BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Business Development Institute (BDI) - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Business Development Institute (BDI)
X-ORIGINAL-URL:https://bdionline.com
X-WR-CALDESC:Events for Business Development Institute (BDI)
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20210314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20211107T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20220313T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20221106T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20230312T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20231105T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Santiago
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:-04
DTSTART:20210404T030000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:-03
DTSTART:20210905T040000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:-04
DTSTART:20220403T030000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:-03
DTSTART:20220911T040000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:-04
DTSTART:20230402T030000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:-03
DTSTART:20230903T040000
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20210314T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20211107T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20220313T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20221106T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20230312T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20231105T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221206T130000
DTEND;TZID=America/New_York:20221206T140000
DTSTAMP:20260407T150651
CREATED:20221026T160447Z
LAST-MODIFIED:20260203T180134Z
UID:89988-1670331600-1670335200@bdionline.com
SUMMARY:Future-Proofing your Startup: Marketing Strategies in an Uncertain Economy
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/future-proofing-marketing-strat/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221201T130000
DTEND;TZID=America/New_York:20221201T140000
DTSTAMP:20260407T150651
CREATED:20221005T162519Z
LAST-MODIFIED:20260203T180135Z
UID:88971-1669899600-1669903200@bdionline.com
SUMMARY:The Future of Securing Apps and APIs
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/frictionless-security/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221130T180000
DTEND;TZID=America/New_York:20221130T200000
DTSTAMP:20260407T150651
CREATED:20221007T131809Z
LAST-MODIFIED:20260203T180137Z
UID:89106-1669831200-1669838400@bdionline.com
SUMMARY:Driving Growth & Pipeline in 2023 - A Roundtable Dinner for B2B Sales & Marketing Leaders
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/113022_demandbase/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/09/raf-winterpacht-IJResNBbAnc-unsplash-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221129T120000
DTEND;TZID=America/New_York:20221129T140000
DTSTAMP:20260407T150651
CREATED:20221017T171308Z
LAST-MODIFIED:20260203T180138Z
UID:89614-1669723200-1669730400@bdionline.com
SUMMARY:The Race for Data: Capturing\, Automating & Enabling Analytics
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/the-race-for-data-capturing-automating-enabling-analytics/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221116T130000
DTEND;TZID=America/New_York:20221116T140000
DTSTAMP:20260407T150651
CREATED:20220915T182636Z
LAST-MODIFIED:20260203T180139Z
UID:87374-1668603600-1668607200@bdionline.com
SUMMARY:Identity Security in the Boardroom: A Moderated Roundtable With the C-Suite
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/111622-identitysecurity/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/09/charles-forerunner-3fPXt37X6UQ-unsplash-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20221115T120000
DTEND;TZID=America/Chicago:20221115T140000
DTSTAMP:20260407T150651
CREATED:20220922T060928Z
LAST-MODIFIED:20260203T180140Z
UID:87916-1668513600-1668520800@bdionline.com
SUMMARY:Mitigating Risk Within Your Supply Chain : Enabling Safety With Compliant\, Successful Practices
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/11152022_supplychain/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/09/marvin-meyer-SYTO3xs06fU-unsplash-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221110T130000
DTEND;TZID=America/New_York:20221110T140000
DTSTAMP:20260407T150651
CREATED:20220919T191448Z
LAST-MODIFIED:20260203T180142Z
UID:87439-1668085200-1668088800@bdionline.com
SUMMARY:The New Age of Email Marketing
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/111022braze/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/09/cytonn-photography-ZJEKICY5EXY-unsplash-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221108T120000
DTEND;TZID=America/New_York:20221108T140000
DTSTAMP:20260407T150651
CREATED:20220908T171959Z
LAST-MODIFIED:20260203T180142Z
UID:87044-1667908800-1667916000@bdionline.com
SUMMARY:Sustainable IT: Tactical Strategies to help Reduce Your Carbon Footprint
