BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//NJ Society for Information Management - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:NJ Society for Information Management
X-ORIGINAL-URL:https://njsim.org
X-WR-CALDESC:Events for NJ Society for Information Management
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240117T120000
DTEND;TZID=America/New_York:20240117T130000
DTSTAMP:20260426T142657
CREATED:20240109T044229Z
LAST-MODIFIED:20240109T044533Z
UID:11423-1705492800-1705496400@njsim.org
SUMMARY:SIM "Rethink Everything": "Adjusting Cybersecurity postures in the wake of Artificial Intelligence and Machine Learning"
DESCRIPTION:[vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_row_inner column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text]About the Session: \nOn Wednesday\, January 17\, 2024\, join the Rethink Everything SIG and guest speaker Pam Lindemoen for an open discussion on how Artificial Intelligence and Machine Learning will impact our Cybersecurity strategy.  Also\, we will touch on adjusting the approach in the wake of global conflict and how to best prepare to address. ß This targets how Joe Q. Public can pay bad actors to launch various attacks against familiar targets (getting kind of scary)\n\nThis webcast is being presented in partnership with the SIM DigiRisk SIG. \nAbout the Speaker: \n \nPam Lindemoen \nAVP & Advisory CISO; Cisco Systems\, Inc. \nPam is a CISO Advisor in Cisco’s Security Organization. She is an Information Security executive leader with over 25 years of experience within the IT industry. Pam joined Cisco from Anthem\, Inc. (currently Elevance Health) where she held the Deputy Chief Information Security Officer role. While at Anthem\, she was considered a bold and strategic thinker who envisioned and delivered a world-class Enterprise Information Security strategy\, including the Steering Committee with cross-functional business and technology membership. Pam was also a key advisor to the litigation process and full program development during and after an unprecedented cyber-attack. The foundation for her success was built upon her innate ability to faster business partnerships and support all stakeholder needs. \nPrior to Anthem\, Pam had significant success leading business and software development\, IT Operations\, program improvements and direct sales. In her executive leadership positions\, she has played pivotal roles in the development of innovative products and services for key accounts and developed IT solution strategies that led to multibillion dollar contracts with global vendors and customers. \nNot allowing her intrinsic drive and commitment to stop with success in running business\, Pam is dedicated to the encouragement of women in business and IT. Pam serves on the boards of the National Cybersecurity Alliance\, Tampa Bay Tech\, and was appointed as a Senior Fellow for Cyber Florida: The Florida Center for Cybersecurity. She cohosts a podcast: Do We Belong Here? (In the Cyber World) which is dedicated to proving that everyone belongs in cybersecurity. \nCOST TO ATTEND: \n\nFree for SIM Members.\n$30 for non-members.\n\n[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text][/vc_column_text][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text][/vc_column_text][vc_column_text]Register for this complimentary midday event by clicking this link.[/vc_column_text][/vc_column][/vc_row]
URL:https://njsim.org/event/sim-rethink-everything-adjusting-cybersecurity-postures-in-the-wake-of-artificial-intelligence-and-machine-learning/
LOCATION:Webinar
CATEGORIES:Member Event,Webinar
ATTACH;FMTTYPE=image/png:https://njsim.org/wp-content/uploads/2024/01/Adjusting-Cybersecurity-Postures.png
END:VEVENT
END:VCALENDAR