BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//NJ Society for Information Management - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://njsim.org
X-WR-CALDESC:Events for NJ Society for Information Management
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20270314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20271107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260409T173000
DTEND;TZID=America/New_York:20260409T203000
DTSTAMP:20260424T195610
CREATED:20250606T000515Z
LAST-MODIFIED:20260406T201836Z
UID:18839-1775755800-1775766600@njsim.org
SUMMARY:April 2026 Monthly Meeting: "Moving Up the Cybersecurity Maturity Model Without Blowing Your Budget"
DESCRIPTION:[vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” row_position_desktop=”default” row_position_tablet=”inherit” row_position_phone=”inherit” overflow=”visible” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” flex_gap_desktop=”10px” column_element_direction_desktop=”default” column_element_spacing=”default” desktop_text_alignment=”default” tablet_text_alignment=”default” phone_text_alignment=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_backdrop_filter=”none” column_shadow=”none” column_border_radius=”none” column_link_target=”_self” column_position=”default” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” animation_type=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][image_with_animation image_url=”23682″ image_size=”full” max_width=”100%” max_width_mobile=”default” animation_type=”entrance” animation=”None” animation_movement_type=”transform_y” hover_animation=”none” alignment=”center” border_radius=”none” box_shadow=”none” image_loading=”default”][nectar_gradient_text heading_tag=”h1″ color=”extra-color-gradient-2″ gradient_direction=”horizontal” text=”Moving Up the Cybersecurity Maturity Model Without Blowing Your Budget”][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” row_position_desktop=”default” row_position_tablet=”inherit” row_position_phone=”inherit” overflow=”visible” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” flex_gap_desktop=”10px” column_element_direction_desktop=”default” column_element_spacing=”default” desktop_text_alignment=”default” tablet_text_alignment=”default” phone_text_alignment=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_backdrop_filter=”none” column_shadow=”none” column_border_radius=”none” column_link_target=”_self” column_position=”default” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” animation_type=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text css=”” text_direction=”default”]Please join us at our next Chapter meeting on Thursday\, April 9th at The Madison Hotel\, where we will host a powerhouse panel of cybersecurity leaders from diverse industries and maturity levels for an in-depth discussion on a topic that impacts every organization today: Moving Up the Cybersecurity Maturity Model Without Blowing Your Budget \nThis session will explore: \n\nWhy measurable maturity matters more than buying more tools\nBarriers organizations face: resource gaps\, complexity\, compliance pressures\nSecuring executive buy-in with business-value-aligned strategies\nPractical crawl/walk/run roadmaps\nLeveraging fractional expertise\, managed services\, funding strategies\nReal-world frameworks: NIST CSF\, CIS Controls\, ISO 27001\n\nGoal: Every attendee will walk away with a realistic roadmap to improve cyber maturity regardless of industry\, size\, or risk profile.[/vc_column_text][image_with_animation image_url=”23808″ image_size=”full” max_width=”50%” max_width_mobile=”default” animation_type=”entrance” animation=”None” animation_movement_type=”transform_y” hover_animation=”none” alignment=”center” border_radius=”none” box_shadow=”none” image_loading=”default”][image_with_animation image_url=”23809″ image_size=”full” max_width=”50%” max_width_mobile=”default” animation_type=”entrance” animation=”None” animation_movement_type=”transform_y” hover_animation=”none” alignment=”center” border_radius=”none” box_shadow=”none” image_loading=”default”][vc_column_text css=”” text_direction=”default”]Special Thanks to Our Sponsor \nWe extend our sincere appreciation to Blue Mantis and Netwolves for generously sponsoring this meeting and supporting SIM New Jersey’s mission to foster learning\, leadership\, and community among technology executives. \nMeet the Panelists[/vc_column_text][image_with_animation image_url=”23676″ image_size=”full” max_width=”custom” animation_type=”entrance” animation=”None” animation_movement_type=”transform_y” hover_animation=”none” alignment=”” border_radius=”none” box_shadow=”none” image_loading=”default” max_width_custom=”400″][vc_column_text css=”” text_direction=”default”]Adrian Tilston – Cyber Program Lead\, Resourcive \nAs Cyber Program Lead\, Adrian serves as a conduit to bridge the gap between Finance\, IT\, and Procurement departments when it comes to assessing and executing on cybersecurity initiatives. His team helps clients build programs in line with their business goals and risks while ensuring security vendors are utilized to drive maximum value from those services. \nPrior to joining Resourcive\, Adrian served in the US Army Special Forces as a Green Beret\, followed by developing security solutions as a government contractor before founding Proteus Advisors. \nAdrian holds a Bachelor of Science in Computer Science from the United States Military Academy at West Point\, and his first introduction to cybersecurity was booting from a Backtrack live CD in 2006. Adrian is an avid sailor\, and his drive is best illustrated by completing an Ironman distance triathlon (his first and last) 18 months after getting spinal fusion surgery.[/vc_column_text][image_with_animation image_url=”23677″ image_size=”full” max_width=”custom” animation_type=”entrance” animation=”None” animation_movement_type=”transform_y” hover_animation=”none” alignment=”” border_radius=”none” box_shadow=”none” image_loading=”default” max_width_custom=”400″][vc_column_text css=”” text_direction=”default”]John Erickson – Director of IT Infrastructure & Cybersecurity\, Berjé Inc. \nJohn Erickson is the Director of IT Infrastructure & Cybersecurity at Berjé\, Inc.\, a family‑owned supplier of flavors\, fragrances\, and essential oils headquartered in Carteret\, New Jersey. He brings more than 30 years of broad IT experience spanning financial services\, retail\, consumer packaged goods (CPG)\, healthcare\, and manufacturing. \nIn his current role\, John leads both the infrastructure and cybersecurity functions\, with a focus on technology platforms\, security policies\, procedures\, operational controls\, and continuous awareness programs designed to protect the organization and its data. \nJohn is a Past President of the Society for Information Management\, New Jersey Chapter (SIM NJ) and has served on its Executive Committee since 2017.