BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Business Development Institute (BDI) - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://bdionline.com
X-WR-CALDESC:Events for Business Development Institute (BDI)
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20190310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20191103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200623T120000
DTEND;TZID=America/New_York:20200623T133000
DTSTAMP:20260404T084638
CREATED:20200508T141318Z
LAST-MODIFIED:20200625T153959Z
UID:47999-1592913600-1592919000@bdionline.com
SUMMARY:Bridging the Gap: eCommerce in the COVID Economy
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/062320ecommerce/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200624T120000
DTEND;TZID=America/New_York:20200624T133000
DTSTAMP:20260404T084638
CREATED:20200508T161502Z
LAST-MODIFIED:20200612T195310Z
UID:48032-1593000000-1593005400@bdionline.com
SUMMARY:Bridging the Gap: eCommerce in the COVID Economy
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/062402ecommerce/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200624T120000
DTEND;TZID=America/New_York:20200624T133000
DTSTAMP:20260404T084638
CREATED:20200508T183555Z
LAST-MODIFIED:20200625T153913Z
UID:48054-1593000000-1593005400@bdionline.com
SUMMARY:Securing Accelerated Transformation: Aggregating\, Analyzing\, and Modeling Critical Enterprise Data
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/062420transformation/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200624T120000
DTEND;TZID=America/New_York:20200624T133000
DTSTAMP:20260404T084638
CREATED:20200520T140138Z
LAST-MODIFIED:20200625T153857Z
UID:48329-1593000000-1593005400@bdionline.com
SUMMARY:Identity Best Practices: Automation the Driver for the Identity Governance Journey
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/062420identity/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200625T120000
DTEND;TZID=America/New_York:20200625T133000
DTSTAMP:20260404T084638
CREATED:20200424T194154Z
LAST-MODIFIED:20200625T133928Z
UID:47532-1593086400-1593091800@bdionline.com
SUMMARY:Your Remote Workforce: Securing the Next Normal
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/062520workforce/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200625T120000
DTEND;TZID=America/New_York:20200625T133000
DTSTAMP:20260404T084638
CREATED:20200506T200135Z
LAST-MODIFIED:20200625T153242Z
UID:47931-1593086400-1593091800@bdionline.com
SUMMARY:Insurance\, Digital Collaboration and the New Normal - Beyond Video Conferencing
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/062520insurance/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200625T120000
DTEND;TZID=America/New_York:20200625T133000
DTSTAMP:20260404T084638
CREATED:20200508T184138Z
LAST-MODIFIED:20200625T153309Z
UID:48058-1593086400-1593091800@bdionline.com
SUMMARY:Securing Accelerated Transformation: Aggregating\, Analyzing\, and Modeling Critical Enterprise Data
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/062520transformation/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200713T080000
DTEND;TZID=America/New_York:20200713T170000
DTSTAMP:20260404T084638
CREATED:20200713T173600Z
LAST-MODIFIED:20200803T193948Z
UID:49477-1594627200-1594659600@bdionline.com
SUMMARY:The Enterprise Infrastructure of Work from Anywhere
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/072920enterprise-form/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200714T120000
DTEND;TZID=America/New_York:20200714T133000
DTSTAMP:20260404T084638
CREATED:20200528T170710Z
LAST-MODIFIED:20200710T134719Z
UID:48486-1594728000-1594733400@bdionline.com
SUMMARY:Pandemic as a Change Agent: Scaling Human Interaction in our New World
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/071420interaction/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200714T120000
DTEND;TZID=America/New_York:20200714T133000
DTSTAMP:20260404T084638
CREATED:20200528T195916Z
LAST-MODIFIED:20210107T193706Z
UID:48509-1594728000-1594733400@bdionline.com
SUMMARY:How Viacom Digitally Transformed their Business with Equinix and Google
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/071420transform/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200715T120000
DTEND;TZID=America/New_York:20200715T133000
DTSTAMP:20260404T084638
CREATED:20200513T195447Z
LAST-MODIFIED:20200713T185623Z
UID:48213-1594814400-1594819800@bdionline.com
SUMMARY:Healthcare Transformation: Modernizing Your Patient Experience During Covid-19 and Beyond
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/071520healthcare/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200716T120000
DTEND;TZID=America/New_York:20200716T133000
DTSTAMP:20260404T084638
CREATED:20200521T145240Z
LAST-MODIFIED:20200707T160058Z
UID:48381-1594900800-1594906200@bdionline.com
SUMMARY:The Future of Work: Digitizing Operations with Intelligent Automation
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/071620automation/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200716T120000
DTEND;TZID=America/New_York:20200716T133000
DTSTAMP:20260404T084638
