2020 Schedule

PA TechCon Seminar Tracks & Speakers

WELCOME – HARRISBURG UNIVERSITY: 9:00 AM – 9:10 AM

Eric Darr, PhD
President

Kelly Powell Logan
Vice President for Strategic Workforce Development and University Centers
Harrisburg University of Science & Technology

WELCOME – Commonwealth of Pennsylvania: 9:10 AM – 9:20 AM

Michael Newsome,
Secretary of Administration,
Commonwealth of Pennsylvania

COMMONWEALTH KEYNOTE: 9:20 AM – 9:45 AM

John MacMillan,
Deputy Secretary for Information Technology and Chief Information Officer,
Commonwealth of Pennsylvania

BREAK: 9:45 AM – 10:00 AM

Keynote: 10:00 AM – 10:45 AM

Culture of Innovation

Hardik Bhatt,
Leader, Digital Government, US State & Local Governments,
AWS

BREAK: 10:45 AM – 11:00 AM

SESSION 1: 11:00 AM – 11:45 AM

TRACK 1

Workforce of The Future

Navigating the Future of Work as a Government Agency

In this session, attendees will take a journey to the future and learn about the technologies that are transforming the modern digital workplace. We’ll take a look at future technologies from all sides so attendees will have a solid understanding of the best investments to improve their enterprise and employee experience while considering security and efficiencies.

Nicole Overley, MA, PMP
Human Capital Senior Manager
Deloitte

TRACK 2

Managing Data & Systems to Ensure Availability

Paper to Pixels – Preserve. Protect. Present.

An essential function of government is the preservation of critical documents such as birth certificates, property deeds and historical artifacts.

Today, instead of reliance on hardcopy, many of these documents are preserved and accessed in electronic form. Therefore, properly managing and archiving electronic documents is a crucial responsibility of government IT leaders.

In this session, you will learn the requirements that governments must follow to preserve critical documents from Linda Avetta (the former Digital Archives and Records Division Chief of the Pennsylvania Historical and Museum Commission), the vision of Phillip Walter (the Chief Information Officer of Adams County, home of the Gettysburg Battlefield) regarding the plan to archive documents that are important to citizens and beyond, and the broader industry perspective from Clifford Shier (Managing Principal, Unisys).

Linda F. Avetta
Supervisor, Contract Management Section 
PA Office of Administration, Health and Human Services Delivery Center

Philip Walter
CIO
Adams County

Clifford Shier
Managing Principal, Enterprise Solutions
Unisys

TRACK 3

Securing Citizens’ and Customers’ Identity Data

Tour of the Dark Web Redux & Steps to Protect Your Agency

The infamous “Dark Web”.  Is it real or a myth? Rest assured it is real and is the underbelly of the Internet where criminals operate with near impunity.

AT&T Cybersecurity experts will take you on a live tour of the deep and dark web and demonstrate how vulnerable your agency and employees may be. Most importantly how to protect citizens.  See firsthand how simple it is for criminals to purchase fake passports, credit cards, drugs, guns, and even order cyber-attacks. This presentation will leave an impression on even the most experienced security veterans.

Now What Should I Do?

AT&T Cybersecurity will provide a simplified approach and steps you should be taking to protect your agency. Highlights will include assessing your current vulnerability, testing your perimeter, and who do you call if you have a breach or ransomware attack? We will end with simple steps to protect your WAN, Customer Data, Internet, and Mobility.

Scott Sweren
PCI QSA, PCIP, CISSP, CISM, CRISC, GIAC GSEC & GSNA, PMP
AT&T Cybersecurity

TRACK 4

Emerging Technologies That Support Effective Customer Interactions

Customer Interactions 2.0 – Attack of the Drones

We want to present on the utilization of drones in public safety operations to support effective customer interactions. Drones are unmanned aerial devices with the capability to navigate autonomously, beyond the line of vision, and they are increasingly being used in various sectors of the economy to streamline processes. Drones can have sensors attached to them (LiDAR, RGB cameras, temperature sensors, etc.) to best serve whatever application is desired from them. The technology is continuously evolving and their usage is expected to keep on growing over time.

