BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Business Development Institute (BDI) - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://bdionline.com
X-WR-CALDESC:Events for Business Development Institute (BDI)
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20190310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20191103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200612T120000
DTEND;TZID=America/New_York:20200612T133000
DTSTAMP:20260404T121758
CREATED:20200508T182722Z
LAST-MODIFIED:20200625T154243Z
UID:48048-1591963200-1591968600@bdionline.com
SUMMARY:Securing Accelerated Transformation: Aggregating\, Analyzing\, and Modeling Critical Enterprise Data
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/061220transformation/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200616T000000
DTEND;TZID=America/New_York:20200616T133000
DTSTAMP:20260404T121758
CREATED:20200413T145757Z
LAST-MODIFIED:20200609T154602Z
UID:47098-1592265600-1592314200@bdionline.com
SUMMARY:Application Security: You Can’t Scan Your Way to Secure Code
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/061620appsecdx/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200616T120000
DTEND;TZID=America/New_York:20200616T133000
DTSTAMP:20260404T121758
CREATED:20200424T190938Z
LAST-MODIFIED:20200615T164741Z
UID:47514-1592308800-1592314200@bdionline.com
SUMMARY:Your Remote Workforce: Securing the Next Normal
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/061620workforce/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200616T120000
DTEND;TZID=America/New_York:20200616T133000
DTSTAMP:20260404T121758
CREATED:20200428T184217Z
LAST-MODIFIED:20200625T154237Z
UID:47631-1592308800-1592314200@bdionline.com
SUMMARY:Interconnected Infrastructure for Life Sciences
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/061620lifesciences/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200616T120000
DTEND;TZID=America/New_York:20200616T133000
DTSTAMP:20260404T121758
CREATED:20200430T163228Z
LAST-MODIFIED:20200609T154310Z
UID:47772-1592308800-1592314200@bdionline.com
SUMMARY:The New Normal: Real-Time Operations in a Remote Environment
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/061120remote/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200616T120000
DTEND;TZID=America/New_York:20200616T133000
DTSTAMP:20260404T121758
CREATED:20200507T193227Z
LAST-MODIFIED:20200625T154030Z
UID:47978-1592308800-1592314200@bdionline.com
SUMMARY:Emerging to The New Normal: Planning for the Post Pandemic World
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/061620normal/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200617T120000
DTEND;TZID=America/New_York:20200617T133000
DTSTAMP:20260404T121758
CREATED:20200424T191513Z
LAST-MODIFIED:20200610T144255Z
UID:47520-1592395200-1592400600@bdionline.com
SUMMARY:Your Remote Workforce: Securing the Next Normal
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/061720workforce/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200618T120000
DTEND;TZID=America/New_York:20200618T133000
DTSTAMP:20260404T121758
CREATED:20200416T201639Z
LAST-MODIFIED:20200724T150146Z
UID:47269-1592481600-1592487000@bdionline.com
SUMMARY:MarketingWorks Healthcare
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/061820marketingworks/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200618T120000
DTEND;TZID=America/New_York:20200618T133000
DTSTAMP:20260404T121758
CREATED:20200424T193148Z
LAST-MODIFIED:20200615T212717Z
UID:47526-1592481600-1592487000@bdionline.com
SUMMARY:Your Remote Workforce: Securing the Next Normal
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/061820workforce/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200618T120000
DTEND;TZID=America/New_York:20200618T133000
DTSTAMP:20260404T121758
CREATED:20200429T180102Z
LAST-MODIFIED:20200625T154011Z
UID:47727-1592481600-1592487000@bdionline.com
SUMMARY:eCommerce in the COVID Economy
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/061820ecommerce/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200623T120000
DTEND;TZID=America/New_York:20200623T133000
DTSTAMP:20260404T121758
CREATED:20200508T141318Z
LAST-MODIFIED:20200625T153959Z
UID:47999-1592913600-1592919000@bdionline.com
SUMMARY:Bridging the Gap: eCommerce in the COVID Economy
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/062320ecommerce/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200624T120000
