BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20250924T170000Z
DTEND:20250924T180000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:BARR Advisory Webinar: What Makes A "Great" Penetration Test?
DESCRIPTION:Not all pentests are created equal. This webinar\, hosted by experts in compliance and security testing from BARR Advisory and Psicurity\, breaks down what a high-quality web application pentest should look like from scoping and methodology to reporting and remediation. \n\n \n\nDesigned for both organizations seeking pentests and the auditors who review them\, this session will cover how to choose a qualified pentest provider\, what makes a pentest report trustworthy\, and common red flags seen in low-quality pentests. \n\n \n\nIf you rely on pentests for compliance\, security\, or vendor risk management\, this webinar will help you ensure you're getting real value from your assessments not just checking a box.
X-ALT-DESC;FMTTYPE=text/html:<p style="margin: 0px\; caret-color: rgb(35\, 73\, 109)\; color: rgb(35\, 73\, 109)\; font-family: Arial\, sans-serif\; font-size: 15px\; text-size-adjust: auto\; line-height: 26.25px\;"><span style="font-family: Lato\, Tahoma\, sans-serif\; color: rgb(0\, 0\, 0)\;">Not all pentests are created equal. This webinar\, hosted by experts in compliance and security testing from <a data-hs-link-id="0" data-hs-link-id-v2="0fNl5BuS" data-outlook-id="a20249eb-fb11-4749-8c42-81294d4764e1" href="https://d2HC7604.na1.hubspotlinks.com/Ctc/W4+113/d2HC7604/VVtXTn4rMfMlW1QKJ2289BF_6W3trWRD5B-_jMN8BHR5W3m2nnW6N1vHY6lZ3pQW38BGmt6P1Jl4W1Hpjx53XSv7bW30wsqL4Q7V8YW6pqQhP2ZthqwW4fT3f52f077dW2Rf95q7Z0TYpVs_9M52Fpn8jVQ1NQs8hjynjVRmD7s11kqLXN8Q61sfBxRnvW6llkFr68x7x4W2NDlW583Yt5mW4rXjqF7Sj6jyW7D1XCZ5yF-qmVHQ73-2mVzcHW7212_h6XS9gDW5HQ_LD1rtvnkW4-YwjT2gFX4cW4YTzcQ5PN1VSW25zrWl1_sxvWW20y9Sb2h_LDKVTQ9ps5xSMBKf2Yp6Tx04" style="color: rgb(0\, 0\, 0)\;" target="_blank" title="https://d2HC7604.na1.hubspotlinks.com/Ctc/W4+113/d2HC7604/VVtXTn4rMfMlW1QKJ2289BF_6W3trWRD5B-_jMN8BHR5W3m2nnW6N1vHY6lZ3pQW38BGmt6P1Jl4W1Hpjx53XSv7bW30wsqL4Q7V8YW6pqQhP2ZthqwW4fT3f52f077dW2Rf95q7Z0TYpVs_9M52Fpn8jVQ1NQs8hjynjVRmD7s11kqLXN8Q61sfBxRnvW6llkFr68x7x4W2NDlW583Yt5mW4rXjqF7Sj6jyW7D1XCZ5yF-qmVHQ73-2mVzcHW7212_h6XS9gDW5HQ_LD1rtvnkW4-YwjT2gFX4cW4YTzcQ5PN1VSW25zrWl1_sxvWW20y9Sb2h_LDKVTQ9ps5xSMBKf2Yp6Tx04"><span style="color: rgb(0\, 84\, 160)\;"><span style="color: rgb(0\, 163\, 221)\;">BARR Advisory</span></span></a> and <a