BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
DTSTART:20250309T030000
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:CDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20251102T010000
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:CST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20250630T143210Z
UID:955F98B8-8D80-4C42-8AA6-D7FDEDDED3DB
DTSTART;TZID=America/Chicago:20250627T120000
DTEND;TZID=America/Chicago:20250627T130000
DESCRIPTION:This talk explores how Moving Target Defense (MTD) can be used 
 to achieve robust configuration security in modern systems. By continuousl
 y shifting system configurations and attack surfaces\, MTD disrupts attack
 er reconnaissance and reduces the likelihood of successful exploits. The s
 ession will cover key MTD techniques\, practical implementation strategies
 \, and how to integrate them into existing security frameworks to enhance 
 resilience and adaptability against evolving cyber threats.\n\nSpeaker(s):
  Dr. Shuvalaxmi Dass\, \n\nAgenda: \nIntroduction\n\nPresentation\n\nQ&amp;A\n
 \nVirtual: https://events.vtools.ieee.org/m/489825
LOCATION:Virtual: https://events.vtools.ieee.org/m/489825
ORGANIZER:manishaguduri@ieee.org
SEQUENCE:31
SUMMARY:IEEE Lafayette Section : Summer Digital Dialogues - Achieving Confi
 guration Security Through Moving Target Defense
URL;VALUE=URI:https://events.vtools.ieee.org/m/489825
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;This talk explores how Moving Target Defen
 se (MTD) can be used to achieve robust configuration security in modern sy
 stems. By continuously shifting system configurations and attack surfaces\
 , MTD disrupts attacker reconnaissance and reduces the likelihood of succe
 ssful exploits. The session will cover key MTD techniques\, practical impl
 ementation strategies\, and how to integrate them into existing security f
 rameworks to enhance resilience and adaptability against evolving cyber th
 reats.&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;p&gt;Introduction&lt;/p&gt;\n&lt;p&gt;Presentation&lt;/
 p&gt;\n&lt;p&gt;Q&amp;amp\;A&lt;/p&gt;
END:VEVENT
END:VCALENDAR