DTEND;TZID=America/New_York:20200624T133000
DTSTAMP:20260404T121758
CREATED:20200508T161502Z
LAST-MODIFIED:20200612T195310Z
UID:48032-1593000000-1593005400@bdionline.com
SUMMARY:Bridging the Gap: eCommerce in the COVID Economy
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/062402ecommerce/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200624T120000
DTEND;TZID=America/New_York:20200624T133000
DTSTAMP:20260404T121758
CREATED:20200508T183555Z
LAST-MODIFIED:20200625T153913Z
UID:48054-1593000000-1593005400@bdionline.com
SUMMARY:Securing Accelerated Transformation: Aggregating\, Analyzing\, and Modeling Critical Enterprise Data
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/062420transformation/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200624T120000
DTEND;TZID=America/New_York:20200624T133000
DTSTAMP:20260404T121758
CREATED:20200520T140138Z
LAST-MODIFIED:20200625T153857Z
UID:48329-1593000000-1593005400@bdionline.com
SUMMARY:Identity Best Practices: Automation the Driver for the Identity Governance Journey
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/062420identity/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200625T120000
DTEND;TZID=America/New_York:20200625T133000
DTSTAMP:20260404T121758
CREATED:20200424T194154Z
LAST-MODIFIED:20200625T133928Z
UID:47532-1593086400-1593091800@bdionline.com
SUMMARY:Your Remote Workforce: Securing the Next Normal
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/062520workforce/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200625T120000
DTEND;TZID=America/New_York:20200625T133000
DTSTAMP:20260404T121758
CREATED:20200506T200135Z
LAST-MODIFIED:20200625T153242Z
UID:47931-1593086400-1593091800@bdionline.com
SUMMARY:Insurance\, Digital Collaboration and the New Normal - Beyond Video Conferencing
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/062520insurance/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200625T120000
DTEND;TZID=America/New_York:20200625T133000
DTSTAMP:20260404T121758
CREATED:20200508T184138Z
LAST-MODIFIED:20200625T153309Z
UID:48058-1593086400-1593091800@bdionline.com
SUMMARY:Securing Accelerated Transformation: Aggregating\, Analyzing\, and Modeling Critical Enterprise Data
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/062520transformation/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200713T080000
DTEND;TZID=America/New_York:20200713T170000
DTSTAMP:20260404T121758
CREATED:20200713T173600Z
LAST-MODIFIED:20200803T193948Z
UID:49477-1594627200-1594659600@bdionline.com
SUMMARY:The Enterprise Infrastructure of Work from Anywhere
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/072920enterprise-form/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200714T120000
DTEND;TZID=America/New_York:20200714T133000
DTSTAMP:20260404T121758
CREATED:20200528T170710Z
LAST-MODIFIED:20200710T134719Z
UID:48486-1594728000-1594733400@bdionline.com
SUMMARY:Pandemic as a Change Agent: Scaling Human Interaction in our New World
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/071420interaction/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200714T120000
DTEND;TZID=America/New_York:20200714T133000
DTSTAMP:20260404T121758
CREATED:20200528T195916Z
LAST-MODIFIED:20210107T193706Z
UID:48509-1594728000-1594733400@bdionline.com
SUMMARY:How Viacom Digitally Transformed their Business with Equinix and Google
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/071420transform/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200715T120000
DTEND;TZID=America/New_York:20200715T133000
DTSTAMP:20260404T121758
CREATED:20200513T195447Z
LAST-MODIFIED:20200713T185623Z
UID:48213-1594814400-1594819800@bdionline.com
SUMMARY:Healthcare Transformation: Modernizing Your Patient Experience During Covid-19 and Beyond
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/071520healthcare/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200716T120000
DTEND;TZID=America/New_York:20200716T133000
DTSTAMP:20260404T121758
CREATED:20200521T145240Z
LAST-MODIFIED:20200707T160058Z
UID:48381-1594900800-1594906200@bdionline.com
SUMMARY:The Future of Work: Digitizing Operations with Intelligent Automation
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/071620automation/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200716T120000
DTEND;TZID=America/New_York:20200716T133000
DTSTAMP:20260404T121758
CREATED:20200526T171647Z
LAST-MODIFIED:20200626T201606Z
UID:48419-1594900800-1594906200@bdionline.com
