BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Business Development Institute (BDI) - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Business Development Institute (BDI)
X-ORIGINAL-URL:https://bdionline.com
X-WR-CALDESC:Events for Business Development Institute (BDI)
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20230312T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20231105T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20240310T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20241103T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20250309T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20251102T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240919T120000
DTEND;TZID=America/New_York:20240919T140000
DTSTAMP:20260407T110545
CREATED:20240717T191037Z
LAST-MODIFIED:20260203T172925Z
UID:104223-1726747200-1726754400@bdionline.com
SUMMARY:Enterprise Data & GenAI Workshop with NVIDIA & HPE
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/091924/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/07/HPE-NVIDIA-MUSEAM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240918T120000
DTEND;TZID=America/New_York:20240918T140000
DTSTAMP:20260407T110545
CREATED:20240802T154240Z
LAST-MODIFIED:20260203T172927Z
UID:105196-1726660800-1726668000@bdionline.com
SUMMARY:Equinix Engage: Real-World Insights From Today’s Leaders in AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/091824/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/EquinixFeaturedImageDC.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240917T120000
DTEND;TZID=America/New_York:20240917T150000
DTSTAMP:20260407T110545
CREATED:20240719T172937Z
LAST-MODIFIED:20260203T172928Z
UID:104324-1726574400-1726585200@bdionline.com
SUMMARY:Enterprise Data & GenAI Workshop with NVIDIA & HPE
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/091724/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/07/HPE-NVIDIA-GRAD-CENTER.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240807T120000
DTEND;TZID=America/New_York:20240807T140000
DTSTAMP:20260407T110545
CREATED:20240607T203723Z
LAST-MODIFIED:20260203T172930Z
UID:104082-1723032000-1723039200@bdionline.com
SUMMARY:Harnessing the Power of GenAI in Your Marketing
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/080724/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2024/06/Adobe-Cinni.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240731T120000
DTEND;TZID=America/New_York:20240731T140000
DTSTAMP:20260407T110545
CREATED:20240607T193111Z
LAST-MODIFIED:20260203T172931Z
UID:104032-1722427200-1722434400@bdionline.com
SUMMARY:Enterprise Data & Gen AI ​
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/073124/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2023/07/HPE-AMD-NYC-FeaturedImage.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240730T120000
DTEND;TZID=America/New_York:20240730T140000
DTSTAMP:20260407T110545
CREATED:20240607T194904Z
LAST-MODIFIED:20260203T172933Z
UID:104051-1722340800-1722348000@bdionline.com
SUMMARY:Harnessing the Power of GenAI in Your Marketing
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/073024/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2024/06/Adobe_Pittsburgh-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240613T120000
DTEND;TZID=America/New_York:20240613T140000
DTSTAMP:20260407T110545
CREATED:20240416T182813Z
LAST-MODIFIED:20260203T172934Z
UID:103483-1718280000-1718287200@bdionline.com
SUMMARY:Transforming Work in the Age of AI for Marketing
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/061324/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/04/Adobe-Chicago.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240606T120000
DTEND;TZID=America/New_York:20240606T140000
DTSTAMP:20260407T110545
CREATED:20240318T175920Z
LAST-MODIFIED:20260203T172935Z
UID:102435-1717675200-1717682400@bdionline.com
SUMMARY:Data and AI: Setting Up Your IT Infrastructure for Success
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/060624/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/digital-realty-palo-alto.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240605T120000
DTEND;TZID=America/New_York:20240605T140000
DTSTAMP:20260407T110545
CREATED:20240409T213139Z
LAST-MODIFIED:20260203T172936Z
UID:103302-1717588800-1717596000@bdionline.com
SUMMARY:Transforming Work in the Age of AI for Marketing 
