BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Business Development Institute (BDI) - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Business Development Institute (BDI)
X-ORIGINAL-URL:https://bdionline.com
X-WR-CALDESC:Events for Business Development Institute (BDI)
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20240310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20241103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20240310T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20241103T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20250309T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20251102T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20260308T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20261101T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250521T120000
DTEND;TZID=America/New_York:20250521T140000
DTSTAMP:20260406T074611
CREATED:20250421T173919Z
LAST-MODIFIED:20260203T172508Z
UID:111651-1747828800-1747836000@bdionline.com
SUMMARY:Rewire for Data and AI Workshop: Dallas
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/052125dr/
LOCATION:Digital Realty Data Center – DFW18\, 1210 Integrity Drive\, Richardson\, 75081\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/webp:https://bdionline.com/wp-content/uploads/2025/04/DigitalRealtyDallas.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250521T120000
DTEND;TZID=America/Chicago:20250521T153000
DTSTAMP:20260406T074611
CREATED:20250402T153109Z
LAST-MODIFIED:20260203T172507Z
UID:111152-1747828800-1747841400@bdionline.com
SUMMARY:Rewire for Data and AI Workshop: Dallas
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/052125/
LOCATION:Digital Realty Data Center – DFW18\, 1210 Integrity Drive\, Richardson\, 75081\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/webp:https://bdionline.com/wp-content/uploads/2025/04/DigitalRealtyDallas.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250603T120000
DTEND;TZID=America/New_York:20250603T140000
DTSTAMP:20260406T074611
CREATED:20250408T182438Z
LAST-MODIFIED:20260203T172505Z
UID:111293-1748952000-1748959200@bdionline.com
SUMMARY:Agentic AI in Action: Autonomous Systems & Intelligent Workflows for Financial Services
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/060325/
LOCATION:Oceana\, 120 W 49th St\, New York\, NY\, 10020\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/webp:https://bdionline.com/wp-content/uploads/2025/02/HPE-NVIDIANYC.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250605T120000
DTEND;TZID=America/New_York:20250605T140000
DTSTAMP:20260406T074611
CREATED:20250409T171617Z
LAST-MODIFIED:20260203T172501Z
UID:111407-1749124800-1749132000@bdionline.com
SUMMARY:Unlocking Agility and Scale in Marketing with AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/060525/
LOCATION:Butter\, 70 W 45th St\, New York\, NY\, 10036\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/04/Adobe-nyc.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250605T173000
DTEND;TZID=America/Chicago:20250605T200000
DTSTAMP:20260406T074611
CREATED:20250409T122123Z
LAST-MODIFIED:20260203T172459Z
UID:111325-1749144600-1749153600@bdionline.com
SUMMARY:Equinix Engage: Real-World Insights From Today’s Leaders in AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/060525equinix/
LOCATION:Gibsons Steakhouse\, 1028 N Rush Street\, Chicago\, IL\, 60611\, United States
CATEGORIES:Event Calendar
ATTACH;FMTTYPE=image/webp:https://bdionline.com/wp-content/uploads/2025/04/equinix_chicago-2.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250611T180000
DTEND;TZID=America/New_York:20250611T200000
DTSTAMP:20260406T074611
CREATED:20250506T183011Z
LAST-MODIFIED:20260203T172455Z
UID:111962-1749664800-1749672000@bdionline.com
SUMMARY:Advancing AI Executive Dinner & Winetasting: Building the Future of Enterprise Innovation
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/061125amd1/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2025/05/AM-ADVANCING-AI-PREIVEIW-IMAGE.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20250611T180000
DTEND;TZID=America/Los_Angeles:20250611T210000
DTSTAMP:20260406T074611
CREATED:20250512T172316Z
LAST-MODIFIED:20260203T172454Z
UID:112443-1749664800-1749675600@bdionline.com
SUMMARY:Advancing AI Executive Dinner & Winetasting: Building the Future of Enterprise Innovation with AMD & Supermicro
