2020 Schedule

PA TechCon Seminar Tracks & Speakers

REGISTRATION: 7:30 AM – 8:30 AM

WELCOME – HARRISBURG UNIVERSITY: 8:30 AM – 8:45 AM

1151, 14th Floor Auditorium

Keynote: 8:45 AM – 9:30 AM

1151, 14th Floor Auditorium

Culture of Innovation

Hardik Bhatt,
Leader, Digital Government, US State & Local Governments,
AWS

COMMONWEALTH KEYNOTE: 9:45 AM – 10:30 AM

John MacMillan,
Deputy Secretary for Information Technology and Chief Information Officer,
Commonwealth of Pennsylvania

NETWORKING: 10:30 AM – 11:00 AM

SESSION 1: 11:00 AM – 11:45 AM

TRACK 1

Workforce of The Future

Navigating the Future of Work as a Government Agency


This session will zoom out to explore disruptive trends in government, technology, and the workforce that are driving government leaders to think differently about how to prepare their agencies for the future and meet the needs of their citizens. What does the Future of Work mean for the trifecta of the work, workforce, and workplace in government, and how will the IT function evolve to support it? Then, we’ll zoom in to explore Deloitte’s perspective on new technologies that are changing government work and opportunities to access, curate, and engage the right talent to perform that work in an increasingly competitive talent landscape.

Nicole Overley, MA, PMP
Human Capital Manager
Deloitte

TRACK 2

Managing Data & Systems to Ensure Availability

Paper to Pixels – Preserve, Protect, Present

An essential function of government is the preservation of critical documents such as birth certificates, property deeds and historical artifacts.
Today, instead of reliance on hardcopy, many of these documents are preserved and accessed in electronic form. Therefore, properly managing and archiving electronic documents is a crucial responsibility of government IT leaders.
In this session, you will learn the requirements that governments must follow to preserve critical documents from Linda Avetta (the Digital Archives and Records Division Chief of the Pennsylvania Historical and Museum Commission), the vision of Phillip Walter (the Chief Information Officer of Adams County, home of the Gettysburg Battlefield) regarding the plan to archive documents that are important to citizens and beyond, and the broader industry perspective from Clifford Shier (Managing Principal, Unisys).

Linda F. Avetta
Digital Archives and Records Division Chief
Pennsylvania State Archives

Philip Walter
CIO
Adams County

Clifford Shier
Managing Principal, Enterprise Solutions
Unisys

TRACK 3

Securing Citizens’ and Customers’ Identity Data

AT&T Cybersecurity Presents: Tour of the Dark Web Redux & Steps to Protect Your Agency

The infamous “Dark Web”. Is it real or a myth? Rest assured it is real and is the underbelly of the Internet where criminals operate with near impunity.
AT&T Cybersecurity experts will take you on a live tour of the deep and dark web and demonstrate how vulnerable your agency and employees may be. Most importantly how to protect citizens. See firsthand how simple it is for criminals to purchase fake passports, credit cards, drugs, guns, and even order cyber-attacks. This presentation will leave an impression on even the most experienced security veterans.
Now What Should I Do?
AT&T Cybersecurity will provide a simplified approach and steps you should be taking to protect your agency. Highlights will include assessing your current vulnerability, testing your perimeter, and who do you call if you have a breach or ransomware attack? We will end with simple steps to protect your WAN, Customer Data, Internet, and Mobility.

Scott Sweren
PCI QSA, PCIP, CISSP, CISM, CRISC, GIAC GSEC & GSNA, PMP
AT&T Cybersecurity

TRACK 4

Emerging Technologies That Support Effective Customer Interactions

Reducing Recidivism, Relapse, Homelessness Through Mobile-Edge Technologies


This presentation will show the way in which different local and state agencies across the country are approaching services delivery to social and community issues of homelessness, opioid/drug addiction and Community Corrections to reduce recidivism, relapse rates and homelessness.

Daniel Stewart
Hon. Senior Advisor – State and Local Government
Cisco Systems Inc

Ben Williams
BDMTRACKtech

TRACK 5

Assessing User Expectations & Outcomes

Customer Satisfaction, Driving Results through Measurement

Have you ever felt that you’re delivering value only to find out your customers feel different during service review time? This discussion will dive into the implementation of a process to measure customer satisfaction with the core tenants of honest feedback, measuring change in satisfaction over time, focusing on the right questions and following the data to drive results and how you can drive successful outcomes in one quarter.

