BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Business Development Institute (BDI) - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Business Development Institute (BDI)
X-ORIGINAL-URL:https://bdionline.com
X-WR-CALDESC:Events for Business Development Institute (BDI)
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20210314T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20211107T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20220313T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20221106T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20230312T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20231105T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20210314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20211107T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20220313T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20221106T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20230312T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20231105T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220524T130000
DTEND;TZID=America/New_York:20220524T141500
DTSTAMP:20260403T175004
CREATED:20220202T155618Z
LAST-MODIFIED:20260203T180153Z
UID:82093-1653397200-1653401700@bdionline.com
SUMMARY:Transforming eCommerce with Automation: Turning Online Shopping into a Visual Experience
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/052422commerce/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220520T120000
DTEND;TZID=America/New_York:20220520T131500
DTSTAMP:20260403T175004
CREATED:20220304T144243Z
LAST-MODIFIED:20260203T180155Z
UID:83510-1653048000-1653052500@bdionline.com
SUMMARY:The Untapped Potential of Type: Trends for Reinventing Brand Image in 2022
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/052022type/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-04-at-9.41.24-AM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220519T130000
DTEND;TZID=America/New_York:20220519T141500
DTSTAMP:20260403T175004
CREATED:20220119T142525Z
LAST-MODIFIED:20260203T180157Z
UID:81201-1652965200-1652969700@bdionline.com
SUMMARY:Modernizing B2B Market Research: Optimizing Your Pipeline with Fast\, Data-Driven Decisions
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/051922research/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/01/stock-market-data-on-tablet-2021-08-28-21-08-07-utc-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20220517T120000
DTEND;TZID=America/Los_Angeles:20220517T140000
DTSTAMP:20260403T175004
CREATED:20220317T152448Z
LAST-MODIFIED:20260203T180158Z
UID:83705-1652788800-1652796000@bdionline.com
SUMMARY:The Backbone of B2B Sales Intelligence: The Critical Role of Data & Alignment Within GTM Strategies
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/051722gtm/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220512T120000
DTEND;TZID=America/New_York:20220512T140000
DTSTAMP:20260403T175004
CREATED:20220322T185418Z
LAST-MODIFIED:20260203T180158Z
UID:83776-1652356800-1652364000@bdionline.com
SUMMARY:Success and Safety Within Your Supply Chain: Mitigating Risk With Industry Best Practices
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/051222supply/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-22-at-8.59.16-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220511T143000
DTEND;TZID=America/New_York:20220511T170000
DTSTAMP:20260403T175004
CREATED:20220316T195305Z
LAST-MODIFIED:20260203T180200Z
UID:83689-1652279400-1652288400@bdionline.com
SUMMARY:Capturing\, Hiring\, and Retaining Top Talent: Recruitment Strategies for Sustaining a Healthy Corporate Culture
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/051122hires/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-16-at-3.53.41-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220510T130000
DTEND;TZID=America/New_York:20220510T141500
DTSTAMP:20260403T175004
CREATED:20220225T224033Z
LAST-MODIFIED:20260203T180201Z
UID:83295-1652187600-1652192100@bdionline.com
SUMMARY:Optimizing the Digital Experience with Visibility for SASE: Driving a Secure Hybrid Workforce
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/041922digital/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/02/Screen-Shot-2022-02-25-at-5.41.32-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220510T120000
DTEND;TZID=America/New_York:20220510T140000
DTSTAMP:20260403T175004
CREATED:20220405T134825Z
LAST-MODIFIED:20260203T180204Z
UID:84679-1652184000-1652191200@bdionline.com
SUMMARY:Mitigating Risk Within Your Supply Chain: Enabling Safety With Compliant\, Successful Practices
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/051022supply/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/04/istockphoto-1198082588-612x612-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220509T080000
DTEND;TZID=America/New_York:20220509T170000
DTSTAMP:20260403T175004
CREATED:20220509T103015Z
LAST-MODIFIED:20260203T180205Z
UID:86462-1652083200-1652115600@bdionline.com