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/061125amd_supermicro/
LOCATION:Meso\, 3060 Olsen Dr #50\, San Jose\, CA\, 95128\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2025/05/AM-ADVANCING-AI-PREIVEIW-IMAGE.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20250611T180000
DTEND;TZID=America/Los_Angeles:20250611T210000
DTSTAMP:20260406T074611
CREATED:20250512T180452Z
LAST-MODIFIED:20260203T172453Z
UID:112482-1749664800-1749675600@bdionline.com
SUMMARY:Advancing AI Executive Dinner & Winetasting: Building the Future of Enterprise Innovation with AMD & AWS
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/061125amd_aws/
LOCATION:Morton’s The Steakhouse\, 184 S Market St Ste 100\, San Jose\, CA\, 95113\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2025/05/AM-ADVANCING-AI-PREIVEIW-IMAGE.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250611T180000
DTEND;TZID=America/New_York:20250611T210000
DTSTAMP:20260406T074611
CREATED:20250512T183436Z
LAST-MODIFIED:20260203T172452Z
UID:112505-1749664800-1749675600@bdionline.com
SUMMARY:Advancing AI Executive Dinner & Winetasting: Building the Future of Enterprise Innovation
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/061125amd_vultr/
LOCATION:Mastro’s Steakhouse\, 2855 Stevens Creek Blvd Suite 1860\, Santa Clara\, CA\, 95050\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2025/05/AM-ADVANCING-AI-PREIVEIW-IMAGE.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20250611T180000
DTEND;TZID=America/Los_Angeles:20250611T210000
DTSTAMP:20260406T074611
CREATED:20250512T192316Z
LAST-MODIFIED:20260203T172451Z
UID:112556-1749664800-1749675600@bdionline.com
SUMMARY:Advancing AI Executive Dinner & Winetasting: Building the Future of Enterprise Innovation with AMD & Lenovo
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/061125amd_lenovo/
LOCATION:MILAN\, 1712 Meridian Avenue\, San Jose\, CA\, 95125\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2025/05/AM-ADVANCING-AI-PREIVEIW-IMAGE.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250611T180000
DTEND;TZID=America/New_York:20250611T210000
DTSTAMP:20260406T074611
CREATED:20250512T193203Z
LAST-MODIFIED:20260203T172448Z
UID:112581-1749664800-1749675600@bdionline.com
SUMMARY:Advancing AI Executive Dinner & Winetasting: Building the Future of Enterprise Innovation
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/061125amd_oracle/
LOCATION:BE.STEAK.A\, 1887 S BASCOM AVE\, CAMPBELL\, CA\, 95008\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2025/05/AM-ADVANCING-AI-PREIVEIW-IMAGE.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20250612T173000
DTEND;TZID=America/Los_Angeles:20250612T200000
DTSTAMP:20260406T074611
CREATED:20250409T130041Z
LAST-MODIFIED:20260203T172445Z
UID:111353-1749749400-1749758400@bdionline.com
SUMMARY:Equinix Engage: Real-World Insights From Today’s Leaders in AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/061225/
LOCATION:Spago\, 176 N Canon Dr\, Beverly Hills\, CA\, 90210\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/webp:https://bdionline.com/wp-content/uploads/2025/04/equinix_losangeles.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250717T173000
DTEND;TZID=America/New_York:20250717T200000
DTSTAMP:20260406T074611
CREATED:20250528T185520Z
LAST-MODIFIED:20260203T172442Z
UID:113046-1752773400-1752782400@bdionline.com
SUMMARY:Executive Wine Tasting & Dinner -  Scalable AI in the Enterprise: Accelerating Innovation Through Infrastructure & Partnership
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/071725/
LOCATION:Davio’s Boston Seaport\, 26 Fan Pier Boulevard\, Boston\, MA\, 02210\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2025/05/HPE-NVIDIA-EQUINIX-PREVIEW-IMAGE.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250722T173000
DTEND;TZID=America/New_York:20250722T200000
DTSTAMP:20260406T074611
CREATED:20250523T170237Z
LAST-MODIFIED:20260203T172414Z
UID:112964-1753205400-1753214400@bdionline.com
SUMMARY:Unlocking Agility And Scale In Marketing With AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/072225/
LOCATION:Gibsons Italia\, 233 N Canal St\, Chicago\, 60606\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2025/05/ADOBE-CHICAGO.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250723T173000
DTEND;TZID=America/Chicago:20250723T210000
DTSTAMP:20260406T074611
CREATED:20250602T190239Z
LAST-MODIFIED:20260203T172412Z
UID:113218-1753291800-1753304400@bdionline.com