Joe Schilling
Manager Security Operations Center
Highmark Health

TRACK 6

Benefiting the Customers Through Modernization and Sharing Applications

Commonwealth Customer Service Transformation

Terrell Martin
Business One-Stop Shop Director
Commonwealth of Pennsylvania

TRACK 7

Case Studies – Customer Engagement Successes

Customer Engagement through Digital Accessibility

Digital accessibility focuses on making sure websites, online applications, mobile apps and other services work for everyone, regardless of ability. Accessibility is a requirement for many government programs and a key priority of the Governor’s Customer Service Transformation initiative. Recently, the commonwealth hired its first Chief Accessibility Officer (CAO) to help advance this important priority.

This session will explore the role of the CAO to improve the digital experience for citizens and employees with disabilities; how accessibility impacts your role in planning, designing and building digital content; and highlight accessibility work underway in the Pennsylvania Department of Education.

Ellen Strom
Chief Accessibility Officer
Commonwealth of Pennsylvania

TRACK 8

Vision & Future of Public Sector IT

Information Coming Soon

Description Coming Soon

Tom Diecidue
Chief Information Officer
Conservation and Environment

 

Michael DeMatt
Chief Information Officer
Infrastructure and Economic Development

 

Sandy Patterson
Chief Information Officer
Health and Human Services

LUNCH: 11:45 AM – 12:45 PM

SESSION 2: 12:45 PM – 1:30 PM

TRACK 1

Workforce of The Future

The Convergence of Security, Automation, and Engagement


In this session attendees will take a journey to the future and learn about the technologies that are transforming the modern digital workplace. We’ll take a look at future technologies from all sides so attendees will have a solid understanding of the best investments to improve their enterprise and employee experience while considering security and efficiencies.

Shamlan Siddiqi, MS
CTO
NTT DATA

TRACK 2

Managing Data & Systems to Ensure Availability

Ensuring Application Uptime and Efficiency via an Application Performance Monitoring Solution

State and Local IT organizations are under increasing pressure to deliver services to their citizens in a digital, “on-demand” manner, as well as ensure their organization’s mission critical applications run as smoothly and efficiently as possible.
The last thing any organization wants is for their key applications to not work as they should – especially those that are revenue-generating, public safety-focused, providing vital benefits and resources to underserved citizens, or keeping internal, day-to-day business operations running. Yet, many still rely upon outdated approaches to managing their mission critical applications – even despite the negative impact denigrated performance issues or, worse yet, full-blown, crippling outages can cause.
A single interaction associated with a request for services, application for benefits, payment, etc., for example, can activate millions of lines of code across multiple, distributed environments. When any single segment, or multiple segments of transactions begin to break down or cause issues, IT teams have to determine the “where” and “why” before any remediation efforts can begin. Hence, the proverbial task of “finding the needle in the haystack.” Unfortunately, the typical use of war rooms, siloed tools, and log driven triage efforts simply are neither thorough nor efficient enough to maintain the level of performance citizens, business partners, staff, students and faculty expect in today’s digital age.
The AppDynamics platform provides SLED IT operations and development teams with the breadth and depth of real time information they need to ensure optimal application performance and uptime. With deep visibility into each piece of technology supporting an application (e.g. database, OS, application server); organizational context (e.g. login, enroll); correlation of each metric; evolving baselines; and automated actions, organizations can rest assured AppDynamics will provide them with a reliable single source of truth for providing their stakeholders with the best possible, performance, uptime and digital experience.

Jay Smith
Regional Account Director
AppDynamics

 

Chris Sechler
Senior Sales Engineer
AppDynamics

TRACK 3

Securing Citizens’ and Customers’ Identity Data

Privileged Access Management (PAM) Best Practices – Back to the Basics

Please join IBM and Thycotic for a “back to the basics” session on Privileged Access Management best practices. For the past two years, PAM has been the number one IT security priority according to Gartner. Privileged Access is a top target for attackers and once they gain privileged access, they move around the organization appearing as a trusted insider avoiding traditional perimeter defenses. With more and more catastrophic breaches, organizations are looking closer at PAM Best Practices and how they fit into their defense-in-depth program.
  • This session describes best practices for Privileged Access Management including defining PAM, understanding the PAM Maturity Model and actionable tasks you can take to begin or mature your PAM program
  • The risk and possible impact of weak privileged access controls
  • Simple best practices to reduce risk from both a technical and policy level for your Privileged Access Management program