CREATED:20200526T171647Z
LAST-MODIFIED:20200626T201606Z
UID:48419-1594900800-1594906200@bdionline.com
SUMMARY:Enhancing Spend Visibility During Times of Disruption
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/071620disruption/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200728T120000
DTEND;TZID=America/New_York:20200728T133000
DTSTAMP:20260404T084638
CREATED:20200616T154351Z
LAST-MODIFIED:20200708T173814Z
UID:49064-1595937600-1595943000@bdionline.com
SUMMARY:PERSONALIZED DIGITAL MARKETING AT SCALE
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/072820marketing/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200729T120000
DTEND;TZID=America/New_York:20200729T133000
DTSTAMP:20260404T084638
CREATED:20200604T150740Z
LAST-MODIFIED:20200714T185619Z
UID:48849-1596024000-1596029400@bdionline.com
SUMMARY:The Enterprise Infrastructure of Work from Anywhere
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/072920enterprise/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200729T120000
DTEND;TZID=America/New_York:20200729T133000
DTSTAMP:20260404T084638
CREATED:20200604T172553Z
LAST-MODIFIED:20200713T171352Z
UID:48879-1596024000-1596029400@bdionline.com
SUMMARY:Building Your New Digital Workplace Strategy
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/072920strategy/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200730T103000
DTEND;TZID=America/New_York:20200730T110000
DTSTAMP:20260404T084638
CREATED:20200428T172447Z
LAST-MODIFIED:20200714T152021Z
UID:47621-1596105000-1596106800@bdionline.com
SUMMARY:How PayPal Digitally Transformed their Business with Equinix and Google Cloud
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/073020payments/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200730T120000
DTEND;TZID=America/New_York:20200730T133000
DTSTAMP:20260404T084638
CREATED:20200601T170830Z
LAST-MODIFIED:20200625T153143Z
UID:48580-1596110400-1596115800@bdionline.com
SUMMARY:Building Your Content Engine
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/073020content/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200730T120000
DTEND;TZID=America/New_York:20200730T133000
DTSTAMP:20260404T084638
CREATED:20200601T183538Z
LAST-MODIFIED:20200724T135951Z
UID:48590-1596110400-1596115800@bdionline.com
SUMMARY:Email Humanization Marketing with Personalization and Empathy
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/073020humanization/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200811T120000
DTEND;TZID=America/New_York:20200811T133000
DTSTAMP:20260404T084638
CREATED:20200225T152745Z
LAST-MODIFIED:20200814T151128Z
UID:45738-1597147200-1597152600@bdionline.com
SUMMARY:Hybrid Cloud Transformation with AWS Outposts & Equinix
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/081120cloud/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200812T120000
DTEND;TZID=America/New_York:20200812T133000
DTSTAMP:20260404T084638
CREATED:20200624T145750Z
LAST-MODIFIED:20200721T172335Z
UID:49195-1597233600-1597239000@bdionline.com
SUMMARY:Email Humanization Marketing with Personalization and Empathy
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/081220humanization/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200813T120000
DTEND;TZID=America/New_York:20200813T133000
DTSTAMP:20260404T084638
CREATED:20200710T171435Z
LAST-MODIFIED:20200807T141638Z
UID:49377-1597320000-1597325400@bdionline.com
SUMMARY:Intelligent Automation: Building Process Excellence and Enterprise Agility
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/081320automation/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200915T120000
DTEND;TZID=America/New_York:20200915T133000
DTSTAMP:20260404T084638
CREATED:20200724T141658Z
LAST-MODIFIED:20200814T154111Z
UID:49701-1600171200-1600176600@bdionline.com
SUMMARY:MarketingWorks Life Sciences
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/091520marketingworks/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200916T120000
DTEND;TZID=America/New_York:20200916T133000
DTSTAMP:20260404T084638
CREATED:20200806T151117Z
LAST-MODIFIED:20200826T224438Z
UID:49882-1600257600-1600263000@bdionline.com
SUMMARY:Customer Service Automation:  RPA for Financial Services
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/091620customer/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200924T120000
DTEND;TZID=America/New_York:20200924T133000
DTSTAMP:20260404T084638
CREATED:20200807T155658Z
LAST-MODIFIED:20200921T192217Z
UID:49968-1600948800-1600954200@bdionline.com
SUMMARY:Accelerated Innovation in the Life Sciences Ecosystem
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/092420innovation/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200924T120000
DTEND;TZID=America/New_York:20200924T133000
DTSTAMP:20260404T084638
CREATED:20200807T163914Z
LAST-MODIFIED:20200922T133904Z
UID:50004-1600948800-1600954200@bdionline.com
SUMMARY:ITWorks: The Road Ahead
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/092420itworks/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200924T130000
DTEND;TZID=America/New_York:20200924T143000
DTSTAMP:20260404T084638
CREATED:20200717T135302Z