SUMMARY:Executive Wine Tasting & Dinner -  Scalable AI in the Enterprise: Accelerating Innovation Through Infrastructure & Partnership
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/072325/
LOCATION:Gibsons Rosemont\, 5464 N River Rd\, Rosemont\, IL\, 60018\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/webp:https://bdionline.com/wp-content/uploads/2025/06/hpechiagofeaturedimage-1.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250730T173000
DTEND;TZID=America/New_York:20250730T200000
DTSTAMP:20260406T074611
CREATED:20250602T194222Z
LAST-MODIFIED:20260203T172410Z
UID:113240-1753896600-1753905600@bdionline.com
SUMMARY:Executive Wine Tasting & Dinner -  Scalable AI in the Enterprise: Accelerating Innovation Through Infrastructure & Partnership
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/073025/
LOCATION:Butter\, 70 W 45th St\, New York\, NY\, 10036\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/webp:https://bdionline.com/wp-content/uploads/2025/06/hpecnycfeaturedimage-1.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20250827T173000
DTEND;TZID=America/Los_Angeles:20250827T200000
DTSTAMP:20260406T074612
CREATED:20250711T103507Z
LAST-MODIFIED:20260203T172407Z
UID:113666-1756315800-1756324800@bdionline.com
SUMMARY:Enabling AI-Powered Innovation at Scale: An API-First Future
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/082725/
LOCATION:Taverna\, 800 Emerson St\, Palo Alto\, CA\, 94301\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/webp:https://bdionline.com/wp-content/uploads/2025/07/0827KongPaloAlto.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250909T120000
DTEND;TZID=America/Chicago:20250911T140000
DTSTAMP:20260406T074612
CREATED:20250715T193859Z
LAST-MODIFIED:20260203T172405Z
UID:113824-1757419200-1757599200@bdionline.com
SUMMARY:Reimagining Product Innovation with AI: Driving Speed\, Precision & Creativity
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/091125_centric_software/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/webp:https://bdionline.com/wp-content/uploads/2025/07/centricsoftwarechiagofeaturedimage.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250911T120000
DTEND;TZID=America/New_York:20250911T140000
DTSTAMP:20260406T074612
CREATED:20250715T140914Z
LAST-MODIFIED:20260203T172404Z
UID:113795-1757592000-1757599200@bdionline.com
SUMMARY:Leading Through Disruption: AI & Social Shifts in Pharma
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/091125/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/01/Liveworld-Preview-image.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20250916T173000
DTEND;TZID=America/Los_Angeles:20250916T203000
DTSTAMP:20260406T074612
CREATED:20250723T202030Z
LAST-MODIFIED:20260203T172403Z
UID:114085-1758043800-1758054600@bdionline.com
SUMMARY:GenAI Roundtable for Enterprise Innovation - An Executive Dinner & Wine Tasting for Technology Leaders
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/091625/
LOCATION:Taverna\, 800 Emerson St\, Palo Alto\, CA\, 94301\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/webp:https://bdionline.com/wp-content/uploads/2025/07/AMDfeaturedimage.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250917T120000
DTEND;TZID=America/New_York:20250917T140000
DTSTAMP:20260406T074612
CREATED:20250716T150603Z
LAST-MODIFIED:20260203T172402Z
UID:113891-1758110400-1758117600@bdionline.com
SUMMARY:Reimagining Product Innovation with AI: Driving Speed\, Precision & Creativity
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/091725/
LOCATION:Oceana\, 120 W 49th St\, New York\, NY\, 10020\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/webp:https://bdionline.com/wp-content/uploads/2025/07/centricsoftwareNYCfeaturedimage.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250917T173000
DTEND;TZID=America/New_York:20250917T200000
DTSTAMP:20260406T074612
CREATED:20250717T154851Z
LAST-MODIFIED:20260203T172400Z
UID:113993-1758130200-1758139200@bdionline.com
SUMMARY:Enabling AI-Powered Innovation at Scale: An API-First Future
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/091725kong/
LOCATION:Fia Restaurant\, The Burgess Hotel 3600 Piedmont Rd NE\, Atlanta\, GA\, 30305\, United States
CATEGORIES:Event Calendar
ATTACH;FMTTYPE=image/webp:https://bdionline.com/wp-content/uploads/2025/07/kongfeaturedimageAtlantawebp.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250918T120000
