BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
DTSTART:20240310T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20241103T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20240601T225422Z
UID:90020C1D-A462-47AF-B96C-34936B7CF35E
DTSTART;TZID=America/New_York:20240529T190000
DTEND;TZID=America/New_York:20240529T203000
DESCRIPTION:Introduction:\n\nCybersecurity is becoming increasingly importa
 nt in today’s world. This lecture is to assist by\nproviding explanation
 s\, examples and practices on fundamental principles of a variety of\ncybe
 rsecurity topics\, without getting bogged down into technical details\n\nP
 urpose:\n\nThis lecture is intended to provide ONLY an initial introductio
 n to the field of cybersecurity.\n\nBeginning with a few of the relevant t
 erms and expressions used in the industry\, some important\n\nsecurity pri
 nciples\, a brief historical overview and current trends and some solution
  approaches in brief\n\nwill be mentioned.\n\n-  Cybersecurity terms\, pri
 nciples\, and history\n-   Basic terminology\n-  Principles of cybersecuri
 ty\n-  Identifying and managing security risks\n-  Implementing security c
 ontrols to reduce security risks\n-  Detecting and understanding cybersecu
 rity events\n-  Responding to and recovering from cybersecurity incidents\
 n\nA brief history of cybersecurity from the past until now in the 2020’
 s\n\n-  Notable cybersecurity attacks\n-  Cyber phishing attacks\n-  Large
  Companies\n-  Retailers\n-  Hotels and Hospitality\n-  Software Platforms
 \n-  Email providers\n\nCurrent challenges\n\n-  Attrition\n-  Skills gap\
 n-  Cybersecurity certifications\n-  Active defensive strategies\n-  Ethic
 al hacking\n-  Future of the cybersecurity industry\n-  DevSecOps\n-  Arti
 ficial intelligence\n\n· Predictions/Conclusion\n\nCo-sponsored by: Lori 
 L. Jeromin\,  LMAG \n\nSpeaker(s): Navid\n\nAgenda: \n- Introduction 7pm\n
 - Chair&#39;s Remarks 7:05 pm\n- Speaker Introduction 7:10 pm\n- Lecture 7:15 
 pm to 8:15 pm\n- Closing Remarks 8:30 pm\n\nVirtual: https://events.vtools
 .ieee.org/m/420919
LOCATION:Virtual: https://events.vtools.ieee.org/m/420919
ORGANIZER:kgan2040@gmail.com
SEQUENCE:33
SUMMARY:&quot;CYBERSECURITY FOR ENGINEERS&quot; Hosted by Technology and Engineering 
 Management (TEM) and Life Members(LMAG)\, Boston Chapter
URL;VALUE=URI:https://events.vtools.ieee.org/m/420919
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;&lt;strong&gt;Introduction&lt;/strong&gt;:&lt;/p&gt;\n&lt;p&gt;&lt;br
 &gt;Cybersecurity is becoming increasingly important in today&amp;rsquo\;s world.
  This lecture is to assist by&lt;br&gt;providing explanations\, examples and pra
 ctices on fundamental principles of a variety of&lt;br&gt;cybersecurity topics\,
  without getting bogged down into technical details&lt;/p&gt;\n&lt;p&gt;&lt;br&gt;&lt;strong&gt;Pu
 rpose&lt;/strong&gt;:&amp;nbsp\;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: .00
 01pt\;&quot;&gt;This lecture is intended to provide ONLY an initial introduction t
 o the field of cybersecurity.&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bott
 om: .0001pt\;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri\; mso-hansi-fon
 t-family: Calibri\; mso-bidi-font-family: Calibri\;&quot;&gt;Beginning with a few 
 of the relevant terms and expressions used in the industry\, some impo&lt;/sp
 an&gt;rtant&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: .0001pt\;&quot;&gt;securi
 ty principles\, a brief historical overview and current trends and some so
 lution approaches in brief&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom:
  .0001pt\;&quot;&gt;will be mentioned.&lt;/p&gt;\n&lt;ul&gt;\n&lt;li class=&quot;MsoListParagraphCxSpF
 irst&quot; style=&quot;text-indent: -0.25in\;&quot;&gt;&lt;span style=&quot;font-family: Symbol\; ms
 o-fareast-font-family: Symbol\; mso-bidi-font-family: Symbol\;&quot;&gt;&lt;span styl
 e=&quot;mso-list: Ignore\;&quot;&gt;&lt;span style=&quot;font: 7.0pt &#39;Times New Roman&#39;\;&quot;&gt;&amp;nbsp
 \; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;Cybersecurity
  terms\, principles\, and history&lt;/li&gt;\n&lt;li class=&quot;MsoListParagraphCxSpFir
 st&quot; style=&quot;text-indent: -0.25in\;&quot;&gt;&lt;span style=&quot;font: 7.0pt &#39;Times New Rom
 an&#39;\;&quot;&gt;&amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\;&lt;/span&gt;&lt;span style=&quot;mso-spacerun: ye
 s\;&quot;&gt;&amp;nbsp\;&lt;/span&gt;&lt;span style=&quot;text-indent: -0.25in\;&quot;&gt;Basic terminology&lt;
 /span&gt;&lt;/li&gt;\n&lt;li class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;text-indent: -0.