Richard Swain, ISSP, CCSP, CRISC and CIPM, Open Group Certified IT Architect
Senior Security Architect
IBM

 

Katie McCroskey, MBA
Director of Knowledge Mgmt. & Training
Thycotic

TRACK 4

Emerging Technologies That Support Effective Customer Interactions

Creating Accessible Government Services Through the Cloud

Government customers are expecting Amazon.com like services from their Governments. It is possible with emerging technologies. Understand how Governments across the country and globe are using emerging technologies to voice-enabled government services, automated call center, use of chatbots to automate service provision, use other Artificial Intelligence services to make government services more accessible (in multiple languages, and through multiple channels).

Hardik Bhatt
Leader, Digital Government, US State & Local Governments
AWS

TRACK 5

Assessing User Expectations & Outcomes

Digital Engagement for Government

Government agencies are seeing increasing expectations from their customers based on their Citizen’s consumer internet experiences to provide digital engagement channels from mobile to social and online conversational live and robotic agents. Salesforce is the leading customer experience platform for commercial companies and is now delivering those capabilities via the Cloud including the latest Public Sector compliance and security standards to support Government digital transformation.

Michael Yeganeh
VP Solution Engineering
Salesforce

TRACK 6

Benefiting the Customers Through Modernization and Sharing Applications

Best Practices in Software Modernization

With the advent of the internet and the success of e-service delivery, citizens and other customers of government have a higher expectation of service. Unfortunately, most governments have a large portfolio of legacy applications not capable of meeting citizen expectations. The time, cost and risk to replace these legacy applications is significant and therefore requires a thoughtful strategy and roadmap.
Accenture will share its experiences working with clients to solve the legacy software issue. Learn best practices on how to approach the problem, prioritize which applications warrant immediate attention and what emerging technologies may help organizations speed the transition from old, legacy technology to contemporary technology that is easier to maintain and capable of providing a better customer experience.

Jamie Shephard
Managing Director, Health and Public Service Transformation and Tech Advisory Executive
Accenture

TRACK 7

Case Studies – Customer Engagement Successes

Voting Machine Deployment

Description Coming Soon

City of Philadelphia

Gartner

TRACK 8

Vision & Future of Public Sector IT

Information Coming Soon

Description Coming Soon

NETWORKING: 1:30 PM – 2:00 PM

SESSION 3: 2:00 PM – 2:45 PM

TRACK 1

Workforce of The Future

Planning Today for Tomorrow’s Future


It’s not enough to simply plan for succession, you must plan for succession that also follows your strategic vision, technological changes, and anticipated challenges. We’ll look at the difference between “succession planning” and “strategic succession planning.” We’ll then highlight techniques that will help you form, implement, and maintain a strategic succession plan.

Curt Mills
Director of Service Delivery
Momentum, Inc.

 

Amy Towson, PMP, SA, CSM, ITIL (v4)
Senior Advisor
Momentum, Inc.

TRACK 2

Managing Data & Systems to Ensure Availability

Do More with Less – Become the Hero of Your IT Organization

IT organizations across government, higher ed, and the public sector face severe challenges such as low funding, shrinking staff, and aging infrastructure. How can IT teams even manage to keep the lights on under these circumstances, especially if they’re using multiple point tools for things like backup, disaster recovery, and data cloning for test purposes? One solution would be to use a copy data management platform which enables IT organizations to consolidate data protection and data cloning functions under a single pane of glass. Copy data management solutions allow IT organizations to reduce operational burden and infrastructure costs while freeing up IT staff to work on other projects – without losing focus on security. Attend this session to learn how you can become the hero of your IT organization by utilizing a copy data management solution for backup, disaster recovery, and data cloning!

Jason Brown, MBA
Director, Product Marketing
Actifio

The Future of the Cloud

New Era delivers communication and collaboration services to users faster and more effectively than ever with a full suite of cloud-hosted collaboration services on a highly secure, cloud-ready, virtualized platform under a centralized management system.
Attendees will receive a comprehensive review of New Era’s Cloud Hosted Solutions, including Cloud Unified Communications, Cloud Storage/Backup as a Service, Video Surveillance as a Service, Anti-Virus Protection as a Service, Carrier/SIP as a Service, and Wireless as a Service. Learn about the key benefits of migrating your organization to the Cloud and how New Era’s best-of-breed security technology can keep your data safe.

