BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Business Development Institute (BDI) - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Business Development Institute (BDI)
X-ORIGINAL-URL:https://bdionline.com
X-WR-CALDESC:Events for Business Development Institute (BDI)
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20190310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20191103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200324T120000
DTEND;TZID=America/New_York:20200324T133000
DTSTAMP:20260403T195233
CREATED:20200207T212319Z
LAST-MODIFIED:20200326T195012Z
UID:44425-1585051200-1585056600@bdionline.com
SUMMARY:MarketingWorks
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/032420marketingworks/
LOCATION:PA\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200319T120000
DTEND;TZID=America/New_York:20200319T140000
DTSTAMP:20260403T195234
CREATED:20200207T183646Z
LAST-MODIFIED:20210111T195832Z
UID:44418-1584619200-1584626400@bdionline.com
SUMMARY:MarketingWorks
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/031920marketingworks/
LOCATION:Morton’s The Steakhouse\, 227 W Trade Street\, Charlotte\, NC\, 28202\, United States
END:VEVENT
END:VCALENDAR