BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Business Development Institute (BDI) - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Business Development Institute (BDI)
X-ORIGINAL-URL:https://bdionline.com
X-WR-CALDESC:Events for Business Development Institute (BDI)
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Santiago
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:-04
DTSTART:20210404T030000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:-03
DTSTART:20210905T040000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:-04
DTSTART:20220403T030000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:-03
DTSTART:20220911T040000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:-04
DTSTART:20230402T030000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:-03
DTSTART:20230903T040000
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20210314T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20211107T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20220313T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20221106T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20230312T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20231105T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20210314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20211107T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20220313T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20221106T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20230312T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20231105T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221018T120000
DTEND;TZID=America/New_York:20221018T140000
DTSTAMP:20260403T160016
CREATED:20220928T190914Z
LAST-MODIFIED:20260203T180146Z
UID:88661-1666094400-1666101600@bdionline.com
SUMMARY:The future of the workplace: Making strategic investments in next-generation leaders
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/101822_handshake_chicago/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/09/arlington-research-kN_kViDchA0-unsplash-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221006T130000
DTEND;TZID=America/New_York:20221006T141500
DTSTAMP:20260403T160016
CREATED:20220826T173123Z
LAST-MODIFIED:20260203T180148Z
UID:86648-1665061200-1665065700@bdionline.com
SUMMARY:Social media as the new service differentiator: Boost reputation and drive loyalty
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/100622serviceprogram/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220914T080000
DTEND;TZID=America/New_York:20220914T170000
DTSTAMP:20260403T160016
CREATED:20220914T174939Z
LAST-MODIFIED:20260203T180149Z
UID:87316-1663142400-1663174800@bdionline.com
SUMMARY:LiveWorld RSVP
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/10-06-22-liveworld-rsvp/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220904T000000
DTEND;TZID=America/New_York:20220904T000000
DTSTAMP:20260403T160016
CREATED:20221004T183553Z
LAST-MODIFIED:20260203T180150Z
UID:88945-1662249600-1662249600@bdionline.com
SUMMARY:11.2 RollWorks ABM-ify Your Revenue Strategy
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/11-2-rollworks-abm-ify/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Santiago:20220628T120000
DTEND;TZID=America/Santiago:20220628T120000
DTSTAMP:20260403T160016
CREATED:20220422T170336Z
LAST-MODIFIED:20260203T180152Z
UID:85777-1656417600-1656417600@bdionline.com
SUMMARY:Frictionless Fraud Protection: Adopting Automation for a Secure eCommerce Experience
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/062822fraudprotection/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/04/Screen-Shot-2022-04-22-at-8.11.26-PM.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220524T130000
DTEND;TZID=America/New_York:20220524T141500
DTSTAMP:20260403T160016
CREATED:20220202T155618Z
LAST-MODIFIED:20260203T180153Z
UID:82093-1653397200-1653401700@bdionline.com
SUMMARY:Transforming eCommerce with Automation: Turning Online Shopping into a Visual Experience
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/052422commerce/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220520T120000
DTEND;TZID=America/New_York:20220520T131500
DTSTAMP:20260403T160016
CREATED:20220304T144243Z
LAST-MODIFIED:20260203T180155Z
UID:83510-1653048000-1653052500@bdionline.com
SUMMARY:The Untapped Potential of Type: Trends for Reinventing Brand Image in 2022
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/052022type/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-04-at-9.41.24-AM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220519T130000
DTEND;TZID=America/New_York:20220519T141500
DTSTAMP:20260403T160016
CREATED:20220119T142525Z
LAST-MODIFIED:20260203T180157Z
UID:81201-1652965200-1652969700@bdionline.com
SUMMARY:Modernizing B2B Market Research: Optimizing Your Pipeline with Fast\, Data-Driven Decisions
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/051922research/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/01/stock-market-data-on-tablet-2021-08-28-21-08-07-utc-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20220517T120000
