BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:Asia/Kolkata
BEGIN:STANDARD
DTSTART:19451014T230000
TZOFFSETFROM:+0630
TZOFFSETTO:+0530
TZNAME:IST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20240511T203622Z
UID:B2B46A39-2E4E-45C9-912C-2C467FD8464A
DTSTART;TZID=Asia/Kolkata:20240418T153000
DTEND;TZID=Asia/Kolkata:20240419T193200
DESCRIPTION:The IEEE JUIT Student Branch inaugurated Digital Guardians Prot
 ecting our Cyber Realm\, Preserving Our Planet under CyberSavy Theme in co
 llaboration with IEEE\, Delhi Section\, India Council and R10 celebrated t
 he Education week on April18\, 2024.\n\nItinerary\n\nApril 18\, 2024\n\nIn
 augural and introduction\, Participants gained practical knowledge on secu
 ring their digital footprint and protecting sensitive information.\n\nApri
 l 19\, 2024\n\nHands-on experience in identifying vulnerabilities and asse
 ssing the security posture of digital systems\, blockchain security.\n\nTh
 e first day commenced with an insightful keynote address by Mr. Ajinkya Lo
 hakare\, a leading expert in cybersecurity\, setting the tone for the disc
 ussions ahead. Following this\, a series of interactive sessions delved in
 to various aspects of digital safety\, starting with the importance of onl
 ine privacy in an era of increasing data breaches and surveillance. Partic
 ipants gained practical knowledge on securing their digital footprint and 
 protecting sensitive information from malicious actors. Additionally\, ses
 sions on data security shed light on the latest encryption techniques and 
 best practices for safeguarding digital assets. Participants were encourag
 ed to adopt proactive measures to mitigate the risks of data loss or theft
 \, thereby enhancing their resilience against cyber threats. The afternoon
  sessions focused on social engineering tactics employed by cybercriminals
  to manipulate individuals into divulging confidential information or perf
 orming unauthorised actions. Through engaging case studies and simulations
 \, participants learned to recognize and resist common social engineering 
 techniques\, thereby fortifying their defences against cyber-attacks.\n\nR
 oom: LT-2\, Jaypee University Of Information Technology\, Solan\, Himachal
  Pradesh\, India\, 173234
LOCATION:Room: LT-2\, Jaypee University Of Information Technology\, Solan\,
  Himachal Pradesh\, India\, 173234
ORGANIZER:ieee.sight@juitsolan.in
SEQUENCE:4
SUMMARY:Digital Guardians Protecting our Cyber Realm\, Preserving Our Plane
 t 
URL;VALUE=URI:https://events.vtools.ieee.org/m/420561
X-ALT-DESC:Description: &lt;br /&gt;&lt;p class=&quot;Normal1&quot; style=&quot;text-align: justify
 \; line-height: 150%\; margin: 12.0pt 0cm 12.0pt 0cm\;&quot;&gt;&lt;strong style=&quot;mso
 -bidi-font-weight: normal\;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-size: 12.0pt\;
  line-height: 150%\; font-family: &#39;Times New Roman&#39;\,serif\;&quot;&gt;&lt;span style=
 &quot;color: rgb(0\, 0\, 0)\;&quot;&gt;The &lt;span lang=&quot;EN-US&quot; style=&quot;background: white\
 ;&quot;&gt;IEEE JUIT Student Branch&lt;/span&gt; inaugurated &lt;span lang=&quot;EN-US&quot; style=&quot;b
 ackground: white\;&quot;&gt;Digital Guardians Protecting our Cyber Realm\, Preserv
 ing Our Planet under CyberSavy Theme&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-
 size: 16pt\; line-height: 150%\; background: white\;&quot;&gt; &lt;/span&gt;in collabora
