BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//NJ Society for Information Management - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:NJ Society for Information Management
X-ORIGINAL-URL:https://njsim.org
X-WR-CALDESC:Events for NJ Society for Information Management
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231012T173000
DTEND;TZID=America/New_York:20231012T203000
DTSTAMP:20260426T181317
CREATED:20230820T053011Z
LAST-MODIFIED:20230928T023502Z
UID:10431-1697131800-1697142600@njsim.org
SUMMARY:Cybersecurity Through A Risk Management\, Compliance\, And Legal Lens
DESCRIPTION:[vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][nectar_gradient_text heading_tag=”h2″ color=”extra-color-gradient-2″ gradient_direction=”diagonal” text=”October 12 2023 Monthly Meeting”][vc_row_inner column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/2″ tablet_width_inherit=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text]Information Security is now one of the most significant risk areas for any business. Thus\, understanding\, addressing\, and managing that risk needs to be a top priority – to protect company information\, assets\, technology\, systems\, and networks. \nMost federal\, state\, and local law enforcement agencies and regulators are now hyper-focused on Information Security — not just on apprehending cybercriminals and reactively addressing cybercrime after it occurs; but also\, proactively preventing it. \nToday\, most enforcement and regulatory agencies expect businesses to have robust cybersecurity compliance programs built around identifying and managing their most significant cyber risks. Many also require companies to have robust risk-based information security programs\, as pre-requisites to conducting business. This also extends to third-party contractors and business partners who are now expected and contractually required to have robust risk-based information security compliance programs. \nThe best way to prevent this Parade of Horribles is for IT and Risk Management/Compliance/Legal to work together in a collaborative partnership – transcending traditional corporate silos and assumptions regarding what IT\, Compliance\, Legal\, and Risk Management are “supposed” to do. \nOn Octobert 12 2023\, Alexandra Rebay\, former Global Chief Compliance Officer for Verizon Communications will lead a discussion on how to form this collaborative partnership. When done right\, effective proactive information security compliance and risk management can be leveraged as a competitive advantage. \n  \nAbout Our Presenter: \nAlexandra Rebay was the Senior Vice President\, Deputy General Counsel\, and Global Chief Compliance Officer for Verizon Communications\, and also held a variety of other senior executive leadership roles at Verizon and its predecessor company\, GTE Corporation\, over almost 30 years. Since retiring from Verizon on the eve of the COVID-19 pandemic\, Ms. Rebay has brought her expertise in compliance\, risk management\, litigation\, and crisis management to the not-for-profit arena\, guiding the Greater Somerset County YMCA\, whose Board Audit & Risk Management Committee she chairs\, through the myriad novel operational issues – including cybersecurity challenges – presented by the global pandemic and its aftermath. \nBefore her career in the private sector\, Ms. Rebay served as an Assistant United States Attorney in the Southern District of New York\, prosecuting computer crime\, securities fraud\, corruption\, narcotics\, and terrorism cases.[/vc_column_text][/vc_column_inner][vc_column_inner column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/2″ tablet_width_inherit=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][image_with_animation image_url=”10470″ animation=”Fade In” hover_animation=”none” alignment=”” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”100%” max_width_mobile=”default”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_custom_heading text=”Agenda” font_container=”tag:h2|text_align:left|color:%23005b94″ use_theme_fonts=”yes”][vc_column_text]5:30     Registration and Networking\n6:15     Dinner\n6:45     SIM NJ Updates\n7:00     Featured Presentation/Discussion\n8:00     More Networking\n8:30:    In-person Members In Transition (M.I.T.) Meeting[/vc_column_text][vc_custom_heading text=”Event Sponsor” font_container=”tag:h2|text_align:left|color:%23005b94″ use_theme_fonts=”yes”][image_with_animation image_url=”10785″ animation=”Fade In” hover_animation=”none” alignment=”” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”100%” max_width_mobile=”default” img_link=”https://consortium.net/”][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text][/vc_column_text][vc_column_text]Register for the event below or email your RSVP to Karen Kostulas.  Include your full name\, professional title\, and company email address in the message. \nSIM NJ (and other SIM chapter) Members: $60\nSIM NJ Members In Transition: $30\nNon-member guests: $100\nNon-member guests must be accompanied by a member[/vc_column_text][/vc_column][/vc_row]
URL:https://njsim.org/event/2023-10-12-monthly-meeting/
LOCATION:Madison Hotel\, 1 Convent Road\, Morristown\, NJ\, United States
CATEGORIES:Member Event,Monthly Meeting,Webinar
ATTACH;FMTTYPE=image/jpeg:https://njsim.org/wp-content/uploads/2023/08/Informatio-Security.jpeg
END:VEVENT
END:VCALENDAR