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/06052024/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/04/Adobe-Atlanta.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240604T130000
DTEND;TZID=America/New_York:20240604T140000
DTSTAMP:20260407T110545
CREATED:20240507T174317Z
LAST-MODIFIED:20260203T172937Z
UID:103777-1717506000-1717509600@bdionline.com
SUMMARY:B2B ABM Field Marketing Event Roundtable - The Adobe Case Study
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/060424/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/05/bdi-adobe-preview-imafge.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240530T120000
DTEND;TZID=America/New_York:20240530T140000
DTSTAMP:20260407T110546
CREATED:20240318T150232Z
LAST-MODIFIED:20260203T172938Z
UID:102265-1717070400-1717077600@bdionline.com
SUMMARY:Data and AI: Setting Up Your IT Infrastructure for Success
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/053024/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/Digital-Reality-tysons.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240522T120000
DTEND;TZID=America/New_York:20240522T140000
DTSTAMP:20260407T110546
CREATED:20240325T195536Z
LAST-MODIFIED:20260203T172939Z
UID:102788-1716379200-1716386400@bdionline.com
SUMMARY:Enterprise Data & Gen AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/052224/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/HPE-CONRES-NVIDIA.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240521T120000
DTEND;TZID=America/New_York:20240521T140000
DTSTAMP:20260407T110546
CREATED:20240402T211248Z
LAST-MODIFIED:20260203T172940Z
UID:103115-1716292800-1716300000@bdionline.com
SUMMARY:Transforming Work in the Age of AI for Marketing 
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/052124/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/04/Adobe-nyc.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240516T120000
DTEND;TZID=America/New_York:20240516T140000
DTSTAMP:20260407T110546
CREATED:20240321T215952Z
LAST-MODIFIED:20260203T172942Z
UID:102653-1715860800-1715868000@bdionline.com
SUMMARY:Transforming Work in the Age of AI for Tech & Product Management
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/051624/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/Adobe-Dallas.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240515T120000
DTEND;TZID=America/New_York:20240515T140000
DTSTAMP:20260407T110546
CREATED:20240321T174159Z
LAST-MODIFIED:20260203T172943Z
UID:102592-1715774400-1715781600@bdionline.com
SUMMARY:Transforming Work in the Age of AI for Marketing 
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/051524/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/Adobe-Dallas.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240502T120000
DTEND;TZID=America/New_York:20240502T150000
DTSTAMP:20260407T110546
CREATED:20240326T180245Z
LAST-MODIFIED:20260203T172944Z
UID:102862-1714651200-1714662000@bdionline.com
SUMMARY:Enterprise Data & GenAI at NVIDIA
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/050224-2/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/hpe-nvidia-preview.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240502T120000
DTEND;TZID=America/New_York:20240502T140000
DTSTAMP:20260407T110546
CREATED:20240308T205846Z
LAST-MODIFIED:20260203T172945Z
UID:102078-1714651200-1714658400@bdionline.com
SUMMARY:Harnessing the Power of GenAI in Your Marketing
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/050224/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/adoobe-miami.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240430T120000
DTEND;TZID=America/New_York:20240430T140000
DTSTAMP:20260407T110546
CREATED:20240307T202615Z
LAST-MODIFIED:20260203T172947Z
UID:101922-1714478400-1714485600@bdionline.com
SUMMARY:Harnessing the Power of GenAI in Your Marketing
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/04302024/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/Adobe-Denverpreview-.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240430T120000
DTEND;TZID=America/New_York:20240430T140000
DTSTAMP:20260407T110546
CREATED:20240306T195829Z
LAST-MODIFIED:20260203T172948Z
UID:101788-1714478400-1714485600@bdionline.com
SUMMARY:Hybrid Cloud for Enterprise GenAI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/043024/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/Microsoft-hpe-preview-image.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240425T120000
DTEND;TZID=America/New_York:20240425T140000
DTSTAMP:20260407T110546
CREATED:20240307T214316Z
LAST-MODIFIED:20260203T172950Z