SUMMARY:Enhancing Spend Visibility During Times of Disruption
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/071620disruption/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200728T120000
DTEND;TZID=America/New_York:20200728T133000
DTSTAMP:20260404T121758
CREATED:20200616T154351Z
LAST-MODIFIED:20200708T173814Z
UID:49064-1595937600-1595943000@bdionline.com
SUMMARY:PERSONALIZED DIGITAL MARKETING AT SCALE
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/072820marketing/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200729T120000
DTEND;TZID=America/New_York:20200729T133000
DTSTAMP:20260404T121758
CREATED:20200604T150740Z
LAST-MODIFIED:20200714T185619Z
UID:48849-1596024000-1596029400@bdionline.com
SUMMARY:The Enterprise Infrastructure of Work from Anywhere
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/072920enterprise/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200729T120000
DTEND;TZID=America/New_York:20200729T133000
DTSTAMP:20260404T121758
CREATED:20200604T172553Z
LAST-MODIFIED:20200713T171352Z
UID:48879-1596024000-1596029400@bdionline.com
SUMMARY:Building Your New Digital Workplace Strategy
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/072920strategy/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200730T103000
DTEND;TZID=America/New_York:20200730T110000
DTSTAMP:20260404T121758
CREATED:20200428T172447Z
LAST-MODIFIED:20200714T152021Z
UID:47621-1596105000-1596106800@bdionline.com
SUMMARY:How PayPal Digitally Transformed their Business with Equinix and Google Cloud
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/073020payments/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200730T120000
DTEND;TZID=America/New_York:20200730T133000
DTSTAMP:20260404T121759
CREATED:20200601T170830Z
LAST-MODIFIED:20200625T153143Z
UID:48580-1596110400-1596115800@bdionline.com
SUMMARY:Building Your Content Engine
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/073020content/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200730T120000
DTEND;TZID=America/New_York:20200730T133000
DTSTAMP:20260404T121759
CREATED:20200601T183538Z
LAST-MODIFIED:20200724T135951Z
UID:48590-1596110400-1596115800@bdionline.com
SUMMARY:Email Humanization Marketing with Personalization and Empathy
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/073020humanization/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200811T120000
DTEND;TZID=America/New_York:20200811T133000
DTSTAMP:20260404T121759
CREATED:20200225T152745Z
LAST-MODIFIED:20200814T151128Z
UID:45738-1597147200-1597152600@bdionline.com
SUMMARY:Hybrid Cloud Transformation with AWS Outposts & Equinix
DESCRIPTION:The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					The Identity Imperative				\n				\n				\n				\n					The Future of Cloud Security				\n				\n				\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n				\n						\n					\n			\n						\n				\n					Lunch at Grill 23 & Bar - Boston\n\nThursday\, June 8th\n12:00 – 2:00 PM ET				\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n				\n			\n						\n				\n					Join our discussion about creating and implementing a strategy that addresses cloud security risks.				\n				\n					\n		\n					\n		\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n					\n					\n					\n				Panel\nContent\nProgram\nVenue\nSponsors\n			\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Eric Kedrosky							\n						\n													\n								Sonrai							\n											\n				\n			\n			\n			\n				\n											\n							Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n				\n			\n						\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Nick Dimtchev							\n						\n													\n								AWS							\n											\n				\n			\n			\n			\n				\n											\n							Security\, Compliance\, and Governance						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Dmitriy Sokolovskiy							\n						\n													\n								Avid 							\n											\n				\n			\n			\n			\n				\n											\n							CISO\, Avid and Lead Instructor						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sam Curry							\n						\n													\n								Zscaler							\n											\n				\n			\n			\n			\n				\n											\n							VP\, CISO						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Sonia E. Arista							\n						\n													\n								Signify Health							\n											\n				\n			\n			\n			\n				\n											\n							Senior Vice President - Chief Information Security Officer						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n				\n					\n						\n													\n								Kelley Misata							\n						\n													\n								Corelight							\n											\n				\n			\n			\n			\n				\n											\n							Senior Director\, Open Source						\n					\n											\n													\n					\n											\n							LinkedIn						\n								\n		\n		\n		\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									It’s time to stop asking ourselves ‘will they get in?’ and instead\, ‘what can they do once they’re in?’ In the cloud\, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities\, their entitlements and what data they can access is necessary to bolster any vulnerability management or cloud platform security. Join us on June 8th as our expert panel discusses the latest security strategies over lunch at Grill 23 & Bar.  								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									The dangers of not controlling identity and entitlements.The gaps CWPP and CSPM solutions can’t cover.The negative effect of ‘shifting too far left’ & DevOps identity management.How identity insights help prioritize threats based on potential business impact.And finally: how proper management of identities and access can help you pass audits with ease.								\n				\n					\n		\n					\n		\n				\n				\n																														\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n						\n					\n			\n						\n				\n					Agenda (in ET)				\n				\n				\n				\n					\n  12:00 - 12:15 Registration & Networking \n  12:15 - 12:30 Introduction of all Participants \n  12:30 - 1:15 Moderated Panel\, Audience Q/A & Lunch is Served \n  1:15 - 2:00 \nInteractive Peer-to-Peer Roundtable Discussion\n \n				\n				\n				\n				\n									12:00 – 12:15  Registration & Networking 12:15 – 12:30 Introduction of all participants 12:30 – 1:15 Moderated Panel\, Audience Q/A & Lunch is Served 1:15 – 2:00 Interactive Peer-to-Peer Roundtable Discussion 								\n				\n					\n		\n				\n			\n						\n				\n					Who's Attending				\n				\n				\n				\n									A select group of security leaders from major companies in the Boston area. 								\n				\n				\n				\n					Objectives				\n				\n				\n				\n									Walk away with a better understanding of how leading companies are enabling security strategies that fully embrace identity management.Connect and learn from peers facing the same real-life challenges as you are facing.Ask our panelists your most pressing questions.								\n				\n					\n		\n					\n		\n				\n				\n							\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n		\n					\n					\n			\n						\n				\n					About the Venue				\n				\n				\n				\n					Grill 23 & Bar				\n				\n				\n				\n									161 Berkeley St\, Boston\, MA 02116 Proudly independent since 1983\, Grill 23 & Bar has been bringing unrivaled steak\, seafood and service to Boston for decades\, with a Grand Award-winning wine list that is quite literally better every day. When it comes to steakhouses\, there’s only one Grill 23 https://www.grill23.com/   								\n				\n				\n				\n							\n			\n											\n												\n											\n					\n											\n				\n									\n									\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n		\n				\n			\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n									\n				\n				\n				\n							\n			\n						\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsors				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Sonrai offers a total public cloud security solution for Amazon Web Services\, Microsoft Azure\, Google Cloud Platform\, and Oracle Cloud. Sonrai Dig identifies and monitors all relationships between workloads\, identities\, and data stores that exist within your various cloud platforms to provide security teams a continuous view of all risks\, unusual activity and automated remediations. The company\, named a 2021 Gartner Cool Vendor\, has offices in New York and New Brunswick\, Canada and is backed by ISTARI\, Menlo Ventures\, Polaris Partners\, and TenEleven Ventures. For more information\, visit https://sonraisecurity.com/ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud\, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups\, largest enterprises\, and leading government agencies—are using AWS to lower costs\, become more agile\, and innovate faster. For more information\, visit https://aws.amazon.com/ 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders.
URL:https://bdionline.com/event/081120cloud/
END:VEVENT
END:VCALENDAR