BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Business Development Institute (BDI) - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Business Development Institute (BDI)
X-ORIGINAL-URL:https://bdionline.com
X-WR-CALDESC:Events for Business Development Institute (BDI)
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20230312T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20231105T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20240310T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20241103T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20250309T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20251102T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Toronto
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241114T120000
DTEND;TZID=America/New_York:20241114T140000
DTSTAMP:20260403T152215
CREATED:20240905T203314Z
LAST-MODIFIED:20260203T172856Z
UID:106730-1731585600-1731592800@bdionline.com
SUMMARY:Life Sciences & GenAI: Strategies for Innovation and Transformation
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/111424-2/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/09/HPE-CONRES-NVIDIA-CAMBRIDGE.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241107T120000
DTEND;TZID=America/New_York:20241107T140000
DTSTAMP:20260403T152215
CREATED:20240919T155052Z
LAST-MODIFIED:20260203T172859Z
UID:107115-1730980800-1730988000@bdionline.com
SUMMARY:Hybrid Cloud Virtualization In The Age Of AI
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/110724/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/09/HPE-MICRO-INTEL-CHICAGO.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241106T173000
DTEND;TZID=America/New_York:20241106T200000
DTSTAMP:20260403T152215
CREATED:20240919T210851Z
LAST-MODIFIED:20260203T172900Z
UID:107154-1730914200-1730923200@bdionline.com
SUMMARY:GenAI Roundtable For Enterprise Innovation - An Executive Dinner & Wine Tasting For Technology Leaders
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/110624/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/09/AMD-NYC.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241030T120000
DTEND;TZID=America/New_York:20241030T140000
DTSTAMP:20260403T152215
CREATED:20240912T192850Z
LAST-MODIFIED:20260203T172902Z
UID:106923-1730289600-1730296800@bdionline.com
SUMMARY:Transforming Digital Marketing with AI
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/103024/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/09/siteimprove-nyc.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241029T173000
DTEND;TZID=America/New_York:20241029T200000
DTSTAMP:20260403T152215
CREATED:20240906T183058Z
LAST-MODIFIED:20260203T172903Z
UID:106819-1730223000-1730232000@bdionline.com
SUMMARY:GenAI Roundtable for Enterprise Innovation - An Executive Dinner & Wine Tasting for Technology Leaders
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/102924/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/09/AMD-CHICAGO.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241024T173000
DTEND;TZID=America/New_York:20241024T200000
DTSTAMP:20260403T152215
CREATED:20240821T175730Z
LAST-MODIFIED:20260203T172905Z
UID:106228-1729791000-1729800000@bdionline.com
SUMMARY:Equinix Engage: Real-World Insights From Today’s Leaders In AI
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/102424/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/Equinix-Boston1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241024T120000
DTEND;TZID=America/New_York:20241024T140000
DTSTAMP:20260403T152215
CREATED:20240925T180259Z
LAST-MODIFIED:20260203T172907Z
UID:107382-1729771200-1729778400@bdionline.com
SUMMARY:Equinix Engage: Real-World Insights From Today’s Leaders In AI
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/102424equinix/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/Equinix-Boston1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241023T120000
DTEND;TZID=America/New_York:20241023T140000
DTSTAMP:20260403T152215
CREATED:20240917T192844Z
LAST-MODIFIED:20260203T172908Z
UID:107016-1729684800-1729692000@bdionline.com
SUMMARY:Harnessing The Power Of GenAI In Your Marketing
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/102324/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/09/adobe-minneapolis.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241022T173000
DTEND;TZID=America/New_York:20241022T200000
DTSTAMP:20260403T152215
CREATED:20240903T194726Z
LAST-MODIFIED:20260203T172910Z
UID:106536-1729618200-1729627200@bdionline.com
SUMMARY:GenAI Roundtable for Enterprise Innovation - An Executive Dinner & Wine Tasting for Technology Leaders