 25in\;&quot;&gt;&amp;nbsp\; &amp;nbsp\; Principles of cybersecurity&lt;/li&gt;\n&lt;li class=&quot;MsoLi
 stParagraphCxSpFirst&quot; style=&quot;text-indent: -0.25in\;&quot;&gt;&amp;nbsp\; &amp;nbsp\; Ident
 ifying and managing security risks&lt;/li&gt;\n&lt;li class=&quot;MsoListParagraphCxSpFi
 rst&quot; style=&quot;text-indent: -0.25in\;&quot;&gt;&amp;nbsp\; &amp;nbsp\; Implementing security 
 controls to reduce security risks&lt;/li&gt;\n&lt;li class=&quot;MsoListParagraphCxSpFir
 st&quot; style=&quot;text-indent: -0.25in\;&quot;&gt;&lt;span style=&quot;text-indent: -0.25in\;&quot;&gt;&amp;n
 bsp\; &amp;nbsp\; Detecting and understanding cybersecurity events&lt;/span&gt;&lt;/li&gt;
 \n&lt;li class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;text-indent: -0.25in\;&quot;&gt;&amp;nb
 sp\; &amp;nbsp\; Responding to and recovering from cybersecurity incidents&lt;/li
 &gt;\n&lt;/ul&gt;\n&lt;p&gt;&amp;nbsp\; &amp;nbsp\; A brief history of cybersecurity from the pas
 t until now in the 2020&amp;rsquo\;s&lt;/p&gt;\n&lt;ul&gt;\n&lt;li class=&quot;MsoListParagraphCxS
 pFirst&quot; style=&quot;text-indent: -0.25in\;&quot;&gt;&amp;nbsp\; &amp;nbsp\; Notable cybersecuri
 ty attacks&lt;/li&gt;\n&lt;li class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;text-indent:
  -0.25in\;&quot;&gt;&amp;nbsp\; &amp;nbsp\; Cyber phishing attacks&lt;/li&gt;\n&lt;li class=&quot;MsoLis
 tParagraphCxSpFirst&quot; style=&quot;text-indent: -0.25in\;&quot;&gt;&amp;nbsp\; &amp;nbsp\; Large 
 Companies&lt;/li&gt;\n&lt;li class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;text-indent: 
 -0.25in\;&quot;&gt;&amp;nbsp\; &amp;nbsp\; Retailers&lt;/li&gt;\n&lt;li class=&quot;MsoListParagraphCxSp
 First&quot; style=&quot;text-indent: -0.25in\;&quot;&gt;&amp;nbsp\; &amp;nbsp\; Hotels and Hospitali
 ty&lt;/li&gt;\n&lt;li class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;text-indent: -0.25in
 \;&quot;&gt;&amp;nbsp\; &amp;nbsp\; Software Platforms&lt;/li&gt;\n&lt;li class=&quot;MsoListParagraphCx
 SpFirst&quot; style=&quot;text-indent: -0.25in\;&quot;&gt;&amp;nbsp\; &amp;nbsp\; Email providers&amp;nb
 sp\;&amp;nbsp\;&lt;/li&gt;\n&lt;/ul&gt;\n&lt;p&gt;&amp;nbsp\; &amp;nbsp\; Current challenges&lt;/p&gt;\n&lt;ul&gt;\n
 &lt;li class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;text-indent: -0.25in\;&quot;&gt;&lt;!--
  [if !supportLists]--&gt;&amp;nbsp\; &amp;nbsp\; &amp;nbsp\;Attrition&lt;/li&gt;\n&lt;li class=&quot;Ms
 oListParagraphCxSpMiddle&quot; style=&quot;text-indent: -0.25in\;&quot;&gt;&amp;nbsp\; &amp;nbsp\; &amp;
