SIMNJ – Holiday Cocktail Party
As the year comes to a close, join your SIM NJ colleagues for Holiday drinks and banter. Bring your funniest stories and anecdotes from 2021 to share the gift of...
As the year comes to a close, join your SIM NJ colleagues for Holiday drinks and banter. Bring your funniest stories and anecdotes from 2021 to share the gift of...
One of the biggest issues we face as leaders is our teams. This is getting harder recently and we all seem to be struggling with developing solutions. As a community...
Come join your fellow SIM NJ members for a Networking Lunch. Learn more about each other, what we do in our professional lives and how we can help each other....
We continue the discussion on How To Win The Talent War with the first of two Virtual Roundtables on Tues, Jan 18 at 12:00pm. The discussion will concentrate on our...
The Enterprise Applications Special Interest Group (SIG) is comprised of a group of IT leaders that are responsible for providing innovative technology solutions to core business functions including Finance, Supply Chain,...
How To Win The Talent War concludes on Wed, Jan 26 at 12:00pm with a discussion on our Defensive Playbook – Retaining Talent. The roundtable will be an open...
This is an MIT meeting to catch up with those members that are searching for their next opportunity. Are you In Transition? Are you thinking of changing positions? Is your...
Companies are using digital transformation to take advantage of rapidly changing business opportunities and to provide a way of optimizing their business processes to keep them profitable. Day to day,...
Come join your fellow SIM NJ members for a Networking Lunch. Learn more about each other, what we do in our professional lives and how we can help each other....
IoT is both a buzzword and a fact of life. At home we have smart devices – thermostats, water level monitors, refrigerators, doorbells, etc. In business there are IoT devices...
Edge computing is a distributed computing architecture that brings compute and data storage closer to the sources of data. Those real time data sources are often sensors or users. IoT...
This is an MIT meeting to catch up with those members that are searching for their next opportunity. Are you In Transition? Are you thinking of changing positions? Is your...
With the ever-increasing threat of data breaches and intrusions affecting all of us in our personal and professional lives, Cybersecurity is becoming more important. On March 10, Michael Geraghty, NJ...
Come join your fellow SIM NJ members for a Networking Lunch. Learn more about each other, what we do in our professional lives and how we can help each other....
Penetration testing is one type of ethical or white hat hacking technique that helps security leaders evaluate the effectiveness of their security armor before hackers do. With cyberattacks increasingly sophisticated...