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/102224/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/09/AMD-PALO-ALTO.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241017T120000
DTEND;TZID=America/New_York:20241017T140000
DTSTAMP:20260403T152215
CREATED:20240815T185222Z
LAST-MODIFIED:20260203T172912Z
UID:105951-1729166400-1729173600@bdionline.com
SUMMARY:Data and AI: Setting Up Your IT Infrastructure For Success
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/101724/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/Digital-Realty-.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241016T120000
DTEND;TZID=America/New_York:20241016T140000
DTSTAMP:20260403T152215
CREATED:20240819T174806Z
LAST-MODIFIED:20260203T172914Z
UID:106076-1729080000-1729087200@bdionline.com
SUMMARY:Hybrid Cloud Virtualization in the Age of AI
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/101624/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/HPE-Microsfot-INTEL-NYC-.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241010T120000
DTEND;TZID=America/New_York:20241010T140000
DTSTAMP:20260403T152215
CREATED:20240813T030451Z
LAST-MODIFIED:20260203T172918Z
UID:105708-1728561600-1728568800@bdionline.com
SUMMARY:Data And AI: Setting Up Your IT Infrastructure For Success
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/101024/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/Digital-Realty-.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20241008T120000
DTEND;TZID=America/Los_Angeles:20241008T140000
DTSTAMP:20260403T152215
CREATED:20240813T150659Z
LAST-MODIFIED:20260203T172919Z
UID:105731-1728388800-1728396000@bdionline.com
SUMMARY:Harnessing the Power of GenAI in Your Marketing
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/100824/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/AdobeSeattle.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Toronto:20240924T120000
DTEND;TZID=America/Toronto:20240924T140000
DTSTAMP:20260403T152215
CREATED:20240802T150807Z
LAST-MODIFIED:20260203T172923Z
UID:105172-1727179200-1727186400@bdionline.com
SUMMARY:Equinix Engage: Real-World Insights From Today’s Leaders in AI
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/092424/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/EquinixFeaturedImageToronto-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240919T120000
DTEND;TZID=America/New_York:20240919T140000
DTSTAMP:20260403T152215
CREATED:20240717T191037Z
LAST-MODIFIED:20260203T172925Z
UID:104223-1726747200-1726754400@bdionline.com
SUMMARY:Enterprise Data & GenAI Workshop with NVIDIA & HPE
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/091924/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/07/HPE-NVIDIA-MUSEAM.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240918T120000
DTEND;TZID=America/New_York:20240918T140000
DTSTAMP:20260403T152215
CREATED:20240802T154240Z
LAST-MODIFIED:20260203T172927Z
UID:105196-1726660800-1726668000@bdionline.com
SUMMARY:Equinix Engage: Real-World Insights From Today’s Leaders in AI
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/091824/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/08/EquinixFeaturedImageDC.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240917T120000
DTEND;TZID=America/New_York:20240917T150000
DTSTAMP:20260403T152215
CREATED:20240719T172937Z
LAST-MODIFIED:20260203T172928Z
UID:104324-1726574400-1726585200@bdionline.com
SUMMARY:Enterprise Data & GenAI Workshop with NVIDIA & HPE
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/091724/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/07/HPE-NVIDIA-GRAD-CENTER.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240807T120000
DTEND;TZID=America/New_York:20240807T140000
DTSTAMP:20260403T152215
CREATED:20240607T203723Z
LAST-MODIFIED:20260203T172930Z
UID:104082-1723032000-1723039200@bdionline.com
SUMMARY:Harnessing the Power of GenAI in Your Marketing
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/080724/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2024/06/Adobe-Cinni.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240731T120000
DTEND;TZID=America/New_York:20240731T140000
DTSTAMP:20260403T152215
CREATED:20240607T193111Z
LAST-MODIFIED:20260203T172931Z
UID:104032-1722427200-1722434400@bdionline.com
SUMMARY:Enterprise Data & Gen AI ​
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/073124/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2023/07/HPE-AMD-NYC-FeaturedImage.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240730T120000
DTEND;TZID=America/New_York:20240730T140000
DTSTAMP:20260403T152216
CREATED:20240607T194904Z
