BEGIN:VCALENDAR VERSION:2.0 PRODID:-//Security Boulevard - ECPv5.16.4//NONSGML v1.0//EN CALSCALE:GREGORIAN METHOD:PUBLISH X-WR-CALNAME:Security Boulevard X-ORIGINAL-URL:https://securityboulevard.com X-WR-CALDESC:Events for Security Boulevard BEGIN:VTIMEZONE TZID:America/New_York BEGIN:DAYLIGHT TZOFFSETFROM:-0500 TZOFFSETTO:-0400 TZNAME:EDT DTSTART:20240310T070000 END:DAYLIGHT BEGIN:STANDARD TZOFFSETFROM:-0400 TZOFFSETTO:-0500 TZNAME:EST DTSTART:20241103T060000 END:STANDARD BEGIN:DAYLIGHT TZOFFSETFROM:-0500 TZOFFSETTO:-0400 TZNAME:EDT DTSTART:20250309T070000 END:DAYLIGHT BEGIN:STANDARD TZOFFSETFROM:-0400 TZOFFSETTO:-0500 TZNAME:EST DTSTART:20251102T060000 END:STANDARD END:VTIMEZONE BEGIN:VEVENT DTSTART;TZID=America/New_York:20241205T150000 DTEND;TZID=America/New_York:20241205T160000 DTSTAMP:20241201T204122 CREATED:20241005T070015Z LAST-MODIFIED:20241004T061013Z UID:2032500-1733410800-1733414400@securityboulevard.com SUMMARY:Navigating Compliance: Ensuring Your Software Meets Regulatory Standards DESCRIPTION:As the regulatory landscape continues to evolve\, organizations face increasing pressure to comply with standards such as the Executive Order on Improving the Nation’s Cybersecurity. This panel will guide you through the complexities of compliance\, focusing on how Software Composition \nAnalysis (SCA) and Software Bill of Materials (SBOM) can help ensure your software meets current and future requirements. Learn from industry experts about the best practices for achieving compliance\, the key regulations to watch\, and how to prepare for the next wave of compliance standards in your software development process. \nKey Takeaways: \n\nUnderstand Key Regulations and Standards: Learn how current regulations\, including the Executive Order on Cybersecurity\, mandate the use of Software Composition Analysis (SCA) and Software Bill of Materials (SBOM) for compliance.\nBest Practices for Achieving and Maintaining Compliance: Discover how to integrate SCA and SBOM into your workflows to ensure continuous compliance and avoid regulatory risks.\nFuture-Proof Your Software for Upcoming Compliance Standards: Stay ahead of evolving regulations by understanding future trends and preparing your software security practices to meet new compliance standards. URL:https://securityboulevard.com/webinars/navigating-compliance-ensuring-your-software-meets-regulatory-standards/ LOCATION:Live Webinar\, Boca Raton\, FL\, United States ATTACH;FMTTYPE=image/png:https://securityboulevard.com/wp-content/uploads/2024/10/2024.12.05-Sonotype-LandingPage-1540x660-SB.png ORGANIZER;CN="Security%20Boulevard":MAILTO:webinars@securityboulevard.com GEO:26.3683064;-80.1289321 END:VEVENT BEGIN:VEVENT DTSTART;TZID=America/New_York:20241210T110000 DTEND;TZID=America/New_York:20241210T120000 DTSTAMP:20241201T204122 CREATED:20241112T235955Z LAST-MODIFIED:20241114T202215Z UID:2036145-1733828400-1733832000@securityboulevard.com SUMMARY:DevSecOps “Friends”\, Webinar Series: The One with Platform Engineering (and the Happy Developers) DESCRIPTION:Join us for a DevSecOps “Friends” webinar series where we explore the ins and outs of DevSecOps. We’ll dive deep into key topics\, from platform engineering to the role of AI\, all while navigating the intricacies of modern software development (and maybe sharing a coffee or two at the digital “central perk” along the way). No matter your DevSecOps experience level\, you’ll find valuable insights and leave each session feeling like you’ve just hung out with your favorite friends…who also happen to share your passion for application security. URL:https://securityboulevard.com/webinars/devsecops-friends-webinar-series-the-one-with-platform-engineering-and-the-happy-developers/ LOCATION:Live Webinar\, Boca Raton\, FL\, United States ATTACH;FMTTYPE=image/png:https://securityboulevard.com/wp-content/uploads/2024/11/2024.12.10-Opentext-LandingPage-1540x660-4.png ORGANIZER;CN="Security%20Boulevard":MAILTO:webinars@securityboulevard.com GEO:26.3683064;-80.1289321 END:VEVENT BEGIN:VEVENT DTSTART;TZID=America/New_York:20241211T110000 DTEND;TZID=America/New_York:20241211T120000 DTSTAMP:20241201T204122 CREATED:20241030T190041Z LAST-MODIFIED:20241029T133925Z UID:2034451-1733914800-1733918400@securityboulevard.com SUMMARY:Managing Dependencies at Enterprise Scale DESCRIPTION:Are confidentiality\, integrity\, and availability still enough\, or is it time to evolve our thinking? Join Chris Lindsey and a panel of tech leaders from leading enterprises\, for a dynamic discussion on the relevance of the CIA Triad in modern security practices. We’ll explore whether the triad needs to be replaced by more advanced models\, such as assigning weighted risk scores or other emerging frameworks for defining security incidents. \nThe panel will also dive into what constitutes a Zero-Day threat\, using the classification of CrowdStrike as a case study. Was it appropriately labeled a Zero-Day? Gain actionable insights from top security leaders\, on how they navigate these challenges and how you can better prepare your organization. \nRegister today! \nKey Takeaways: \n\nExploring whether the triad needs to be replaced by more advanced models\, such as assigning weighted risk scores or other emerging frameworks for defining security incidents.