Upcoming Coffee with NJ-GMIS Sessions:
Thursday, February 20, 2025 - Coffee with Kiteworks - Securing Sensitive Data with Kiteworks: Unlock the Power of Zero Trust
In 2024, the stakes in cybersecurity are higher than ever. Data breaches now cost $4.88 million on average, and supply chain attacks have surged by 68%. To combat these growing threats, organizations are turning to Zero Trust—a transformative framework that redefines how sensitive content is secured.
With Kiteworks, you can unify, track, and protect your organization’s most sensitive content while achieving compliance and mitigating advanced threats. Discover why 55% of organizations are adopting Zero Trust to prevent IP leakage, secure communications, and stay ahead of evolving risks.
Join us to explore how Kiteworks can help your organization embrace Zero Trust and lead the charge in cybersecurity excellence.
In 2024, the stakes in cybersecurity are higher than ever. Data breaches now cost $4.88 million on average, and supply chain attacks have surged by 68%. To combat these growing threats, organizations are turning to Zero Trust—a transformative framework that redefines how sensitive content is secured.
With Kiteworks, you can unify, track, and protect your organization’s most sensitive content while achieving compliance and mitigating advanced threats. Discover why 55% of organizations are adopting Zero Trust to prevent IP leakage, secure communications, and stay ahead of evolving risks.
Join us to explore how Kiteworks can help your organization embrace Zero Trust and lead the charge in cybersecurity excellence.
Thursday, March 20, 2025 - Coffee with Insight
Join us for a panel discussion exploring how AI can revolutionize municipal services. We'll delve into real-world examples and discuss the potential of AI in areas such as:
Register today!
Join us for a panel discussion exploring how AI can revolutionize municipal services. We'll delve into real-world examples and discuss the potential of AI in areas such as:
- AI-powered financial reporting
- Budget estimation with predictive analytics
- Streamlining permit applications and enhancing citizen engagement
- Panel discussion: Unlocking AI for smarter municipal services
- Live demo: TechForGov AI solutions
- Interactive Q&A session
Register today!
Previous Coffee with NJ-GMIS Sessions:
Coffee with CrowdStrike - #OneTeamOneFight – CrowdStrike’s collaboration with the State of New Jersey
CrowdStrike is the most advanced cybersecurity platform in the world – protecting the people, processes and technologies that drive modern State and Local Government and Education. CrowdStrike secures the most critical areas of risk (endpoints and cloud workloads, identity, and data) to keep customers ahead of today’s adversaries and stop breaches. The NJ Office of Homeland Security and Preparedness (NJOHSP) leveraged funding from the State and Local Cybersecurity Grant Program (SLCGP) to strengthen its Collective Defense by starting the Advanced Endpoint Protection (AEP) Program. CrowdStrike is excited to now extend the economies of scale that were realized through the SLCGP to all Public Entities in the State of New Jersey. Find out more here: https://crwdnjccic.splashthat.com/
CrowdStrike is the most advanced cybersecurity platform in the world – protecting the people, processes and technologies that drive modern State and Local Government and Education. CrowdStrike secures the most critical areas of risk (endpoints and cloud workloads, identity, and data) to keep customers ahead of today’s adversaries and stop breaches. The NJ Office of Homeland Security and Preparedness (NJOHSP) leveraged funding from the State and Local Cybersecurity Grant Program (SLCGP) to strengthen its Collective Defense by starting the Advanced Endpoint Protection (AEP) Program. CrowdStrike is excited to now extend the economies of scale that were realized through the SLCGP to all Public Entities in the State of New Jersey. Find out more here: https://crwdnjccic.splashthat.com/
Coffee with Eclypsium - Get CJIS SI-7 compliant with Eclypsium
Join NJ GMIS members and corporate member Eclypsium for.a session on the latest CJIS security policy SI-7 requirement and how Eclypsium is the best solution for compliance. CJIS compliance is necessary for every public safety agency and court system. Become educated on the SI-7 requirement and how to comply.
Join NJ GMIS members and corporate member Eclypsium for.a session on the latest CJIS security policy SI-7 requirement and how Eclypsium is the best solution for compliance. CJIS compliance is necessary for every public safety agency and court system. Become educated on the SI-7 requirement and how to comply.
