BEGIN:VCALENDAR VERSION:2.0 PRODID:-//Security Boulevard - ECPv5.16.4//NONSGML v1.0//EN CALSCALE:GREGORIAN METHOD:PUBLISH X-WR-CALNAME:Security Boulevard X-ORIGINAL-URL:https://securityboulevard.com X-WR-CALDESC:Events for Security Boulevard BEGIN:VTIMEZONE TZID:America/New_York BEGIN:DAYLIGHT TZOFFSETFROM:-0500 TZOFFSETTO:-0400 TZNAME:EDT DTSTART:20230312T070000 END:DAYLIGHT BEGIN:STANDARD TZOFFSETFROM:-0400 TZOFFSETTO:-0500 TZNAME:EST DTSTART:20231105T060000 END:STANDARD BEGIN:DAYLIGHT TZOFFSETFROM:-0500 TZOFFSETTO:-0400 TZNAME:EDT DTSTART:20240310T070000 END:DAYLIGHT BEGIN:STANDARD TZOFFSETFROM:-0400 TZOFFSETTO:-0500 TZNAME:EST DTSTART:20241103T060000 END:STANDARD END:VTIMEZONE BEGIN:VEVENT DTSTART;TZID=America/New_York:20230725T110000 DTEND;TZID=America/New_York:20230725T120000 DTSTAMP:20230725T073542 CREATED:20230623T063026Z LAST-MODIFIED:20230724T132402Z UID:1979303-1690282800-1690286400@securityboulevard.com SUMMARY:SBOMs: A Roadmap for a Secure Software Journey DESCRIPTION:Software supply chain threats and increasing regulatory pressures make supply chain security a top priority for software organizations. While building secure applications is a must for any organization\, the path to creating secure software is anything but clear. Software bills of materials (SBOMs) have emerged as an essential tool and a roadmap for organizations on their secure software journey. URL:https://securityboulevard.com/webinars/sboms-a-roadmap-for-a-secure-software-journey/ LOCATION:Live Webinar\, Boca Raton\, FL\, United States ATTACH;FMTTYPE=image/png:https://securityboulevard.com/wp-content/uploads/2023/06/2023.07.25-Mend-SB-LandingPage-1540-×-660.png ORGANIZER;CN="Security%20Boulevard":MAILTO:webinars@securityboulevard.com GEO:26.3683064;-80.1289321 END:VEVENT BEGIN:VEVENT DTSTART;TZID=America/New_York:20230726T110000 DTEND;TZID=America/New_York:20230726T120000 DTSTAMP:20230725T073542 CREATED:20230625T030017Z LAST-MODIFIED:20230724T210133Z UID:1979518-1690369200-1690372800@securityboulevard.com SUMMARY:Modernize Mainframe Data Logistics Management DESCRIPTION:This program is designed to equip you with the knowledge and tools necessary to embrace the potential of hybrid cloud. URL:https://securityboulevard.com/webinars/modernize-mainframe-data-logistics-management/ LOCATION:Live Webinar\, Boca Raton\, FL\, United States ATTACH;FMTTYPE=image/png:https://securityboulevard.com/wp-content/uploads/2023/06/2023.07.26_RocketSoftware_Webinar_SB-LandingPage-1540x660-2.png ORGANIZER;CN="Security%20Boulevard":MAILTO:webinars@securityboulevard.com GEO:26.3683064;-80.1289321 END:VEVENT BEGIN:VEVENT DTSTART;TZID=America/New_York:20230727T130000 DTEND;TZID=America/New_York:20230727T140000 DTSTAMP:20230725T073542 CREATED:20230623T010051Z LAST-MODIFIED:20230714T182604Z UID:1979256-1690462800-1690466400@securityboulevard.com SUMMARY:Secure Your Financial Data in the Cloud: Empowering Financial Services Organizations with CSPM DESCRIPTION: URL:https://securityboulevard.com/webinars/secure-your-financial-data-in-the-cloud-empowering-financial-services-organizations-with-cspm/ LOCATION:Live Webinar\, Boca Raton\, FL\, United States ATTACH;FMTTYPE=image/png:https://securityboulevard.com/wp-content/uploads/2023/06/2023.08.21_SBRT_Webinar_SB-LandingPage-1540x660-2.png