BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Business Development Institute (BDI) - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Business Development Institute (BDI)
X-ORIGINAL-URL:https://bdionline.com
X-WR-CALDESC:Events for Business Development Institute (BDI)
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20230312T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20231105T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20240310T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20241103T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20250309T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20251102T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Toronto
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241029T173000
DTEND;TZID=America/New_York:20241029T200000
DTSTAMP:20260407T072557
CREATED:20240906T183058Z
LAST-MODIFIED:20260203T172903Z
UID:106819-1730223000-1730232000@bdionline.com
SUMMARY:GenAI Roundtable for Enterprise Innovation - An Executive Dinner & Wine Tasting for Technology Leaders
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/102924/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/09/AMD-CHICAGO.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241024T173000
DTEND;TZID=America/New_York:20241024T200000
DTSTAMP:20260407T072557
CREATED:20240821T175730Z
LAST-MODIFIED:20260203T172905Z
UID:106228-1729791000-1729800000@bdionline.com
SUMMARY:Equinix Engage: Real-World Insights From Today’s Leaders In AI
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/102424/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/Equinix-Boston1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241024T120000
DTEND;TZID=America/New_York:20241024T140000
DTSTAMP:20260407T072557
CREATED:20240925T180259Z
LAST-MODIFIED:20260203T172907Z
UID:107382-1729771200-1729778400@bdionline.com
SUMMARY:Equinix Engage: Real-World Insights From Today’s Leaders In AI
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/102424equinix/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/Equinix-Boston1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241023T120000
DTEND;TZID=America/New_York:20241023T140000
DTSTAMP:20260407T072557
CREATED:20240917T192844Z
LAST-MODIFIED:20260203T172908Z
UID:107016-1729684800-1729692000@bdionline.com
SUMMARY:Harnessing The Power Of GenAI In Your Marketing
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/102324/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/09/adobe-minneapolis.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241022T173000
DTEND;TZID=America/New_York:20241022T200000
DTSTAMP:20260407T072557
CREATED:20240903T194726Z
LAST-MODIFIED:20260203T172910Z
UID:106536-1729618200-1729627200@bdionline.com
SUMMARY:GenAI Roundtable for Enterprise Innovation - An Executive Dinner & Wine Tasting for Technology Leaders
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/102224/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/09/AMD-PALO-ALTO.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241017T120000
DTEND;TZID=America/New_York:20241017T140000
DTSTAMP:20260407T072557
CREATED:20240815T185222Z
LAST-MODIFIED:20260203T172912Z
UID:105951-1729166400-1729173600@bdionline.com
SUMMARY:Data and AI: Setting Up Your IT Infrastructure For Success
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/101724/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/Digital-Realty-.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241016T120000
DTEND;TZID=America/New_York:20241016T140000
DTSTAMP:20260407T072557
CREATED:20240819T174806Z
LAST-MODIFIED:20260203T172914Z
UID:106076-1729080000-1729087200@bdionline.com
SUMMARY:Hybrid Cloud Virtualization in the Age of AI
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/101624/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/HPE-Microsfot-INTEL-NYC-.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241010T120000
DTEND;TZID=America/New_York:20241010T140000
DTSTAMP:20260407T072557
CREATED:20240813T030451Z
LAST-MODIFIED:20260203T172918Z
UID:105708-1728561600-1728568800@bdionline.com
SUMMARY:Data And AI: Setting Up Your IT Infrastructure For Success
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/101024/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/Digital-Realty-.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20241008T120000
DTEND;TZID=America/Los_Angeles:20241008T140000
DTSTAMP:20260407T072557
CREATED:20240813T150659Z
LAST-MODIFIED:20260203T172919Z
UID:105731-1728388800-1728396000@bdionline.com
SUMMARY:Harnessing the Power of GenAI in Your Marketing
