BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20150507T133000Z
DTEND:20150508T040000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Tennessee Chamber of Commerce & Industry Cybersecurity Training
DESCRIPTION:A crucial component of business operations today is ensuring that both internal and external network and cloud operations are secure and cybersecurity threats are constantly monitored and updated.   Business systems now have the ability to connect anywhere to anyone online.  With this opportunity comes great responsibility as it gives business competitive advantage\, however the resulting "access by anyone anywhere" puts the security of all business-critical operations at enormous risk.\n\n\n\nAGENDA includes:\n\n8:30-9:00AM: Sign-in\; Breakfast\n\n9:00-9:15AM: Welcome/Intro \n\n"Protecting Your Crown Jewels: Making Cybersecurity a Leadership Priority" \n\nLt. Gen. Brad Pray\, USAF (ret)\, AxiosTec\n\n9:15-9:30AM: "Assessing Your Liability: Cybersecurity and the Law"\n\nAlex Little\, Bone McAllester Norton\n\n9:30-9:45AM: Achieving Precision Access: the Software Defined Perimeter Security\n\nModel"   This session focuses on how organizations mitigate risk by achieving precision access to     critical apps they seek to protect using a ground breaking security model called Software Defined Perimeter (SDP).\n\nBrent Bilger\, Vice president of solutions architecture for Vidder\n\n9:45-10:45AM: Q&A\n\n10:45-11:00AM: Closing remarks
X-ALT-DESC;FMTTYPE=text/html:A crucial component of business operations today is ensuring that both internal and external network and cloud operations are secure and cybersecurity threats are constantly monitored and updated. &nbsp\; Business systems now have the ability to connect anywhere to anyone online. &nbsp\;With this opportunity comes great responsibility as it gives business competitive advantage\, however the resulting &ldquo\;access by anyone anywhere&rdquo\; puts the security of all business-critical operations at enormous risk.<br />\n<br />\n<strong>AGENDA includes:</strong><br />\n8:30-9:00AM: Sign-in\; Breakfast<br />\n9:00-9:15AM: Welcome/Intro&nbsp\;<br />\n&quot\;Protecting Your Crown Jewels: Making Cybersecurity a Leadership Priority&quot\;&nbsp\;<br />\nLt. Gen. Brad Pray\, USAF (ret)\, AxiosTec<br />\n9:15-9:30AM: &ldquo\;Assessing Your Liability: Cybersecurity and the Law&quot\;<br />\nAlex Little\, Bone McAllester Norton<br />\n9:30-9:45AM: Achieving Precision Access: the Software Defined Perimeter Security<br />\nModel&quot\; &nbsp\; This session focuses on how organizations mitigate risk by achieving precision access to &nbsp\; &nbsp\; critical apps they seek to protect using a ground breaking security model called Software Defined Perimeter (SDP).<br />\nBrent Bilger\, Vice president of solutions architecture for Vidder<br />\n9:45-10:45AM: Q&amp\;A<br />\n10:45-11:00AM: Closing remarks&nbsp\;
LOCATION:Jackson Courtyard by Marriott Jackson\, 200 Campbell Oaks Drive (Exit 83)
UID:e.2172.270
SEQUENCE:3
DTSTAMP:20260516T194612Z
URL:http://business.roanechamber.com/events/details/tennessee-chamber-of-commerce-industry-cybersecurity-training-05-07-2015-270
END:VEVENT

END:VCALENDAR
