BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Austin Technology Council - ECPv6.11.0.1//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Austin Technology Council
X-ORIGINAL-URL:https://www.austintechnologycouncil.org
X-WR-CALDESC:Events for Austin Technology Council
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20220313T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20221106T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20220301T180000
DTEND;TZID=America/Chicago:20220301T194500
DTSTAMP:20260427T042710
CREATED:20220128T201914Z
LAST-MODIFIED:20220128T201914Z
UID:10001660-1646157600-1646163900@www.austintechnologycouncil.org
SUMMARY:Cybersecurity in 2022: Growing Threats\, And What You Can Do
DESCRIPTION:As Covid pandemic measures have pushed people and businesses increasingly online and remote\, cybercriminals have pivoted as well\, exploiting weaknesses in these technologies. Always a present threat\, today’s exploits are now automated\, pushing us to automate our defense as well. Many threats — even if larger in scale — remain the same. Phishing\, credential re-use\, known vulnerable components\, the traditional attacks continue to provide criminals with a steady stream of access to private networks and personal data. It seems that nobody\, and no company or agency\, is safe from cyber theft. \nWhat can we do? Fortunately\, lessons learned from watching adversaries can also be applied to improve our defenses. Proactively looking for indicators of compromise\, adding two-factor authentication\, and thwarting credential re-use are easier today than ever before. \nJoin us as Gabe Schuyler\, a cybersecurity expert now with WizIO\, explains the types of computer and network vulnerabilities and how they are exploited\, as well as examples of a variety of attack types and threats\, why they happen and what should be done to prevent or recover from them. Gabe will close with some very practical advice on what organizations\, and you\, can do to be more secure against cyberthreats. \nRegister Here 
URL:https://www.austintechnologycouncil.org/event/cybersecurity-in-2022-growing-threats-and-what-you-can-do/
LOCATION:Austin Central Library\, 710 W. Cesar Chavez Downtown Austin\, Austin\, texas\, 78702\, Select a Country:
CATEGORIES:Community Event
ATTACH;FMTTYPE=image/jpeg:https://www.austintechnologycouncil.org/wp-content/uploads/2022/01/pexels-pixabay-60504-scaled.jpg
ORGANIZER;CN="Austin Technology Council":MAILTO:info@www.austintechnologycouncil.org
END:VEVENT
END:VCALENDAR