SUMMARY:Eliminating Cookie-Cutter Content: Personalizing at Scale with Creative Work Management- Video Content
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/workmanagementvideo-content/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220506T130000
DTEND;TZID=America/New_York:20220506T140000
DTSTAMP:20260403T175004
CREATED:20220303T202122Z
LAST-MODIFIED:20260203T180206Z
UID:83483-1651842000-1651845600@bdionline.com
SUMMARY:The True Anchor of Great Marketing: Connecting the Dots with Strategic Thought Leadership
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/050622marketing/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-03-at-3.21.39-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220505T120000
DTEND;TZID=America/New_York:20220505T131500
DTSTAMP:20260403T175004
CREATED:20220304T180453Z
LAST-MODIFIED:20260203T180206Z
UID:83517-1651752000-1651756500@bdionline.com
SUMMARY:Zeroing in on Zero Trust: Ending Cybersecurity Threat in FSI
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/050522cybersecurity/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-04-at-1.06.16-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20220505T120000
DTEND;TZID=America/Los_Angeles:20220505T131500
DTSTAMP:20260403T175004
CREATED:20220303T204234Z
LAST-MODIFIED:20260203T180207Z
UID:83506-1651752000-1651756500@bdionline.com
SUMMARY:The Untapped Potential of Type: Trends for Reinventing Brand Image in 2022
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/050522type/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-03-at-3.45.20-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220503T130000
DTEND;TZID=America/New_York:20220503T141500
DTSTAMP:20260403T175004
CREATED:20220303T162655Z
LAST-MODIFIED:20260203T180208Z
UID:83469-1651582800-1651587300@bdionline.com
SUMMARY:The Untapped Potential of Type: Trends for Reinventing Brand Image in 2022
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/050322type/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-03-at-11.30.34-AM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220503T080000
DTEND;TZID=America/New_York:20220503T170000
DTSTAMP:20260403T175004
CREATED:20220503T155121Z
LAST-MODIFIED:20260203T180210Z
UID:86289-1651564800-1651597200@bdionline.com
SUMMARY:Vulnerability-Free Code: Striking the Balance Between Speed and Security- Video Content
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/031022codevideocontent/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220429T080000
DTEND;TZID=America/New_York:20220429T170000
DTSTAMP:20260403T175004
CREATED:20220429T063324Z
LAST-MODIFIED:20260203T180212Z
UID:86139-1651219200-1651251600@bdionline.com
SUMMARY:Transforming Genomics with GPUs: Enabling Improved Outcomes in Life Sciences Research and Patient Care - Video Content
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/042022grpuvideocontent/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20220427T120000
DTEND;TZID=America/Los_Angeles:20220427T140000
DTSTAMP:20260403T175004
CREATED:20220225T161624Z
LAST-MODIFIED:20260203T180215Z
UID:83236-1651060800-1651068000@bdionline.com
SUMMARY:Success and Safety Within Your Supply Chain: Mitigating Risk With Industry Best Practices
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/042722supply/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/02/pexels-chanaka-906494-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220426T120000
DTEND;TZID=America/New_York:20220426T140000
DTSTAMP:20260403T175004
CREATED:20220222T215721Z
LAST-MODIFIED:20260203T180216Z
UID:83079-1650974400-1650981600@bdionline.com
SUMMARY:Perfecting Cross-Channel Engagement: Meeting Customers Where They Are to Transform CX
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/042622engagement/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/02/pexels-roberto-vivancos-2190283-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220426T080000
DTEND;TZID=America/New_York:20220426T170000
DTSTAMP:20260403T175004
CREATED:20220426T082551Z
LAST-MODIFIED:20260203T180218Z
UID:85891-1650960000-1650992400@bdionline.com
SUMMARY:Migrating Virtual Estates to the Cloud: Accelerating Infrastructure Migration at Scale - Video Content
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/040722cloudmigrationvideo-content/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20220421T120000
DTEND;TZID=America/Chicago:20220421T140000
DTSTAMP:20260403T175004
CREATED:20220215T221524Z
LAST-MODIFIED:20260203T180219Z
UID:82884-1650542400-1650549600@bdionline.com
SUMMARY:Success and Safety Within Your Supply Chain: Mitigating Risk With Industry Best Practices
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/042122supply/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/02/pexels-chanaka-906494-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220420T130000
DTEND;TZID=America/New_York:20220420T141500
DTSTAMP:20260403T175005
CREATED:20220310T194231Z
LAST-MODIFIED:20260203T180221Z
UID:83543-1650459600-1650464100@bdionline.com