data-hs-link-id="0" data-hs-link-id-v2="vgQYFZIq" data-outlook-id="a627cba6-84a9-4c2a-80cf-7dc34a7df03a" href="https://d2HC7604.na1.hubspotlinks.com/Ctc/W4+113/d2HC7604/VVtXTn4rMfMlW1QKJ2289BF_6W3trWRD5B-_jMN8BHR5W3m2nnW6N1vHY6lZ3q4Vq16lW2gX1jCW2Tj6rz2LTZmdW2LwkQD3_vWlLW4XQJrk7md-5mW4F0Ydt4dCPBrW3Hyt6t6CVLSVW1VKlnq7P4-8lV_fx8F5s-JtKW2h7lMK76VlhgW28c4mJ7MbHW8W89jzFb3VKBp6N8wqd8kJnj4vW5FN1Xf6Kgn_tW12VbtF8FkWcpN2V2vQJJ8m-CW2Kq4Zc4ZGHSnW7hb_fp26lWr0W2HMmCS1x4JsLN6BxrBxpZDrQW12_MHG1p7JRlW4CS6gk6KL6qSW6Z_d7j6dNR7Qf4n4Xd-04" style="color: rgb(0\, 0\, 0)\;" target="_blank" title="https://d2HC7604.na1.hubspotlinks.com/Ctc/W4+113/d2HC7604/VVtXTn4rMfMlW1QKJ2289BF_6W3trWRD5B-_jMN8BHR5W3m2nnW6N1vHY6lZ3q4Vq16lW2gX1jCW2Tj6rz2LTZmdW2LwkQD3_vWlLW4XQJrk7md-5mW4F0Ydt4dCPBrW3Hyt6t6CVLSVW1VKlnq7P4-8lV_fx8F5s-JtKW2h7lMK76VlhgW28c4mJ7MbHW8W89jzFb3VKBp6N8wqd8kJnj4vW5FN1Xf6Kgn_tW12VbtF8FkWcpN2V2vQJJ8m-CW2Kq4Zc4ZGHSnW7hb_fp26lWr0W2HMmCS1x4JsLN6BxrBxpZDrQW12_MHG1p7JRlW4CS6gk6KL6qSW6Z_d7j6dNR7Qf4n4Xd-04"><span style="color: rgb(0\, 84\, 160)\;"><span style="color: rgb(0\, 163\, 221)\;">Psicurity</span></span></a>\, breaks down what a high-quality web application pentest should look like&mdash\;from scoping and methodology to reporting and remediation.&nbsp\;</span></p>\n\n<p style="margin: 0px\; caret-color: rgb(35\, 73\, 109)\; color: rgb(35\, 73\, 109)\; font-family: Arial\, sans-serif\; font-size: 15px\; text-size-adjust: auto\; line-height: 26.25px\;">&nbsp\;</p>\n\n<p style="margin: 0px\; caret-color: rgb(35\, 73\, 109)\; color: rgb(35\, 73\, 109)\; font-family: Arial\, sans-serif\; font-size: 15px\; text-size-adjust: auto\; line-height: 26.25px\;"><span style="font-family: Lato\, Tahoma\, sans-serif\; color: rgb(0\, 0\, 0)\;">Designed for both organizations seeking pentests and the auditors who review them\, this session will cover how to choose a qualified pentest provider\, what makes a pentest report trustworthy\, and common red flags seen in low-quality pentests.&nbsp\;</span></p>\n\n<p style="margin: 0px\; caret-color: rgb(35\, 73\, 109)\; color: rgb(35\, 73\, 109)\; font-family: Arial\, sans-serif\; font-size: 15px\; text-size-adjust: auto\; line-height: 26.25px\;">&nbsp\;</p>\n\n<p style="margin: 0px\; caret-color: rgb(35\, 73\, 109)\; color: rgb(35\, 73\, 109)\; font-family: Arial\, sans-serif\; font-size: 15px\; text-size-adjust: auto\; line-height: 26.25px\;"><span style="font-family: Lato\, Tahoma\, sans-serif\; color: rgb(0\, 0\, 0)\;">If you rely on pentests for compliance\, security\, or vendor risk management\, this webinar will help you ensure you&rsquo\;re getting real value from your assessments&mdash\;not just checking a box.</span></p>\n
LOCATION:Webinar
UID:e.9395.1268
SEQUENCE:3
DTSTAMP:20260409T184516Z
URL:https://volunteer.kctechcouncil.com/events/details/barr-advisory-webinar-what-makes-a-great-penetration-test-1268
END:VEVENT

END:VCALENDAR
