BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Business Development Institute (BDI) - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://bdionline.com
X-WR-CALDESC:Events for Business Development Institute (BDI)
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20190310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20191103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200625T120000
DTEND;TZID=America/New_York:20200625T133000
DTSTAMP:20260404T070840
CREATED:20200506T200135Z
LAST-MODIFIED:20200625T153242Z
UID:47931-1593086400-1593091800@bdionline.com
SUMMARY:Insurance\, Digital Collaboration and the New Normal - Beyond Video Conferencing
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/062520insurance/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200625T120000
DTEND;TZID=America/New_York:20200625T133000
DTSTAMP:20260404T070841
CREATED:20200508T184138Z
LAST-MODIFIED:20200625T153309Z
UID:48058-1593086400-1593091800@bdionline.com
SUMMARY:Securing Accelerated Transformation: Aggregating\, Analyzing\, and Modeling Critical Enterprise Data
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/062520transformation/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200713T080000
DTEND;TZID=America/New_York:20200713T170000
DTSTAMP:20260404T070841
CREATED:20200713T173600Z
LAST-MODIFIED:20200803T193948Z
UID:49477-1594627200-1594659600@bdionline.com
SUMMARY:The Enterprise Infrastructure of Work from Anywhere
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/072920enterprise-form/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200714T120000
DTEND;TZID=America/New_York:20200714T133000
DTSTAMP:20260404T070841
CREATED:20200528T170710Z
LAST-MODIFIED:20200710T134719Z
UID:48486-1594728000-1594733400@bdionline.com
SUMMARY:Pandemic as a Change Agent: Scaling Human Interaction in our New World
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/071420interaction/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200714T120000
DTEND;TZID=America/New_York:20200714T133000
DTSTAMP:20260404T070841
CREATED:20200528T195916Z
LAST-MODIFIED:20210107T193706Z
UID:48509-1594728000-1594733400@bdionline.com
SUMMARY:How Viacom Digitally Transformed their Business with Equinix and Google
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/071420transform/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200715T120000
DTEND;TZID=America/New_York:20200715T133000
DTSTAMP:20260404T070841
CREATED:20200513T195447Z
LAST-MODIFIED:20200713T185623Z
UID:48213-1594814400-1594819800@bdionline.com
SUMMARY:Healthcare Transformation: Modernizing Your Patient Experience During Covid-19 and Beyond
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/071520healthcare/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200716T120000
DTEND;TZID=America/New_York:20200716T133000
DTSTAMP:20260404T070841
CREATED:20200521T145240Z
LAST-MODIFIED:20200707T160058Z
UID:48381-1594900800-1594906200@bdionline.com
SUMMARY:The Future of Work: Digitizing Operations with Intelligent Automation
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/071620automation/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200716T120000
DTEND;TZID=America/New_York:20200716T133000
DTSTAMP:20260404T070841
CREATED:20200526T171647Z
LAST-MODIFIED:20200626T201606Z
UID:48419-1594900800-1594906200@bdionline.com
SUMMARY:Enhancing Spend Visibility During Times of Disruption
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/071620disruption/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200728T120000
DTEND;TZID=America/New_York:20200728T133000
DTSTAMP:20260404T070841
CREATED:20200616T154351Z
LAST-MODIFIED:20200708T173814Z
UID:49064-1595937600-1595943000@bdionline.com
SUMMARY:PERSONALIZED DIGITAL MARKETING AT SCALE
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/072820marketing/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200729T120000
DTEND;TZID=America/New_York:20200729T133000
DTSTAMP:20260404T070841
CREATED:20200604T150740Z
LAST-MODIFIED:20200714T185619Z
UID:48849-1596024000-1596029400@bdionline.com
SUMMARY:The Enterprise Infrastructure of Work from Anywhere
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/072920enterprise/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200729T120000
DTEND;TZID=America/New_York:20200729T133000
DTSTAMP:20260404T070841
CREATED:20200604T172553Z
LAST-MODIFIED:20200713T171352Z
UID:48879-1596024000-1596029400@bdionline.com
SUMMARY:Building Your New Digital Workplace Strategy
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/072920strategy/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200730T103000
DTEND;TZID=America/New_York:20200730T110000
DTSTAMP:20260404T070841
CREATED:20200428T172447Z
LAST-MODIFIED:20200714T152021Z
UID:47621-1596105000-1596106800@bdionline.com
