BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//WiCyS - Women in Cybersecurity - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.wicys.org
X-WR-CALDESC:Events for WiCyS - Women in Cybersecurity
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230213T173000
DTEND;TZID=America/New_York:20230213T183000
DTSTAMP:20260416T042454
CREATED:20230209T175141Z
LAST-MODIFIED:20230209T175141Z
UID:10000978-1676309400-1676313000@www.wicys.org
SUMMARY:WiCyS Ontario Affiliate: IT & Security Leaders Turn to Lateral Security
DESCRIPTION:IT and security leaders need to find a method to stay ahead of adversaries as ransomware gangs continue to hone and ramp up their operations. \nAs successful assaults increase\, it is clear that endpoint and perimeter security alone is insufficient to safeguard an entire organization. Instead\, businesses need to adopt a lateral security strategy that places a set of organized\, all-encompassing capabilities between the perimeter and endpoints. The only way to successfully detect\, prevent\, and remediate ransomware and other advanced threats is by combining a variety of tools\, including network segmentation\, micro-segmentation\, and advanced threat prevention capabilities like intrusion detection/prevention systems (IDS/IPS)\, network sandboxes\, network traffic analysis/network detection and response (NTA/NDR)\, and others. \nJoin us for an hour-long webinar to see how VMware security helps counter some of the most complex assaults.
URL:https://www.wicys.org/event/wicys-ontario-affiliate-it-security-leaders-turn-to-lateral-security/
LOCATION:Online
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/png:https://www.wicys.org/wp-content/uploads/2023/02/WiCyS-Ontario-Affiliate-Logo-on-Shield.png
END:VEVENT
END:VCALENDAR