BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Business Development Institute (BDI) - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Business Development Institute (BDI)
X-ORIGINAL-URL:https://bdionline.com
X-WR-CALDESC:Events for Business Development Institute (BDI)
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20230312T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20231105T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20240310T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20241103T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20250309T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20251102T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Toronto
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250212T120000
DTEND;TZID=America/New_York:20250212T140000
DTSTAMP:20260404T152427
CREATED:20250106T225503Z
LAST-MODIFIED:20260203T172759Z
UID:108317-1739361600-1739368800@bdionline.com
SUMMARY:Embracing the Change of Generative AI in Marketing
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/021225/
LOCATION:Aqimero\, 10 Ave Of The Arts\, Philadelphia\, PA\, 19102\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2025/01/Adobe-Philly.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250211T120000
DTEND;TZID=America/New_York:20250211T140000
DTSTAMP:20260404T152428
CREATED:20250106T220607Z
LAST-MODIFIED:20260203T172800Z
UID:108258-1739275200-1739282400@bdionline.com
SUMMARY:Embracing the Change of Generative AI in Marketing
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/021125/
LOCATION:Taverna\, 800 Emerson St\, Palo Alto\, CA\, 94301\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2025/01/Adobe-Palo-Alto.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241212T130000
DTEND;TZID=America/New_York:20241212T140000
DTSTAMP:20260404T152428
CREATED:20240926T164150Z
LAST-MODIFIED:20260203T172802Z
UID:107424-1734008400-1734012000@bdionline.com
SUMMARY:Interactive Virtual Event: GTM Strategies for People Tech in the Age of GenAI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/121224/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/09/BDI-VIRTUAL-SITE.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20241205T120000
DTEND;TZID=America/Los_Angeles:20241205T140000
DTSTAMP:20260404T152428
CREATED:20241017T143353Z
LAST-MODIFIED:20260203T172803Z
UID:107928-1733400000-1733407200@bdionline.com
SUMMARY:Transforming Digital Marketing with AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/120524/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/webp:https://bdionline.com/wp-content/uploads/2024/10/Siteimprovefeaturedimage-scaled.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241204T120000
DTEND;TZID=America/New_York:20241204T140000
DTSTAMP:20260404T152428
CREATED:20241111T181833Z
LAST-MODIFIED:20260203T172805Z
UID:108179-1733313600-1733320800@bdionline.com
SUMMARY:Equinix Engage: Real-World Insights From Today’s Leaders in AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/1204equinix/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/10/equinixdallas.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241204T120000
DTEND;TZID=America/New_York:20241204T140000
DTSTAMP:20260404T152428
CREATED:20241011T175208Z
LAST-MODIFIED:20260203T172807Z
UID:107811-1733313600-1733320800@bdionline.com
SUMMARY:Equinix Engage: Real-World Insights From Today’s Leaders in AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/120424/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/10/equinixdallas.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241115T120000
DTEND;TZID=America/New_York:20241115T140000
DTSTAMP:20260404T152428
CREATED:20240920T205059Z
LAST-MODIFIED:20260203T172808Z
UID:107281-1731672000-1731679200@bdionline.com
SUMMARY:Hybrid Cloud Virtualization In The Age Of AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/111524/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/09/HPE-MS-ATLANTA.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241114T120000
DTEND;TZID=America/New_York:20241114T140000
DTSTAMP:20260404T152428
CREATED:20240920T202734Z
LAST-MODIFIED:20260203T172810Z
UID:107231-1731585600-1731592800@bdionline.com
SUMMARY:Hybrid Cloud Virtualization In The Age Of AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/111424hpe/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/09/hpe-toronto.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241114T120000
DTEND;TZID=America/New_York:20241114T140000
DTSTAMP:20260404T152428
CREATED:20240905T203314Z
LAST-MODIFIED:20260203T172856Z
UID:106730-1731585600-1731592800@bdionline.com
SUMMARY:Life Sciences & GenAI: Strategies for Innovation and Transformation