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/100824/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/AdobeSeattle.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Toronto:20240924T120000
DTEND;TZID=America/Toronto:20240924T140000
DTSTAMP:20260407T072557
CREATED:20240802T150807Z
LAST-MODIFIED:20260203T172923Z
UID:105172-1727179200-1727186400@bdionline.com
SUMMARY:Equinix Engage: Real-World Insights From Today’s Leaders in AI
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/092424/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/EquinixFeaturedImageToronto-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240919T120000
DTEND;TZID=America/New_York:20240919T140000
DTSTAMP:20260407T072557
CREATED:20240717T191037Z
LAST-MODIFIED:20260203T172925Z
UID:104223-1726747200-1726754400@bdionline.com
SUMMARY:Enterprise Data & GenAI Workshop with NVIDIA & HPE
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/091924/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/07/HPE-NVIDIA-MUSEAM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240918T120000
DTEND;TZID=America/New_York:20240918T140000
DTSTAMP:20260407T072558
CREATED:20240802T154240Z
LAST-MODIFIED:20260203T172927Z
UID:105196-1726660800-1726668000@bdionline.com
SUMMARY:Equinix Engage: Real-World Insights From Today’s Leaders in AI
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/091824/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/EquinixFeaturedImageDC.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240917T120000
DTEND;TZID=America/New_York:20240917T150000
DTSTAMP:20260407T072558
CREATED:20240719T172937Z
LAST-MODIFIED:20260203T172928Z
UID:104324-1726574400-1726585200@bdionline.com
SUMMARY:Enterprise Data & GenAI Workshop with NVIDIA & HPE
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/091724/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/07/HPE-NVIDIA-GRAD-CENTER.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240807T120000
DTEND;TZID=America/New_York:20240807T140000
DTSTAMP:20260407T072558
CREATED:20240607T203723Z
LAST-MODIFIED:20260203T172930Z
UID:104082-1723032000-1723039200@bdionline.com
SUMMARY:Harnessing the Power of GenAI in Your Marketing
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/080724/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2024/06/Adobe-Cinni.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240731T120000
DTEND;TZID=America/New_York:20240731T140000
DTSTAMP:20260407T072558
CREATED:20240607T193111Z
LAST-MODIFIED:20260203T172931Z
UID:104032-1722427200-1722434400@bdionline.com
SUMMARY:Enterprise Data & Gen AI ​
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/073124/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2023/07/HPE-AMD-NYC-FeaturedImage.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240730T120000
DTEND;TZID=America/New_York:20240730T140000
DTSTAMP:20260407T072558
CREATED:20240607T194904Z
LAST-MODIFIED:20260203T172933Z
UID:104051-1722340800-1722348000@bdionline.com
SUMMARY:Harnessing the Power of GenAI in Your Marketing
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/073024/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2024/06/Adobe_Pittsburgh-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240613T120000
DTEND;TZID=America/New_York:20240613T140000
DTSTAMP:20260407T072558
CREATED:20240416T182813Z
LAST-MODIFIED:20260203T172934Z
UID:103483-1718280000-1718287200@bdionline.com
SUMMARY:Transforming Work in the Age of AI for Marketing
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/061324/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/04/Adobe-Chicago.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240606T120000
DTEND;TZID=America/New_York:20240606T140000
DTSTAMP:20260407T072558
CREATED:20240318T175920Z
LAST-MODIFIED:20260203T172935Z
UID:102435-1717675200-1717682400@bdionline.com
SUMMARY:Data and AI: Setting Up Your IT Infrastructure for Success
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/060624/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/digital-realty-palo-alto.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240605T120000
DTEND;TZID=America/New_York:20240605T140000
DTSTAMP:20260407T072558
CREATED:20240409T213139Z
LAST-MODIFIED:20260203T172936Z
UID:103302-1717588800-1717596000@bdionline.com
SUMMARY:Transforming Work in the Age of AI for Marketing 
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/06052024/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/04/Adobe-Atlanta.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240604T130000
DTEND;TZID=America/New_York:20240604T140000
DTSTAMP:20260407T072558
