BEGIN:VCALENDAR VERSION:2.0 PRODID:-//ChamberMaster//Event Calendar 2.0//EN METHOD:PUBLISH X-PUBLISHED-TTL:P3D REFRESH-INTERVAL:P3D CALSCALE:GREGORIAN BEGIN:VEVENT DTSTART:20210803T163000Z DTEND:20210803T180000Z X-MICROSOFT-CDO-ALLDAYEVENT:FALSE SUMMARY:Chamber Business Luncheon August 2021 DESCRIPTION:The Portage Area Chamber of Commerce is offering another way to develop more customers and build relationships with your fellow Chamber members and make those important connections that can help you in your business or career. Bring your business cards\, brochures\, or anything you wish to share with other members.\n\n \n\n\nLuncheon Information\n\nFearing's Audio Video Security will be talking with us about the ins and outs of Cyber Security and what you need to know in this new digital world that is constantly changing. A strong cyber security strategy is no longer a luxury it is a necessity to protect your networks\, data centers\, and endpoints from sophisticated malware\, ransomware\, and other targeted cyber attacks. \n\n\n\nTOPICS INCLUDE:\n\n What is a Cyber "Security Model?"\n\n What is the "Zero Trust Security Model?"\n\n What is a "Threat Landscape?"\n\n What is an "Attack Surface" and why is it important to understand?\n\n What is a "Supply Chain Attack?"\n\n Examples of recent "Supply Chain Attacks."\n\n What Techniques and Tools are used in the "Zero Trust Security Model?"\n\n\n\nLocation: Dino's Restaurant \n\nTime: Lunch at 11:30AM\, Presentation at Noon\n\nCost: order your lunch at the restaurant \n\nDate: Tuesday\, August 3\, 2021 X-ALT-DESC;FMTTYPE=text/html:
Luncheon Information
\nFearing'\;s Audio Video Security will be talking with us about the ins and outs of Cyber Security and what you need to know in this new digital world that is constantly changing. \; A strong cyber security strategy is no longer a luxury &ndash\; it is a necessity to protect your networks\, data centers\, and endpoints from sophisticated malware\, ransomware\, and other targeted cyber attacks. \;
\nTOPICS INCLUDE:
\n&bull\; What is a Cyber &ldquo\;Security Model?&rdquo\;
\n&bull\; What is the &ldquo\;Zero Trust Security Model?&rdquo\;
\n&bull\; What is a &ldquo\;Threat Landscape?&rdquo\;
\n&bull\; What is an &ldquo\;Attack Surface&rdquo\; and why is it important to understand?
\n&bull\; What is a &ldquo\;Supply Chain Attack?&rdquo\;
\n&bull\; Examples of recent &ldquo\;Supply Chain Attacks.&rdquo\;
\n&bull\; What Techniques and Tools are used in the &ldquo\;Zero Trust Security Model?&rdquo\;
\n
\nLocation: Dino'\;s Restaurant \;
\nTime: \; Lunch at 11:30AM\, \;Presentation \;at Noon
\nCost: order your lunch at the restaurant \;
\nDate: Tuesday\, August 3\, \;2021