BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Denver
BEGIN:DAYLIGHT
DTSTART:20220313T030000
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:MDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20221106T010000
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:MST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20220619T220349Z
UID:3F7938E6-5017-4158-AB9C-6BDEB4D08EC6
DTSTART;TZID=America/Denver:20220616T180000
DTEND;TZID=America/Denver:20220616T193000
DESCRIPTION:At a rapid pace\, cloud computing has transformed business and 
 government.\n\nThe development of the cloud service model provides busines
 s-supporting technology faster than ever before. The shift from traditiona
 l client/server to service-based models is transforming the way IT departm
 ents plan\, design and deploy new applications.\n\nHowever\, cloud computi
 ng advances have also created\nnew security vulnerabilities.\n\nIn this ta
 lk\, for nine well known companies we will explore attack detail\, technic
 al and business impacts as well as how they could have been prevented by t
 he nine companies.\n\nSpeaker(s): Senthil Mehalingam\, \n\nVirtual: https:
 //events.vtools.ieee.org/m/316059
LOCATION:Virtual: https://events.vtools.ieee.org/m/316059
ORGANIZER:genef@ieee.org
SEQUENCE:5
SUMMARY:June 2022 -- PPCS - Analysis and Learnings from Cyber-Attacks on Ni
 ne Well Known Companies
URL;VALUE=URI:https://events.vtools.ieee.org/m/316059
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;At a rapid pace\, cloud computing has tran
 sformed business and government.&lt;/p&gt;\n&lt;p&gt;The development of the cloud serv
 ice model provides business-supporting technology faster than ever before.
  The shift from traditional client/server to service-based models is trans
 forming the way IT departments plan\, design and deploy new applications.&lt;
 /p&gt;\n&lt;p&gt;However\, cloud computing advances have also created&lt;br /&gt;new secu
 rity vulnerabilities.&lt;/p&gt;\n&lt;p&gt;In this talk\, for nine well known companies
  we will explore attack detail\, technical and business impacts as well as
  how they could have been prevented by the nine companies.&lt;/p&gt;
END:VEVENT
END:VCALENDAR

