SIMNJ Lunch – Open Networking Lunch
Come join your fellow SIM NJ members for a Networking Lunch. Learn more about each other, what we do in our professional lives and how we can help each other....
Come join your fellow SIM NJ members for a Networking Lunch. Learn more about each other, what we do in our professional lives and how we can help each other....
We continue the discussion on How To Win The Talent War with the first of two Virtual Roundtables on Tues, Jan 18 at 12:00pm. The discussion will concentrate on our...
The Enterprise Applications Special Interest Group (SIG) is comprised of a group of IT leaders that are responsible for providing innovative technology solutions to core business functions including Finance, Supply Chain,...
How To Win The Talent War concludes on Wed, Jan 26 at 12:00pm with a discussion on our Defensive Playbook – Retaining Talent. The roundtable will be an open...
This is an MIT meeting to catch up with those members that are searching for their next opportunity. Are you In Transition? Are you thinking of changing positions? Is your...
Come join your fellow SIM NJ members for a Networking Lunch. Learn more about each other, what we do in our professional lives and how we can help each other....
IoT is both a buzzword and a fact of life. At home we have smart devices – thermostats, water level monitors, refrigerators, doorbells, etc. In business there are IoT devices...
Edge computing is a distributed computing architecture that brings compute and data storage closer to the sources of data. Those real time data sources are often sensors or users. IoT...
This is an MIT meeting to catch up with those members that are searching for their next opportunity. Are you In Transition? Are you thinking of changing positions? Is your...
Come join your fellow SIM NJ members for a Networking Lunch. Learn more about each other, what we do in our professional lives and how we can help each other....
Penetration testing is one type of ethical or white hat hacking technique that helps security leaders evaluate the effectiveness of their security armor before hackers do. With cyberattacks increasingly sophisticated...
Third Party Risk Management (TPRM), sometimes known as Vendor Risk Management, is the practice of evaluating and mitigating risks introduced by third parties (suppliers, business partners, etc.) TPRM is a...
This is an MIT meeting to catch up with those members that are searching for their next opportunity. Are you In Transition? Are you thinking of changing positions? Is your...
Come join your fellow SIM NJ members for a Networking Lunch. Learn more about each other, what we do in our professional lives and how we can help each other....
Join us at the April 19 NJ SIM Roundtable where Anubha Gaur of Quest Diagnostics will share the benefits of Quest’s journey to DevSecOps, the challenges and impediments they faced,...