SUMMARY:How PayPal Digitally Transformed their Business with Equinix and Google Cloud
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/073020payments/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200730T120000
DTEND;TZID=America/New_York:20200730T133000
DTSTAMP:20260404T070841
CREATED:20200601T170830Z
LAST-MODIFIED:20200625T153143Z
UID:48580-1596110400-1596115800@bdionline.com
SUMMARY:Building Your Content Engine
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/073020content/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200730T120000
DTEND;TZID=America/New_York:20200730T133000
DTSTAMP:20260404T070841
CREATED:20200601T183538Z
LAST-MODIFIED:20200724T135951Z
UID:48590-1596110400-1596115800@bdionline.com
SUMMARY:Email Humanization Marketing with Personalization and Empathy
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/073020humanization/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200811T120000
DTEND;TZID=America/New_York:20200811T133000
DTSTAMP:20260404T070841
CREATED:20200225T152745Z
LAST-MODIFIED:20200814T151128Z
UID:45738-1597147200-1597152600@bdionline.com
SUMMARY:Hybrid Cloud Transformation with AWS Outposts & Equinix
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/081120cloud/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200812T120000
DTEND;TZID=America/New_York:20200812T133000
DTSTAMP:20260404T070841
CREATED:20200624T145750Z
LAST-MODIFIED:20200721T172335Z
UID:49195-1597233600-1597239000@bdionline.com
SUMMARY:Email Humanization Marketing with Personalization and Empathy
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/081220humanization/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200813T120000
DTEND;TZID=America/New_York:20200813T133000
DTSTAMP:20260404T070841
CREATED:20200710T171435Z
LAST-MODIFIED:20200807T141638Z
UID:49377-1597320000-1597325400@bdionline.com
SUMMARY:Intelligent Automation: Building Process Excellence and Enterprise Agility
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/081320automation/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200915T120000
DTEND;TZID=America/New_York:20200915T133000
DTSTAMP:20260404T070841
CREATED:20200724T141658Z
LAST-MODIFIED:20200814T154111Z
UID:49701-1600171200-1600176600@bdionline.com
SUMMARY:MarketingWorks Life Sciences
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/091520marketingworks/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200916T120000
DTEND;TZID=America/New_York:20200916T133000
DTSTAMP:20260404T070841
CREATED:20200806T151117Z
LAST-MODIFIED:20200826T224438Z
UID:49882-1600257600-1600263000@bdionline.com
SUMMARY:Customer Service Automation:  RPA for Financial Services
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/091620customer/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200924T120000
DTEND;TZID=America/New_York:20200924T133000
DTSTAMP:20260404T070841
CREATED:20200807T155658Z
LAST-MODIFIED:20200921T192217Z
UID:49968-1600948800-1600954200@bdionline.com
SUMMARY:Accelerated Innovation in the Life Sciences Ecosystem
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/092420innovation/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200924T120000
DTEND;TZID=America/New_York:20200924T133000
DTSTAMP:20260404T070841
CREATED:20200807T163914Z
LAST-MODIFIED:20200922T133904Z
UID:50004-1600948800-1600954200@bdionline.com
SUMMARY:ITWorks: The Road Ahead
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/092420itworks/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200924T130000
DTEND;TZID=America/New_York:20200924T143000
DTSTAMP:20260404T070841
CREATED:20200717T135302Z
LAST-MODIFIED:20200921T134615Z
UID:49556-1600952400-1600957800@bdionline.com
SUMMARY:The Cloudification of Capital Markets: Applying Emerging Technologies
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/092420cloudification/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200929T120000
DTEND;TZID=America/New_York:20200929T133000
DTSTAMP:20260404T070841
CREATED:20200818T210308Z
LAST-MODIFIED:20200925T192811Z
UID:50196-1601380800-1601386200@bdionline.com
SUMMARY:Looking Forward: Why Customer Messaging Matters In FinTech
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/092920message/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200929T120000
DTEND;TZID=America/New_York:20200929T133000
DTSTAMP:20260404T070841
CREATED:20200820T163716Z
LAST-MODIFIED:20200922T133444Z
UID:50260-1601380800-1601386200@bdionline.com
SUMMARY:Email Humanization Marketing with Personalization and Empathy
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/092920humanization/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200930T120000
DTEND;TZID=America/New_York:20200930T133000
DTSTAMP:20260404T070841
CREATED:20200731T175344Z
LAST-MODIFIED:20200921T131228Z
