BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//DIB SCC CyberAssist - ECPv6.2.4//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:DIB SCC CyberAssist
X-ORIGINAL-URL:https://ndisac.org/dibscc
X-WR-CALDESC:Events for DIB SCC CyberAssist
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210210T110000
DTEND;TZID=America/New_York:20210210T120000
DTSTAMP:20260412T164016
CREATED:20210127T140425Z
LAST-MODIFIED:20210127T140425Z
UID:10463-1612954800-1612958400@ndisac.org
SUMMARY:SolarWinds Hack: Fallout\, Recovery\, and Prevention
DESCRIPTION:Summary\nThe recent SolarWinds incident demonstrated the challenges of securing systems when they are the product of complex supply chains. \nAgenda\n\nThe recent SolarWinds incident demonstrated the challenges of securing systems when they are the product of complex supply chains. Responding effectively to breaches and hacks requires a cross-section of technical skills and process insights. In this webcast\, we will explore the lifecycle of the SolarWinds activity and discuss both technical and risk assessment to prepare organizations to defend against this type of incident. \nWhat attendees will learn: \n\nTechnical details regarding the SolarWinds vulnerabilities and exploits\nSupply chain risk management principles required to reduce the risk of future incidents\nAdvice on the core operational capabilities required to respond to and recover from the SolarWinds hack\n\nWho should attend? \n\nChief Information Security Officer\nDirector of Information Security\nNetwork Security Operations Manager\nNetwork Security Analyst\nThird-Party Risk Manager
URL:https://ndisac.org/dibscc/events/solarwinds-hack-fallout-recovery-and-prevention/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
END:VCALENDAR