LAST-MODIFIED:20260203T172933Z
UID:104051-1722340800-1722348000@bdionline.com
SUMMARY:Harnessing the Power of GenAI in Your Marketing
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/073024/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2024/06/Adobe_Pittsburgh-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240613T120000
DTEND;TZID=America/New_York:20240613T140000
DTSTAMP:20260403T152216
CREATED:20240416T182813Z
LAST-MODIFIED:20260203T172934Z
UID:103483-1718280000-1718287200@bdionline.com
SUMMARY:Transforming Work in the Age of AI for Marketing
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/061324/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/04/Adobe-Chicago.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240606T120000
DTEND;TZID=America/New_York:20240606T140000
DTSTAMP:20260403T152216
CREATED:20240318T175920Z
LAST-MODIFIED:20260203T172935Z
UID:102435-1717675200-1717682400@bdionline.com
SUMMARY:Data and AI: Setting Up Your IT Infrastructure for Success
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/060624/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/digital-realty-palo-alto.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240605T120000
DTEND;TZID=America/New_York:20240605T140000
DTSTAMP:20260403T152216
CREATED:20240409T213139Z
LAST-MODIFIED:20260203T172936Z
UID:103302-1717588800-1717596000@bdionline.com
SUMMARY:Transforming Work in the Age of AI for Marketing 
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/06052024/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/04/Adobe-Atlanta.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240604T130000
DTEND;TZID=America/New_York:20240604T140000
DTSTAMP:20260403T152216
CREATED:20240507T174317Z
LAST-MODIFIED:20260203T172937Z
UID:103777-1717506000-1717509600@bdionline.com
SUMMARY:B2B ABM Field Marketing Event Roundtable - The Adobe Case Study
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/060424/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/05/bdi-adobe-preview-imafge.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240530T120000
DTEND;TZID=America/New_York:20240530T140000
DTSTAMP:20260403T152216
CREATED:20240318T150232Z
LAST-MODIFIED:20260203T172938Z
UID:102265-1717070400-1717077600@bdionline.com
SUMMARY:Data and AI: Setting Up Your IT Infrastructure for Success
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/053024/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/Digital-Reality-tysons.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240522T120000
DTEND;TZID=America/New_York:20240522T140000
DTSTAMP:20260403T152216
CREATED:20240325T195536Z
LAST-MODIFIED:20260203T172939Z
UID:102788-1716379200-1716386400@bdionline.com
SUMMARY:Enterprise Data & Gen AI
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/052224/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/HPE-CONRES-NVIDIA.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240521T120000
DTEND;TZID=America/New_York:20240521T140000
DTSTAMP:20260403T152216
CREATED:20240402T211248Z
LAST-MODIFIED:20260203T172940Z
UID:103115-1716292800-1716300000@bdionline.com
SUMMARY:Transforming Work in the Age of AI for Marketing 
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/052124/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/04/Adobe-nyc.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240516T120000
DTEND;TZID=America/New_York:20240516T140000
DTSTAMP:20260403T152216
CREATED:20240321T215952Z
LAST-MODIFIED:20260203T172942Z
UID:102653-1715860800-1715868000@bdionline.com
SUMMARY:Transforming Work in the Age of AI for Tech & Product Management
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/051624/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/Adobe-Dallas.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240515T120000
DTEND;TZID=America/New_York:20240515T140000
DTSTAMP:20260403T152216
CREATED:20240321T174159Z
LAST-MODIFIED:20260203T172943Z
UID:102592-1715774400-1715781600@bdionline.com
SUMMARY:Transforming Work in the Age of AI for Marketing 
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/051524/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/Adobe-Dallas.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240502T120000
DTEND;TZID=America/New_York:20240502T150000
DTSTAMP:20260403T152216
CREATED:20240326T180245Z
LAST-MODIFIED:20260203T172944Z
UID:102862-1714651200-1714662000@bdionline.com
SUMMARY:Enterprise Data & GenAI at NVIDIA
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/050224-2/
CATEGORIES:Event Calendar,No Header
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2024/03/hpe-nvidia-preview.png
END:VEVENT
END:VCALENDAR