UID:49781-1601467200-1601472600@bdionline.com
SUMMARY:Digital Twins: The Future of Automation for FSI
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/093020digitaltwins/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200930T120000
DTEND;TZID=America/New_York:20200930T133000
DTSTAMP:20260404T070841
CREATED:20200811T191548Z
LAST-MODIFIED:20200922T133737Z
UID:50039-1601467200-1601472600@bdionline.com
SUMMARY:Normalizing Your Supply Chain in Uncertain Times
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/093020supplychain/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201006T120000
DTEND;TZID=America/New_York:20201006T133000
DTSTAMP:20260404T070841
CREATED:20200820T173824Z
LAST-MODIFIED:20201002T181223Z
UID:50283-1601985600-1601991000@bdionline.com
SUMMARY:Email Humanization
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/100620humanization/
ATTACH;FMTTYPE=image/png:https://bdionline.com/wp-content/uploads/2020/02/triangles-1430105-e1591997241289.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201007T120000
DTEND;TZID=America/New_York:20201007T133000
DTSTAMP:20260404T070841
CREATED:20200811T201840Z
LAST-MODIFIED:20201002T201948Z
UID:50094-1602072000-1602077400@bdionline.com
SUMMARY:Normalizing Your Supply Chain in Uncertain Times
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/100720supplychain/
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2020/08/shutterstock_1008522319-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201007T120000
DTEND;TZID=America/New_York:20201007T133000
DTSTAMP:20260404T070841
CREATED:20200811T202536Z
LAST-MODIFIED:20201005T135659Z
UID:50100-1602072000-1602077400@bdionline.com
SUMMARY:Brand Talks Connected: Digital Acceleration
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/100720brandtalks/
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2020/08/200608_MT_Event_BrandTalksConnected_v2-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201008T120000
DTEND;TZID=America/New_York:20201008T133000
DTSTAMP:20260404T070841
CREATED:20200831T211716Z
LAST-MODIFIED:20201006T200228Z
UID:50495-1602158400-1602163800@bdionline.com
SUMMARY:The Race Chasm:  Addressing Underrepresentation of Black Professionals in B2B Tech
DESCRIPTION:Identity First:				\n				\n				\n				\n					Identity First:				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Taking a Zero Trust Approach to Security				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n					Tuesday\, March 30th @ 12:00 – 1:30 PM CT				\n				\n				\n				\n									\n					\n						\n						\n							\n									RSVP\n					\n					\n				\n								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n								\n				About\nPanel\nDetails\nSponsor\n			\n					\n					\n					\n				About\nPanel\nDetails\nSponsor\n			\n						\n				\n					\n		\n					\n		\n				\n					\n			\n	\n	\n	\n		\n					\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					About the Program				\n				\n				\n				\n									Identity First: Taking a Zero Trust Approach to Security is an invitation-only\, video-based virtual event limited to information security leaders from enterprises in the Central region who will convene with three goals in mind: Gain actionable insights from conversations led by our expert moderated panelParticipate in interactive breakout room video discussionsBuild meaningful new connections with a group of diverse thinkers								\n				\n					\n		\n				\n			\n						\n				\n																														\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					About the Content				\n				\n				\n				\n									When the pandemic started\, many organizations’ primary focus was enabling their employees to work remotely. Now that companies have established their digital workplaces\, they’re grappling with complex concerns such as the expanded security perimeter and increased vulnerabilities that accompany a greater reliance on cloud technologies. Since March 2020\, cyberattacks have increased from a 400% to an 800% rise year over year\, highlighting the need for high-security measures. Identity security is a crucial part of every interaction. With more content and devices in the network than ever before\, organizations are beginning to rely more heavily on automation tech and least privilege principles to create a self-driving security system. Now\, as organizations shift to a Zero Trust security approach\, information security leaders are evaluating how to effectively manage and govern access while keeping the employee experience as frictionless as possible.  Our expert panel will discuss reshaping the conversation around enablement to focus on prioritizing security and identity governance as organizations move to a Zero Trust approach. 								