BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20170829T170000Z
DTEND:20170829T213000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Cybersecurity & Data Privacy
DESCRIPTION:Please join us for a half-day seminar with a special focus on ransomware\, including a deep dive into why attacks occur and how to protect your business from threats.\n\n\n\nLuncheon Keynote | Protecting Your Company From Ransomware\n\nOur keynote speaker for lunch is a Special Agent from the U.S. Secret Service who lives and breathes ransomware and cyberattacks. Get the latest information on recent attacks and what may be coming down the road soon.\n\n\n\nProgram Topics \n\n	Behavior-Based Data Protection: Preventing the Ransomware Attack | What steps can an organization take to protect itself from a ransomware attack? Although technical measures are important\, there are behavior-based processes an organization can use to ensure its workforce doesn't become its weakest link.\n	Penetration and Vulnerability Testing | What is the difference between vulnerability and penetration testing? An independent security consultant who has performed thousands of such tests will walk you through the testing process and how best to put the results to use. \n	Your Files are Encrypted   Now What? | We will dissect a ransomware attack and describe how your organization can develop or improve effective policies for its response.\n	IT Forensics: Evidence Collection   Technical Dos and Don'ts Post-Attack | In stopping an attack and restoring operations\, an organization can make technical missteps that destroy evidence of the attack and limit its ability to respond. We will show you how to respond to an attack and resume operations while maintaining necessary evidence.
X-ALT-DESC;FMTTYPE=text/html:<font color="#000000" size="2">Please join us for a half-day seminar with a special focus on ransomware\, including a deep dive into why attacks occur and how to protect your business from threats.</font><br />\n<br />\n<span style="font-family:&quot\;Arial&quot\;\,sans-serif\; color:black"><b>Luncheon Keynote | Protecting Your Company From Ransomware</b></span><br />\n<span style="font-size:10.0pt\; font-family:&quot\;Arial&quot\;\,sans-serif\; color:black">Our keynote speaker for lunch is a Special Agent from the U.S. Secret Service who lives and breathes ransomware and cyberattacks. Get the latest information on recent attacks and what may be coming down the road soon.</span><br />\n<br />\n<strong><u><span style="font-family:&quot\;Arial&quot\;\,sans-serif\; color:black">Program Topics</span></u></strong><span style="font-size:10.0pt\; font-family:&quot\;Arial&quot\;\,sans-serif\; color:black"> </span>\n<ul type="disc">\n	<li class="x_MsoNormal" style="color:black\; margin-left:0in"><strong><span style="font-size:10.0pt\; font-family:&quot\;Arial&quot\;\,sans-serif">Behavior-Based Data Protection: Preventing the Ransomware Attack&nbsp\;|&nbsp\;</span></strong><span style="font-size:10.0pt\; font-family:&quot\;Arial&quot\;\,sans-serif">What steps can an organization&nbsp\;take to protect itself from a ransomware attack?&nbsp\;Although technical measures are important\, there are behavior-based processes an organization can use to ensure its workforce doesn&#39\;t become its weakest link.</span></li>\n	<li class="x_MsoNormal" style="color:black\; margin-left:0in"><strong><span style="font-size:10.0pt\; font-family:&quot\;Arial&quot\;\,sans-serif">Penetration and Vulnerability Testing&nbsp\;|&nbsp\;</span></strong><span style="font-size:10.0pt\; font-family:&quot\;Arial&quot\;\,sans-serif">What is the difference between vulnerability and penetration testing? An independent security consultant who has performed thousands of such tests will walk you through the testing process and how best to put the results to use.&nbsp\;</span></li>\n	<li class="x_MsoNormal" style="color:black\; margin-left:0in"><strong><span style="font-size:10.0pt\; font-family:&quot\;Arial&quot\;\,sans-serif">Your Files are Encrypted&nbsp\;&ndash\; Now What?</span></strong><span style="font-size:10.0pt\; font-family:&quot\;Arial&quot\;\,sans-serif">&nbsp\;<strong><span style="font-family:&quot\;Arial&quot\;\,sans-serif">|&nbsp\;</span></strong>We will dissect a ransomware attack and describe how your organization can develop or improve effective policies for its response.</span></li>\n	<li class="x_MsoNormal" style="color:black\; margin-left:0in"><strong><span style="font-size:10.0pt\; font-family:&quot\;Arial&quot\;\,sans-serif">IT Forensics: Evidence Collection&nbsp\;&ndash\; Technical Dos and Don&#39\;ts Post-Attack&nbsp\;|</span></strong><span style="font-size:10.0pt\; font-family:&quot\;Arial&quot\;\,sans-serif">&nbsp\;In stopping an attack and restoring operations\, an organization can make technical missteps that destroy evidence of the attack and limit its ability to respond. We will show you how to respond to an attack and resume operations while maintaining necessary evidence.</span></li>\n</ul>\n\n<div class="x_MsoNormal" style="color:black\; margin-left:0in">&nbsp\;</div>\n<br />\n&nbsp\;
LOCATION:Lathrop & Gage 2345 Grand Boulevard\, Suite 2200 Kansas City\, Missouri 64108
UID:e.9395.117
SEQUENCE:3
DTSTAMP:20260413T130040Z
URL:https://volunteer.kctechcouncil.com/events/details/cybersecurity-data-privacy-117
END:VEVENT

END:VCALENDAR
