BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20081112T131500Z
DTEND:20081112T150000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:2008 Nov - Hackers\, Security Breaches & You
DESCRIPTION:Think of your organization and how almost every aspect of it relies upon technology and computer systems. If  someone hacks in\, imagine the potentially devastating results.  Could your business survive?  Could you?  Besides the obvious system downtime and theft of data\, there could be data corruption\, identity theft (from online personnel records)\, embarrassing publicity\, financially devastating results  or even jail time as customers and business partners learn of and react negatively to news of a compromise or security breach.\n     A breach can result in resources rendered unavailable and stolen or corrupted data. But one cannot overlook issues that are difficult to calculate financially\, such as bad publicity\,  not to mention the loss of trust from your clients .  \n     In the event that the security of a system has been compromised\, an incident response is necessary. It is the responsibility of the security team to respond to the problem quickly and effectively.  This lecture will demonstrate the proper initial response to computer incidents of all types (hackers\, inappropriate use of network resources\, other illegal activity) using Helix\, e-fense\, Inc.’s popular free incident response disk.  A demonstration of Helix 3 Enterprise (H3E)\, the new network version will follow. ARE YOU DOING ENOUGH TO DETECT\, PREVENT\, and RESPOND to security breaches?
X-ALT-DESC;FMTTYPE=text/html:<P><SPAN style="FONT-SIZE: 11pt\; FONT-FAMILY: Calibri"><FONT size=3><FONT face="Times New Roman"><FONT color=#ff0000><FONT color=#000000>&nbsp\;&nbsp\;&nbsp\;&nbsp\; Think of your organization and how almost every aspect of it relies upon technology and computer systems. If&nbsp\;<SPAN class=440190721-27102008>&nbsp\;someone hacks in</SPAN>\, imagine the potentially devastating results.<SPAN class=440190721-27102008>&nbsp\; Could your business survive?&nbsp\; Could you?&nbsp\;</SPAN> Besides the obvious system downtime and theft of data\, there could be data corruption\, identity theft (from online personnel records)\, embarrassing publicity\, financially devastating results<SPAN class=440190721-27102008>&nbsp\; or even&nbsp\;jail time</SPAN> as customers and business partners learn of and react negatively to news of a compromise</FONT><SPAN class=194140020-27102008><FONT color=#000000> or security breach.<BR>&nbsp\;&nbsp\;&nbsp\;&nbsp\; </FONT></SPAN><FONT color=#000000><SPAN class=194140020-27102008>A breach can result in resources rendered unavailable and stolen or corrupted data. But one cannot overlook issues that are difficult to calculate financially\, such as bad publicity<SPAN class=440190721-27102008>\,&nbsp\; not to mention the loss of trust from your clients&nbsp\;</SPAN>.&nbsp\; <BR>&nbsp\;&nbsp\;&nbsp\;&nbsp\; </SPAN>In the event that the security of a system has been compromised\, an <I class=FIRSTTERM>incident response</I> is necessary. It is the responsibility of the security team to respond to the problem quickly and effectively.<SPAN class=194140020-27102008>&nbsp\; </SPAN><SPAN style="FONT-SIZE: 11pt"><FONT size=3>This lecture will demonstrate the proper initial response to computer incidents of all types (hackers\, inappropriate use of network resources\, other illegal activity) using Helix\, e-fense\, Inc.’s popular free incident response disk. &nbsp\;A demonstration of Helix 3 Enterprise (H3E)\, the new network version will follow.<SPAN class=440190721-27102008>&nbsp\;</SPAN></FONT></SPAN></FONT></P><DIV dir=ltr align=left><DIV dir=ltr align=left><P><SPAN style="FONT-SIZE: 11pt"><FONT size=3><SPAN class=440190721-27102008><STRONG>ARE&nbsp\;YOU DOING ENOUGH TO DETECT\, PREVENT\, and RESPOND to&nbsp\;security&nbsp\;breaches?</STRONG></SPAN><BR></FONT></SPAN></P></DIV></DIV></FONT></FONT></FONT></SPAN><P><SPAN style="FONT-SIZE: 11pt\; FONT-FAMILY: Calibri"><SPAN style="FONT-SIZE: 11pt\; FONT-FAMILY: Calibri"><IMG alt="" src="http://members.northsachamber.com/sbaweb/images/imgs/1112tech.jpg" border=0></SPAN>&nbsp\;</P><P></P></SPAN>
LOCATION:The Petroleum Club
UID:e.2020.540
SEQUENCE:3
DTSTAMP:20260425T083700Z
URL:https://members.metrosa.com/events/details/2008-nov-hackers-security-breaches-you-11-12-2008-540
END:VEVENT

END:VCALENDAR
