BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20170920T200000Z
DTEND:20170920T210000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Equifax Breach and Managing Your Vulnerabilities
DESCRIPTION:With 143 million personally identifiable records stolen\, the recent Equifax data breach is one of the largest and most damaging cyber-attacks to date. Hackers may have accessed highly valuable information\, including our social security numbers\, addresses\, birth dates and credit card information.\n\n\n\nWhat can we do do contain the damage as consumers\, as well as organizations? How can we move on from this breach? \n\n\n\nJoin this interactive panel discussion with cyber security experts across the spectrum to hear their thoughts on:\n\n- The key takeaways consumers and enterprises should act on to protect against cyber scams and attacks related to this breach\n\n- Managing IT risk and vulnerabilities\n\n- How to improve breach prevention\, detection and response\n\n- What to expect in the future\n\n\n\nSpeakers:\n\n- Carl Wright\, CRO\, AttackIQ\n\n- Igor Baikalov\, Chief Scientist\, Securonix\n\n- Chris Petersen\, CTO\, SVP of R&D & Co-Founder\, LogRhythm\n\n- Sam Abadir\, Director of Product Management\, LockPath
X-ALT-DESC;FMTTYPE=text/html:<span style="color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;">With 143 million personally identifiable records stolen\, the recent Equifax data breach is one of the largest and most damaging cyber-attacks to date. Hackers may have accessed highly valuable information\, including our social security numbers\, addresses\, birth dates and credit card information.</span><br style="box-sizing: border-box\; margin: 0px\; padding: 0px\; list-style: none\; color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;" />\n<br style="box-sizing: border-box\; margin: 0px\; padding: 0px\; list-style: none\; color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;" />\n<span style="color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;">What can we do do contain the damage as consumers\, as well as organizations? How can we move on from this breach?&nbsp\;</span><br style="box-sizing: border-box\; margin: 0px\; padding: 0px\; list-style: none\; color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;" />\n<br style="box-sizing: border-box\; margin: 0px\; padding: 0px\; list-style: none\; color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;" />\n<span style="color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;">Join this interactive panel discussion with cyber security experts across the spectrum to hear their thoughts on:</span><br style="box-sizing: border-box\; margin: 0px\; padding: 0px\; list-style: none\; color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;" />\n<span style="color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;">- The key takeaways consumers and enterprises should act on to protect against cyber scams and attacks related to this breach</span><br style="box-sizing: border-box\; margin: 0px\; padding: 0px\; list-style: none\; color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;" />\n<span style="color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;">- Managing IT risk and vulnerabilities</span><br style="box-sizing: border-box\; margin: 0px\; padding: 0px\; list-style: none\; color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;" />\n<span style="color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;">- How to improve breach prevention\, detection and response</span><br style="box-sizing: border-box\; margin: 0px\; padding: 0px\; list-style: none\; color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;" />\n<span style="color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;">- What to expect in the future</span><br style="box-sizing: border-box\; margin: 0px\; padding: 0px\; list-style: none\; color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;" />\n<br style="box-sizing: border-box\; margin: 0px\; padding: 0px\; list-style: none\; color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;" />\n<span style="color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;">Speakers:</span><br style="box-sizing: border-box\; margin: 0px\; padding: 0px\; list-style: none\; color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;" />\n<span style="color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;">- Carl Wright\, CRO\, AttackIQ</span><br style="box-sizing: border-box\; margin: 0px\; padding: 0px\; list-style: none\; color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;" />\n<span style="color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;">- Igor Baikalov\, Chief Scientist\, Securonix</span><br style="box-sizing: border-box\; margin: 0px\; padding: 0px\; list-style: none\; color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;" />\n<span style="color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;">- Chris Petersen\, CTO\, SVP of R&amp\;D &amp\; Co-Founder\, LogRhythm</span><br style="box-sizing: border-box\; margin: 0px\; padding: 0px\; list-style: none\; color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;" />\n<span style="color: rgb(77\, 77\, 77)\; font-family: BrightTALK\, arial\, helvetica\, sans-serif\; font-size: 14px\;">- Sam Abadir\, Director of Product Management\, LockPath</span>
LOCATION:webinar https://www.brighttalk.com/webcast/288/280157?utm_source=brighttalk-promoted&utm_medium=email&utm_term=Audience20275&utm_campaign=AUD-02710&utm_content=2017-09-14
UID:e.781.21939
SEQUENCE:3
DTSTAMP:20260413T183748Z
URL:https://business.littleriverchamber.org/events/details/equifax-breach-and-managing-your-vulnerabilities-21939
END:VEVENT

END:VCALENDAR