Coffee with ThinkGard - Voicemail from a Hacker
Imagine getting that voicemail message after exhausting all options to recover your data after a ransomware attack. Hackers aren’t messing around. And yet, we find that many organizations—often large organizations with robust IT teams—let the urgent overtake the important. When that happens, it’s easy to ignore red flags, proactive security tasks, and critical alerts. We’ll discuss an organization that experienced the permanent data loss of critical servers, millions of dollars in fines, and repercussions that lasted years. It’s easy to cast judgment on other organizations, but can you say for sure that you are prepared for a ransomware attack? Is your organization equipped to respond quickly when a vulnerability could lead to a cyberattack? Are you certain you’re checking all the right boxes? The advice ignored by the organization when cyber attackers began their reconnaissance three months before the attack. A play-by-play of the ransomware attack that devastated this organization.
Imagine getting that voicemail message after exhausting all options to recover your data after a ransomware attack. Hackers aren’t messing around. And yet, we find that many organizations—often large organizations with robust IT teams—let the urgent overtake the important. When that happens, it’s easy to ignore red flags, proactive security tasks, and critical alerts. We’ll discuss an organization that experienced the permanent data loss of critical servers, millions of dollars in fines, and repercussions that lasted years. It’s easy to cast judgment on other organizations, but can you say for sure that you are prepared for a ransomware attack? Is your organization equipped to respond quickly when a vulnerability could lead to a cyberattack? Are you certain you’re checking all the right boxes? The advice ignored by the organization when cyber attackers began their reconnaissance three months before the attack. A play-by-play of the ransomware attack that devastated this organization.
Coffee with D2 Cybersecurity - A Chat with Former CIO and NJGMIS Member Michael Esolda and Director of D2 Cybersecurity, Brian Lau.
Learn and understand how Cybersecurity affects your public entity and what you can do to lower the risk of a Cyber incident on your organization.
In this presentation geared towards, Mayors and leaders, IT Directors and teams, Business Administrator, and Council Members, D2 will share how they have helped over 500 clients in this sector create a culture of Cybersecurity from the top down.
Attendees will learn about how to create a culture change at their public entity, explore new funding sources, in addition to insurance initiatives one can take advantage to help reduce the economic burden of these needed additional services and solutions.
Learn and understand how Cybersecurity affects your public entity and what you can do to lower the risk of a Cyber incident on your organization.
In this presentation geared towards, Mayors and leaders, IT Directors and teams, Business Administrator, and Council Members, D2 will share how they have helped over 500 clients in this sector create a culture of Cybersecurity from the top down.
Attendees will learn about how to create a culture change at their public entity, explore new funding sources, in addition to insurance initiatives one can take advantage to help reduce the economic burden of these needed additional services and solutions.
Improving Government Productivity and Efficiency using AI with Insight
How the use of Generative AI can help enhance the government employee and citizen experience. Gen AI is a powerful tool that can be used to automate a wide range of tasks, drive productivity, improve efficiency, and create new content.
For governments, Gen AI augments and improves daily tasks using an AI powered mentor sitting beside every employee helping them search, summarize, and understand. It can also be used to translate text and documents on the Government website.
In this presentation, Insight will share service offering they are engaged in across the country with Google and Insight Broadband solutions. Insight Services portfolio Gen AI driven technology platforms & models can help promote equity and inclusion for citizens in a variety of ways by using public government website data, accessible through a virtual agent, that communicates, translates to over 100 different languages & dialects, and takes action.
Google Public Sector is highly focused on delivering this experience with its Gov AI model responsibly, ethically and securely.
How the use of Generative AI can help enhance the government employee and citizen experience. Gen AI is a powerful tool that can be used to automate a wide range of tasks, drive productivity, improve efficiency, and create new content.
For governments, Gen AI augments and improves daily tasks using an AI powered mentor sitting beside every employee helping them search, summarize, and understand. It can also be used to translate text and documents on the Government website.
In this presentation, Insight will share service offering they are engaged in across the country with Google and Insight Broadband solutions. Insight Services portfolio Gen AI driven technology platforms & models can help promote equity and inclusion for citizens in a variety of ways by using public government website data, accessible through a virtual agent, that communicates, translates to over 100 different languages & dialects, and takes action.
Google Public Sector is highly focused on delivering this experience with its Gov AI model responsibly, ethically and securely.
Special Coffee with NJ-GMIS & NJCCIC - Q & A with Michael Geraghty about the State and Local Cybersecurity Grant Program (SLCGP)
The State and Local Cybersecurity Grant Program (SLCGP) is a federal grant program administered by the United States Department of Homeland Security (DHS) and funded by the Infrastructure Investment and Jobs Act (IIJA). The overall goal of the SLCGP is to improve the cybersecurity posture of state, local, and territorial (SLT) government organizations by providing assistance for managing and reducing systemic cyber risk.
