BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20200618T170000Z
DTEND:20200618T180000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:YOUR SECURITY CHECKLIST FOR THE NEW NORMAL
DESCRIPTION:Host: IT World Canada\nFive million more Canadians are now working from home compared to just a few months ago.\n\nIn the rush to work remotely\, many organizations have come to a crossroad: having to choose demand over security given new adverse circumstances. As a result\, the attack surface has expanded   cybercriminals have exploited the vulnerabilities and focused on new\, as well as old\, weaknesses specifically around endpoint security and third-party remote access.\n\nWhile some businesses are hoping to return to "business as usual\," many are preparing to work from home as the new normal. Implementing the principle of least privilege for remote users and enforcing Zero Trust access for remote vendors can be done without interfering with their day-to-day responsibilities. By doing this\, organizations can reduce risk without overburdening IT and operations teams.\n\nOn Thursday\, June 18\, join ITWC CIO Jim Love and CyberArk's Global Director of Emerging Technologies Chris Maroun as they discuss ransomware\, biometrics\, and key undertakings tech leaders who are gearing up for the world of remote work need to understand.
X-ALT-DESC;FMTTYPE=text/html:<span style="box-sizing: border-box\; border: 0px\; font-variant-numeric: inherit\; font-variant-east-asian: inherit\; font-weight: 600\; font-stretch: inherit\; font-size: 16px\; line-height: inherit\; font-family: &quot\;Open Sans&quot\;\, Arial\, Helvetica\, sans-serif\; vertical-align: baseline\; margin: 0px\; padding: 0px\; color: rgb(68\, 68\, 68)\;">Host:</span><span style="color: rgb(68\, 68\, 68)\; font-family: &quot\;Open Sans&quot\;\, Arial\, Helvetica\, sans-serif\; font-size: 16px\;">&nbsp\;IT World Canada</span>\n<p style="box-sizing: border-box\; border: 0px\; font-variant-numeric: inherit\; font-variant-east-asian: inherit\; font-stretch: inherit\; font-size: 16px\; line-height: 1.7\; font-family: &quot\;Open Sans&quot\;\, Arial\, Helvetica\, sans-serif\; vertical-align: baseline\; margin: 0px 0px 10px\; padding: 0px\; color: rgb(68\, 68\, 68)\;"><a href="https://bc.ctvnews.ca/nearly-5-million-more-canadians-are-working-from-home-and-many-like-it-surveys-1.4903045" rel="noopener noreferrer" style="box-sizing: border-box\; border: 0px\; font: inherit\; vertical-align: baseline\; margin: 0px\; padding: 0px\; color: rgb(31\, 57\, 144)\; outline: 0px\; text-decoration-line: none\; transition: color 0.14s linear 0s\;" target="_blank">Five million more Canadians</a>&nbsp\;are now working from home compared to just a few months ago.</p>\n\n<p style="box-sizing: border-box\; border: 0px\; font-variant-numeric: inherit\; font-variant-east-asian: inherit\; font-stretch: inherit\; font-size: 16px\; line-height: 1.7\; font-family: &quot\;Open Sans&quot\;\, Arial\, Helvetica\, sans-serif\; vertical-align: baseline\; margin: 0px 0px 10px\; padding: 0px\; color: rgb(68\, 68\, 68)\;">In the rush to work remotely\, many organizations have come to a crossroad: having to choose demand over security given new adverse circumstances. As a result\, the attack surface has expanded &mdash\; cybercriminals have exploited the vulnerabilities and focused on new\, as well as old\, weaknesses specifically around endpoint security and third-party remote access.</p>\n\n<p style="box-sizing: border-box\; border: 0px\; font-variant-numeric: inherit\; font-variant-east-asian: inherit\; font-stretch: inherit\; font-size: 16px\; line-height: 1.7\; font-family: &quot\;Open Sans&quot\;\, Arial\, Helvetica\, sans-serif\; vertical-align: baseline\; margin: 0px 0px 10px\; padding: 0px\; color: rgb(68\, 68\, 68)\;">While some businesses are hoping to return to &ldquo\;business as usual\,&rdquo\; many are preparing to work from home as the new normal. Implementing the principle of least privilege for remote users and enforcing Zero Trust access for remote vendors can be done without interfering with their day-to-day responsibilities. By doing this\, organizations can reduce risk without overburdening IT and operations teams.</p>\n\n<p style="box-sizing: border-box\; border: 0px\; font-variant-numeric: inherit\; font-variant-east-asian: inherit\; font-stretch: inherit\; font-size: 16px\; line-height: 1.7\; font-family: &quot\;Open Sans&quot\;\, Arial\, Helvetica\, sans-serif\; vertical-align: baseline\; margin: 0px 0px 10px\; padding: 0px\; color: rgb(68\, 68\, 68)\;">On Thursday\, June 18\, join ITWC CIO Jim Love and CyberArk&rsquo\;s Global Director of Emerging Technologies Chris Maroun as they discuss ransomware\, biometrics\, and key undertakings tech leaders who are gearing up for the world of remote work need to understand.</p>\n
LOCATION:
UID:e.3459.115
SEQUENCE:3
DTSTAMP:20260506T200214Z
URL:https://w.stouffvillechamber.ca/events/details/your-security-checklist-for-the-new-normal-115
END:VEVENT

END:VCALENDAR
