BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
DTSTART:20240310T030000
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:CDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20241103T010000
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:CST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20240425T133343Z
UID:C5F27044-4B0D-43A0-8A6E-50EBC8E46DD8
DTSTART;TZID=America/Chicago:20240424T170000
DTEND;TZID=America/Chicago:20240424T191500
DESCRIPTION:[Cyber Security Attack]\n\nSafeguarding Your Business from Cybe
 r Threats:\n\nOverview\n\nIs your business safe from cyber-attacks? Cyber-
 attacks are at an all-time high and every business is at risk. Any size bu
 siness is vulnerable\, no-one is too small or too big. Putting anti-virus 
 on your computer is not sufficient.\n\nAre you doing the most to make sure
  your business is safe from malicious cyber-attacks? Learn 4 steps to a mo
 re secure business-technology environment.\n\nObjectives\n\n- This course 
 will teach you the 4 steps needed to protect your client and corporate dat
 a.\n- Identify risk your business faces\n- Know what data are you responsi
 ble for protecting\n- Understand where are your most vulnerable data\n- Pe
 rform a risk assessment\n- Identify email attacks\n- Choose the tools need
 ed to protect your business\n\nTopics Covered:\n\n- The cyber threat lands
 cape\n- Responsibilities of the business\n- Security frameworks\n- Risk ma
 nagement\n- Documentation\n- Human factors\n- Layered protection\n\nSpeake
 r(s): Peter Salerno\, \n\nAgenda: \n5:00pm - Networking (w/ light snacks a
 nd beverages)\n\n5:45pm - Introductions\n\n6:00pm - Feature Presentation\n
 \n7:00pm - Q&amp;A\n\n7:15pm - Meeting Adjourns\n\nBldg: Glen Ellyn Civic Cent
 er\, INNOVATION DUPAGE\, 535 Duane Street\, Glen Ellyn\, Illinois\, United
  States\, 60137\, Virtual: https://events.vtools.ieee.org/m/413552
LOCATION:Bldg: Glen Ellyn Civic Center\, INNOVATION DUPAGE\, 535 Duane Stre
 et\, Glen Ellyn\, Illinois\, United States\, 60137\, Virtual: https://even
 ts.vtools.ieee.org/m/413552
ORGANIZER:rob.klein@ieee.org
SEQUENCE:41
SUMMARY:Safeguarding Your Business from Cyber Threats
URL;VALUE=URI:https://events.vtools.ieee.org/m/413552
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;&lt;span style=&quot;font-size: 14pt\; font-family
 : arial\, helvetica\, sans-serif\;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 18pt\;
 &quot;&gt;&lt;img src=&quot;https://events.vtools.ieee.org/vtools_ui/media/display/d1939a3
 6-3048-4a04-8b28-188f060fbd0a&quot; alt=&quot;Cyber Security Attack&quot; width=&quot;800&quot; hei
 ght=&quot;450&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;\n&lt;p&gt;&lt;span style=&quot;font-size: 14pt\; f
 ont-family: arial\, helvetica\, sans-serif\;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-si
 ze: 18pt\;&quot;&gt;Safeguarding Your Business from Cyber Threats:&lt;/span&gt;&lt;br&gt;&lt;/str
 ong&gt;&lt;/span&gt;&lt;/p&gt;\n&lt;p style=&quot;font-weight: 400\;&quot;&gt;&lt;strong&gt;Overview&lt;/strong&gt;&lt;/
 p&gt;\n&lt;p&gt;Is your business safe from cyber-attacks? Cyber-attacks are at an a
 ll-time high and every business is at risk. Any size business is vulnerabl
 e\, no-one is too small or too big. Putting anti-virus on your computer is
  not sufficient.&lt;/p&gt;\n&lt;p&gt;Are you doing the most to make sure your business
  is safe from malicious cyber-attacks? Learn 4 steps to a more secure busi
 ness-technology environment.&lt;/p&gt;\n&lt;p style=&quot;font-weight: 400\;&quot;&gt;&lt;strong&gt;Ob
 jectives&lt;/strong&gt;&lt;/p&gt;\n&lt;ul&gt;\n&lt;li&gt;This course will teach you the 4 steps ne
 eded to protect your client and corporate data.&lt;/li&gt;\n&lt;li&gt;Identify risk yo
 ur business faces&lt;/li&gt;\n&lt;li&gt;Know what data are you responsible for protect
 ing&lt;/li&gt;\n&lt;li&gt;Understand where are your most vulnerable data&lt;/li&gt;\n&lt;li&gt;Per
 form a risk assessment&lt;/li&gt;\n&lt;li&gt;Identify email attacks&lt;/li&gt;\n&lt;li&gt;Choose t
 he tools needed to protect your business&lt;/li&gt;\n&lt;/ul&gt;\n&lt;p style=&quot;font-weigh
 t: 400\;&quot;&gt;&lt;strong&gt;Topics Covered:&lt;/strong&gt;&lt;/p&gt;\n&lt;ul&gt;\n&lt;li style=&quot;font-weig
 ht: 400\;&quot;&gt;The cyber threat landscape&lt;/li&gt;\n&lt;li&gt;Responsibilities of the bu
 siness&lt;/li&gt;\n&lt;li&gt;Security frameworks&lt;/li&gt;\n&lt;li&gt;Risk management&lt;/li&gt;\n&lt;li&gt;D
 ocumentation&lt;/li&gt;\n&lt;li&gt;Human factors&lt;/li&gt;\n&lt;li&gt;Layered protection&lt;/li&gt;\n&lt;/
 ul&gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;p&gt;5:00pm - Networking (w/ light snacks and b
 everages)&lt;/p&gt;\n&lt;p&gt;5:45pm - Introductions&lt;/p&gt;\n&lt;p&gt;6:00pm - Feature Presenta
 tion&lt;/p&gt;\n&lt;p&gt;7:00pm - Q&amp;amp\;A&lt;/p&gt;\n&lt;p&gt;7:15pm - Meeting Adjourns&lt;/p&gt;
END:VEVENT
END:VCALENDAR