DTEND;TZID=America/Los_Angeles:20220517T140000
DTSTAMP:20260403T160016
CREATED:20220317T152448Z
LAST-MODIFIED:20260203T180158Z
UID:83705-1652788800-1652796000@bdionline.com
SUMMARY:The Backbone of B2B Sales Intelligence: The Critical Role of Data & Alignment Within GTM Strategies
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/051722gtm/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220512T120000
DTEND;TZID=America/New_York:20220512T140000
DTSTAMP:20260403T160016
CREATED:20220322T185418Z
LAST-MODIFIED:20260203T180158Z
UID:83776-1652356800-1652364000@bdionline.com
SUMMARY:Success and Safety Within Your Supply Chain: Mitigating Risk With Industry Best Practices
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/051222supply/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-22-at-8.59.16-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220511T143000
DTEND;TZID=America/New_York:20220511T170000
DTSTAMP:20260403T160016
CREATED:20220316T195305Z
LAST-MODIFIED:20260203T180200Z
UID:83689-1652279400-1652288400@bdionline.com
SUMMARY:Capturing\, Hiring\, and Retaining Top Talent: Recruitment Strategies for Sustaining a Healthy Corporate Culture
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/051122hires/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-16-at-3.53.41-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220510T130000
DTEND;TZID=America/New_York:20220510T141500
DTSTAMP:20260403T160016
CREATED:20220225T224033Z
LAST-MODIFIED:20260203T180201Z
UID:83295-1652187600-1652192100@bdionline.com
SUMMARY:Optimizing the Digital Experience with Visibility for SASE: Driving a Secure Hybrid Workforce
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/041922digital/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/02/Screen-Shot-2022-02-25-at-5.41.32-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220510T120000
DTEND;TZID=America/New_York:20220510T140000
DTSTAMP:20260403T160016
CREATED:20220405T134825Z
LAST-MODIFIED:20260203T180204Z
UID:84679-1652184000-1652191200@bdionline.com
SUMMARY:Mitigating Risk Within Your Supply Chain: Enabling Safety With Compliant\, Successful Practices
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/051022supply/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/04/istockphoto-1198082588-612x612-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220509T080000
DTEND;TZID=America/New_York:20220509T170000
DTSTAMP:20260403T160016
CREATED:20220509T103015Z
LAST-MODIFIED:20260203T180205Z
UID:86462-1652083200-1652115600@bdionline.com
SUMMARY:Eliminating Cookie-Cutter Content: Personalizing at Scale with Creative Work Management- Video Content
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/workmanagementvideo-content/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220506T130000
DTEND;TZID=America/New_York:20220506T140000
DTSTAMP:20260403T160016
CREATED:20220303T202122Z
LAST-MODIFIED:20260203T180206Z
UID:83483-1651842000-1651845600@bdionline.com
SUMMARY:The True Anchor of Great Marketing: Connecting the Dots with Strategic Thought Leadership
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/050622marketing/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-03-at-3.21.39-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220505T120000
DTEND;TZID=America/New_York:20220505T131500
DTSTAMP:20260403T160016
CREATED:20220304T180453Z
LAST-MODIFIED:20260203T180206Z
UID:83517-1651752000-1651756500@bdionline.com
SUMMARY:Zeroing in on Zero Trust: Ending Cybersecurity Threat in FSI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/050522cybersecurity/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-04-at-1.06.16-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20220505T120000
DTEND;TZID=America/Los_Angeles:20220505T131500
DTSTAMP:20260403T160016
CREATED:20220303T204234Z
LAST-MODIFIED:20260203T180207Z
UID:83506-1651752000-1651756500@bdionline.com
SUMMARY:The Untapped Potential of Type: Trends for Reinventing Brand Image in 2022
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/050522type/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-03-at-3.45.20-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220503T130000
DTEND;TZID=America/New_York:20220503T141500
DTSTAMP:20260403T160016
CREATED:20220303T162655Z
LAST-MODIFIED:20260203T180208Z
UID:83469-1651582800-1651587300@bdionline.com
SUMMARY:The Untapped Potential of Type: Trends for Reinventing Brand Image in 2022
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/050322type/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-03-at-11.30.34-AM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220503T080000
DTEND;TZID=America/New_York:20220503T170000
DTSTAMP:20260403T160016
CREATED:20220503T155121Z
LAST-MODIFIED:20260203T180210Z
UID:86289-1651564800-1651597200@bdionline.com
SUMMARY:Vulnerability-Free Code: Striking the Balance Between Speed and Security- Video Content
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/031022codevideocontent/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220429T080000