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/110822reducecarbon/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/09/alesia-kazantceva-XLm6-fPwK5Q-unsplash-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221102T130000
DTEND;TZID=America/New_York:20221102T140000
DTSTAMP:20260407T150651
CREATED:20220907T172412Z
LAST-MODIFIED:20260203T180144Z
UID:86872-1667394000-1667397600@bdionline.com
SUMMARY:ABM-ify Your Revenue Strategy: Your Secret Weapon for Sales and Marketing Success
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/110222revenuestrategy/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/09/lukas-blazek-mcSDtbWXUZU-unsplash-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221020T173000
DTEND;TZID=America/New_York:20221020T193000
DTSTAMP:20260407T150651
CREATED:20220927T143000Z
LAST-MODIFIED:20260203T180145Z
UID:88190-1666287000-1666294200@bdionline.com
SUMMARY:The future of the workplace: Making strategic investments in next-generation leaders
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/102022_handshake_nyc/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/09/arlington-research-kN_kViDchA0-unsplash-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221018T120000
DTEND;TZID=America/New_York:20221018T140000
DTSTAMP:20260407T150651
CREATED:20220928T190914Z
LAST-MODIFIED:20260203T180146Z
UID:88661-1666094400-1666101600@bdionline.com
SUMMARY:The future of the workplace: Making strategic investments in next-generation leaders
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/101822_handshake_chicago/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/09/arlington-research-kN_kViDchA0-unsplash-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221006T130000
DTEND;TZID=America/New_York:20221006T141500
DTSTAMP:20260407T150651
CREATED:20220826T173123Z
LAST-MODIFIED:20260203T180148Z
UID:86648-1665061200-1665065700@bdionline.com
SUMMARY:Social media as the new service differentiator: Boost reputation and drive loyalty
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/100622serviceprogram/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220914T080000
DTEND;TZID=America/New_York:20220914T170000
DTSTAMP:20260407T150651
CREATED:20220914T174939Z
LAST-MODIFIED:20260203T180149Z
UID:87316-1663142400-1663174800@bdionline.com
SUMMARY:LiveWorld RSVP
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/10-06-22-liveworld-rsvp/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220904T000000
DTEND;TZID=America/New_York:20220904T000000
DTSTAMP:20260407T150651
CREATED:20221004T183553Z
LAST-MODIFIED:20260203T180150Z
UID:88945-1662249600-1662249600@bdionline.com
SUMMARY:11.2 RollWorks ABM-ify Your Revenue Strategy
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/11-2-rollworks-abm-ify/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Santiago:20220628T120000
DTEND;TZID=America/Santiago:20220628T120000
DTSTAMP:20260407T150651
CREATED:20220422T170336Z
LAST-MODIFIED:20260203T180152Z
UID:85777-1656417600-1656417600@bdionline.com
SUMMARY:Frictionless Fraud Protection: Adopting Automation for a Secure eCommerce Experience
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/062822fraudprotection/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/04/Screen-Shot-2022-04-22-at-8.11.26-PM.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220524T130000
DTEND;TZID=America/New_York:20220524T141500
DTSTAMP:20260407T150651
CREATED:20220202T155618Z
LAST-MODIFIED:20260203T180153Z
UID:82093-1653397200-1653401700@bdionline.com
SUMMARY:Transforming eCommerce with Automation: Turning Online Shopping into a Visual Experience
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/052422commerce/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220520T120000
DTEND;TZID=America/New_York:20220520T131500
DTSTAMP:20260407T150651
CREATED:20220304T144243Z
LAST-MODIFIED:20260203T180155Z
UID:83510-1653048000-1653052500@bdionline.com
SUMMARY:The Untapped Potential of Type: Trends for Reinventing Brand Image in 2022
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/052022type/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-04-at-9.41.24-AM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220519T130000
DTEND;TZID=America/New_York:20220519T141500
DTSTAMP:20260407T150651
CREATED:20220119T142525Z
LAST-MODIFIED:20260203T180157Z
UID:81201-1652965200-1652969700@bdionline.com
SUMMARY:Modernizing B2B Market Research: Optimizing Your Pipeline with Fast\, Data-Driven Decisions
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/051922research/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/01/stock-market-data-on-tablet-2021-08-28-21-08-07-utc-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20220517T120000
DTEND;TZID=America/Los_Angeles:20220517T140000
DTSTAMP:20260407T150651
CREATED:20220317T152448Z
LAST-MODIFIED:20260203T180158Z
UID:83705-1652788800-1652796000@bdionline.com
SUMMARY:The Backbone of B2B Sales Intelligence: The Critical Role of Data & Alignment Within GTM Strategies
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/051722gtm/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220512T120000
