Workshop 2016 has ended


The NJSBA Workshop 2016 SCHED and mobile app feature the same programming, speaker, and exhibitor information, however, schedules created on SCHED cannot be integrated to the mobile app.

To stay connected throughout Workshop 2016 and have your schedule on your smart device, please download the NJSBA Workshop mobile app available through the Apple App store or Google Play store by searching NJSBA Workshop 2016.

The Workshop app offers an opportunity to actively engage in Workshop throughout the entire event by networking with other attendees, vendors and speakers; posting pictures to the newsfeed, viewing sessions, receiving announcements, getting the most up-to-date event information, earning points and in-app badges and more!

Make sure you select “yes” to receive notifications from Workshop 2016, including minute-to-minute updates, session changes and cancellations as soon as they happen. 

REMINDER: Attendance at training sessions, unless pre-registration is required, is first-come basis. Creating an agenda via SCHED or the mobile app does not guarantee a place in the session. 

Back To Schedule
Wednesday, October 26 • 2:30pm - 3:30pm
Establishing a Right-sized K-12 Information Security Program

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Cyber risk is real, and you need to meet it head on. As threats to technology systems and data are on an exponential rise, the development of an information security program becomes critically important to combat and address technology risk. Attendees will learn about developing an information security program using a continuous risk management lifecycle approach. We will identify the components of a security program, review the continuous risk management methods and demonstrate how these concepts can be designed to fit into any organization regardless of size or industry. Discussions on how and where to get started on building a continuous risk management program will be presented with recommendations on how to get started in your organization.

1 QPA: Information Technology  

Attendees needing to receive a Certificate of Attendance must be scanned at the conclusion of the program. 


John A. Otte

Principal Security Strategist Lead Auditor, ePlus Technology Inc
John A. Otte, C|CISO, CISSP, CISA, CISM, MBA, MSIA, ISO 27001 Lead AuditorePlus Technology, inc - Principal Security StrategistJohn is the Principal Security Strategist for ePlus. John is an accomplished Information Security and data protection professional with over 15 years of Systems... Read More →

avatar for ePlus Technology

ePlus Technology

Diamond Sponsor, ePlus Technology
ePlus is a leading systems integrator for the public sector in the United States. Holding more than 100 contracts ePlus currently works with numerous school districts universities and government agencies. Our experienced dedicated staff understands the nuances of IT and how they intersect... Read More →

Wednesday October 26, 2016 2:30pm - 3:30pm EDT
Room 415 One Convention Boulevard Atlantic City, NJ 08401