CREATED:20240507T174317Z
LAST-MODIFIED:20260203T172937Z
UID:103777-1717506000-1717509600@bdionline.com
SUMMARY:B2B ABM Field Marketing Event Roundtable - The Adobe Case Study
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/060424/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/05/bdi-adobe-preview-imafge.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240530T120000
DTEND;TZID=America/New_York:20240530T140000
DTSTAMP:20260407T072558
CREATED:20240318T150232Z
LAST-MODIFIED:20260203T172938Z
UID:102265-1717070400-1717077600@bdionline.com
SUMMARY:Data and AI: Setting Up Your IT Infrastructure for Success
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/053024/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/Digital-Reality-tysons.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240522T120000
DTEND;TZID=America/New_York:20240522T140000
DTSTAMP:20260407T072558
CREATED:20240325T195536Z
LAST-MODIFIED:20260203T172939Z
UID:102788-1716379200-1716386400@bdionline.com
SUMMARY:Enterprise Data & Gen AI
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/052224/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/HPE-CONRES-NVIDIA.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240521T120000
DTEND;TZID=America/New_York:20240521T140000
DTSTAMP:20260407T072558
CREATED:20240402T211248Z
LAST-MODIFIED:20260203T172940Z
UID:103115-1716292800-1716300000@bdionline.com
SUMMARY:Transforming Work in the Age of AI for Marketing 
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/052124/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/04/Adobe-nyc.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240516T120000
DTEND;TZID=America/New_York:20240516T140000
DTSTAMP:20260407T072558
CREATED:20240321T215952Z
LAST-MODIFIED:20260203T172942Z
UID:102653-1715860800-1715868000@bdionline.com
SUMMARY:Transforming Work in the Age of AI for Tech & Product Management
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/051624/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/Adobe-Dallas.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240515T120000
DTEND;TZID=America/New_York:20240515T140000
DTSTAMP:20260407T072558
CREATED:20240321T174159Z
LAST-MODIFIED:20260203T172943Z
UID:102592-1715774400-1715781600@bdionline.com
SUMMARY:Transforming Work in the Age of AI for Marketing 
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/051524/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/Adobe-Dallas.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240502T120000
DTEND;TZID=America/New_York:20240502T150000
DTSTAMP:20260407T072558
CREATED:20240326T180245Z
LAST-MODIFIED:20260203T172944Z
UID:102862-1714651200-1714662000@bdionline.com
SUMMARY:Enterprise Data & GenAI at NVIDIA
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/050224-2/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/hpe-nvidia-preview.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240502T120000
DTEND;TZID=America/New_York:20240502T140000
DTSTAMP:20260407T072558
CREATED:20240308T205846Z
LAST-MODIFIED:20260203T172945Z
UID:102078-1714651200-1714658400@bdionline.com
SUMMARY:Harnessing the Power of GenAI in Your Marketing
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/050224/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/adoobe-miami.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240430T120000
DTEND;TZID=America/New_York:20240430T140000
DTSTAMP:20260407T072558
CREATED:20240307T202615Z
LAST-MODIFIED:20260203T172947Z
UID:101922-1714478400-1714485600@bdionline.com
SUMMARY:Harnessing the Power of GenAI in Your Marketing
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/04302024/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/Adobe-Denverpreview-.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240430T120000
DTEND;TZID=America/New_York:20240430T140000
DTSTAMP:20260407T072558
CREATED:20240306T195829Z
LAST-MODIFIED:20260203T172948Z
UID:101788-1714478400-1714485600@bdionline.com
SUMMARY:Hybrid Cloud for Enterprise GenAI
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/043024/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/Microsoft-hpe-preview-image.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240425T120000
DTEND;TZID=America/New_York:20240425T140000
DTSTAMP:20260407T072558
CREATED:20240307T214316Z
LAST-MODIFIED:20260203T172950Z
UID:101975-1714046400-1714053600@bdionline.com
SUMMARY:Harnessing the Power of GenAI in Your Marketing
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/042524/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/Adobe-Boston.png
END:VEVENT
END:VCALENDAR