SIMNJ Roundtable Discussion – RETAINING TALENT
How To Win The Talent War concludes on Wed, Jan 26 at 12:00pm with a discussion on our Defensive Playbook – Retaining Talent. The roundtable will be an open...
How To Win The Talent War concludes on Wed, Jan 26 at 12:00pm with a discussion on our Defensive Playbook – Retaining Talent. The roundtable will be an open...
This is an MIT meeting to catch up with those members that are searching for their next opportunity. Are you In Transition? Are you thinking of changing positions? Is your...
Companies are using digital transformation to take advantage of rapidly changing business opportunities and to provide a way of optimizing their business processes to keep them profitable. Day to day,...
Come join your fellow SIM NJ members for a Networking Lunch. Learn more about each other, what we do in our professional lives and how we can help each other....
IoT is both a buzzword and a fact of life. At home we have smart devices – thermostats, water level monitors, refrigerators, doorbells, etc. In business there are IoT devices...
Edge computing is a distributed computing architecture that brings compute and data storage closer to the sources of data. Those real time data sources are often sensors or users. IoT...
This is an MIT meeting to catch up with those members that are searching for their next opportunity. Are you In Transition? Are you thinking of changing positions? Is your...
With the ever-increasing threat of data breaches and intrusions affecting all of us in our personal and professional lives, Cybersecurity is becoming more important. On March 10, Michael Geraghty, NJ...
Come join your fellow SIM NJ members for a Networking Lunch. Learn more about each other, what we do in our professional lives and how we can help each other....
Penetration testing is one type of ethical or white hat hacking technique that helps security leaders evaluate the effectiveness of their security armor before hackers do. With cyberattacks increasingly sophisticated...
Third Party Risk Management (TPRM), sometimes known as Vendor Risk Management, is the practice of evaluating and mitigating risks introduced by third parties (suppliers, business partners, etc.) TPRM is a...
This is an MIT meeting to catch up with those members that are searching for their next opportunity. Are you In Transition? Are you thinking of changing positions? Is your...
The Gene Kim book, The Phoenix Project, popularized DevOps with an implied need for cultural change. Unfortunately, tools and processes dominate most related conferences and local user group meetings. During the hour,...
Come join your fellow SIM NJ members for a Networking Lunch. Learn more about each other, what we do in our professional lives and how we can help each other....
Join us at the April 19 NJ SIM Roundtable where Anubha Gaur of Quest Diagnostics will share the benefits of Quest’s journey to DevSecOps, the challenges and impediments they faced,...