRACK 2

Managing Data & Systems to Ensure Availability

Up & Running Isn’t Good Enough – Protecting Operations, Data, and Systems

Keeping systems up and running isn’t good enough. System and operational failures can result in an agency’s failure to properly conduct its mission. When data is lost, or incidents are not properly handled, or resources are not adequate to support daily operations then failures can occur. Some failures are annoyances and others can be front page news. This presentation introduces Enterprise Risk Management and the tools and techniques used to identify, assess, and manage risk in a coordinated manner across an agency. ERM in the context of an agency’s traditional three lines of defense is also discussed.

Steven Young, PMP
Sr. Vice President
Mathtech, Inc.

TRACK 3

Securing Citizens’ and Customers’ Identity Data

Rethinking How We Protect Data

The world has changed a lot in the last 20 years. 20 years ago, it was much harder to get information on people, in fact, if you wanted to find someone’s phone number you had to look it up in the phone book. Even then you would be lucky to find the person you were looking for. Information today is far more accessible, and you can find information on virtually anyone. In the first days of the internet, the more data you had on people the better off you were. After all, with knowledge comes power. However, data has now become a liability for many organizations as privacy issues continue to rise on the use of data and what privacy should be afforded to that data. In this fast-paced presentation, we will review a brief history of how far we have come in 20 years and how our management and handling of consumer data must change in the 21st century to avoid disaster.

Brandon Keath, MS
Cyber Security Practice Lead
Appalachia Technologies

TRACK 8

Vision & Future of Public Sector IT

Panel Discussion: Commonwealth of Pennsylvania

Description Coming Soon

Tom Diecidue
Chief Information Officer
Conservation and Environment

 

Michael DeMatt
Chief Information Officer
Infrastructure and Economic Development

 

Sandy Patterson
Chief Information Officer
Health and Human Services

NETWORKING: 2:45 PM – 3:15 PM

SESSION 4: 3:15 PM – 4:00 PM

TRACK 5

Assessing User Expectations & Outcomes

Digital Engagement for Government

Government agencies are seeing increasing expectations from their customers based on their Citizen’s consumer internet experiences to provide digital engagement channels from mobile to social and online conversational live and robotic agents. Salesforce is the leading customer experience platform for commercial companies and is now delivering those capabilities via the Cloud including the latest Public Sector compliance and security standards to support Government digital transformation.

Michael Yeganeh
VP Solution Engineering
Salesforce

TRACK 6

Benefiting the Customers Through Modernization and Sharing Applications

Commonwealth Customer Service Transformation

Description coming soon.

Terrell Martin
Business One-Stop Shop Director
Commonwealth of Pennsylvania

TRACK 7

Case Studies – Customer Engagement Successes

Empowering Companies and Overcoming Challenges to Transform Your Customer Experience

Transforming an organization’s customer experience can feel like a daunting task.  Where do I start?  What should I do?  How do I gets started?  These questions are common.  After 10 years of researching the world’s greatest customer experience companies KPMG will share leading practices for transforming your customer experience.  After learning the approach to building great experiences you have the opportunity to hear the VP of Experience and Solutions from the Project Management Institute as he describes how this global learning organization has enhanced their customer experience.  During this interview discussion, you we will learn: how to prioritize customer experience initiatives, how to empower companies and its employees to successfully change the experience, and how to overcome challenges (internal and external) to achieve a successful customer experience transformation.  Our goal is to have you change the way you think and feel more emboldened as you proceed down the customer experience transformation journey.  This session will deliver success factors that you can take back to the office tomorrow to start moving the needle on your department’s customer experience.

Jeff Mango

Managing Director, Customer Experience Transformation

KPMG

TRACK 8

Vision & Future of Public Sector IT

Panel Discussion: Commonwealth of Pennsylvania

Description Coming Soon

Dustin Rhoads
Chief Information Officer
Public Safety Delivery Center

 

Dave Naisby
Chief Information Officer
Employment, Banking and Revenue Delivery Center

 

Julie Snyder
Chief Information Officer
General Government Delivery Center

NETWORKING RECEPTION (Invitation Only): 4:00 PM – 5:00 PM

NETWORKING: 2:45 PM – 3:15 PM