[/vc_column_text][image_with_animation image_url=”23679″ image_size=”full” max_width=”custom” animation_type=”entrance” animation=”None” animation_movement_type=”transform_y” hover_animation=”none” alignment=”” border_radius=”none” box_shadow=”none” image_loading=”default” max_width_custom=”400″][vc_column_text css=”” text_direction=”default”]Ken Fishkin\, CISSP\, CIPP/US\, CIPM\, CIPT – Associate Director of Information Security\, Lowenstein Sandler LLP \nKen Fishkin serves as Associate Director of Information Security at Lowenstein Sandler\, where he leads the firm’s cybersecurity strategy and operations. Since joining the firm in 2019\, he has overseen its cybersecurity program to not only protect the organization but also advance its broader business mission. \nPreviously\, Ken served as Director for the Cybersecurity practice at a national accounting firm\, advising organizations on strengthening security programs\, maturing incident response capabilities\, and aligning risk management strategies with evolving regulatory and industry standards. \nKen is widely recognized for his leadership within the cybersecurity community. As President of the ISC2 New Jersey Chapter\, he guides the chapter’s strategic growth\, expands regional engagement\, and champions high-quality professional education for practitioners at all career stages. He strengthened partnerships across industry\, academia\, and the public sector and advanced mentorship initiatives. His contributions helped reinforce the chapter’s role as a trusted hub for professional development and community advancement. \nHe serves on the Executive\, Threat Intelligence\, and PHISH Committees of the Legal Services ISAO and sits on several advisory boards\, including InfraGard NJ\, HMG Strategy\, and the New Jersey Gartner CISO community. In addition\, he mentors students at Saint Peter’s University and regularly delivers guest lectures at conferences and university events.  Through his leadership\, mentorship\, and service\, Ken demonstrates a sustained commitment to advancing both organizational resilience and the broader cybersecurity profession.[/vc_column_text][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” row_position_desktop=”default” row_position_tablet=”inherit” row_position_phone=”inherit” overflow=”visible” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” flex_gap_desktop=”10px” column_element_direction_desktop=”default” column_element_spacing=”default” desktop_text_alignment=”default” tablet_text_alignment=”default” phone_text_alignment=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_backdrop_filter=”none” column_shadow=”none” column_border_radius=”none” column_link_target=”_self” column_position=”default” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” animation_type=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][image_with_animation image_url=”23771″ image_size=”full” max_width=”custom” animation_type=”entrance” animation=”None” animation_movement_type=”transform_y” hover_animation=”none” alignment=”” border_radius=”none” box_shadow=”none” image_loading=”default” max_width_custom=”400″][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” row_position_desktop=”default” row_position_tablet=”inherit” row_position_phone=”inherit” overflow=”visible” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” flex_gap_desktop=”10px” column_element_direction_desktop=”default” column_element_spacing=”default” desktop_text_alignment=”default” tablet_text_alignment=”default” phone_text_alignment=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_backdrop_filter=”none” column_shadow=”none” column_border_radius=”none” column_link_target=”_self” column_position=”default” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” animation_type=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text css=”” text_direction=”default”]George Griesler – Senior Director of Cybersecurity\, National Football League (NFL) \nGeorge Griesler is a senior cybersecurity executive with over two decades of experience leading enterprise-scale security\, network infrastructure\, and cyber defense programs across global organizations and high-profile sporting environments. He leads advanced cyber defense capabilities spanning security operations\, threat detection and response\, vulnerability management\, and strategic integration of managed providers. His work focuses on ensuring resilience across complex\, high-visibility environments where cybersecurity\, physical operations\, and fan experience intersect. \nCurrently\, as the Senior Director of Cybersecurity Operations & Defense at the National Football League (NFL)\, George is responsible for protecting critical league infrastructure\, NFL clubs\, NFL stadium operations\, and marquee global events—including the Super Bowl\, NFL Draft\, and International Series Games. \nPrior to the NFL\, George held senior leadership roles\, including Director of Global Networking & Security at International Flavors & Fragrances (IFF)\, where he led global network transformation and cybersecurity strategy\, and Director of IT & Security at the United States Golf Association (USGA)\, where he supported the National Championship operations for over 155 years. \nA collaborative and forward-thinking leader\, George is passionate about developing high-performing teams\, aligning cybersecurity with business outcomes\, and advancing innovative defense strategies to address an evolving threat landscape. Current focus areas include driving large-scale initiatives in zero trust\, firewall modernizations\, cyber threat intelligence\, and AI-enabled security operations. \nSamantha Vandeven – Vice President\, Cyber Intelligence\, JPMorgan Chase \nAgenda \n5:30     Registration and Networking\n6:15     Dinner\n6:45     Business Meeting\n7:00     Presentation and Q&A\n8:00     Networking \nWe look forward to an engaging\, practical\, and insight-rich session that will help all of us elevate our security programs in meaningful\, sustainable ways.[/vc_column_text][/vc_column][/vc_row]
URL:https://njsim.org/event/april-2026-monthly-meeting-maturity-models-for-cybersecurity/
LOCATION:Madison Hotel\, 1 Convent Road\, Morristown\, NJ\, United States
CATEGORIES:Member Event,Monthly Meeting
ATTACH;FMTTYPE=image/png:https://njsim.org/wp-content/uploads/2025/06/cybersecurity-maturity-model.png
END:VEVENT
END:VCALENDAR