Customer satisfaction can be significantly enhanced by employing drones in public sector operations. Drones, specifically micro drones, have the capability to reach places where it might be difficult or even life threatening to send a human to. This makes them highly valuable in search and rescue operations. In moments of natural disasters or other crises where humans are stranded, drones can collect information through visuals, heat signatures and other means to significantly enhance and speed up the process of identifying and locating stranded citizens. Drones can also be used to remotely monitor temperature and toxic gas concentrations to safeguard the security of citizens. It is possible to communicate with citizens and/ or public sector officials working on site through drones equipped with speakers and microphones, even without having to physically reach them. This enables faster and more efficient distribution of information, which can be time critical. Furthermore, lightweight packages can be delivered using drones, enabling a safe, environmentally friendly and fast transport of goods by air to citizens and/ or public sector officers. This can help boost the on- site efficiency of many public sector activities. Drones enable public sector teams to maintain satisfactory levels of customer interaction and satisfaction even in the tightest scenarios. This is truly revolutionary in the world of customer interaction.

Indu Singh, PhD
Senior Scientist
OST, Inc.

 

Renu Chaudhry 
Chief Strategy Officer
OST, Inc.

LUNCH: 11:45 AM – 12:15 PM

SESSION 2: 12:15 PM – 1:00 PM

TRACK 1

Workforce of The Future

Planning Today for Tomorrow’s Future

It’s not enough to simply plan for succession, you must plan for succession that also follows your strategic vision, technological changes, and anticipated challenges. We’ll look at the difference between “succession planning” and “strategic succession planning.” We’ll then highlight techniques that will help you form, implement, and maintain a strategic succession plan.

Curt Mills
Director of Service Delivery
Momentum, Inc.

 

Amy Towson, PMP, SA, CSM, ITIL (v4)
Senior Advisor
Momentum, Inc.

TRACK 2

Managing Data & Systems to Ensure Availability

Ensuring Application Uptime and Efficiency via an Application Performance Monitoring Solution

State and Local IT organizations are under increasing pressure to deliver services to their citizens in a digital, “on-demand” manner, as well as ensure their organization’s mission critical applications run as smoothly and efficiently as possible.

The last thing any organization wants is for their key applications to not work as they should – especially those that are revenue-generating, public safety-focused, providing vital benefits and resources to underserved citizens, or keeping internal, day-to-day business operations running.  Yet, many still rely upon outdated approaches to managing their mission critical applications – even despite the negative impact denigrated performance issues or, worse yet, full-blown, crippling outages can cause.

A single interaction associated with a request for services, application for benefits, payment, etc., for example, can activate millions of lines of code across multiple, distributed environments.  When any single segment, or multiple segments of transactions begin to break down or cause issues, IT teams have to determine the “where” and “why” before any remediation efforts can begin.  Hence, the proverbial task of “finding the needle in the haystack.”  Unfortunately, the typical use of war rooms, siloed tools, and log driven triage efforts simply are neither thorough nor efficient enough to maintain the level of performance citizens, business partners, staff, students and faculty expect in today’s digital age.

The AppDynamics platform provides SLED IT operations and development teams with the breadth and depth of real-time information they need to ensure optimal application performance and uptime.  With deep visibility into each piece of technology supporting an application (e.g. database, OS, application server); organizational context (e.g. login, enroll); correlation of each metric; evolving baselines; and automated actions, organizations can rest assured AppDynamics will provide them with a reliable single source of truth for providing their stakeholders with the best possible, performance, uptime and digital experience.

