BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:US/Eastern
BEGIN:DAYLIGHT
DTSTART:20250309T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20251102T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20250324T133641Z
UID:05018A49-EE80-41EB-8BFC-13FAD8F305AD
DTSTART;TZID=US/Eastern:20250318T190000
DTEND;TZID=US/Eastern:20250318T200000
DESCRIPTION:Cyber Attack Detection and Quick Response Strategy\n\nWith rega
 rd to online activities\, one should really be aware of the existence of c
 yber threats\, metaphorically described as some sort of &#39;digital enemies&#39; 
 that seek many ways to compromise our systems. In this regard\, we go on t
 o discuss the very important topic entitled &quot;Cyber Attack Detection and Qu
 ick Response Strategy\,&quot; concerning recognition of the potential threats s
 uch as phishing\, malware\, and DDoS attack\, and understand ways to handl
 e them. We are also going to cover how to develop investigative skills tha
 t could help in the detection of irregular activities\, and development of
  a contingency plan to be implemented when an attack is successful. We&#39;ll 
 also look at advanced hardening strategies and why training your team and 
 security assessments are so important. By the end of our discussion\, part
 icipants will be fully empowered in the protection of digital assets\, ide
 ntification of any likely threats\, and the neutralization of such threats
  to render the cyber adversary impotent.\n\nSpeaker(s):  Mr Sairam Durgara
 ju\n\nAgenda: \nWEBINAR: 7:00 - 8:00 P.M.\n\nThe Zoom Webinar link and pas
 sword will be forwarded to all registered participants after Noon on the d
 ay of the meeting. Check your spam folder if you don&#39;t see the email.\n\nW
 ebinar is open to all.\n\nPDH certificates are available and an evaluation
  form will be emailed to you after the meeting. PDH certificate are sent b
 y IEEE USA 3-4 weeks after the meeting.\n\nVirtual: https://events.vtools.
 ieee.org/m/463961
LOCATION:Virtual: https://events.vtools.ieee.org/m/463961
ORGANIZER:ieee@gpamg.org
SEQUENCE:20
SUMMARY:Cyber Attack Detection and Quick Response Strategy
URL;VALUE=URI:https://events.vtools.ieee.org/m/463961
X-ALT-DESC:Description: &lt;br /&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;strong style=&quot;mso-bidi-
 font-weight: normal\;&quot;&gt;Cyber Attack Detection and Quick Response Strategy&lt;
 /strong&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;With regard to online activities\, one 
 should really be aware of the existence of cyber threats\, metaphorically 
 described as some sort of &#39;digital enemies&#39; that seek many ways to comprom
 ise our systems. In this regard\, we go on to discuss the very important t
 opic entitled &quot;Cyber Attack Detection and Quick Response Strategy\,&quot; conce
 rning recognition of the potential threats such as phishing\, malware\, an
 d DDoS attack\, and understand ways to handle them. We are also going to c
 over how to develop investigative skills that could help in the detection 
 of irregular activities\, and development of a contingency plan to be impl
 emented when an attack is successful. We&#39;ll also look at advanced hardenin
 g strategies and why training your team and security assessments are so im
 portant. By the end of our discussion\, participants will be fully empower
 ed in the protection of digital assets\, identification of any likely thre
 ats\, and the neutralization of such threats to render the cyber adversary
  impotent.&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;p&gt;&lt;strong&gt;WEBINAR:&lt;/strong&gt;&amp;nbsp\
 ;7:00 - 8:00 P.M.&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;The Zoom Webinar link and password will b
 e forwarded to all registered participants after Noon on the day of the me
 eting. &lt;strong&gt;Check your spam folder if you don&#39;t see the email.&amp;nbsp\;&lt;/
 strong&gt;&lt;/p&gt;\n&lt;p&gt;Webinar is open to all.&lt;/p&gt;\n&lt;p&gt;PDH certificates are avail
 able and an evaluation form will be emailed to you after the meeting. PDH 
 certificate are sent by IEEE USA 3-4 weeks after the meeting.&lt;/p&gt;
END:VEVENT
END:VCALENDAR

