BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//NJ Society for Information Management - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:NJ Society for Information Management
X-ORIGINAL-URL:https://njsim.org
X-WR-CALDESC:Events for NJ Society for Information Management
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240912T173000
DTEND;TZID=America/New_York:20240912T203000
DTSTAMP:20260425T233757
CREATED:20240808T223103Z
LAST-MODIFIED:20240909T234540Z
UID:13862-1726162200-1726173000@njsim.org
SUMMARY:September 2024 Monthly Meeting - The Day After: What Happens When the Digital Forensics People Show Up
DESCRIPTION:[vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text]\nThe Day After:\nWhat Happens When the Digital Forensics People Show Up\n[/vc_column_text][vc_row_inner column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/2″ tablet_width_inherit=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][image_with_animation image_url=”13951″ animation=”Fade In” hover_animation=”none” alignment=”” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”100%” max_width_mobile=”default”][/vc_column_inner][vc_column_inner column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/2″ tablet_width_inherit=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text]Managers and Executives with Cybersecurity responsibility spend most of their focus on “preventative” controls; doing what they can to ensure the organization does not experience cybersecurity events. Talk to any one of them\, however\, and they will admit it is probably not a case of “if” but rather “when” such an event will occur. Many will also admit that they are probably not properly prepared for the aftermath of such an event\, particularly in regard to determining exactly what happened and the extent of the compromise. Thus\, many will reach out to outside consultants who will need to be supported in this mission. \nWould your organization be ready to support them in this critical endeavor at such a highly stressful time? Join us for this session\, led by experienced experts\, where we will explore best practices to help prepare for such incidents before they occur. Don’t miss out on what promises to be an important and informative lecture and discussion.[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text]Our esteemed panelists will include: \nMichael Geraghty\, CISO State of NJ\, Director NJ CCIC\nMichael Geraghty is the State of New Jersey’s Chief Information Security Officer (CISO) and Director of the New Jersey Cybersecurity and Communications Integration Cell (NJCCIC). In these roles Director Geraghty is responsible for the development and execution of the State’s cybersecurity strategy. He is responsible for leading and coordinating New Jersey’s cybersecurity efforts while building resiliency throughout the State and has direct responsibility for all aspects of statewide cybersecurity operations; governance\, risk and compliance; and incident response. Mr. Geraghty is an accomplished cybersecurity executive with a history of building innovative and model programs in private and public sector enterprises including roles as CISO of the Hudson’s Bay Company\, Chief Information Officer of the National and International Centers for Missing and Exploited Children\, Vice President of High Technology Investigations at Prudential Financial\, and Network Intrusion Detection Manager\, Lucent Technologies/Bell Labs. Mr. Geraghty began his career with the New Jersey State Police\, where he served 12 years and led the formation and development of its High Technology Crimes Investigations Unit. He has provided expert testimony before the United States Congress and in federal\, state\, and international courts on computer crime investigations and forensics. Geraghty is a past president of the Northeast Chapter of the High Technology Crimes Investigation Association and has held leadership roles in the National Strategic Policy Council on Cyber and Electronic Crime. \nWilliam Rassier\, FBI Special Agent\, Cybercrime\, Financial and Healthcare Fraud\nBill has enjoyed an 8 year career in public accounting at KPMG in the financial services sector followed by a 21 year career at the FBI with expertise in the areas of financial frauds\, cybersecurity\, healthcare fraud\, and counterterrorism.    He has previously worked in the New York\, Los Angeles\, FBI Headquarters\, and Newark offices. Currently on a Cyber Criminal squad in Newark which works network intrusions to include ransomware.  He holds a CPA certification and SANS GSEC cybersecurity certification. \nMichelle Lui\, Supervisory Special Agent\, FBI Cyber Division\nSupervisory Special Agent (SSA) Liu has been in the FBI for approximately 14 years\, working National Security matters in both Counterintelligence and Cyber. SSA Liu also works closely with industry to share threat indicators on cyber activity. Currently\, SSA Liu is FBI’s Program Manager for Midnight Blizzard. \nChris Salerno\, Chief Operating Officer\, SRA\nChris is a seasoned information security leader and SRA’s Chief Operating Officer. He specializes in incident readiness and response\, cyber security assessments (pen tests\, purple teams\, red teams)\, security operations\, strategy & roadmaps\, and advanced threat defense.  His mission is to help train the next generation of cyber security professionals. He has wide-ranging industry expertise with a focus on Fortune 500 companies. \n\nSpeaker at BlackHat Arsenal\, RSA Conference\, Security BSides\, and SecureWorld\nDelivered numerous security demonstrations and security awareness training showcasing the latest tools and techniques in the field of Information Security.\nSpecialties: IT Security Strategy\, Purple Teams\, Red Teams\, Penetration Testing\, Incident Response\, Advanced Threats\, Web Application Security\n\nJoe Fisher\, Senior Cybersecurity Analyst\, Affinity IT Security\nMr. Fisher has over 30 years of IT experience including application development\, training\, and cybersecurity consulting.\nMr. Fisher is the founder of Affinity IT Security Services\, a cybersecurity consultancy which offers: \n\nNetwork Security Vulnerability Assessments\nPenetration Testing\nApplication and website Security Testing\nInformation Security Policies and Procedures\nInformation Security Governance\n\nIn addition to his role as a consultant he is a dynamic and engaging speaker\, and has spoken on cybersecurity topics at ICSJWG\, SCADA Tech Summit\, SIMPosium\, QCon\, OWASP\, JavaSIG\, NJMMA\, Chamber of Commerce\, and Regional IIB meetings. \nMr. Fisher is an enthusiastic member of OWASP and is Past President and current Trustee of the  of the NJ Chapter of the Society of Information Management (SIM).[/vc_column_text][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_custom_heading text=”Agenda” font_container=”tag:h2|text_align:left|color:%23005b94″ use_theme_fonts=”yes”][vc_column_text]5:30     Registration and Networking\n6:15     Dinner\n6:45     Business Meeting\n7:00     Presentation and Q&A\n8:00     Networking[/vc_column_text][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_custom_heading text=”Please register for the event below.\nPlease note that registration at the event will be $85.00 for members.” font_container=”tag:h4|text_align:left|color:%23000000″ use_theme_fonts=”yes”][vc_column_text][/vc_column_text][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text]\n[/vc_column_text][/vc_column][/vc_row]
URL:https://njsim.org/event/september-2024-monthly-meeting/
LOCATION:Madison Hotel\, 1 Convent Road\, Morristown\, NJ\, United States
CATEGORIES:Member Event,Monthly Meeting
ATTACH;FMTTYPE=image/jpeg:https://njsim.org/wp-content/uploads/2024/08/Forensics-image.jpg
END:VEVENT
END:VCALENDAR