BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Denver
BEGIN:DAYLIGHT
DTSTART:20220313T030000
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:MDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20221106T010000
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:MST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20220620T184645Z
UID:2544392E-8806-4FDF-AF29-E8158E7945BF
DTSTART;TZID=America/Denver:20220616T180000
DTEND;TZID=America/Denver:20220616T193000
DESCRIPTION:---------------------------------------------------------------
 \n\nAt a rapid pace\, cloud computing has transformed business and governm
 ent.\n\nThe development of the cloud service model provides business-suppo
 rting technology faster than ever before. The shift from traditional clien
 t/server to service-based models is transforming the way IT departments pl
 an\, design and deploy new applications.\n\nHowever\, cloud computing adva
 nces have also created\nnew security vulnerabilities.\n\nIn this talk\, fo
 r nine well known companies we will explore attack detail\, technical and 
 business impacts as well as how they could have been prevented by the nine
  companies.\n\nVirtual: https://events.vtools.ieee.org/m/317496
LOCATION:Virtual: https://events.vtools.ieee.org/m/317496
ORGANIZER:john@e-liteworks.com
SEQUENCE:0
SUMMARY:ANALYSIS AND LEARNINGS FROM CYBER-ATTACKS ON NINE WELL KNOWN COMPAN
 IES
URL;VALUE=URI:https://events.vtools.ieee.org/m/317496
X-ALT-DESC:Description: &lt;br /&gt;&lt;hr class=&quot;hr-solid&quot; /&gt;\n&lt;p&gt;At a rapid pace\,
  cloud computing has transformed business and government.&lt;/p&gt;\n&lt;p&gt;The deve
 lopment of the cloud service model provides business-supporting technology
  faster than ever before. The shift from traditional client/server to serv
 ice-based models is transforming the way IT departments plan\, design and 
 deploy new applications.&lt;/p&gt;\n&lt;p&gt;However\, cloud computing advances have a
 lso created&lt;br /&gt;new security vulnerabilities.&lt;/p&gt;\n&lt;p&gt;In this talk\, for 
 nine well known companies we will explore attack detail\, technical and bu
 siness impacts as well as how they could have been prevented by the nine c
 ompanies.&lt;/p&gt;
END:VEVENT
END:VCALENDAR

