BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20210615T170000Z
DTEND:20210615T180000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Who is creeping inside your security perimeter?
DESCRIPTION:Topic\nWho is creeping inside your security perimeter?\n\n\nDescription\n\nIn the recent SolarWinds digital supply chain attack\, hackers bypassed multi-factor authentication to move laterally within the network\, posing as regular users. This serves as a wakeup call to IT security leaders and highlights the need for new approaches to identity management.\n\n\n\nIdentity management is one of the new frontiers of managing security risks and a weak point for companies. One study revealed that 74 per cent of businesses aren't confident they can thwart an identity breach.\n\n\n\nIf you're struggling with identity security\, you'll want to experience Who is creeping inside your security perimeter? on June 15. In this briefing\, Cybersecurity author Brennen Schmidt and Chris Ruetz\, AVP and Country Manager for CyberArk join two other leading security executives to provide lessons learned and recommendations on new ways to thwart a new wave of identity breaches.\n\n\n\nAmong the topics covered in this briefing:\n\n\n\n- Why two factor authentication is not enough\n\n- New risks around privileged access in the work-from-home era\n\n- Techniques attackers are using to try to gain privileged access\n\n- How work-from-home is compounding the problem\n\n- Ways to adopt a Zero Trust approach and move to more comprehensive identity security\n\n\nTime\n\n\nJun 15\, 2021 01:00 PM in Eastern Time (US and Canada)
X-ALT-DESC;FMTTYPE=text/html:<img alt="Webinar banner" src="https://us02web.zoom.us/w_p/85736680163/2951a56a-a261-4089-9c87-b45a4e219ce6.jpg" /><br />\n<br />\n&nbsp\;\n<div class="form-group horizontal" style="box-sizing: border-box\; margin-bottom: 38px\; margin-left: 20px\; color: rgb(35\, 35\, 51)\; font-family: Lato\, Helvetica\, Arial\; font-size: 14px\;"><label class="control-label" style="box-sizing: border-box\; display: inline-block\; margin-bottom: 5px\; font-weight: 600\; float: left\; width: 80px\;">Topic</label>\n<div class="controls" style="box-sizing: border-box\; margin-left: 100px\;"><span style="box-sizing: border-box\; font-weight: 600\;">Who is creeping inside your security perimeter?</span></div>\n</div>\n\n<div class="form-group horizontal" style="box-sizing: border-box\; margin-bottom: 38px\; margin-left: 20px\; color: rgb(35\, 35\, 51)\; font-family: Lato\, Helvetica\, Arial\; font-size: 14px\;"><label class="control-label" style="box-sizing: border-box\; display: inline-block\; margin-bottom: 5px\; font-weight: 600\; float: left\; width: 80px\;">Description</label>\n\n<div class="controls" style="box-sizing: border-box\; margin-left: 100px\;">In the recent SolarWinds digital supply chain attack\, hackers bypassed multi-factor authentication to move laterally within the network\, posing as regular users. This serves as a wakeup call to IT security leaders and highlights the need for new approaches to identity management.<br style="box-sizing: border-box\;" />\n<br style="box-sizing: border-box\;" />\nIdentity management is one of the new frontiers of managing security risks and a weak point for companies. One study revealed that 74 per cent of businesses aren&rsquo\;t confident they can thwart an identity breach.<br style="box-sizing: border-box\;" />\n<br style="box-sizing: border-box\;" />\nIf you&rsquo\;re struggling with identity security\, you&rsquo\;ll want to experience Who is creeping inside your security perimeter? on June 15. In this briefing\, Cybersecurity author Brennen Schmidt and Chris Ruetz\, AVP and Country Manager for CyberArk join two other leading security executives to provide lessons learned and recommendations on new ways to thwart a new wave of identity breaches.<br style="box-sizing: border-box\;" />\n<br style="box-sizing: border-box\;" />\nAmong the topics covered in this briefing:<br style="box-sizing: border-box\;" />\n<br style="box-sizing: border-box\;" />\n- Why two factor authentication is not enough<br style="box-sizing: border-box\;" />\n- New risks around privileged access in the work-from-home era<br style="box-sizing: border-box\;" />\n- Techniques attackers are using to try to gain privileged access<br style="box-sizing: border-box\;" />\n- How work-from-home is compounding the problem<br style="box-sizing: border-box\;" />\n- Ways to adopt a Zero Trust approach and move to more comprehensive identity security</div>\n</div>\n\n<div class="form-group horizontal" style="box-sizing: border-box\; margin-bottom: 0px\; margin-left: 20px\; color: rgb(35\, 35\, 51)\; font-family: Lato\, Helvetica\, Arial\; font-size: 14px\;"><label class="control-label" style="box-sizing: border-box\; display: inline-block\; margin-bottom: 5px\; font-weight: 600\; float: left\; width: 80px\;">Time</label>\n\n<div class="controls" style="box-sizing: border-box\; margin-left: 100px\;">\n<p style="box-sizing: border-box\; margin: 0px\; line-height: 1.5\;">Jun 15\, 2021 01:00 PM in&nbsp\;<a aria-labelledby="switch_timezone webinar-timezone-title" aria-modal="true" id="switch_timezone" role="button" style="box-sizing: border-box\; background: transparent\; color: rgb(14\, 113\, 235)\; border: 0px\;" title="Change Time Zone">Eastern Time (US and Canada)</a></p>\n</div>\n</div>\n
LOCATION:
UID:e.3459.305
SEQUENCE:3
DTSTAMP:20260506T085340Z
URL:https://w.stouffvillechamber.ca/events/details/who-is-creeping-inside-your-security-perimeter-305
END:VEVENT

END:VCALENDAR
