BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:Canada/Eastern
BEGIN:DAYLIGHT
DTSTART:20220313T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20211107T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20220427T013649Z
UID:4D75FEEC-A460-4E44-86B6-5735DDFB23D8
DTSTART;TZID=Canada/Eastern:20211116T120000
DTEND;TZID=Canada/Eastern:20211116T130000
DESCRIPTION:IEEE Canada Region and IEEE Toronto Section Industry Engagement
  Committees are pleased to announce that there will be a Cybersecurity Lun
 ch Talk Series in collaboration with Accenture. We will kick this off with
  this talk titled &quot;Zero Trust: A journey from theory to tactical applicati
 on&quot;.\n\nClassic perimeter/defense-in-depth cybersecurity strategies are qu
 ickly becoming obsolete when protecting against well-resourced adversaries
 \, and not efficient when addressing insider threats.\nOn May 12 this year
 \, the Biden administration issued an &#39;Executive Order on improving the na
 tion’s cybersecurity&#39; which made clear the need for &quot;bold changes and si
 gnificant investments&quot; in order to defend both IT and OT across our vital 
 institutions\, including advancing towards a &#39;Zero Trust Architecture&#39;.\nD
 uring the same month\, the Canadian Government recognized that in light of
  emerging trends in the industry and the strategic direction of the govern
 ment to support user access from any device at any time\, a new security p
 aradigm is required. That paradigm is Zero Trust Architecture (ZTA).\nThis
  new approach renounces any implied trust (of users or location)\, assumes
  hostility within the network\, replaces the dated ideas of security based
  on physical location\, and moves to a dynamic user/device/application pol
 icy driven model. Contrary to previous paradigms\, Zero Trust embeds secur
 ity throughout the architecture to prevent malicious personas from accessi
 ng our most critical assets.\nThe challenge remains for many institutions 
 to define what Zero Trust actually means for them and moreover the difficu
 lty of articulating what tactical steps should be taken to achieve the goa
 ls or Zero Trust is a roadblock to many institutions from embarking on a Z
 ero Trust journey.\nJoin this session to learn:\n- How Zero Trust can unlo
 ck new business value\n- The importance of identity in a Zero Trust enviro
 nment\n- How your organization can get started on its Zero Trust journey\n
 \nCo-sponsored by: Accenture\n\nSpeaker(s): Ian Zwirek\, \n\nVirtual: http
 s://events.vtools.ieee.org/m/288411
LOCATION:Virtual: https://events.vtools.ieee.org/m/288411
ORGANIZER:asadollah.norouzi@ieee.org
SEQUENCE:12
SUMMARY:[Cybersecurity Lunch Talk Series] Accenture presents Zero Trust: A 
 journey from theory to tactical application
URL;VALUE=URI:https://events.vtools.ieee.org/m/288411
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;IEEE Canada Region and IEEE Toronto Sectio
 n Industry Engagement Committees are pleased to announce that there will b
 e a Cybersecurity Lunch Talk Series in collaboration with Accenture. We wi
 ll kick this off with this talk titled &lt;strong&gt;&quot;Zero Trust: A journey from
  theory to tactical application&quot;&lt;/strong&gt;.&lt;/p&gt;\n&lt;p&gt;Classic perimeter/defen
 se-in-depth cybersecurity strategies are quickly becoming obsolete when pr
 otecting against well-resourced adversaries\, and not efficient when addre
 ssing insider threats.&lt;br /&gt;On May 12 this year\, the Biden administration
  issued an &#39;Executive Order on improving the nation&amp;rsquo\;s cybersecurity
 &#39; which made clear the need for &quot;bold changes and significant investments&quot;
  in order to defend both IT and OT across our vital institutions\, includi
 ng advancing towards a &#39;Zero Trust Architecture&#39;.&amp;nbsp\;&lt;br /&gt;During the s
 ame month\, the Canadian Government recognized that in light of emerging t
 rends in the industry and the strategic direction of the government to sup
 port user access from any device at any time\, a new security paradigm is 
 required. That paradigm is Zero Trust Architecture (ZTA).&lt;br /&gt;This new ap
 proach renounces any implied trust (of users or location)\, assumes hostil
 ity within the network\, replaces the dated ideas of security based on phy
 sical location\, and moves to a dynamic user/device/application policy dri
 ven model. Contrary to previous paradigms\, Zero Trust embeds security thr
 oughout the architecture to prevent malicious personas from accessing our 
 most critical assets.&lt;br /&gt;The challenge remains for many institutions to 
 define what Zero Trust actually means for them and moreover the difficulty
  of articulating what tactical steps should be taken to achieve the goals 
 or Zero Trust is a roadblock to many institutions from embarking on a Zero
  Trust journey.&lt;br /&gt;Join this session to learn:&lt;br /&gt;- How Zero Trust can
  unlock new business value&lt;br /&gt;- The importance of identity in a Zero Tru
 st environment&lt;br /&gt;- How your organization can get started on its Zero Tr
 ust journey&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