Jay Smith
Regional Account Director
AppDynamics

 

Carey Benge
Senior Sales Engineer
AppDynamics

TRACK 3

Securing Citizens’ and Customers’ Identity Data

Privileged Access Management (PAM) Best Practices – Back to the Basics

Please join IBM and Thycotic for a “back to the basics” session on Privileged Access Management best practices. For the past two years, PAM has been the number one IT security priority according to Gartner. Privileged Access is a top target for attackers and once they gain privileged access, they move around the organization appearing as a trusted insider avoiding traditional perimeter defenses. With more and more catastrophic breaches, organizations are looking closer at PAM Best Practices and how they fit into their defense-in-depth program.

  • This session describes best practices for Privileged Access Management including defining PAM, understanding the PAM Maturity Model and actionable tasks you can take to begin or mature your PAM program
  • The risk and possible impact of weak privileged access controls
  • Simple best practices to reduce risk from both a technical and policy level for your Privileged Access Management program

Richard Swain, ISSP, CCSP, CRISC and CIPM, Open Group Certified IT Architect
Senior Security Architect
IBM

 

Katie McCroskey, MBA
Director of Knowledge Mgmt. & Training
Thycotic

TRACK 4

Emerging Technologies That Support Effective Customer Interactions

Reducing Recidivism, Relapse, Homelessness Through Mobile-Edge Technologies


This presentation will show the way in which different local and state agencies across the country are approaching services delivery to social and community issues of homelessness, opioid/drug addiction and Community Corrections to reduce recidivism, relapse rates and homelessness.

Daniel Stewart
Hon. Senior Advisor – State and Local Government
Cisco Systems Inc

Ben Williams
BDMTRACKtech

BREAK: 1:00 PM – 1:15 PM

SESSION 3: 1:15 PM – 2:00 PM

TRACK 1

Workforce of The Future

The Convergence of Security, Automation, and Engagement

In this session, attendees will  take a journey to the future and learn about the technologies that are transforming the modern digital workplace.  We’ll take a look at future technologies from all sides so attendees will have a solid understanding of the best investments to improve their enterprise and employee experience while considering security and efficiencies.

Shamlan Siddiqi, MS
CTO
NTT DATA

TRACK 2

Managing Data & Systems to Ensure Availability

Up & Running Isn’t Good Enough – Protecting Operations, Data, and Systems

Keeping systems up and running isn’t good enough. System and operational failures can result in an agency’s failure to properly conduct its mission. When data is lost, or incidents are not properly handled, or resources are not adequate to support daily operations then failures can occur. Some failures are annoyances and others can be front page news. This presentation introduces Enterprise Risk Management and the tools and techniques used to identify, assess, and manage risk in a coordinated manner across an agency. ERM in the context of an agency’s traditional three lines of defense is also discussed.

Steven Young, PMP
Sr. Vice President
Mathtech, Inc.

TRACK 3

Securing Citizens’ and Customers’ Identity Data

Rethinking How We Protect Data

The world has changed a lot in the last 20 years. 20 years ago, it was much harder to get information on people, in fact, if you wanted to find someone’s phone number you had to look it up in the phone book. Even then you would be lucky to find the person you were looking for. Information today is far more accessible, and you can find information on virtually anyone. In the first days of the internet, the more data you had on people the better off you were. After all, with knowledge comes power. However, data has now become a liability for many organizations as compliance requirements continue to rise on the use of data and how to protection that should be afforded to that data. In this fast-paced presentation, we will review a brief history of how far we have come in 20 years and how our management and handling of consumer data must change in the 21st century to avoid disaster.

Brandon Keath, MS
Cyber Security Practice Lead
Appalachia Technologies

TRACK 8

Vision & Future of Public Sector IT

Panel Discussion: Commonwealth of Pennsylvania

Hear from Commonwealth of Pennsylvania IT leadership about the future of their delivery centers.