Joe Gillis
National Business Development Manager
New Era Technology

TRACK 3

Securing Citizens’ and Customers’ Identity Data

Rethinking How We Protect Data

Description Coming Soon

Brandon Keath, MS
Cyber Security Practice Lead
Appalachia Technologies

Critical Cyber Security Components Often Overlooked

Cybersecurity has become a big business for criminals and the fact that Government agencies are still being breached on a regular occurrence should have taxpayers furious. Most of these agencies are the cities, municipalities, and counties that we live in, but larger and larger entities also are getting caught without proper proactive security measures and no recovery or continuity plan.
Often overlooked cybersecurity components that are critical to securing the smallest borough to the largest federal agency are one in the same. DNS scanning, firewalls, network infrastructure, patching, updates, and end user training are all crucial to a proactive plan of attack to maintain a secure network infrastructure. It is these components that are often time consuming or just simply ignored that allows a successful phishing attack access.
Reactive planning and validation are essential to any proactive plan. Being able to timely identify and then recover from an attack or hardware failure, and having the documentation in order sounds simple, but even many trusted IT vendors will fall short on providing a complete validated solution.
Attending this presentation, you will learn the questions to ask your IT staff or vendor to fully understand what your Recovery Time would be and where you fall short on a cybersecurity plan. As a bonus, we will highlight of some of the common and effective tools that should be utilized to protect your network infrastructure while maintaining security compliance.
It’s long overdue to take a serious look at your cyber security portfolio, making this the can’t miss presentation of PATechCon.

Scott Davis
vCIO/CTO
TechWise Group

TRACK 4

Emerging Technologies That Support Effective Customer Interactions

AI-Based Product Strategy

Being a Product Leader requires structured and organized thinking. Frameworks and toolkits are a handy and effective way to approach problems. In the ever changing environment of the business models, technologies, leaders must be prepared to embrace the change and adapt to the demand.

Main takeaways:

  • Should you provide products or solutions to the customer?
  • How would you set expectations to your management?
  • Learn about how to deal with innovation, prototyping, growth, failure (and learning)
  • How can AI, ML and DS can help organizations to help customers and best competition
  • Real world examples of how AI is helping traditional industries to thrive

Suresh Madhuvarsui
Founder & Partner
Product10x

 

Anand Desikan, MBA
Founder & Partner
Product10x

TRACK 5

Assessing User Expectations & Outcomes

Human-Centered Design for Meaningful Citizen Engagement

Do you know if your services are useful and meaningful to citizens? Where they created and validated with citizens? Do you co-create with citizens? When creating services for citizens to use, you must keep them central to all product design process. This session will walk you through Human-Centered Design (HCD) Methodology, a creative approach to developing digital services and products that are usable and meet citizen expectations.

By using HCD principles and methods in your projects you will be able to:

  • Identify real challenges over supposed ones.
  • Clearly define opportunities.
  • Ideate and test multiple solutions all before ever touching code.
  • Create continuous product development pipelines to always meet citizen expectations.
You will learn practical, hands-on methods that let you translate strategic goals and ideas into tactical approaches and outcomes that are data-backed and objectively derived. Additionally, by centering your work on HCD principles you can build a culture that is “Citizen-First” and advocates for experience over systems.

Timothy McKenna
Director of Experience Design
Pennsylvania Interactive LLC

TRACK 6

Benefiting the Customers Through Modernization and Sharing Applications

Colorado HHS Modernization: Building a Connected Government with MuleSoft

In response to the Affordable Care Act, the State of Colorado elected to be one of 17 states to create their own health insurance marketplace. In order to better engage citizens, Colorado embraced new technologies and delivery channels to provide a streamlined citizen experience. However, as they rolled out their marketplace and citizen portals, they realized portals would need data from a host of complex legacy applications. Delivering a seamless experience for citizens would require integrating their ‘PEAK’ platform for Medicaid with a number of disparate systems including ones owned by Federal Agencies including the Social Security Administration as well as several internal State systems.
In this session, learn how Colorado utilized an API-led methodology and adopted a developer-first approach to modernize legacy applications to create a flexible, connected architecture across siloed systems.