 nbsp\;Skills gap&lt;/li&gt;\n&lt;li class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;text-
 indent: -0.25in\;&quot;&gt;&lt;span style=&quot;text-indent: -0.25in\;&quot;&gt;&amp;nbsp\; &amp;nbsp\; &amp;n
 bsp\;Cybersecurity certifications&lt;/span&gt;&lt;/li&gt;\n&lt;li class=&quot;MsoListParagraph
 CxSpMiddle&quot; style=&quot;text-indent: -0.25in\;&quot;&gt;&lt;span style=&quot;text-indent: -0.25
 in\;&quot;&gt;&amp;nbsp\; &amp;nbsp\; &amp;nbsp\;Active defensive strategies&lt;/span&gt;&lt;/li&gt;\n&lt;li 
 class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;text-indent: -0.25in\;&quot;&gt;&lt;span st
 yle=&quot;text-indent: -0.25in\;&quot;&gt;&amp;nbsp\; &amp;nbsp\; &amp;nbsp\;Ethical hacking&lt;/span&gt;
 &lt;/li&gt;\n&lt;li class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;text-indent: -0.25in\
 ;&quot;&gt;&lt;span style=&quot;font-family: Symbol\; mso-fareast-font-family: Symbol\; ms
 o-bidi-font-family: Symbol\;&quot;&gt;&lt;span style=&quot;mso-list: Ignore\;&quot;&gt;&lt;span style
 =&quot;font: 7.0pt &#39;Times New Roman&#39;\;&quot;&gt;&amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\;&lt;/span&gt;&lt;
 /span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;Future of the cybersecurity industry&lt;/li&gt;\n&lt;li 
 class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;text-indent: -0.25in\;&quot;&gt;&amp;nbsp\; 
 &amp;nbsp\; DevSecOps&lt;/li&gt;\n&lt;li class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;text
 -indent: -0.25in\;&quot;&gt;&amp;nbsp\; &amp;nbsp\; Artificial intelligence&lt;/li&gt;\n&lt;/ul&gt;\n&lt;
 p class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;margin-bottom: .0001pt\; mso-add
 -space: auto\; text-indent: -.25in\; mso-list: l0 level1 lfo1\;&quot;&gt;&lt;!-- [if 
 !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol\; mso-fareast-font-famil
 y: Symbol\; mso-bidi-font-family: Symbol\;&quot;&gt;&lt;span style=&quot;mso-list: Ignore\
 ;&quot;&gt;&amp;middot\;&lt;span style=&quot;font: 7.0pt &#39;Times New Roman&#39;\;&quot;&gt; &amp;nbsp\;&amp;nbsp\;&amp;
 nbsp\;&amp;nbsp\;&amp;nbsp\;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;Predictions/Conclusion&lt;/p&gt;&lt;br /&gt;&lt;
 br /&gt;Agenda: &lt;br /&gt;&lt;ul&gt;\n&lt;li&gt;Introduction 7pm&lt;/li&gt;\n&lt;li&gt;Chair&#39;s Remarks 7:
 05 pm&lt;/li&gt;\n&lt;li&gt;Speaker Introduction 7:10 pm&lt;/li&gt;\n&lt;li&gt;Lecture 7:15 pm to 
 8:15 pm&lt;/li&gt;\n&lt;li&gt;Closing Remarks 8:30 pm&lt;/li&gt;\n&lt;/ul&gt;
END:VEVENT
END:VCALENDAR