The State and Local Cybersecurity Grant Program (SLCGP) is a federal grant program administered by the United States Department of Homeland Security (DHS) and funded by the Infrastructure Investment and Jobs Act (IIJA). The overall goal of the SLCGP is to improve the cybersecurity posture of state, local, and territorial (SLT) government organizations by providing assistance for managing and reducing systemic cyber risk.
Complying with Insurance Industry Cyber Liability Requirements & Understanding NJ MEL Risk Management Plan Tier Changes
Join members and Ed Cooney, Senior Underwriting Manager Conner Strong Insurance Brokerage - Industry Leader in Insuring
High-risk Businesses on Thursday, December 15, 2022 at 10:00 for this informative session.
Attendees will learn from an insurance industry senior executive about Cyber liability Claims Trends; Where local governments and educational entities can obtain cyber incident help and advice; about insurance industry prerequisites required to obtain Cyber Liability insurance and the impacts of the NJ MEL Risk Management Plan tier changes.
The knowledge gained by session attendees will prepare them to confidently acquire Cyber Liability coverage for their respective organizations.
Join members and Ed Cooney, Senior Underwriting Manager Conner Strong Insurance Brokerage - Industry Leader in Insuring
High-risk Businesses on Thursday, December 15, 2022 at 10:00 for this informative session.
Attendees will learn from an insurance industry senior executive about Cyber liability Claims Trends; Where local governments and educational entities can obtain cyber incident help and advice; about insurance industry prerequisites required to obtain Cyber Liability insurance and the impacts of the NJ MEL Risk Management Plan tier changes.
The knowledge gained by session attendees will prepare them to confidently acquire Cyber Liability coverage for their respective organizations.
Ransomware the Elephant in the Room: Navigating Cyber Insurance Industry Multi-Factor Authentication (MFA) Requirements.
Ransomware attacks have resulted in significant financial losses. Approximately 37% of global organizations said they were the victim of some form of ransomware attack in 2021, according to IDC's "2021 Ransomware Study." Average ransomware payments reached $812,000 in 2021, compared to $170,000 in 2020. Ransomware was involved in 75% of all cyber insurance claims during the first half of 2021. Cyber insurance is still widely available, but organizations will have to pay more and jump through extra hoops, such as implementing Multi-factor Authentications across their enterprise.
Ransomware attacks have resulted in significant financial losses. Approximately 37% of global organizations said they were the victim of some form of ransomware attack in 2021, according to IDC's "2021 Ransomware Study." Average ransomware payments reached $812,000 in 2021, compared to $170,000 in 2020. Ransomware was involved in 75% of all cyber insurance claims during the first half of 2021. Cyber insurance is still widely available, but organizations will have to pay more and jump through extra hoops, such as implementing Multi-factor Authentications across their enterprise.
Coffee with NJ-GMIS & the MEL: Cyber Risk Management for NJ Public Entities
The MEL JIF and NJCE JIF represent about 70% of NJ’s public entities, and have developed a customized Cybersecurity Maturity Model for its members. The model is thoughtfully structured considering the risks of its members, and the effectiveness, cost and complexity of the controls being recommended. Not only will the Cyber program help members get to a strong security posture, but the recommended controls are also critical in obtaining Cyber insurance today.
The MEL JIF and NJCE JIF represent about 70% of NJ’s public entities, and have developed a customized Cybersecurity Maturity Model for its members. The model is thoughtfully structured considering the risks of its members, and the effectiveness, cost and complexity of the controls being recommended. Not only will the Cyber program help members get to a strong security posture, but the recommended controls are also critical in obtaining Cyber insurance today.
Coffee with NJ-GMIS & Granicus: Is the End in Sight? Or Is It Time to Turn Temporary Measures into Long-term Solutions?
Government agencies have been rapidly adjusting for the last 2 years and learning along the way. One of the most urgent tasks early in the pandemic was how to run public meetings virtually. Residents and staff have come to expect a digital option to participate in meetings now that it's been executed. However, demand to provide in person meetings continues. How can agencies truly adjust to a hybrid model of meetings to best serve their communities?
In this NJGMIS Coffee Chat session, we'll be joined by Granicus and (soon to be announced), where we'll cover:
Government agencies have been rapidly adjusting for the last 2 years and learning along the way. One of the most urgent tasks early in the pandemic was how to run public meetings virtually. Residents and staff have come to expect a digital option to participate in meetings now that it's been executed. However, demand to provide in person meetings continues. How can agencies truly adjust to a hybrid model of meetings to best serve their communities?
In this NJGMIS Coffee Chat session, we'll be joined by Granicus and (soon to be announced), where we'll cover:
- Running effective, inclusive hybrid public meetings
- Creating meetings that can work with fluctuations in resident participation
- How to handle an increase of public comments with increased engagement