Shad Imam
Director of Solutions Engineering-Public Sector
MuleSoft

TRACK 7

Case Studies – Customer Engagement Successes

Customer Assessments in ERB

Description Coming Soon

TRACK 8

Vision & Future of Public Sector IT

Information Coming Soon

Description Coming Soon

Michael Riley, G6
CIO
Pennsylvania Army National Guard

 

Mark Wheeler
CIO
City of Philadelphia

NETWORKING: 2:45 PM – 3:15 PM

SESSION 4: 3:15 PM – 4:00 PM

TRACK 1

Workforce of The Future

Digital Curriculum Disruption for Career & Technology Education


Health Science students entering the workforce will use electronic health records and other forms of technology. Why are we still using textbooks and traditional classroom methods to educate? Learn about the disruptive power of digital curriculum and blended learning for career and technical education.

Ken Richard
Product Director
Applied Educational System

Quantum is Knocking on Your Door


Today, quantum computers and a quantum internet are just a blip on the edge of IT’s radar, but quantum is approaching fast. This session presents the current state of quantum information technologies and offers a roadmap IT leader should be operating by in order to skill-up and staff a “Quantum Ready” workforce. Indeed, quantum computers are now even available via AWS and Azure. Yes, RSA encryption is effectively cracked, and you should be aware of what nation-states and industries are doing about it. Knock, knock….

Terrill Frantz
Professor of eBusiness and Cybersecurity
Harrisburg University of Science and Technology

TRACK 2

Managing Data & Systems to Ensure Availability

The Evolving Face of Ransomware – Security Planning for Today’s Threats

Ransomware is now targeting governments and has led to several high-profile cases. The hyper-targeting of small government agencies is predicted to continue into 2020. In this educational session, Kevin Damghani shares what threat actors are searching for in the average 120 days ransomware is dormant on a network and suggests simple security planning steps to avoid the most common mistakes. To illustrate his points, Kevin will demonstrate a live ransomware infection and recovery.

Kevin Damghani, PMP
Chief Partner Experience Engineer
ITPartners+

Up & Running Isn’t Good Enough – Protecting Operations, Data, and Systems

Keeping systems up and running isn’t good enough. System and operational failures can result in an agency’s failure to properly conduct its mission. When data is lost, or incidents are not properly handled, or resources are not adequate to support daily operations then failures can occur. Some failures are annoyances and others can be front page news. This presentation introduces Enterprise Risk Management and the tools and techniques used to identify, assess, and manage risk in a coordinated manner across an agency. ERM in the context of an agency’s traditional three lines of defense is also discussed.

Steven Young, PMP
Sr. Vice President
Mathtech, Inc.

TRACK 3

Securing Citizens’ and Customers’ Identity Data

Security Risk Analysis of Enterprise Systems and the Integration of Distributed Ledger Technologies

Cryptography, the rise of cloud computing coupled with the adoption of peer to peer technologies has enabled a new medium of stability and security for the delivery of government and enterprise services. We are in a period of time where governments, financial institutions and enterprises around the globe are being shaped by this technology. Distributed ledger technologies enable user data to be readily available, securely accessible and cryptographically verifiable.

Zachary Pelkey, B.S Computer Science, Curriculum Engineer
CTO
Akashic Technologies

 

Alec Wantoch, B.S Computer Science, Sr. Curriculum Engineer
CEO
Akashic Technologies

Building a Foundation for Secure Citizens and Customers Data

One aspect of delivering a “Citizen-First” agenda is the protection of identity and personal data. Managing data, privacy, risk and accessibility associated with Commonwealth Data, facilities and materials depends on a comprehensive data inventory.
Trusted data is used to deliver regulatory compliance, support citizen services and explore options to improve delivery. Organizations need a structured approach to building data intelligence – any data-driven activity based on an unstable foundation inevitably leads to failure.

This session will introduce a structured process to:

  • Establish the data inventory
  • Identify personal data
  • Create a repeatable and scalable process to maintain data protection
  • Manage data privacy status

Join ASG Technologies to discover how a combination of broad coverage of legacy and modern technologies, connection of business and technical metadata, and automated traceability of private data through applications and data will:

  • Protect citizen information
  • Enable rapid response to legitimate requests for information
  • Improve agency/citizen relationships
  • Support modernization efforts
  • Build a foundation for Data Management best practices

Sam Yoo
Data Intelligence Specialist, Financial Sector
ASG Technologies

Why Securing Data-in-Motion Matters?