DTEND;TZID=America/New_York:20250918T140000
DTSTAMP:20260406T074612
CREATED:20250730T185009Z
LAST-MODIFIED:20260203T172358Z
UID:114200-1758196800-1758204000@bdionline.com
SUMMARY:Strategic AI Workload Placement: Infrastructure Decisions for Performance\, Scale\, and Trust
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/091825/
LOCATION:Oceana\, 120 W 49th St\, New York\, NY\, 10020\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2025/07/DR-NYVUntitled-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20251007T080000
DTEND;TZID=America/New_York:20251007T170000
DTSTAMP:20260406T074612
CREATED:20250806T183226Z
LAST-MODIFIED:20260203T172355Z
UID:114501-1759824000-1759856400@bdionline.com
SUMMARY:Agentic AI in Action: Autonomous Systems & Intelligent Workflows for Financial Services
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/100725/
LOCATION:Davios Back Bay\, 75 Arlington Street\, Boston\, MA\, 02116\, United States
CATEGORIES:Event Calendar
ATTACH;FMTTYPE=image/webp:https://bdionline.com/wp-content/uploads/2025/08/HPE-ConResfeaturedimage-1.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20251008T173000
DTEND;TZID=America/New_York:20251008T200000
DTSTAMP:20260406T074612
CREATED:20250714T164446Z
LAST-MODIFIED:20260203T172353Z
UID:113757-1759944600-1759953600@bdionline.com
SUMMARY:The Future of Enterprise Data Security in the Age of AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/100825/
LOCATION:Butter\, 70 W 45th St\, New York\, NY\, 10036\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/webp:https://bdionline.com/wp-content/uploads/2025/07/HPEVEEAMNYCfeaturedimage.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20251009T173000
DTEND;TZID=America/New_York:20251009T200000
DTSTAMP:20260406T074612
CREATED:20250806T192019Z
LAST-MODIFIED:20260203T172352Z
UID:114529-1760031000-1760040000@bdionline.com
SUMMARY:AI at the Core: Powering the Future of Drug Discovery & Manufacturing
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/100925/
LOCATION:Toca Vez\, 95 Morristown Rd\, Basking Ridge\, NJ\, 07920\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/webp:https://bdionline.com/wp-content/uploads/2025/08/HPE-AMDfeaturedimage.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20251014T173000
DTEND;TZID=America/New_York:20251014T200000
DTSTAMP:20260406T074612
CREATED:20250820T190322Z
LAST-MODIFIED:20260203T172350Z
UID:114944-1760463000-1760472000@bdionline.com
SUMMARY:The Enterprise Compute Advantage: Enabling Agentic AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/101425/
LOCATION:Gibsons Rosemont\, 5464 N River Rd\, Rosemont\, IL\, 60018\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2025/08/chicago.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251014T173000
DTEND;TZID=America/Chicago:20251014T200000
DTSTAMP:20260406T074612
CREATED:20260112T171910Z
LAST-MODIFIED:20260127T200217Z
UID:118653-1760463000-1760472000@bdionline.com
SUMMARY:Event Recap: The Enterprise Compute Advantage: Enabling Agentic AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/101425_hpe_event_recap/
LOCATION:Gibsons Rosemont\, 5464 N River Rd\, Rosemont\, IL\, 60018\, United States
CATEGORIES:Event Recap,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2025/08/chicago.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20251015T173000
DTEND;TZID=America/New_York:20251015T200000
DTSTAMP:20260406T074612
CREATED:20250813T204444Z
LAST-MODIFIED:20260203T172349Z
UID:114672-1760549400-1760558400@bdionline.com
SUMMARY:GenAI Roundtable For Enterprise Innovation - An Executive Dinner & Wine Tasting For Technology Leaders
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/101525/
LOCATION:Fleming’s Prime Steakhouse – Plano\, 7250 Dallas Pkwy Suite 110\, Plano\, TX 75024\, Plano\, TX\, 75024\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2025/08/AMD-DALLAS.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20251016T120000
DTEND;TZID=America/New_York:20251016T140000
DTSTAMP:20260406T074612
CREATED:20250820T192739Z
LAST-MODIFIED:20260203T172348Z
UID:115002-1760616000-1760623200@bdionline.com
SUMMARY:The Enterprise Compute Advantage: Enabling Agentic AI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/101625/
LOCATION:Taverna\, 800 Emerson St\, Palo Alto\, CA\, 94301\, United States
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2025/08/Untitled-1.png
END:VEVENT
END:VCALENDAR