BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//NJ Society for Information Management - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://njsim.org
X-WR-CALDESC:Events for NJ Society for Information Management
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220315T120000
DTEND;TZID=America/New_York:20220315T133000
DTSTAMP:20260428T231634
CREATED:20220222T003304Z
LAST-MODIFIED:20220222T003304Z
UID:6844-1647345600-1647351000@njsim.org
SUMMARY:SIMNJ Roundtable Discussion - Penetration Testing - How Much is Enough?
DESCRIPTION:[vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text]Penetration testing is one type of ethical or white hat hacking technique that helps security leaders evaluate the effectiveness of their security armor before hackers do.   \nWith cyberattacks increasingly sophisticated and forever on the rise\, it is more important than ever that organizations perform regular penetration testing to identify their exposures\, block holes\, and ensure that cyber controls are working as intended.  \nHow much testing is enough and what approaches provide the best results?   \nOn March 15th at noon\, Joseph W. Fisher\, President and Founder of Affinity IT Security Services\, will host this Zoom session to further discuss the latest strategies in penetration testing.[/vc_column_text][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text]About The Moderator: \nJoseph W. Fisher\, President and Founder of Affinity IT Security Services\, performs and/or supervises all security work performed by the firm.  He brings over 30 years of IT experience including development\, training\, and cybersecurity consulting to the table.  Mr. Fisher has a BS and MS in Computer Science as well as a MBA.  He also holds certifications as an ISACA Certified Information Systems Auditor (CISA)\, EC-Council Certified Ethical Hacker (CEH)\, and SANS/GIAC Certified Web-Application Penetration Tester (GWAPT). \nMr. Fisher is an enthusiastic member of OWASP and serves on the Executive Council of the NJ Chapter of the Society of Information Management (SIM).  He writes on security issues on the Affinity IT Security website at:  https://affinity-it-security.com/articles/.[/vc_column_text][/vc_column][/vc_row]
URL:https://njsim.org/event/simnj-roundtable-discussion-penetration-testing-how-much-is-enough/
LOCATION:Webinar
CATEGORIES:Member Event,Roundtable,Webinar
ATTACH;FMTTYPE=image/jpeg:https://njsim.org/wp-content/uploads/2020/12/RoundTable.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220323T120000
DTEND;TZID=America/New_York:20220323T133000
DTSTAMP:20260428T231634
CREATED:20220221T233921Z
LAST-MODIFIED:20220221T233921Z
UID:6843-1648036800-1648042200@njsim.org
SUMMARY:SIMNJ Roundtable Discussion - Third Party Risk Management
DESCRIPTION:[vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text]Third Party Risk Management (TPRM)\, sometimes known as Vendor Risk Management\, is the practice of evaluating and mitigating risks introduced by third parties (suppliers\, business partners\, etc.)  TPRM is a process that begins before establishing a business relationship and continues throughout the business partnership.  TPRM is important because unaddressed risks can expose an organization to cybersecurity threats\, data breaches\, and other disruptions.  Risks can be operational\, reputational\, financial\, and compliance.  In many industries\, TPRM has become a regulatory requirement.  More customers now require a TPRM program.  \nOn March 23rd at noon\, Roota Almeida\, CISO at Delta Dental of New Jersey and Connecticut (DDNJ\, Inc.) will host this Zoom session and walk us through DDNJ’s TPRM journey. [/vc_column_text][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text]About the Moderator \nROOTA ALMEIDA \nChief Information Security Officer\nDelta Dental of New Jersey and Connecticut \n\nRoota Almeida is the Chief Information Security Officer at Delta Dental of New Jersey and Connecticut (DDNJ\, Inc.). Roota has been instrumental in helping to establish Delta Dental of New Jersey’s Office of Information Security and leading the development and implementation of enterprise-wide information security strategy\, policies\, risk assessments and controls\, including leading the HITRUST Certification effort for DDNJ. She believes more women should be encouraged to pursue STEM careers and has started a summer internship program at DDNJ\, Inc. specifically designed to give graduating female high school students insight into the field of corporate cybersecurity. \nPrior to joining Delta Dental\, Roota was the Chief Information Security Officer (CISO) at Covanta Holdings Corp.\, a leader in Energy-from-Waste. As CISO\, she led all aspects of Information security and risk\, including global information security awareness programs\, policies\, business continuity\, and incident response teams. \nWith over 15 years of direct experience in establishing and maintaining global security strategies\, architectures\, standards\, and compliance Roota drives the necessary cultural changes to affect measurable improvements in organizations’ security posture.  \nRoota is a recognized industry thought leader who serves as a member of the Board of Advisors at several organizations\, a governing body chair for Evanta’s NJ CxO Summits and other technology conferences\, a faculty and a security awards judge.  Her in-depth experience and expertise in the field of information security and risk management can be measured by the various articles\, eBooks\, interviews\, and podcasts she has to her credit. Roota is also working to build and encourage new talent and solutions in the security arena.  \nRoota holds CCISO\, CISSP\, CISM and CRISC certifications.[/vc_column_text][/vc_column][/vc_row]
URL:https://njsim.org/event/simnj-roundtable-discussion-third-party-risk-management/
LOCATION:Webinar
CATEGORIES:Member Event,Roundtable,Webinar
ATTACH;FMTTYPE=image/jpeg:https://njsim.org/wp-content/uploads/2020/12/RoundTable.jpg
END:VEVENT
END:VCALENDAR