BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Business Development Institute (BDI) - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Business Development Institute (BDI)
X-ORIGINAL-URL:https://bdionline.com
X-WR-CALDESC:Events for Business Development Institute (BDI)
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20190310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20191103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200429T120000
DTEND;TZID=America/New_York:20200527T133000
DTSTAMP:20260403T144253
CREATED:20200213T164045Z
LAST-MODIFIED:20200408T212442Z
UID:45277-1588161600-1590586200@bdionline.com
SUMMARY:Winning the Digital Transformation Networking Challenge
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/042920network/
LOCATION:GA\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200429T120000
DTEND;TZID=America/New_York:20200429T133000
DTSTAMP:20260403T144253
CREATED:20200218T195206Z
LAST-MODIFIED:20200422T185607Z
UID:45431-1588161600-1588167000@bdionline.com
SUMMARY:Building Your Content Engine
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/042920content/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200428T120000
DTEND;TZID=America/New_York:20200428T133000
DTSTAMP:20260403T144253
CREATED:20200221T170358Z
LAST-MODIFIED:20200429T180009Z
UID:45685-1588075200-1588080600@bdionline.com
SUMMARY:eCommerce in the COVID Economy
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/042820ecommerce/
LOCATION:NY\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200423T120000
DTEND;TZID=America/New_York:20200423T133000
DTSTAMP:20260403T144253
CREATED:20200227T180100Z
LAST-MODIFIED:20200413T153723Z
UID:45815-1587643200-1587648600@bdionline.com
SUMMARY:AI for Connected Vehicles & Smart Mobility
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/042320ai/
LOCATION:MI\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200423T120000
DTEND;TZID=America/New_York:20200423T133000
DTSTAMP:20260403T144253
CREATED:20200221T164835Z
LAST-MODIFIED:20200413T210433Z
UID:45668-1587643200-1587648600@bdionline.com
SUMMARY:Building Your Content Engine
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/042320content/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200421T120000
DTEND;TZID=America/New_York:20200421T133000
DTSTAMP:20260403T144253
CREATED:20200218T201602Z
LAST-MODIFIED:20200423T161929Z
UID:45472-1587470400-1587475800@bdionline.com
SUMMARY:B2B Tech Sales & Marketing Roundtable
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/042120b2b/
LOCATION:CA\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200415T120000
DTEND;TZID=America/New_York:20200415T133000
DTSTAMP:20260403T144253
CREATED:20200213T170910Z
LAST-MODIFIED:20200408T212415Z
UID:45298-1586952000-1586957400@bdionline.com
SUMMARY:Winning the Digital Transformation Networking Challenge
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/041520network/
LOCATION:IL\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200402T120000
DTEND;TZID=America/New_York:20200402T133000
DTSTAMP:20260403T144253
CREATED:20200208T032337Z
LAST-MODIFIED:20200417T165741Z
UID:44636-1585828800-1585834200@bdionline.com
SUMMARY:Optimizing the Digital Transformation Journey with Microsoft
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/040220dx/
LOCATION:NY\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200401T120000
DTEND;TZID=America/New_York:20200401T133000
DTSTAMP:20260403T144253
CREATED:20200207T210531Z
LAST-MODIFIED:20200513T195819Z
UID:44509-1585742400-1585747800@bdionline.com
SUMMARY:Search to Sold: 100% Digitally
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/040120searchtosold/
LOCATION:IL\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200331T120000
DTEND;TZID=America/New_York:20200331T133000
DTSTAMP:20260403T144253
CREATED:20200208T211308Z
LAST-MODIFIED:20200507T193424Z
UID:44751-1585656000-1585661400@bdionline.com
SUMMARY:Stay at Home Workforce
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/033120riskcompliance/
LOCATION:IL\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200326T120000
DTEND;TZID=America/New_York:20200326T133000
DTSTAMP:20260403T144253
CREATED:20200208T214134Z
LAST-MODIFIED:20200324T154516Z
UID:44756-1585224000-1585229400@bdionline.com
SUMMARY:Winning the Digital Transformation Networking Challenge
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/032620network/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200326T120000
DTEND;TZID=America/New_York:20200326T133000
DTSTAMP:20260403T144253
CREATED:20200208T203945Z
LAST-MODIFIED:20200324T154529Z
UID:44730-1585224000-1585229400@bdionline.com
SUMMARY:Stay at Home Workforce
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/032620riskcompliance/
LOCATION:CA\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200325T120000
DTEND;TZID=America/New_York:20200325T133000
DTSTAMP:20260403T144253
CREATED:20200209T051542Z
LAST-MODIFIED:20200417T165653Z
UID:44831-1585137600-1585143000@bdionline.com
SUMMARY:Securing The Enterprise
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/032520enterprise/
LOCATION:NY\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200325T120000
DTEND;TZID=America/New_York:20200325T133000
DTSTAMP:20260403T144253
CREATED:20200208T165951Z
LAST-MODIFIED:20200417T165823Z
UID:44663-1585137600-1585143000@bdionline.com
SUMMARY:Enterprise Artificial Intelligence
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/032520ai/
LOCATION:Guard And Grace\, 1801 California Street\, Denver\, CO\, 80202\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200324T120000
DTEND;TZID=America/New_York:20200324T133000
DTSTAMP:20260403T144253
CREATED:20200208T201949Z
LAST-MODIFIED:20200324T154002Z
UID:44718-1585051200-1585056600@bdionline.com
SUMMARY:B2B Tech Sales & Marketing Leadership Roundtable
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/032420b2b/
LOCATION:NY\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200324T120000
DTEND;TZID=America/New_York:20200324T133000
DTSTAMP:20260403T144253
CREATED:20200207T212319Z
LAST-MODIFIED:20200326T195012Z
UID:44425-1585051200-1585056600@bdionline.com
SUMMARY:MarketingWorks
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/032420marketingworks/
LOCATION:PA\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200319T120000
DTEND;TZID=America/New_York:20200319T140000
DTSTAMP:20260403T144253
CREATED:20200207T183646Z
LAST-MODIFIED:20210111T195832Z
UID:44418-1584619200-1584626400@bdionline.com
SUMMARY:MarketingWorks
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/031920marketingworks/
LOCATION:Morton’s The Steakhouse\, 227 W Trade Street\, Charlotte\, NC\, 28202\, United States
END:VEVENT
END:VCALENDAR