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/111424-2/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/09/HPE-CONRES-NVIDIA-CAMBRIDGE.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241107T120000
DTEND;TZID=America/New_York:20241107T140000
DTSTAMP:20260404T152428
CREATED:20240919T155052Z
LAST-MODIFIED:20260203T172859Z
UID:107115-1730980800-1730988000@bdionline.com
SUMMARY:Hybrid Cloud Virtualization In The Age Of AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/110724/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/09/HPE-MICRO-INTEL-CHICAGO.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241106T173000
DTEND;TZID=America/New_York:20241106T200000
DTSTAMP:20260404T152428
CREATED:20240919T210851Z
LAST-MODIFIED:20260203T172900Z
UID:107154-1730914200-1730923200@bdionline.com
SUMMARY:GenAI Roundtable For Enterprise Innovation - An Executive Dinner & Wine Tasting For Technology Leaders
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/110624/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/09/AMD-NYC.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241030T120000
DTEND;TZID=America/New_York:20241030T140000
DTSTAMP:20260404T152428
CREATED:20240912T192850Z
LAST-MODIFIED:20260203T172902Z
UID:106923-1730289600-1730296800@bdionline.com
SUMMARY:Transforming Digital Marketing with AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/103024/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/09/siteimprove-nyc.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241029T173000
DTEND;TZID=America/New_York:20241029T200000
DTSTAMP:20260404T152428
CREATED:20240906T183058Z
LAST-MODIFIED:20260203T172903Z
UID:106819-1730223000-1730232000@bdionline.com
SUMMARY:GenAI Roundtable for Enterprise Innovation - An Executive Dinner & Wine Tasting for Technology Leaders
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/102924/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/09/AMD-CHICAGO.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241024T173000
DTEND;TZID=America/New_York:20241024T200000
DTSTAMP:20260404T152428
CREATED:20240821T175730Z
LAST-MODIFIED:20260203T172905Z
UID:106228-1729791000-1729800000@bdionline.com
SUMMARY:Equinix Engage: Real-World Insights From Today’s Leaders In AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/102424/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/Equinix-Boston1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241024T120000
DTEND;TZID=America/New_York:20241024T140000
DTSTAMP:20260404T152428
CREATED:20240925T180259Z
LAST-MODIFIED:20260203T172907Z
UID:107382-1729771200-1729778400@bdionline.com
SUMMARY:Equinix Engage: Real-World Insights From Today’s Leaders In AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/102424equinix/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/Equinix-Boston1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241023T120000
DTEND;TZID=America/New_York:20241023T140000
DTSTAMP:20260404T152428
CREATED:20240917T192844Z
LAST-MODIFIED:20260203T172908Z
UID:107016-1729684800-1729692000@bdionline.com
SUMMARY:Harnessing The Power Of GenAI In Your Marketing
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/102324/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/09/adobe-minneapolis.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241022T173000
DTEND;TZID=America/New_York:20241022T200000
DTSTAMP:20260404T152428
CREATED:20240903T194726Z
LAST-MODIFIED:20260203T172910Z
UID:106536-1729618200-1729627200@bdionline.com
SUMMARY:GenAI Roundtable for Enterprise Innovation - An Executive Dinner & Wine Tasting for Technology Leaders
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/102224/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/09/AMD-PALO-ALTO.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241017T120000
DTEND;TZID=America/New_York:20241017T140000
DTSTAMP:20260404T152428
CREATED:20240815T185222Z
LAST-MODIFIED:20260203T172912Z
UID:105951-1729166400-1729173600@bdionline.com
SUMMARY:Data and AI: Setting Up Your IT Infrastructure For Success
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/101724/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/Digital-Realty-.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241016T120000
DTEND;TZID=America/New_York:20241016T140000
DTSTAMP:20260404T152428
CREATED:20240819T174806Z
LAST-MODIFIED:20260203T172914Z
UID:106076-1729080000-1729087200@bdionline.com
SUMMARY:Hybrid Cloud Virtualization in the Age of AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/101624/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/HPE-Microsfot-INTEL-NYC-.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241010T120000
DTEND;TZID=America/New_York:20241010T140000