Our information has become currency with e-mail becoming the most convenient way to share files. In fact, 293 billion emails were sent each day in 2019. With that much data in motion, is email the most secure distribution mechanism? Without much thought placed on the sharing of data have you considered how valuable or sensitive the information shared has become? It is estimated that personal information is worth, on average, $1,500 and those will lose morals continue to find ways to obtain and sell that data to third parties. This doesn’t include the billions of corporate and business documents shared. Let’s discuss the value of securing data in motion with the goal of defining the best cybersecurity practices for everyday use.

Marek Hajn
Vice President
IT-CNS, Inc.

 

Christopher Martin
President
Atlas Marketing

TRACK 4

Emerging Technologies That Support Effective Customer Interactions

Customer Interactions 2.0 – Attack of the Drones

We want to present on the utilization of drones in public safety operations to support effective customer interactions. Drones are unmanned aerial devices with the capability to navigate autonomously, beyond the line of vision, and they are increasingly being used in various sectors of the economy to streamline processes. Drones can have sensors attached to them (LiDAR, RGB cameras, temperature sensors, etc.) to best serve whatever application is desired from them. The technology is continuously evolving and their usage is expected to keep on growing over time.
Customer satisfaction can be significantly enhanced by employing drones in Public Safety operations. Drones, specifically micro drones, have the capability to reach places where it might be difficult or even life threatening to send a human public safety responder to. This makes them highly valuable in search and rescue operations. In moments of natural disasters or other crises where humans are stranded, drones can collect information through visuals, heat signatures and other means to significantly enhance and speed up the process of identifying and locating stranded citizens. This helps public safety officers reach them faster and remove them from harm’s way sooner. Drones can also be used to remotely monitor temperature and toxic gas concentrations to safeguard the security of citizens. It is possible to communicate with citizens through drones equipped with speakers and microphones, even before officers have physically reached them. This enables officers to tend to the needs and concerns of citizens, better and faster. Furthermore, lightweight packages can be delivered using drones, enabling a safe, environmentally friendly and fast transport of goods by air to citizens in need of immediate assistance. Drones enable public safety teams to maintain satisfactory levels of customer interaction and satisfaction even in the tightest scenarios. This is truly revolutionary in the world of customer interaction.

Indu Singh, PhD
Senior Scientist
OST, Inc.

 

Renu Chaudhry
Chief Strategy Officer
OST, Inc.

TRACK 5

Assessing User Expectations & Outcomes

Defining the Citizen Experience: How Customer–Focused Initiatives are Transforming Agency Operations

As leaders of change, organizational strategy development should center around 2 guiding principles:

  • How can we create a supportive and productive work environment for our team, and
  • How can we exceed customer expectations?
Whether a private business or public sector agency, customer-centric organizations deliver positive interactions and achieve higher customer satisfaction. Additionally, when consideration is given to the entire customer journey, employees also experience greater job satisfaction and a deeper awareness of their purpose.
For organizations focused specifically on the citizen experience, it is often difficult to understand the value of these initiatives and to appreciate the impact that brand reputation has on agency culture and operations. By exploring the rationale of and the methodologies for transforming your agency into a customer-focused delivery center, we can begin to embrace the importance of creating and facilitating the optimal customer journey. With that mindset, we gain a better understanding of what the customer truly wants, and we are enabled to create specific, targeted strategies for providing positive customer interactions.

Tabitha Daugherty, M. Ed.
Director, Brand Strategy & Customer Experience
Info-Matrix Corporation

TRACK 6

Benefiting the Customers Through Modernization and Sharing Applications

Consumerism: Customer-Centric R&D

We will explore (and implore) designing for consumerism, specifically “the process of applying the same methods that companies use to create and improve consumer products and services to the creation and improvement of healthcare services.”
We focus our discussion of consumerism on three tenets: customer understanding, engaged employees and experience design.
Attendees can expect to take away insights for designing innovative, customer-focused experiences built upon empathy and problem solving.

Mark Kandrysawtz, MBA
CEO
Benjamin & Bond

 

Max Robinson, MBA
Senior Associate
Benjamin & Bond

TRACK 7

Case Studies – Customer Engagement Successes

Panel Discussion: Important Considerations When Seeking Better Customer Service

Description Coming Soon

TRACK 8

Vision & Future of Public Sector IT

Information Coming Soon

Description Coming Soon

NETWORKING RECEPTION (Invitation Only): 4:00 PM – 5:00 PM