BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20150506T133000Z
DTEND:20150507T040000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Tennessee Chamber of Commerce & Industry Cybersecurity Training
DESCRIPTION:A crucial component of business operations today is ensuring that both internal and external network and cloud operations are secure and cybersecurity threats are constantly monitored and updated.   Business systems now have the ability to connect anywhere to anyone online.  With this opportunity comes great responsibility as it gives business competitive advantage\, however the resulting "access by anyone anywhere" puts the security of all business-critical operations at enormous risk.\n\n\n\nAGENDA includes:\n\n8:30-9:00AM: Sign-in\; Breakfast\n\n9:00-9:15AM: Welcome/Intro \n\n"Protecting Your Crown Jewels: Making Cybersecurity a Leadership Priority" \n\nLt. Gen. Brad Pray\, USAF (ret)\, AxiosTec\n\n9:15-9:30AM: "Assessing Your Liability: Cybersecurity and the Law"\n\nAlex Little\, Bone McAllester Norton\n\n9:30-9:45AM: Achieving Precision Access: the Software Defined Perimeter Security\n\nModel"   This session focuses on how organizations mitigate risk by achieving precision access to     critical apps they seek to protect using a ground breaking security model called Software Defined Perimeter (SDP).\n\nBrent Bilger\, Vice president of solutions architecture for Vidder\n\n9:45-10:45AM: Q&A\n\n10:45-11:00AM: Closing remarks
X-ALT-DESC;FMTTYPE=text/html:A crucial component of business operations today is ensuring that both internal and external network and cloud operations are secure and cybersecurity threats are constantly monitored and updated. &nbsp\; Business systems now have the ability to connect anywhere to anyone online. &nbsp\;With this opportunity comes great responsibility as it gives business competitive advantage\, however the resulting &ldquo\;access by anyone anywhere&rdquo\; puts the security of all business-critical operations at enormous risk.<br />\n<br />\n<strong>AGENDA includes:</strong><br />\n8:30-9:00AM: Sign-in\; Breakfast<br />\n9:00-9:15AM: Welcome/Intro&nbsp\;<br />\n&quot\;Protecting Your Crown Jewels: Making Cybersecurity a Leadership Priority&quot\;&nbsp\;<br />\nLt. Gen. Brad Pray\, USAF (ret)\, AxiosTec<br />\n9:15-9:30AM: &ldquo\;Assessing Your Liability: Cybersecurity and the Law&quot\;<br />\nAlex Little\, Bone McAllester Norton<br />\n9:30-9:45AM: Achieving Precision Access: the Software Defined Perimeter Security<br />\nModel&quot\; &nbsp\; This session focuses on how organizations mitigate risk by achieving precision access to &nbsp\; &nbsp\; critical apps they seek to protect using a ground breaking security model called Software Defined Perimeter (SDP).<br />\nBrent Bilger\, Vice president of solutions architecture for Vidder<br />\n9:45-10:45AM: Q&amp\;A<br />\n10:45-11:00AM: Closing remarks&nbsp\;
LOCATION:Murfreesboro Hampton Inn & Suites 325 N. Thompson Lane
UID:e.2172.269
SEQUENCE:3
DTSTAMP:20260516T193903Z
URL:http://business.roanechamber.com/events/details/tennessee-chamber-of-commerce-industry-cybersecurity-training-05-06-2015-269
END:VEVENT

END:VCALENDAR