DTEND;TZID=America/New_York:20220429T170000
DTSTAMP:20260403T160016
CREATED:20220429T063324Z
LAST-MODIFIED:20260203T180212Z
UID:86139-1651219200-1651251600@bdionline.com
SUMMARY:Transforming Genomics with GPUs: Enabling Improved Outcomes in Life Sciences Research and Patient Care - Video Content
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/042022grpuvideocontent/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20220427T120000
DTEND;TZID=America/Los_Angeles:20220427T140000
DTSTAMP:20260403T160016
CREATED:20220225T161624Z
LAST-MODIFIED:20260203T180215Z
UID:83236-1651060800-1651068000@bdionline.com
SUMMARY:Success and Safety Within Your Supply Chain: Mitigating Risk With Industry Best Practices
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/042722supply/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/02/pexels-chanaka-906494-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220426T120000
DTEND;TZID=America/New_York:20220426T140000
DTSTAMP:20260403T160016
CREATED:20220222T215721Z
LAST-MODIFIED:20260203T180216Z
UID:83079-1650974400-1650981600@bdionline.com
SUMMARY:Perfecting Cross-Channel Engagement: Meeting Customers Where They Are to Transform CX
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/042622engagement/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/02/pexels-roberto-vivancos-2190283-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220426T080000
DTEND;TZID=America/New_York:20220426T170000
DTSTAMP:20260403T160016
CREATED:20220426T082551Z
LAST-MODIFIED:20260203T180218Z
UID:85891-1650960000-1650992400@bdionline.com
SUMMARY:Migrating Virtual Estates to the Cloud: Accelerating Infrastructure Migration at Scale - Video Content
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/040722cloudmigrationvideo-content/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20220421T120000
DTEND;TZID=America/Chicago:20220421T140000
DTSTAMP:20260403T160016
CREATED:20220215T221524Z
LAST-MODIFIED:20260203T180219Z
UID:82884-1650542400-1650549600@bdionline.com
SUMMARY:Success and Safety Within Your Supply Chain: Mitigating Risk With Industry Best Practices
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/042122supply/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/02/pexels-chanaka-906494-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220420T130000
DTEND;TZID=America/New_York:20220420T141500
DTSTAMP:20260403T160017
CREATED:20220310T194231Z
LAST-MODIFIED:20260203T180221Z
UID:83543-1650459600-1650464100@bdionline.com
SUMMARY:Transforming Genomics with GPUs: Enabling Improved Outcomes in Life Sciences Research and Patient Care
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/042022gpu/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-10-at-5.12.17-PM-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220420T080000
DTEND;TZID=America/New_York:20220420T170000
DTSTAMP:20260403T160017
CREATED:20220420T082502Z
LAST-MODIFIED:20260203T180223Z
UID:85701-1650441600-1650474000@bdionline.com
SUMMARY:No Cookies\, No Problem: Future-proof Marketing Strategies for Growth LA - Video Content
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/032222cookieslavideo-content/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220420T080000
DTEND;TZID=America/New_York:20220420T170000
DTSTAMP:20260403T160017
CREATED:20220420T072328Z
LAST-MODIFIED:20260203T180225Z
UID:85632-1650441600-1650474000@bdionline.com
SUMMARY:No Cookies\, No Problem: Future-proof Marketing Strategies for Growth - Video Content
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/031522cookiesnyvideo-content/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220419T130000
DTEND;TZID=America/New_York:20220419T141500
DTSTAMP:20260403T160017
CREATED:20220226T001617Z
LAST-MODIFIED:20260203T180226Z
UID:83304-1650373200-1650377700@bdionline.com
SUMMARY:ABM-ify Your Revenue Strategy: Your Secret Weapon for Sales and Marketing Success
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/041922abm/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/02/Screen-Shot-2022-02-25-at-7.17.23-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220415T080000
DTEND;TZID=America/New_York:20220415T170000
DTSTAMP:20260403T160017
CREATED:20220415T174059Z
LAST-MODIFIED:20260203T180228Z
UID:85295-1650009600-1650042000@bdionline.com
SUMMARY:Reevaluating Your Org’s Financial Health: How to Come Out on Top in 2022 - Video Content
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/financialhealthvideo-content/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20220412T120000
DTEND;TZID=America/Chicago:20220412T131500
DTSTAMP:20260403T160017
CREATED:20220303T174436Z
LAST-MODIFIED:20260203T180231Z
UID:83473-1649764800-1649769300@bdionline.com
SUMMARY:Re-Imagining Your Content Moderation Strategy: Achieving Marketing Objectives Beyond Brand Protection
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/042722content/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-03-at-12.52.48-PM.png
END:VEVENT
END:VCALENDAR