 tion with &lt;span lang=&quot;EN-US&quot; style=&quot;background: white\;&quot;&gt;IEEE\, Delhi Sect
 ion\,&amp;nbsp\;India Council and R10 celebrated the Education week on April18
 \, 2024&lt;/span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;\n&lt;p class=&quot;Normal1&quot; style=&quot;text
 -align: justify\; line-height: 150%\; margin: 12.0pt 0cm 12.0pt 0cm\;&quot;&gt;&lt;st
 rong style=&quot;mso-bidi-font-weight: normal\;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font
 -size: 12.0pt\; line-height: 150%\; font-family: &#39;Times New Roman&#39;\,serif\
 ;&quot;&gt;Itinerary&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;\n&lt;table class=&quot;MsoNormalTable&quot; style=&quot;mar
 gin-left: 19.2pt\; border-collapse: collapse\; mso-table-layout-alt: fixed
 \; border: none\; mso-border-alt: solid black 1.0pt\; mso-yfti-tbllook: 15
 36\; mso-padding-alt: 0cm 5.4pt 0cm 5.4pt\; mso-border-insideh: 1.0pt soli
 d black\; mso-border-insidev: 1.0pt solid black\;&quot; border=&quot;1&quot; width=&quot;574&quot; 
 cellspacing=&quot;0&quot; cellpadding=&quot;0&quot;&gt;\n&lt;thead&gt;\n&lt;tr style=&quot;mso-yfti-irow: 0\; m
 so-yfti-firstrow: yes\; page-break-inside: avoid\;&quot;&gt;\n&lt;td style=&quot;width: 92
 .15pt\; border: solid black 1.0pt\; padding: 5.0pt 5.0pt 5.0pt 5.0pt\;&quot; va
 lign=&quot;top&quot; width=&quot;123&quot;&gt;\n&lt;p class=&quot;Normal1&quot; style=&quot;text-align: justify\; l
 ine-height: 150%\; mso-pagination: none\; border: none\; mso-padding-alt: 
 31.0pt 31.0pt 31.0pt 31.0pt\; mso-border-shadow: yes\;&quot;&gt;&lt;span lang=&quot;EN-US&quot;
  style=&quot;font-size: 12.0pt\; line-height: 150%\; font-family: &#39;Times New Ro
 man&#39;\,serif\; mso-fareast-font-family: &#39;Times New Roman&#39;\;&quot;&gt;April 18\, 202
 4&lt;/span&gt;&lt;/p&gt;\n&lt;/td&gt;\n&lt;td style=&quot;width: 338.65pt\; border: solid black 1.0p
 t\; border-left: none\; mso-border-left-alt: solid black 1.0pt\; padding: 
 5.0pt 5.0pt 5.0pt 5.0pt\;&quot; valign=&quot;top&quot; width=&quot;452&quot;&gt;\n&lt;p class=&quot;Normal1&quot; s
 tyle=&quot;text-align: justify\; line-height: 150%\; mso-pagination: none\; bor
 der: none\; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt\; mso-border-shad
 ow: yes\;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-size: 12.0pt\; line-height: 150%
 \; font-family: &#39;Times New Roman&#39;\,serif\; mso-fareast-font-family: &#39;Times
  New Roman&#39;\;&quot;&gt;Inaugural and introduction\, Participants gained practical 
 knowledge on securing their digital footprint and protecting sensitive inf
 ormation.&lt;/span&gt;&lt;/p&gt;\n&lt;/td&gt;\n&lt;/tr&gt;\n&lt;tr style=&quot;mso-yfti-irow: 1\; mso-yfti
 -lastrow: yes\; page-break-inside: avoid\;&quot;&gt;\n&lt;td style=&quot;width: 92.15pt\; 
 border: solid black 1.0pt\; border-top: none\; mso-border-top-alt: solid b
 lack 1.0pt\; padding: 5.0pt 5.0pt 5.0pt 5.0pt\;&quot; valign=&quot;top&quot; width=&quot;123&quot;&gt;
 \n&lt;p class=&quot;Normal1&quot; style=&quot;text-align: justify\; line-height: 150%\; mso-
 pagination: none\; border: none\; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31
 .0pt\; mso-border-shadow: yes\;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-size: 12.0
 pt\; line-height: 150%\; font-family: &#39;Times New Roman&#39;\,serif\; mso-farea
