BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//NJ Society for Information Management - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:NJ Society for Information Management
X-ORIGINAL-URL:https://njsim.org
X-WR-CALDESC:Events for NJ Society for Information Management
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210316T120000
DTEND;TZID=America/New_York:20210316T130000
DTSTAMP:20260429T093809
CREATED:20210220T232306Z
LAST-MODIFIED:20210311T185443Z
UID:4077-1615896000-1615899600@njsim.org
SUMMARY:SIMNJ Lunch & Learn - Identity and Access Management: Good for Cybersecurity\, Not So Much for Information Security
DESCRIPTION:[vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_column_text]While cybersecurity is broad in both its context and application\, information security is singularly focused on the protection of data.  In practice however\, most organizations repeatedly use the same tools\, controls\, strategies\, mindset\, etc.\, to defend against cyber-attacks as they do to protect their data.  The unfortunate reality is that most tools are designed fundamentally to address cybersecurity\, and while these tools may to some degree help with information security\, it’s really not their raison d’être. \nIn this session\, Dimitri Nemirovsky will argue the importance of segregating IAM controls from information security mechanisms and why doing so can enhance your security posture. \nDimitri Nemirovsky is the Chief Operating Officer for Atakama.  Atakama is a NYC-based information security company that was founded in 2017 by a team of entrepreneurs\, engineers\, and cryptographers. Its mission is to be the leading data security provider. Using distributed key management\, Atakama’s encryption solution protects data against unauthorized access and cyber attacks.[/vc_column_text][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_column_text]FREE for all NJSIM Members. \nPlease register for the event below\, or email your RSVP to simsec@verizon.net\nPlease include your full name\, professional title\, with company email in the message. \nWebinar information will be included in the registration email and sent to all registered shortly before the meeting date.[/vc_column_text][/vc_column][/vc_row]
URL:https://njsim.org/event/simnj-lunch-learn-identity-and-access-management-good-for-cybersecurity-not-so-much-for-information-security/
LOCATION:Webinar
CATEGORIES:Member Event,Webinar
ATTACH;FMTTYPE=image/png:https://njsim.org/wp-content/uploads/2021/02/LunchLearn.png
END:VEVENT
END:VCALENDAR