UID:101975-1714046400-1714053600@bdionline.com
SUMMARY:Harnessing the Power of GenAI in Your Marketing
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/042524/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/Adobe-Boston.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240418T120000
DTEND;TZID=America/New_York:20240418T140000
DTSTAMP:20260407T110546
CREATED:20240304T195624Z
LAST-MODIFIED:20260203T172952Z
UID:101639-1713441600-1713448800@bdionline.com
SUMMARY:Enterprise Automation in the Age of AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/041824/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/Automation-Anywhere.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240327T120000
DTEND;TZID=America/New_York:20240327T140000
DTSTAMP:20260407T110546
CREATED:20240123T230632Z
LAST-MODIFIED:20260203T172953Z
UID:100934-1711540800-1711548000@bdionline.com
SUMMARY:Enterprise Data & Gen AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/032724/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2023/07/HPE-AMD-NYC-FeaturedImage.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240321T120000
DTEND;TZID=America/New_York:20240321T140000
DTSTAMP:20260407T110546
CREATED:20240117T175003Z
LAST-MODIFIED:20260203T172955Z
UID:100494-1711022400-1711029600@bdionline.com
SUMMARY:Enterprise Infrastructure in the Age of AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/032124/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2023/06/preveiw-imageadient-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240314T173000
DTEND;TZID=America/New_York:20240314T200000
DTSTAMP:20260407T110546
CREATED:20240109T233339Z
LAST-MODIFIED:20260203T172956Z
UID:100241-1710437400-1710446400@bdionline.com
SUMMARY:Data Infrastructure in the Age of AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/031424/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/01/pingcappreview.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240306T120000
DTEND;TZID=America/New_York:20240306T140000
DTSTAMP:20260407T110546
CREATED:20240108T222330Z
LAST-MODIFIED:20260203T172958Z
UID:99976-1709726400-1709733600@bdionline.com
SUMMARY:The Rise of Social Video in the Age of AI for Pharma
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/030624/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/01/Liveworld-Preview-image.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240229T120000
DTEND;TZID=America/New_York:20240229T140000
DTSTAMP:20260407T110546
CREATED:20240124T175602Z
LAST-MODIFIED:20260203T173002Z
UID:101052-1709208000-1709215200@bdionline.com
SUMMARY:Harnessing the Power of GenAI in Your Marketing
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/022924/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/01/adobe-atlanta-preview-image.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240227T120000
DTEND;TZID=America/New_York:20240227T140000
DTSTAMP:20260407T110546
CREATED:20240119T171008Z
LAST-MODIFIED:20260203T173010Z
UID:100707-1709035200-1709042400@bdionline.com
SUMMARY:Harnessing the Power of GenAI in Your Marketing
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/022724/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/01/Adobe-Dallas.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240222T120000
DTEND;TZID=America/Los_Angeles:20240222T140000
DTSTAMP:20260407T110546
CREATED:20240101T170019Z
LAST-MODIFIED:20260203T173012Z
UID:98861-1708603200-1708610400@bdionline.com
SUMMARY:Beyond the Buzzword: Operationalizing Generative AI for Growth
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/022224/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2023/10/adobe-palo-alto-image.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231212T120000
DTEND;TZID=America/New_York:20231212T140000
DTSTAMP:20260407T110546
CREATED:20231012T200244Z
LAST-MODIFIED:20260203T173015Z
UID:99069-1702382400-1702389600@bdionline.com
SUMMARY:Generative AI & the Enterprise
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/121223hpe/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2023/10/HPE-LA.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231212T120000
DTEND;TZID=America/New_York:20231212T140000
DTSTAMP:20260407T110546
CREATED:20231010T210822Z
LAST-MODIFIED:20260203T173016Z
UID:98957-1702382400-1702389600@bdionline.com
SUMMARY:Digital Transformation in the Age of AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/121223/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2023/06/preveiw-imageadient-1.png
END:VEVENT
END:VCALENDAR