SUMMARY:Transforming Genomics with GPUs: Enabling Improved Outcomes in Life Sciences Research and Patient Care
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/042022gpu/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-10-at-5.12.17-PM-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220420T080000
DTEND;TZID=America/New_York:20220420T170000
DTSTAMP:20260403T175005
CREATED:20220420T082502Z
LAST-MODIFIED:20260203T180223Z
UID:85701-1650441600-1650474000@bdionline.com
SUMMARY:No Cookies\, No Problem: Future-proof Marketing Strategies for Growth LA - Video Content
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/032222cookieslavideo-content/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220420T080000
DTEND;TZID=America/New_York:20220420T170000
DTSTAMP:20260403T175005
CREATED:20220420T072328Z
LAST-MODIFIED:20260203T180225Z
UID:85632-1650441600-1650474000@bdionline.com
SUMMARY:No Cookies\, No Problem: Future-proof Marketing Strategies for Growth - Video Content
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/031522cookiesnyvideo-content/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220419T130000
DTEND;TZID=America/New_York:20220419T141500
DTSTAMP:20260403T175005
CREATED:20220226T001617Z
LAST-MODIFIED:20260203T180226Z
UID:83304-1650373200-1650377700@bdionline.com
SUMMARY:ABM-ify Your Revenue Strategy: Your Secret Weapon for Sales and Marketing Success
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/041922abm/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/02/Screen-Shot-2022-02-25-at-7.17.23-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220415T080000
DTEND;TZID=America/New_York:20220415T170000
DTSTAMP:20260403T175005
CREATED:20220415T174059Z
LAST-MODIFIED:20260203T180228Z
UID:85295-1650009600-1650042000@bdionline.com
SUMMARY:Reevaluating Your Org’s Financial Health: How to Come Out on Top in 2022 - Video Content
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/financialhealthvideo-content/
CATEGORIES:Event Calendar,No Header
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20220412T120000
DTEND;TZID=America/Chicago:20220412T131500
DTSTAMP:20260403T175005
CREATED:20220303T174436Z
LAST-MODIFIED:20260203T180231Z
UID:83473-1649764800-1649769300@bdionline.com
SUMMARY:Re-Imagining Your Content Moderation Strategy: Achieving Marketing Objectives Beyond Brand Protection
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/042722content/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-03-at-12.52.48-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220407T130000
DTEND;TZID=America/New_York:20220407T141500
DTSTAMP:20260403T175005
CREATED:20220225T223250Z
LAST-MODIFIED:20260203T180233Z
UID:83286-1649336400-1649340900@bdionline.com
SUMMARY:Migrating Virtual Estates to the Cloud: Accelerating Infrastructure Strategy in Financial Services
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/040722cloud/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/02/Screen-Shot-2022-02-25-at-5.34.12-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20220407T120000
DTEND;TZID=America/Chicago:20220407T131500
DTSTAMP:20260403T175005
CREATED:20220225T223709Z
LAST-MODIFIED:20260203T180234Z
UID:83291-1649332800-1649337300@bdionline.com
SUMMARY:conXion on the Road: Manufacturing Virtual Event
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/040722enterprise/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/02/Screen-Shot-2022-02-25-at-5.39.10-PM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220407T120000
DTEND;TZID=America/New_York:20220407T131500
DTSTAMP:20260403T175005
CREATED:20220209T172249Z
LAST-MODIFIED:20260203T180236Z
UID:82714-1649332800-1649337300@bdionline.com
SUMMARY:Goodbye Dr. Google\, Hello Dr. TikTok: How Pharma Can Utilize the Fastest Growing Social Media Platform
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/040722pharma/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2022/02/pexels-cottonbro-5081926-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220331T130000
DTEND;TZID=America/New_York:20220331T141500
DTSTAMP:20260403T175005
CREATED:20220201T200401Z
LAST-MODIFIED:20260203T180239Z
UID:82008-1648731600-1648736100@bdionline.com
SUMMARY:Resiliency and Adaptivity with XDR: Dynamic Approaches for Tackling the Threat Landscape
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/033122threat/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2022/02/McAfee-Enterprise-background-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220325T080000
DTEND;TZID=America/New_York:20220325T170000
DTSTAMP:20260403T175005
CREATED:20220325T183852Z
LAST-MODIFIED:20260203T180244Z
UID:84066-1648195200-1648227600@bdionline.com
SUMMARY:The Art of Agile Consumer Insights: Driving Market Research Innovation with Tech and Automation  - Video Content
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/the-art-of-agile-consumer-insights-driving-market-research-innovation-with-tech-and-automation-video-content/
CATEGORIES:Event Calendar,No Header
END:VEVENT
END:VCALENDAR