ORGANIZER;CN="Security%20Boulevard":MAILTO:webinars@securityboulevard.com GEO:26.3683064;-80.1289321 END:VEVENT BEGIN:VEVENT DTSTART;TZID=America/New_York:20230803T150000 DTEND;TZID=America/New_York:20230803T150000 DTSTAMP:20230725T073542 CREATED:20230701T030014Z LAST-MODIFIED:20230710T201542Z UID:1980147-1691074800-1691074800@securityboulevard.com SUMMARY:How Pomelo Implemented Developer-First Code Security Controls Across Their SDLC DESCRIPTION:In this session\, you’ll hear from security experts at Pomelo\, a fast-growing FinTech company\, who will walk you through their journey to implementing DevSecOps into their software development life cycle by implementing tools like Snyk to help their development team find and quickly fix vulnerabilities across both proprietary code and open source software\, automating code security controls across the tools Pomelo’s developers use to build their applications. URL:https://securityboulevard.com/webinars/how-pomelo-implemented-developer-first-code-security-controls-across-their-sdlc/ LOCATION:Live Webinar\, Boca Raton\, FL\, United States ATTACH;FMTTYPE=image/png:https://securityboulevard.com/wp-content/uploads/2023/06/2023.08.03-Synk-AWS-Landing-Page-1540x770-SB-1.png ORGANIZER;CN="Security%20Boulevard":MAILTO:webinars@securityboulevard.com GEO:26.3683064;-80.1289321 END:VEVENT BEGIN:VEVENT DTSTART;TZID=America/New_York:20230816T130000 DTEND;TZID=America/New_York:20230816T140000 DTSTAMP:20230725T073542 CREATED:20230720T050006Z LAST-MODIFIED:20230718T192145Z UID:1981895-1692190800-1692194400@securityboulevard.com SUMMARY:Building Trust in Digital Identity Verifications: Account Enrollment and Beyond DESCRIPTION:In this Techstrong Learning Experience\, our experts will delve into the ever-changing digital world\, explore the conversion challenges faced during the account enrollment process\, examine emerging trends and technologies and discuss effective strategies to mitigate fraud risks. URL:https://securityboulevard.com/webinars/building-trust-in-digital-identity-verifications-account-enrollment-and-beyond/ LOCATION:Live Webinar\, Boca Raton\, FL\, United States ATTACH;FMTTYPE=image/png:https://securityboulevard.com/wp-content/uploads/2023/07/2023.08.16_AuthenticID-SB-LandingPage-1540x660-1.png ORGANIZER;CN="Security%20Boulevard":MAILTO:webinars@securityboulevard.com GEO:26.3683064;-80.1289321 END:VEVENT BEGIN:VEVENT DTSTART;TZID=America/New_York:20230817T150000 DTEND;TZID=America/New_York:20230817T160000 DTSTAMP:20230725T073542 CREATED:20230716T072144Z LAST-MODIFIED:20230717T174357Z UID:1981565-1692284400-1692288000@securityboulevard.com SUMMARY:Overcoming Supply Chain Security Alert Fatigue DESCRIPTION:This Techstrong Learning session presents a counterintuitive approach to strengthening security–by ignoring over 90% of security vulnerability alerts. Using specific examples\, experts illustrate how organizations can ignore alerts with high confidence\, and how this enables a marked shift in security workflows and behavior. URL:https://securityboulevard.com/webinars/overcoming-supply-chain-security-alert-fatigue/ LOCATION:Live Webinar\, Boca Raton\, FL\, United States ATTACH;FMTTYPE=image/png:https://securityboulevard.com/wp-content/uploads/2023/07/2023.08.17_Semgrep_SB-LandingPage-1540x660-2.png