 st-font-family: &#39;Times New Roman&#39;\;&quot;&gt;April 19\, 2024&lt;/span&gt;&lt;/p&gt;\n&lt;/td&gt;\n&lt;t
 d style=&quot;width: 338.65pt\; border-top: none\; border-left: none\; border-b
 ottom: solid black 1.0pt\; border-right: solid black 1.0pt\; mso-border-to
 p-alt: solid black 1.0pt\; mso-border-left-alt: solid black 1.0pt\; paddin
 g: 5.0pt 5.0pt 5.0pt 5.0pt\;&quot; valign=&quot;top&quot; width=&quot;452&quot;&gt;\n&lt;p class=&quot;Normal1
 &quot; style=&quot;margin-top: 12.0pt\; text-align: justify\; line-height: 150%\;&quot;&gt;&lt;
 span lang=&quot;EN-US&quot; style=&quot;font-size: 12.0pt\; line-height: 150%\; font-fami
 ly: &#39;Times New Roman&#39;\,serif\; mso-fareast-font-family: &#39;Times New Roman&#39;\
 ;&quot;&gt;Hands-on experience in identifying vulnerabilities and assessing the se
 curity posture of digital systems\, blockchain security.&lt;/span&gt;&lt;/p&gt;\n&lt;/td&gt;
 \n&lt;/tr&gt;\n&lt;/thead&gt;\n&lt;/table&gt;\n&lt;p class=&quot;Normal1&quot; style=&quot;margin-top: 1.0pt\;
  text-align: justify\; line-height: 150%\;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font
 -size: 16.0pt\; mso-bidi-font-size: 11.0pt\; line-height: 150%\; color: bl
 ue\; background: white\;&quot;&gt;&amp;nbsp\;&lt;/span&gt;&lt;/p&gt;\n&lt;p class=&quot;Normal1&quot; style=&quot;ma
 rgin-top: 1.0pt\; text-align: justify\; line-height: 150%\;&quot;&gt;&lt;span lang=&quot;E
 N-US&quot; style=&quot;font-size: 12.0pt\; line-height: 150%\; font-family: &#39;Times N
 ew Roman&#39;\,serif\;&quot;&gt;The first day commenced with an insightful keynote add
 ress by Mr. &lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: blue\; background: whi
 te\;&quot;&gt;Ajinkya Lohakare&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-size: 12.0pt\;
  line-height: 150%\; font-family: &#39;Times New Roman&#39;\,serif\;&quot;&gt;\, a leading
  expert in cybersecurity\, setting the tone for the discussions ahead. Fol
 lowing this\, a series of interactive sessions delved into various aspects
  of digital safety\, starting with the importance of online privacy in an 
 era of increasing data breaches and surveillance. Participants gained prac
 tical knowledge on securing their digital footprint and protecting sensiti
 ve information from malicious actors. Additionally\, sessions on data secu
 rity shed light on the latest encryption techniques and best practices for
  safeguarding digital assets. Participants were encouraged to adopt proact
 ive measures to mitigate the risks of data loss or theft\, thereby enhanci
 ng their resilience against cyber threats.&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=
 &quot;font-size: 12.0pt\; line-height: 150%\; font-family: &#39;Times New Roman&#39;\,s
 erif\; mso-fareast-font-family: Calibri\;&quot;&gt; &lt;/span&gt;&lt;span lang=&quot;EN-US&quot; styl
 e=&quot;font-size: 12.0pt\; line-height: 150%\; font-family: &#39;Times New Roman&#39;\
 ,serif\;&quot;&gt;The afternoon sessions focused on social engineering tactics emp
 loyed by cybercriminals to manipulate individuals into divulging confident
 ial information or performing unauthorised actions. Through engaging case 
 studies and simulations\, participants learned to recognize and resist com
 mon social engineering techniques\, thereby fortifying their defences agai
 nst cyber-attacks.&lt;/span&gt;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