LAST-MODIFIED:20200921T134615Z
UID:49556-1600952400-1600957800@bdionline.com
SUMMARY:The Cloudification of Capital Markets: Applying Emerging Technologies
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/092420cloudification/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200929T120000
DTEND;TZID=America/New_York:20200929T133000
DTSTAMP:20260404T084638
CREATED:20200818T210308Z
LAST-MODIFIED:20200925T192811Z
UID:50196-1601380800-1601386200@bdionline.com
SUMMARY:Looking Forward: Why Customer Messaging Matters In FinTech
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/092920message/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200929T120000
DTEND;TZID=America/New_York:20200929T133000
DTSTAMP:20260404T084638
CREATED:20200820T163716Z
LAST-MODIFIED:20200922T133444Z
UID:50260-1601380800-1601386200@bdionline.com
SUMMARY:Email Humanization Marketing with Personalization and Empathy
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/092920humanization/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200930T120000
DTEND;TZID=America/New_York:20200930T133000
DTSTAMP:20260404T084638
CREATED:20200731T175344Z
LAST-MODIFIED:20200921T131228Z
UID:49781-1601467200-1601472600@bdionline.com
SUMMARY:Digital Twins: The Future of Automation for FSI
DESCRIPTION:Leveraging the Human Elementof Cybersecurity\n				\n				\n				\n				\n					Leveraging the Human Element of Cybersecurity				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					Wednesday\, June 30th  12:00 – 1:30 PM ET				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n					All final attendees will be entered into a raffle to win a Nintendo Switch Lite ($199 value)!				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Leveraging the Human Element of Cybersecurity is an invitation-only\, video-based virtual event limited to information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space from organizations across the country who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									Human error is responsible for 70% of security breaches today [1]. Recent examples\, such as the water treatment facility in Oldsmar\, FL\, show that cybersecurity is much more of an operational problem than a tools problem\, and the consequences can be catastrophic. To effectively address alert fatigue\, lack of full remediation plans\, and lack of incident prioritization\, under-resourced cybersecurity teams need more than the right tools — they need access to human expertise to support their security strategy. While having the right security tech stack is essential\, it’s only a company’s first layer of protection. Having security professionals with multi-paradigm skill sets in place to oversee existing tools ensures continuous monitoring\, visibility\, and risk management across endpoints\, data centers\, and the cloud while minimizing error. By investing in the human element of their security teams\, organizations can develop a holistic cybersecurity strategy that can help them strengthen their security posture and reduce the likelihood and impacts of security breaches.  								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Identifying patterns in the underlying causes of recent cybersecurity breaches to form a successful prevention strategyProviding IT and IS teams with detailed security guidance and posture reviews on an ongoing basisThe importance of holistic environment monitoring and swift containment measures to prevent attacksLeveraging human expertise and prioritizing security professionals with multi-paradigm skill setsImplementing a 24/7 SOC staffed with engineers who can measure the risk of an alert in real-time								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Sam McLane\n																						Chief Technical Services OfficerArctic Wolf\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Donna Ross\n																						Chief Information Security OfficerRadian\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Rakesh Sharma\n																						VP - Data & Strategy Safrapay\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ronald Sorozan\n																						Chief Information Officer\, Solutions GroupSeneca Resources\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Wednesday\, June 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm ET 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information technology and information security leaders in the banking\, healthcare\, legal\, and manufacturing space 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM    Attendees Enter Virtual Event & Welcome Remarks 12:05PM    Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM    Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform\, we help companies end cyber risk by providing security operations as a concierge service. Highly-trained Concierge Security® experts work as an extension of internal teams to provide 24×7 monitoring\, detection\, and response\, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture. For more information\, visit arcticwolf.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/093020digitaltwins/
END:VEVENT
END:VCALENDAR