Tom Diecidue
Chief Information Officer
Conservation and Environment

 

Michael DeMatt
Chief Information Officer
Infrastructure and Economic Development

 

Sandy Patterson
Chief Information Officer
Health and Human Services

BREAK: 2:00 PM – 2:15 PM

SESSION 4: 2:15 PM – 3:00 PM

TRACK 5

Assessing User Expectations & Outcomes

Digital Engagement for Government

Government agencies are seeing increasing expectations from their customers based on their Citizen’s consumer internet experiences to provide digital engagement channels from mobile to social and online conversational live and robotic agents. Salesforce is the leading customer experience platform for commercial companies and is now delivering those capabilities via the Cloud including the latest Public Sector compliance and security standards to support Government digital transformation.

Michael Yeganeh
VP Solution Engineering
Salesforce

TRACK 6

Benefiting the Customers Through Modernization and Sharing Applications

Commonwealth Customer Service Transformation

Coming soon.

Terrell Martin
Business One-Stop Shop Director
Commonwealth of Pennsylvania

TRACK 7

Customer Engagement Successes

Empowering Companies and Overcoming Challenges to Transform Your Customer Experience

Transforming an organization’s customer experience can feel like a daunting task.  Where do I start?  What should I do?  How do I gets started?  These questions are common.  After 10 years of researching the world’s greatest customer experience companies KPMG will share leading practices for transforming your customer experience.  After learning the approach to building great experiences you have the opportunity to hear the VP of Experience and Solutions from the Project Management Institute as he describes how this global learning organization has enhanced their customer experience.  During this interview discussion, you we will learn: how to prioritize customer experience initiatives, how to empower companies and its employees to successfully change the experience, and how to overcome challenges (internal and external) to achieve a successful customer experience transformation.  Our goal is to have you change the way you think and feel more emboldened as you proceed down the customer experience transformation journey.  This session will deliver success factors that you can take back to the office tomorrow to start moving the needle on your department’s customer experience.

Jeff Mango
Managing Director, Customer Experience Transformation
KPMG

TRACK 8

Vision & Future of Public Sector IT

Panel Discussion: Commonwealth of Pennsylvania

Hear from Commonwealth of Pennsylvania IT leadership about the future of their delivery centers.

Dustin Rhoads
Chief Information Officer
Public Safety Delivery Center

 

Dave Naisby
Chief Information Officer
Employment, Banking and Revenue Delivery Center

 

Sarah Shaffer
General Government Delivery Center

BREAK: 3:00 PM – 3:15 PM

SESSION 5: 3:15 PM – 4:00 PM

TRACK 5

Assessing User Expectations & Outcomes

Human-Centered Design for Meaningful Citizen Engagement

Do you know if your services are useful and meaningful to citizens? Where they created and validated with citizens? Do you co-create with citizens? When creating services for citizens to use, you must keep them central to all product design process. This session will walk you through Human-Centered Design (HCD) Methodology, a creative approach to developing digital services and products that are usable and meet citizen expectations.

By using HCD principles and methods in your projects you will be able to:

  • Identify real challenges over supposed ones.
  • Clearly define opportunities.
  • Ideate and test multiple solutions all before ever touching code.
  • Create continuous product development pipelines to always meet citizen expectations.

You will learn practical, hands-on methods that let you translate strategic goals and ideas into tactical approaches and outcomes that are data-backed and objectively derived.  Additionally, by centering your work on HCD principles you can build a culture that is “Citizen-First” and advocates for experience over systems.

Timothy McKenna
Director of Experience Design
Pennsylvania Interactive, LLC

TRACK 6

Benefiting the Customers Through Modernization and Sharing Applications

Best Practices in Software Modernization

With the advent of the internet and the success of e-service delivery, citizens and other customers of government have a higher expectation of service.  Unfortunately, most governments have a large portfolio of legacy applications not capable of meeting citizen expectations. The time, cost and risk to replace these legacy applications is significant and therefore requires a thoughtful strategy and roadmap.

Accenture will share its experiences working with clients to solve the legacy software issue.  Learn best practices on how to approach the problem, prioritize which applications warrant immediate attention and what emerging technologies may help organizations speed the transition from old, legacy technology to contemporary technology that is easier to maintain and capable of providing a better customer experience.

