Jim Meskimen, Master Impressionist and Communication Coach
Today’s culture emphasizes the value of teamwork and collaboration, sometimes at the expense of the individual. This is particularly true in the IT arena where you can sometimes find yourself stereotyped, or even worse, not taken seriously by potential stakeholders. What good are insights and solutions if your words get lost in the crowd? You need to make sure that you’re heard! Jim Meskimen has spent the past 30 years studying the most famous, creative and interesting people in modern times. In this fascinating and hilarious session, Jim discusses – and illustrates – the traits and methods used by some of the best and most charismatic communicators in the world. Don’t settle for being “one of the crowd”. YOU have a unique identity. YOU have a voice!
Society’s appetite for data is downright insatiable. It’s estimated that the world’s information doubles every 18 months, and government eats more than its share. Is all of it nutritious? Of course not! The key is to identify what’s actually needed and prioritizing accordingly. Only then can you establish appropriate standards for quality and usability. This session discusses some of the ways to cope with a data tsunami that just keeps coming.
Smartphones are increasingly replacing computers, televisions, landlines, game consoles, GPS devices, and live personal interaction. Smartphone addiction has even been labelled an official syndrome: “nomophobia”. For better or for worse, mobility is king and governments must pay homage. This session discusses the most important factors to consider when developing or utilizing mobile tools and apps, both internal- and external-facing.
The biggest security challenge faced by IT officials is the attitude of “I’ve heard it all before”. A close second is “It’s not my job.” But if there’s anything we’ve learned through the years, it’s that threats and vulnerabilities are constantly shifting and that security is everyone’s job. This session focuses on how to keep stakeholders educated, informed and engaged during the never-ending fight against intrusion.
The Next Generation Kentucky Information Highway is a key piece of the plan to reshape eastern Kentucky’s economy. It will offer some of the nation’s fastest capacity along with unsurpassed rural connectivity. This session provides a timely update on this ambitious initiative and why it will soon change the face of the Commonwealth.
Cyber security is the new front line of financial crime and social upheaval. It is the new Wild West, with hackers divided among the "white hats" and "black hats." Stage coach and bank robberies of old have been replaced by heists of personally identifiable information from major retailers, insurers and governments. Political protests are increasingly taking the form of denial-of-service attacks by so-called “hactivists” to disrupt the normal order of things. Such things can and do happen anywhere, and everybody has a role in preventing, preparing for, and responding to cyber threats. This interactive session unpacks key lessons and learnings from real-life state and local government cases with the help of a panel of local experts and engaged audience members.
As the Internet continues its transformation from a web of information to a web of connected people and things, the bar keeps rising for delivering services and means of access that are up to the task. Smart devices, mobile apps, sensors, convergence and social media present both challenges and unprecedented opportunities. This session focuses on game-changing innovations and advances that are making networked connections more relevant and valuable than ever before.
XaaS is the essence of cloud computing, and these days almost anything can be delivered as a service: software, infrastructure, storage, platforms, data, you name it. The concept is no longer new, but it’s far from settled. The key is to build the right business case while determining the risks and rewards. This session explores the factors to consider when deciding to pull the trigger in a move to managed services.
Typically, organizations have an inconsistent view of data across different departments or even within the same department. In this age of big data, it’s more important than ever to find ways to consolidate and share reliable data organization-wide. Otherwise there will be missed opportunities, wasted money and poorer customer service. This session focuses on strategies for identifying, streamlining and sharing critical information across the organization.
Although the debate about open data is still evolving, transparency and open government are clearly here to stay. Simply making data available to the public isn’t enough, however. It has to be useful, which requires a specific approach based on the agency releasing it, the kind of data being released and the targeted audience. This session discusses how open data can lead to increased engagement, efficiency and innovation.
Sometimes, despite all efforts, systems are breached. There are important things to know in advance rather than after the fact. Some of the guidelines are universal and some are unique to the Commonwealth. This interactive session covers the dos and don’ts if a worst-case scenario happens to you.
Today, it’s tough to find an organization that doesn’t depend on the cloud for something critical. The question is no longer whether to venture into the cloud, yes or no. Now it’s a matter of “How, what, when and where?” Valuable lessons have been learned by both government and private industry in recent years. This session focuses on practices that work and pitfalls to avoid.
Network with your colleagues and discuss technology solutions with the event exhibitors.
Conference times, agenda, and speakers are subject to change.