Go to Kentucky.gov home page
Kentucky Techlines - a monthly digital information publication (banner imagery) go to homepage.

2008 Kentucky Digital Government Summit Held in Lexington

COT Interim Commissioner Steve Dooley

COT Interim Commissioner Steve Dooley welcomes attendees of the 2008 Kentucky Digital Government Summit.

 
 
Paul Taylor, Chief Strategy Officer, Center for Digital Government

Paul Taylor, Ph.D., Chief Strategy Officer for the Center for Digital Government, delivered the morning keynote address. 
 
 

Tom McQuillan, former CIO of Grand Rapids, Michigan, leads a panel through a data breach simulation.

Tom McQuillan, former CIO of Grand Rapids, Michigan, leads a panel of security experts through a data breach simulation.  Seated at the table are (l-to-r) Toby Whitehouse, Steve Ramirez and Richard Chapman.



A recipient holds one of this year's Best of Kentucky awards.

For the eighth straight year, the Commonwealth Office of Technology (COT) partnered with Government Technology magazine and industry sponsors to host the Kentucky Digital Government Summit.

This year's conference was held at the Embassy Suites in Lexington, Kentucky on April 22.  The gathering of IT leaders from across the commonwealth provided a forum for communications and collaboration on technology solutions and business practices.  The conference provided opportunities for attendees to interact with each other and key vendors on technology solutions and strategies to help the public sector increase efficiency and improve services.

Opening Keynote:  Paul Taylor, Ph.D., Chief Strategy Officer, Center for Digital Government

The opening keynote address by Paul Taylor, Ph.D., provided a lesson in larceny as he encouraged attendees to steal, or borrow, the best ideas in digital government from across the country. As governments grapple with diminishing revenue, Taylor explained how the creative use of information technology can help provide better services at lower cost. His entertaining and lively keynote session highlighted the best ideas from hundreds of nominees and dozens of winners from the Center for Digital Government’s national surveys of public sector IT innovation.

Afternoon Session:  Security Roundtable

The afternoon keynote session was modeled on the concept of the White House Situation Room, taking attendees through a data breach simulation. This thought-provoking session was led by Tom McQuillan, former CIO of Grand Rapids, Michigan and focused on how to prevent a data breach, how to react to a loss should it occur and how and when to disclose it. Mr. McQuillan was assisted by a panel of security experts, including Richard Chapman, senior security officer of the Cabinet for Health and Family Services; Steve Ramirez, security officer for Louisville Metro Government; and Toby Whitehouse, former chief information security officer for COT.

Best of Kentucky Technology Awards 

The Best of Kentucky Technology Awards Program was originally established in 2006 to salute Kentucky's IT professionals and managers for their dedication and accomplishments. Again this year, agency heads and local governments throughout the state submitted nominations, with a formal evaluation committee selecting a winner in each category. Categories recognized leadership, innovation, collaboration and stellar achievements by the commonwealth, the education community and local governments.  The winners are listed in a separate Techlines article.

Summit Breakout Sessions

The 2008 digital government conference included numerous sessions on other current topics of interest to IT managers and executives:

  • Digital Citizenship;
  • Web-Based Security–The Next Frontier;
  • Wireless Challenges and Opportunities;
  • Next Generation Workforce;
  • Securing Laptops and Mobile Devices;
  • Business Continuity and Disaster Recovery;
  • Electronic Records and e-Discovery;
  • Greening of IT;
  • Public Records–What is Private Information?; and
  • Homeland Security and the Role of IT.

The conference concluded with an executive reception that allowed attendees an opportunity to meet one another and the many vendor representatives present.

 

Last Updated 5/9/2008
Privacy | Security | Disclaimer | Accessibility Statement