BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20150505T123000Z
DTEND:20150506T030000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Tennessee Chamber of Commerce & Industry Cybersecurity Training
DESCRIPTION:A crucial component of business operations today is ensuring that both internal and external network and cloud operations are secure and cybersecurity threats are constantly monitored and updated.   Business systems now have the ability to connect anywhere to anyone online.  With this opportunity comes great responsibility as it gives business competitive advantage\, however the resulting "access by anyone anywhere" puts the security of all business-critical operations at enormous risk.\n\n\n\nAGENDA includes:\n\n8:30-9:00AM: Sign-in\; Breakfast\n\n9:00-9:15AM: Welcome/Intro \n\n"Protecting Your Crown Jewels: Making Cybersecurity a Leadership Priority" \n\nLt. Gen. Brad Pray\, USAF (ret)\, AxiosTec\n\n9:15-9:30AM: "Assessing Your Liability: Cybersecurity and the Law"\n\nAlex Little\, Bone McAllester Norton\n\n9:30-9:45AM: Achieving Precision Access: the Software Defined Perimeter Security\n\nModel"   This session focuses on how organizations mitigate risk by achieving precision access to     critical apps they seek to protect using a ground breaking security model called Software Defined Perimeter (SDP).\n\nBrent Bilger\, Vice president of solutions architecture for Vidder\n\n9:45-10:45AM: Q&A\n\n10:45-11:00AM: Closing remarks
X-ALT-DESC;FMTTYPE=text/html:A crucial component of business operations today is ensuring that both internal and external network and cloud operations are secure and cybersecurity threats are constantly monitored and updated. &nbsp\; Business systems now have the ability to connect anywhere to anyone online. &nbsp\;With this opportunity comes great responsibility as it gives business competitive advantage\, however the resulting &ldquo\;access by anyone anywhere&rdquo\; puts the security of all business-critical operations at enormous risk.<br />\n<br />\n<strong>AGENDA includes:</strong><br />\n8:30-9:00AM: Sign-in\; Breakfast<br />\n9:00-9:15AM: Welcome/Intro&nbsp\;<br />\n&quot\;Protecting Your Crown Jewels: Making Cybersecurity a Leadership Priority&quot\;&nbsp\;<br />\nLt. Gen. Brad Pray\, USAF (ret)\, AxiosTec<br />\n9:15-9:30AM: &ldquo\;Assessing Your Liability: Cybersecurity and the Law&quot\;<br />\nAlex Little\, Bone McAllester Norton<br />\n9:30-9:45AM: Achieving Precision Access: the Software Defined Perimeter Security<br />\nModel&quot\; &nbsp\; This session focuses on how organizations mitigate risk by achieving precision access to &nbsp\; &nbsp\; critical apps they seek to protect using a ground breaking security model called Software Defined Perimeter (SDP).<br />\nBrent Bilger\, Vice president of solutions architecture for Vidder<br />\n9:45-10:45AM: Q&amp\;A<br />\n10:45-11:00AM: Closing remarks&nbsp\;
LOCATION:Knoxville UT Conference Center 541 Henley Street 4th Floor (best parking is Locust Street)
UID:e.2172.268
SEQUENCE:3
DTSTAMP:20260516T201629Z
URL:http://roane.preview.gochambermaster.com/events/details/tennessee-chamber-of-commerce-industry-cybersecurity-training-05-05-2015-268
END:VEVENT

END:VCALENDAR