DTSTAMP:20260404T152428
CREATED:20240813T030451Z
LAST-MODIFIED:20260203T172918Z
UID:105708-1728561600-1728568800@bdionline.com
SUMMARY:Data And AI: Setting Up Your IT Infrastructure For Success
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/101024/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/Digital-Realty-.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20241008T120000
DTEND;TZID=America/Los_Angeles:20241008T140000
DTSTAMP:20260404T152428
CREATED:20240813T150659Z
LAST-MODIFIED:20260203T172919Z
UID:105731-1728388800-1728396000@bdionline.com
SUMMARY:Harnessing the Power of GenAI in Your Marketing
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/100824/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/AdobeSeattle.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Toronto:20240924T120000
DTEND;TZID=America/Toronto:20240924T140000
DTSTAMP:20260404T152428
CREATED:20240802T150807Z
LAST-MODIFIED:20260203T172923Z
UID:105172-1727179200-1727186400@bdionline.com
SUMMARY:Equinix Engage: Real-World Insights From Today’s Leaders in AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/092424/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/EquinixFeaturedImageToronto-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240919T120000
DTEND;TZID=America/New_York:20240919T140000
DTSTAMP:20260404T152428
CREATED:20240717T191037Z
LAST-MODIFIED:20260203T172925Z
UID:104223-1726747200-1726754400@bdionline.com
SUMMARY:Enterprise Data & GenAI Workshop with NVIDIA & HPE
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/091924/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/07/HPE-NVIDIA-MUSEAM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240918T120000
DTEND;TZID=America/New_York:20240918T140000
DTSTAMP:20260404T152428
CREATED:20240802T154240Z
LAST-MODIFIED:20260203T172927Z
UID:105196-1726660800-1726668000@bdionline.com
SUMMARY:Equinix Engage: Real-World Insights From Today’s Leaders in AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/091824/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/EquinixFeaturedImageDC.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240917T120000
DTEND;TZID=America/New_York:20240917T150000
DTSTAMP:20260404T152428
CREATED:20240719T172937Z
LAST-MODIFIED:20260203T172928Z
UID:104324-1726574400-1726585200@bdionline.com
SUMMARY:Enterprise Data & GenAI Workshop with NVIDIA & HPE
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/091724/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/07/HPE-NVIDIA-GRAD-CENTER.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240807T120000
DTEND;TZID=America/New_York:20240807T140000
DTSTAMP:20260404T152428
CREATED:20240607T203723Z
LAST-MODIFIED:20260203T172930Z
UID:104082-1723032000-1723039200@bdionline.com
SUMMARY:Harnessing the Power of GenAI in Your Marketing
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/080724/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2024/06/Adobe-Cinni.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240731T120000
DTEND;TZID=America/New_York:20240731T140000
DTSTAMP:20260404T152428
CREATED:20240607T193111Z
LAST-MODIFIED:20260203T172931Z
UID:104032-1722427200-1722434400@bdionline.com
SUMMARY:Enterprise Data & Gen AI ​
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/073124/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2023/07/HPE-AMD-NYC-FeaturedImage.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240730T120000
DTEND;TZID=America/New_York:20240730T140000
DTSTAMP:20260404T152428
CREATED:20240607T194904Z
LAST-MODIFIED:20260203T172933Z
UID:104051-1722340800-1722348000@bdionline.com
SUMMARY:Harnessing the Power of GenAI in Your Marketing
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/073024/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2024/06/Adobe_Pittsburgh-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240613T120000
DTEND;TZID=America/New_York:20240613T140000
DTSTAMP:20260404T152428
CREATED:20240416T182813Z
LAST-MODIFIED:20260203T172934Z
UID:103483-1718280000-1718287200@bdionline.com
SUMMARY:Transforming Work in the Age of AI for Marketing
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/061324/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/04/Adobe-Chicago.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240606T120000
DTEND;TZID=America/New_York:20240606T140000
DTSTAMP:20260404T152428
CREATED:20240318T175920Z
LAST-MODIFIED:20260203T172935Z
UID:102435-1717675200-1717682400@bdionline.com
SUMMARY:Data and AI: Setting Up Your IT Infrastructure for Success
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/060624/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/digital-realty-palo-alto.png
END:VEVENT
END:VCALENDAR