BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//DIB SCC CyberAssist - ECPv6.2.4//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:DIB SCC CyberAssist
X-ORIGINAL-URL:https://ndisac.org/dibscc
X-WR-CALDESC:Events for DIB SCC CyberAssist
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201026
DTEND;VALUE=DATE:20201029
DTSTAMP:20260406T073114
CREATED:20200804T003234Z
LAST-MODIFIED:20200804T101622Z
UID:9532-1603670400-1603929599@ndisac.org
SUMMARY:10th Annual Cyber Security Summit
DESCRIPTION:At the Cyber Security Summit\, our mission is to produce a multi-stakeholder consortium that brings together industry\, government and academic interests in an effort to improve the state of cyber security on both a domestic and international level.
URL:https://ndisac.org/dibscc/events/10th-annual-cyber-security-summit/
LOCATION:Minneapolis\, MN\, United States
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201027T113000
DTEND;TZID=America/New_York:20201027T123000
DTSTAMP:20260406T073114
CREATED:20201008T130148Z
LAST-MODIFIED:20201008T130148Z
UID:9618-1603798200-1603801800@ndisac.org
SUMMARY:How to Bridge the NetOps/SecOps Divide
DESCRIPTION:In this webinar\, we’ll talk about and illustrate how a common set of data can help both teams work and address cybersecurity requirements together. Join us to learn: \n• Why packet capture and flow analysis are important to cybersecurity response and remediation\n• How to complement existing protection\, detection\, and response tools using packet capture\n• Which data sources can be leveraged to ensure comprehensive performance and threat visibility\n• What is ‘enriched’ flow and the added insight it gives you to reduce dwell time for malicious activity
URL:https://ndisac.org/dibscc/events/how-to-bridge-the-netops-secops-divide/
CATEGORIES:Cybersecurity
END:VEVENT
END:VCALENDAR