DTEND;TZID=America/New_York:20220512T140000
DTSTAMP:20260407T150651
CREATED:20220322T185418Z
LAST-MODIFIED:20260203T180158Z
UID:83776-1652356800-1652364000@bdionline.com
SUMMARY:Success and Safety Within Your Supply Chain: Mitigating Risk With Industry Best Practices
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/051222supply/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-22-at-8.59.16-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220511T143000
DTEND;TZID=America/New_York:20220511T170000
DTSTAMP:20260407T150651
CREATED:20220316T195305Z
LAST-MODIFIED:20260203T180200Z
UID:83689-1652279400-1652288400@bdionline.com
SUMMARY:Capturing\, Hiring\, and Retaining Top Talent: Recruitment Strategies for Sustaining a Healthy Corporate Culture
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/051122hires/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-16-at-3.53.41-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220510T130000
DTEND;TZID=America/New_York:20220510T141500
DTSTAMP:20260407T150651
CREATED:20220225T224033Z
LAST-MODIFIED:20260203T180201Z
UID:83295-1652187600-1652192100@bdionline.com
SUMMARY:Optimizing the Digital Experience with Visibility for SASE: Driving a Secure Hybrid Workforce
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/041922digital/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/02/Screen-Shot-2022-02-25-at-5.41.32-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220510T120000
DTEND;TZID=America/New_York:20220510T140000
DTSTAMP:20260407T150651
CREATED:20220405T134825Z
LAST-MODIFIED:20260203T180204Z
UID:84679-1652184000-1652191200@bdionline.com
SUMMARY:Mitigating Risk Within Your Supply Chain: Enabling Safety With Compliant\, Successful Practices
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/051022supply/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/04/istockphoto-1198082588-612x612-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220509T080000
DTEND;TZID=America/New_York:20220509T170000
DTSTAMP:20260407T150651
CREATED:20220509T103015Z
LAST-MODIFIED:20260203T180205Z
UID:86462-1652083200-1652115600@bdionline.com
SUMMARY:Eliminating Cookie-Cutter Content: Personalizing at Scale with Creative Work Management- Video Content
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/workmanagementvideo-content/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220506T130000
DTEND;TZID=America/New_York:20220506T140000
DTSTAMP:20260407T150651
CREATED:20220303T202122Z
LAST-MODIFIED:20260203T180206Z
UID:83483-1651842000-1651845600@bdionline.com
SUMMARY:The True Anchor of Great Marketing: Connecting the Dots with Strategic Thought Leadership
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/050622marketing/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-03-at-3.21.39-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220505T120000
DTEND;TZID=America/New_York:20220505T131500
DTSTAMP:20260407T150651
CREATED:20220304T180453Z
LAST-MODIFIED:20260203T180206Z
UID:83517-1651752000-1651756500@bdionline.com
SUMMARY:Zeroing in on Zero Trust: Ending Cybersecurity Threat in FSI
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/050522cybersecurity/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-04-at-1.06.16-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20220505T120000
DTEND;TZID=America/Los_Angeles:20220505T131500
DTSTAMP:20260407T150651
CREATED:20220303T204234Z
LAST-MODIFIED:20260203T180207Z
UID:83506-1651752000-1651756500@bdionline.com
SUMMARY:The Untapped Potential of Type: Trends for Reinventing Brand Image in 2022
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/050522type/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-03-at-3.45.20-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220503T130000
DTEND;TZID=America/New_York:20220503T141500
DTSTAMP:20260407T150652
CREATED:20220303T162655Z
LAST-MODIFIED:20260203T180208Z
UID:83469-1651582800-1651587300@bdionline.com
SUMMARY:The Untapped Potential of Type: Trends for Reinventing Brand Image in 2022
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/050322type/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-03-at-11.30.34-AM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220503T080000
DTEND;TZID=America/New_York:20220503T170000
DTSTAMP:20260407T150652
CREATED:20220503T155121Z
LAST-MODIFIED:20260203T180210Z
UID:86289-1651564800-1651597200@bdionline.com
SUMMARY:Vulnerability-Free Code: Striking the Balance Between Speed and Security- Video Content
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/031022codevideocontent/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220429T080000
DTEND;TZID=America/New_York:20220429T170000
DTSTAMP:20260407T150652
CREATED:20220429T063324Z
LAST-MODIFIED:20260203T180212Z
UID:86139-1651219200-1651251600@bdionline.com
SUMMARY:Transforming Genomics with GPUs: Enabling Improved Outcomes in Life Sciences Research and Patient Care - Video Content
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/042022grpuvideocontent/
CATEGORIES:Event Calendar,No Header
END:VEVENT
END:VCALENDAR