Jamie Shepard 
Managing Director, Health and Public Service Transformation and Tech Advisory Executive

Todd Kimbriel
Accenture Government Senior Advisor

Accenture

TRACK 7

Customer Engagement Successes

Accessibility

This presentation will cover the following topics:

  • What is a Chief Accessibility Officer?
  • How did this role come into existence?
  • Who am I and what will I be doing?
  • How does accessibility impact you?
  • A case study from the Department of Education
  • Call to action: Tell me what you’re doing for digital accessibility
  • Q&A

Ellen Strom, MBA, CPACC
Chief Accessibility Officer

Rachel Henry
ITG Administrator

Commonwealth of Pennsylvania

TRACK 8

Vision & Future of Public Sector IT

Panel Discussion

Hear about the future of IT for the  Pennsylvania Army National Guard and City of Philadelphia.

Santiago Garces
Chief Information Officer
City of Pittsburgh

Michael Riley, LTC/SC, 268
Chief Information Officer
Pennsylvania Army National Guard

 

Mark Wheeler
Chief Innovation Officer
City of Phiadelphia

BREAK: 4:00 PM – 4:15 PM

SESSION 6: 4:15 PM – 5:00 PM

TRACK 5

Assessing User Expectations & Outcomes

Customer Satisfaction, Driving Results through Measurement

Have you ever felt that you’re delivering value only to find out your customers feel different during service review time? This discussion will dive into the implementation of a process to measure customer satisfaction with the core tenants of honest feedback, measuring change in satisfaction over time, focusing on the right questions and following the data to drive results and how you can drive successful outcomes in one quarter.

Joe Schilling
Manager, Security Operations Center
Highmark Health

Brian Rea
Manager, Identity Access Management
Highmark Health

TRACK 6

Benefiting the Customers Through Modernization and Sharing Applications

Colorado HHS Modernization: Building a Connected Government with MuleSoft

In response to the Affordable Care Act, the State of Colorado elected to be one of 17 states to create their own health insurance marketplace. In order to better engage citizens, Colorado embraced new technologies and delivery channels to provide a streamlined citizen experience. However, as they rolled out their marketplace and citizen portals, they realized portals would need data from a host of complex legacy applications. Delivering a seamless experience for citizens would require integrating their ‘PEAK’ platform for Medicaid with a number of disparate systems including ones owned by Federal Agencies including the Social Security Administration as well as several internal State systems.

In this session, learn how Colorado utilized an API-led methodology and adopted a developer-first approach to modernize legacy applications to create a flexible, connected architecture across siloed systems.

Shad Imam
Director of Solutions Engineering-Public Sector
MuleSoft

TRACK 7

Customer Engagement Successes

There will not be a Track 7 session at this time.

TRACK 8

Vision & Future of Public Sector IT

Panel Discussion

Hear about the future of IT for PLCB, Treasury, and CCAP.

ON DEMAND SESSIONS

TRACK 2

Managing Data & Systems to Ensure Availability

Do More with Less – Become the Hero of Your IT Organization

IT organizations across government, higher ed, and the public sector face severe challenges such as low funding, shrinking staff, and aging infrastructure. How can IT teams even manage to keep the lights on under these circumstances, especially if they’re using multiple point tools for things like backup, disaster recovery, and data cloning for test purposes? One solution would be to use a copy data management platform which enables IT organizations to consolidate data protection and data cloning functions under a single pane of glass. Copy data management solutions allow IT organizations to reduce operational burden and infrastructure costs while freeing up IT staff to work on other projects – without losing focus on security. Attend this session to learn how you can become the hero of your IT organization by utilizing a copy data management solution for backup, disaster recovery, and data cloning!

Jason Brown, MBA
Director, Product Marketing
Actifio

TRACK 3

Securing Citizens’ and Customers’ Identity Data

Building a Foundation for Secure Citizens and Customers Data

 

One aspect of delivering a “Citizen-First” agenda is the protection of identity and personal data. Managing data, privacy, risk and accessibility associated with Commonwealth Data, facilities and materials depends on a comprehensive data inventory.