\nDiving into what constitutes a Zero-Day threat\, using the classification of CrowdStrike as a case study.\nGaining actionable insights from top security leaders\, on how they navigate these challenges and how you can better prepare your organization. URL:https://securityboulevard.com/webinars/managing-dependencies-at-enterprise-scale/ LOCATION:Live Webinar\, Boca Raton\, FL\, United States CATEGORIES:Techstrong Learning ATTACH;FMTTYPE=image/png:https://securityboulevard.com/wp-content/uploads/2024/10/2024.11.20-Mend-LandingPage-1540x660-SB-1.png ORGANIZER;CN="Security%20Boulevard":MAILTO:webinars@securityboulevard.com GEO:26.3683064;-80.1289321 END:VEVENT BEGIN:VEVENT DTSTART;TZID=America/New_York:20241219T130000 DTEND;TZID=America/New_York:20241219T140000 DTSTAMP:20241201T204122 CREATED:20241120T212647Z LAST-MODIFIED:20241120T212647Z UID:2037125-1734613200-1734616800@securityboulevard.com SUMMARY:Staying Ahead: Top Internet Trends Shaping Networking and Security DESCRIPTION:Join us for an interactive discussion where we’ll talk about the latest knowledge\, actionable experiences\, and practical insights for your strategy. Whether you’re seeking to improve network resilience\, refine your cybersecurity stance\, or better align your plans with emerging Internet patterns\, this session is designed to deliver valuable takeaways. URL:https://securityboulevard.com/webinars/staying-ahead-top-internet-trends-shaping-networking-and-security/ LOCATION:Live Webinar\, Boca Raton\, FL\, United States CATEGORIES:Techstrong Learning ORGANIZER;CN="Security%20Boulevard":MAILTO:webinars@securityboulevard.com GEO:26.3683064;-80.1289321 END:VEVENT BEGIN:VEVENT DTSTART;TZID=America/New_York:20250108T100000 DTEND;TZID=America/New_York:20250108T110000 DTSTAMP:20241201T204122 CREATED:20241122T154119Z LAST-MODIFIED:20241121T155012Z UID:2037227-1736330400-1736334000@securityboulevard.com SUMMARY:Hacker Tactic: Avoid Blind Spots with Your Windows Event Logs DESCRIPTION:Several high-profile breaches involving Windows Event Log blind spots made headlines when hackers evaded detection by manipulating or deleting logs to obscure their activities. Without the right tools\, security teams struggled to identify the nefarious actions and understand the full extent of the breach. \nWith SentinelOne\, you can collect and consolidate your EDR data with Windows Event Logs without investing in new tooling or infrastructure. Singularity™ AI SIEM allows organizations to extend their investment in EDR\, leveraging the same lightweight EDR agent to centralize Windows Event Logs. URL:https://securityboulevard.com/webinars/hacker-tactic-avoid-blind-spots-with-your-windows-event-logs/ LOCATION:Live Webinar\, Boca Raton\, FL\, United States CATEGORIES:Techstrong Learning ATTACH;FMTTYPE=image/png:https://securityboulevard.com/wp-content/uploads/2024/11/2025.01.08-SentinelOne-LandingPage-1540x660-1.png ORGANIZER;CN="Security%20Boulevard":MAILTO:webinars@securityboulevard.com GEO:26.3683064;-80.1289321 END:VEVENT BEGIN:VEVENT DTSTART;TZID=America/New_York:20250128T130000 DTEND;TZID=America/New_York:20250128T140000 DTSTAMP:20241201T204122 CREATED:20241121T213643Z LAST-MODIFIED:20241125T210539Z UID:2037296-1738069200-1738072800@securityboulevard.com SUMMARY:Simplifying Network Access: Secure Modern Connectivity with Tailscale DESCRIPTION:In today’s distributed computing landscape\, network complexity and security challenges continue to burden IT security\, DevOps\, and SRE professionals. Tailscale simplifies network access without compromising underlying security\, and in fact\, can enhance your security posture when connecting to distributed infrastructure like AWS. \n  \nIn this webinar we will unveil how modern mesh networking based on WireGuard can simplify secure connectivity across diverse environments\, reducing operational overhead while maintaining robust security standards. You’ll leave with a better understanding of how modern remote connectivity works and how best to secure your infrastructure with Tailscale. URL:https://securityboulevard.com/webinars/simplifying-network-access-secure-modern-connectivity-with-tailscale/ LOCATION:Live Webinar\, Boca Raton\, FL\, United States CATEGORIES:Techstrong Learning ATTACH;FMTTYPE=image/png:https://securityboulevard.com/wp-content/uploads/2024/11/2025.01.28-Tailscale-LandingPage-1540x660-SB-2.png ORGANIZER;CN="Security%20Boulevard":MAILTO:webinars@securityboulevard.com GEO:26.3683064;-80.1289321 END:VEVENT END:VCALENDAR