\n				\n					\n		\n				\n			\n						\n				\n					Discussion Topics				\n				\n				\n				\n									Preparing for a successful identity security journeyGoverning the effectiveness of your organization’s identity controlsUtilizing identity automation to enable timely\, least privilege access to resources Implementing least privilege access controls with RBAC and SODMitigating risks and responding to threats with adaptive governance and access intelligence capabilities								\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n					\n			\n    \n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Moderator				\n				\n				\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Lori Robinson\n																						Sr. Director\, Product and Market StrategySailPoint\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n						\n				\n				\n				\n					Panelists				\n				\n				\n				\n					Panelists				\n				\n				\n						\n					\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Dmitriy Sokolovskiy\n																						VP and CSO/CISOAvid Technology\, Inc.\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Michael Lester\n																						 Director\, Cyber Security Strategy\, Governance & ArchitectureEmerson Electric\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Casey Watkins\n																						Managing Director/CISO\, Enterprise Information SecurityFTI Consulting\n													\n									\n			\n					\n						\n				\n					\n		\n				\n			\n						\n				\n							\n			\n						\n				\n											\n													\n					\n										\n														Ian Anderson\n																						 Manager\, Enterprise SecurityOGE Energy Corp.\n													\n									\n			\n					\n						\n				\n					\n		\n					\n		\n					\n		\n					\n		\n				\n							\n							\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Event Details				\n				\n					\n		\n					\n		\n				\n				\n					Date				\n				\n				\n				\n									Tuesday\, March 30th\, 2021 								\n				\n				\n				\n					Time				\n				\n				\n				\n									12:00 pm – 1:30 pm CST 								\n				\n				\n				\n					Attendee Profile				\n				\n				\n				\n									Select group of information security leaders from the Central region 								\n				\n					\n		\n				\n			\n						\n						\n					\n			\n						\n				\n					Agenda				\n				\n					\n		\n					\n		\n				\n				\n									12:00PM     Attendees Enter Virtual Event & Welcome Remarks 12:05PM     Video Networking in Breakout Rooms 12:15PM     Panel Discussion 12:55PM     Audience Q&A 1:10PM       Breakout Networking Sessions 								\n				\n				\n				\n									12:00PM      Attendees Enter Virtual Event & Welcome Remarks 12:05PM      Video Networking in Breakout Rooms 12:15PM      Panel Discussion 12:55PM      Audience Q&A 1:10PM        Breakout Networking Sessions 								\n				\n					\n		\n					\n		\n				\n							\n						\n			\n	\n	\n	\n	\n		\n					\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Reserve Your Spot Here				\n				\n				\n				\n							\n			\n			\n			\n\n			\n			\n								\n												\n								First Name							\n														\n											\n								\n												\n								Last Name							\n														\n											\n								\n												\n								Job Title							\n														\n											\n								\n												\n								Company Name							\n														\n											\n								\n												\n								Business Email Address							\n														\n											\n								\n												\n								Message							\n										\n								\n									\n								\n					\n						\n																						SUBMIT\n													\n					\n				\n			\n		\n						\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n						\n					\n			\n						\n				\n							\n						\n				\n				\n				\n					Sponsor				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									SailPoint\, the leader in identity management across global government agencies\, delivers an innovative approach to securing access across the enterprise. With SailPoint\, agencies can ensure that access is granted accurately and efficiently. The SailPoint Predictive IdentityTM platform is designed to securely accelerate mission objectives while delivering adaptive security\, continuous compliance and improved process efficiency. Learn more at www.sailpoint.com. 								\n				\n					\n		\n					\n		\n				\n						\n					\n			\n						\n				\n					Organizer				\n				\n				\n				\n																														\n				\n					\n		\n				\n			\n						\n				\n									Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only\, thought leadership driven\, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.
URL:https://bdionline.com/event/100820racechasm/
ATTACH;FMTTYPE=image/jpeg:https://bdionline.com/wp-content/uploads/2020/08/shutterstock_1627828234-scaled.jpg
END:VEVENT
END:VCALENDAR