Trusted data is used to deliver regulatory compliance, support citizen services and explore options to improve delivery. Organizations need a structured approach to building data intelligence – any data-driven activity based on an unstable foundation inevitably leads to failure.

This session will introduce a structured process to:
•Establish the data inventory
•Identify personal data
•Create a repeatable and scalable process to maintain data protection
•Manage data privacy status

Join ASG Technologies to discover how a combination of broad coverage of legacy and modern technologies, connection of business and technical metadata, and automated traceability of private data through applications and data will:

  • Protect citizen information
  • Enable rapid response to legitimate requests for information
  • Improve agency/citizen relationships
  • Support modernization efforts
  • Build a foundation for Data Management best practices

Alex Larson
Account Executive, Data Intelligence
ASG Technologies

TRACK 3

Securing Citizens’ and Customers’ Identity Data

Why Securing Data-in-Motion Matters?

Our information has become currency with e-mail becoming the most convenient way to share files. In fact, 293 billion emails were sent each day in 2019. With that much data in motion, is email the most secure distribution mechanism? Without much thought placed on the sharing of data have you considered how valuable or sensitive the information shared has become? It is estimated that personal information is worth, on average, $1,500 and those will lose morals continue to find ways to obtain and sell that data to third parties. This doesn’t include the billions of corporate and business documents shared. Let’s discuss the value of securing data in motion with the goal of defining the best cybersecurity practices for everyday use.

Marek Hajn
IT-CNS, Inc.

 

Christopher Martin
Atlast Marketing

TRACK 5

Securing Citizens’ and Customers’ Identity Data

Critical Cyber Security Components Often Overlooked

Cybersecurity has become a big business for criminals and the fact that Government agencies are still being breached on a regular occurrence should have taxpayers furious. Most of these agencies are the cities, municipalities, and counties that we live in, but larger and larger entities also are getting caught without proper proactive security measures and no recovery or continuity plan.

Often overlooked cybersecurity components that are critical to securing the smallest borough to the largest federal agency are one in the same. DNS scanning, firewalls, network infrastructure, patching, updates, and end user training are all crucial to a proactive plan of attack to maintain a secure network infrastructure. It is these components that are often time consuming or just simply ignored that allows a successful phishing attack access.

Reactive planning and validation are essential to any proactive plan. Being able to timely identify and then recover from an attack or hardware failure, and having the documentation in order sounds simple, but even many trusted IT vendors will fall short on providing a complete validated solution.

Attending this presentation, you will learn the questions to ask your IT staff or vendor to fully understand what your Recovery Time would be and where you fall short on a cybersecurity plan. As a bonus, we will highlight of some of the common and effective tools that should be utilized to protect your network infrastructure while maintaining security compliance.

It’s long overdue to take a serious look at your cyber security portfolio, making this the can’t miss presentation of PATechCon.

Scott Davis
Lion Gard

TRACK 5

Assessing User Expectations & Outcomes

Defining the Citizen Experience: How Customer – Focused Initiatives are Transforming Agency Operations

As leaders of change, organizational strategy development should center around 2 guiding principles:

1) How can we create a supportive and productive work environment for our team, and

2) How can we exceed customer expectations?

 

Whether a private business or public sector agency, customer-centric organizations deliver positive interactions and achieve higher customer satisfaction.  Additionally, when consideration is given to the entire customer journey, employees also experience greater job satisfaction and a deeper awareness of their purpose.

 

For organizations focused specifically on the citizen experience, it is often difficult to understand the value of these initiatives and to appreciate the impact that brand reputation has on agency culture and operations.  By exploring the rationale of and the methodologies for transforming your agency into a customer-focused delivery center, we can begin to embrace the importance of creating and facilitating the optimal customer journey.  With that mindset, we gain a better understanding of what the customer truly wants, and we are enabled to create specific, targeted strategies for providing positive customer interactions.

Tabitha Daugherty
Assemble