ORGANIZER;CN="Security%20Boulevard":MAILTO:webinars@securityboulevard.com GEO:26.3683064;-80.1289321 END:VEVENT BEGIN:VEVENT DTSTART;TZID=America/New_York:20230821T130000 DTEND;TZID=America/New_York:20230821T140000 DTSTAMP:20230725T073542 CREATED:20230617T030006Z LAST-MODIFIED:20230615T161118Z UID:1978579-1692622800-1692626400@securityboulevard.com SUMMARY:API Security DESCRIPTION:In this panel discussion\, Techstrong Group Chief Content Officer Mike Vizard and API security experts discuss these challenges and how to overcome them. URL:https://securityboulevard.com/webinars/api-security-4/ LOCATION:Live Webinar\, Boca Raton\, FL\, United States ATTACH;FMTTYPE=image/png:https://securityboulevard.com/wp-content/uploads/2023/06/2023.08.21_SBRT_Webinar_SB-LandingPage-1540x660-1.png ORGANIZER;CN="Security%20Boulevard":MAILTO:webinars@securityboulevard.com GEO:26.3683064;-80.1289321 END:VEVENT BEGIN:VEVENT DTSTART;TZID=America/New_York:20240212T130000 DTEND;TZID=America/New_York:20240212T140000 DTSTAMP:20230725T073542 CREATED:20230317T021131Z LAST-MODIFIED:20230517T155003Z UID:1968525-1707742800-1707746400@securityboulevard.com SUMMARY:Ransomware DESCRIPTION:Ransomware continues to be the most disruptive and pernicious of all cyberattacks. There’s still not a lot that can be done to prevent these attacks\, but it’s apparent that the scourge requires a different approach to cybersecurity if attacks are to be thwarted. A defense-in-depth approach to cybersecurity is quickly evolving to better combat the ongoing ransomware threat. URL:https://securityboulevard.com/webinars/ransomware/ LOCATION:Live Webinar\, Boca Raton\, FL\, United States ATTACH;FMTTYPE=image/png:https://securityboulevard.com/wp-content/uploads/2023/03/2024.02.12-LandingPage-1540x660-SB.png ORGANIZER;CN="Security%20Boulevard":MAILTO:webinars@securityboulevard.com GEO:26.3683064;-80.1289321 END:VEVENT BEGIN:VEVENT DTSTART;TZID=America/New_York:20240311T130000 DTEND;TZID=America/New_York:20240311T140000 DTSTAMP:20230725T073542 CREATED:20230314T083200Z LAST-MODIFIED:20230602T133807Z UID:1968073-1710162000-1710165600@securityboulevard.com SUMMARY:Securing Open Source DESCRIPTION:It’s not just small startups that are dependent on open source software—enterprises and even many federal agencies are increasingly relying on open source software and applications. Following an executive order from the Biden administration that requires federal agencies to secure software supply chains\, organizations of all sizes are revisiting how they consume open source software and its potential to harbor any number of vulnerabilities. \nFrom making investments in software bills of materials (SBOMs) to tracking open source software usage and dependencies to more actively contributing to open source software projects\, the level of attention being paid to open source security has never been greater as the September 2023 deadline for federal compliance looms. URL:https://securityboulevard.com/webinars/securing-open-source/ LOCATION:Live Webinar\, Boca Raton\, FL\, United States ATTACH;FMTTYPE=image/png:https://securityboulevard.com/wp-content/uploads/2023/03/2023.06.05-SBRT-LandingPage-1540x660-SB.png ORGANIZER;CN="Security%20Boulevard":MAILTO:webinars@securityboulevard.com GEO:26.3683064;-80.1289321 END:VEVENT END:VCALENDAR