Jun 17, 2015
Tim Robyn, Chief Information Officer, State of Missouri
Jim Meskimen, Master Impressionist and Communication Coach
Today’s culture emphasizes the value of teamwork and collaboration, sometimes at the expense of the individual. This is particularly true in the IT arena where you can sometimes find yourself stereotyped, or even worse, not taken seriously by potential stakeholders. What good are insights and solutions if your words get lost in the crowd? You need to make sure that you’re heard! Jim Meskimen has spent the past 30 years studying the most famous, creative and interesting people in modern times. In this fascinating and hilarious session, Jim discusses – and illustrates – the traits and methods used by some of the best and most charismatic communicators in the world. Don’t settle for being “one of the crowd”. YOU have a unique identity. YOU have a voice!
Open government and transparency are often unattainable without an aggressive open data strategy. Data empowers citizens – but only if it’s valuable information and only if it’s in a form that’s easy to understand and use. Otherwise, all the hard work just goes to waste. This session looks at how to effectively use open data to streamline, improve upon, and amplify citizen relationships.
Smartphones are increasingly replacing computers, televisions, landlines, game consoles, GPS devices, and live personal interaction. Smartphone addiction has even been labelled an official syndrome: “nomophobia”. For better or for worse, mobility is king and governments must pay homage. This session discusses the most important factors to consider when developing or utilizing mobile apps, both internal- and external-facing.
Typically, organizations have an inconsistent view of data across departments or even within the same department. In this age of big data and the cloud, it’s more important than ever to find ways to consolidate and share reliable data both internally and externally. Otherwise there will be inefficiencies, missed opportunities and poor service. This session focuses on strategies for a holistic data ecosystem.
Cyber security is the new front line of financial crime and social upheaval. It is the new Wild West, with hackers divided among the "white hats" and "black hats." Stage coach and bank robberies of old have been replaced by heists of personally identifiable information from major retailers, insurers and governments. Political protests are increasingly taking the form of denial-of-service attacks by so-called “hactivists” to disrupt the normal order of things. Such things can and do happen anywhere, and everybody has a role in preventing, preparing for, and responding to cyber threats. This interactive session unpacks key lessons and learnings from real-life cases with the help of a panel of local experts and engaged audience members.
Application management goes well beyond “maintenance”. It must also encompass accurate performance measurement and ongoing security assessment. Regardless of who develops and maintains the application, there are methods to embrace and pitfalls to avoid. This session discusses some of the approaches and solutions that can be used to manage and safeguard an application throughout its life cycle.
Pressure is intensifying on government organizations to share data and apps with other agencies and jurisdictions. The challenge isn’t always easy, but traditional barriers are breaking down and opportunities have never been greater. This session provides insights on how to collaborate and build mutually beneficial relationships along with some of the data- and app-sharing strategies and technologies being used successfully today.
Expectations about service have been greatly influenced by the Internet and fierce competition in private industry. Customers are used to service being available at their own convenience, and they are viewing government services the same way. How can the challenge be met without adding significantly more resources? What tools and strategies work the best? This session focuses on successful actions, innovations and lessons learned.
(Industry sponsors only.) This informal discussion is hosted by State CIO Tim Robyn and Deputy State CIO Steve Siegler.
Smartphones and tablets are increasingly replacing computers, televisions, landlines, game consoles, GPS devices and live personal interaction. Smartphone addiction has even been labeled an official syndrome: "nomophobia", and it's undoubtedly taking a toll on human behavior and physical health. This session discusses some things to be concerned about in today's device-based society.
One question about security is particularly easy to answer: "Are we 100% digitally secure?" The answer is always "no", of course. There are no absolutes, and that's particularly true for security. But there are ways to tilt the odds in your favor. The easiest (and cheapest) way is to simply quit doing the things you shouldn’t be doing. This fun and informative session provides some valuable tips.
Today, it's tough to find an organization that doesn't depend on the cloud for at least a few critical processes. The question is no longer whether to venture into the cloud, yes or no. That's a forgone conclusion. Now it's a question of "how, what, when and where?" Valuable lessons have been learned by both government and private industry in recent years. This session focuses on available options, practices that work and pitfalls to avoid.
Network with your colleagues and discuss technology solutions with the event exhibitors.
Conference times, agenda, and speakers are subject to change.