BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20150121T130000Z
DTEND:20150121T160000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:It's 2015: You Will Be Hacked!
DESCRIPTION:Learn how to protect your company against hackers. Register now. \n\n\n\nPresented By:\n\n\n\nDurham 2.0\, Smith Anderson Law\, and The Research Triangle Park\n\n\n\n                          \n\nLearn how to protect your assets by joining us on January 21st 8:30-11:30 AM at the Research Triangle Foundation building in RTP. You'll learn how to prepare your business technically\, legally\, and culturally to protect against cybersecurity threats that are knocking on your company door.\n\n \n\nIf your organization maintains any information about customers\, employees or business contacts\, this program is a must see.  \n\n \n\nWe'll discuss preparing and handling issues so that you avert possible disasters for your organization.\n\n \n\n8:00 AM   Registration opens\n\n8:30 AM   Program Begins\n\n11:00 AM   Program Ends\n\n\n\nFirst Panel | 8:30 - 10:00 AM\n\nPresented by Alicia A. Gilleskie\, Smith Anderson\, and James Sills\, M&F Bank  \n\nDiscussion of real world data breach scenarios\, practical tips for handling the technical and legal response\, and communications challenges that companies face in response to a data breach.\n\n\n\nSecond Panel  |  10:15 - 11:00 AM\n\nPresented by John  H. Jo and Jackson W. Moore\, Smith Anderson\n\nDiscussion of regulatory enforcement activity and risk mitigation tactics\, including trends in cyber insurance coverage.\n\n\n\n*Moderated by Christopher G. Smith\, Smith Anderson \n\n\n\n***Early registration is encouraged due to limited capacity.***
X-ALT-DESC;FMTTYPE=text/html:<p><span style="font-size: 16px\;"><span style="font-family: calibri\;"><span style="font-size: 18px\;"><strong>Learn how to protect your company against hackers.&nbsp\;</strong></span></span></span><strong style="font-family: calibri\; font-size: 18px\; line-height: 28.7999992370605px\;">Register now.&nbsp\;</strong><br />\n<br />\n<span style="font-size: 16px\;"><span style="font-family: calibri\;"><span style="font-size: 18px\;"><strong>Presented By</strong>:</span></span></span><br />\n<br />\n<span style="font-family: arial\; font-size: 16px\; line-height: 25.6000003814697px\; text-align: center\;">Durham 2.0\, Smith Anderson Law\, and&nbsp\;The Research Triangle Park</span><br />\n<br />\n<span style="font-size: 16px\;"><span style="font-family: calibri\;"><span style="color: rgb(31\, 73\, 125)\;"><img alt="" height="48" src="http://cloud.chambermaster.com/userfiles/UserFiles/chambers/1159/Image/DurhamChamber2.0.png" style="width: 120px\; height: 48px\;" width="120" />&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\; &nbsp\;<img alt="" height="28" src="http://cloud.chambermaster.com/userfiles/UserFiles/chambers/1159/Image/SmithAndersonLogo.jpg" style="width: 135px\; height: 28px\;" width="135" />&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\; <img alt="" height="67" src="http://cloud.chambermaster.com/userfiles/UserFiles/chambers/1159/Image/RTPJPEG.jpg" style="width: 119px\; height: 67px\;" width="119" /></span></span></span></p>\n\n<p><span style="font-size: 16px\;"><span style="font-family: arial\;"><strong><span style="font-weight: normal\;">Learn how to protect your assets by joining us on January 21<sup>st</sup></span></strong>&nbsp\;<strong><span style="font-weight: normal\;">8:30-11:</span></strong>30 AM<strong><span style="font-weight: normal\;"> at the Research Triangle Foundation building in </span></strong>RTP<strong><span style="font-weight: normal\;">. </span></strong>You&#39\;ll learn how to prepare your business technically\, legally\, and culturally to protect against cybersecurity threats that are knocking on your company door.<br />\n&nbsp\;<br />\nIf your organization maintains any information about customers\, employees or business contacts\, this program is a must see.&nbsp\;&nbsp\;<br />\n&nbsp\;<br />\n<strong><span style="font-weight: normal\;">We&rsquo\;ll discuss preparing and handling issues so that you avert possible disasters for your organization.</span></strong><br />\n&nbsp\;<br />\n8:00 AM &ndash\; Registration opens<br />\n8:30 AM &ndash\; Program Begins<br />\n11:00 AM &ndash\; Program Ends</span></span><br />\n<br />\n<span style="font-size:16px\;"><strong style="line-height: 20.7999992370605px\;"><span style="font-family: arial\, sans-serif\;">First Panel | 8:30 - 10:00 AM</span></strong><br style="line-height: 20.7999992370605px\;" />\n<strong style="line-height: 20.7999992370605px\;"><em><span style="font-family: arial\, sans-serif\;">Presented by&nbsp\;Alicia A.&nbsp\;Gilleskie\, Smith Anderson\, and James Sills\, M&amp\;F Bank&nbsp\;&nbsp\;</span></em></strong><br style="line-height: 20.7999992370605px\;" />\n<span style="line-height: 20.7999992370605px\; background-image: initial\; background-attachment: initial\; background-size: initial\; background-origin: initial\; background-clip: initial\; background-position: initial\; background-repeat: initial\;"><span style="font-family: arial\, sans-serif\;">Discussion of real world data breach scenarios\, practical tips for handling the technical and legal response\, and communications challenges that companies face in response to a data breach.</span></span><br />\n<br />\n<strong style="line-height: 20.7999992370605px\;"><span style="font-family: arial\, sans-serif\;">Second Panel &nbsp\;| &nbsp\;10:15 - 11:00 AM</span></strong><br style="line-height: 20.7999992370605px\;" />\n<strong style="line-height: 20.7999992370605px\;"><em><span style="font-family: arial\, sans-serif\;">Presented&nbsp\;by&nbsp\;John &nbsp\;H. Jo and Jackson W. Moore\, Smith Anderson</span></em></strong><br style="line-height: 20.7999992370605px\;" />\n<span style="line-height: 20.7999992370605px\; background-image: initial\; background-attachment: initial\; background-size: initial\; background-origin: initial\; background-clip: initial\; background-position: initial\; background-repeat: initial\;"><span style="font-family: arial\, sans-serif\;">Discussion of regulatory enforcement activity and risk mitigation tactics\, including trends in cyber insurance coverage.</span></span><br />\n<br />\n<strong style="line-height: 20.7999992370605px\;"><em><span style="background-image: initial\; background-attachment: initial\; background-size: initial\; background-origin: initial\; background-clip: initial\; background-position: initial\; background-repeat: initial\;"><span style="font-family: arial\, sans-serif\;">*Moderated&nbsp\;by Christopher G. Smith\, Smith Anderson</span></span></em></strong><span style="line-height: 20.7999992370605px\; background-image: initial\; background-attachment: initial\; background-size: initial\; background-origin: initial\; background-clip: initial\; background-position: initial\; background-repeat: initial\;"><span style="font-family: arial\, sans-serif\;">&nbsp\;</span></span><br />\n<br />\n<em style="line-height: 20.7999992370605px\;"><span style="font-family: arial\, sans-serif\;">***Early registration is encouraged due to limited capacity.***&nbsp\;</span></em></span></p>\n
LOCATION:The Research Triangle Park 12 Davis Drive RTP\, NC 27709
UID:e.1159.1626
SEQUENCE:3
DTSTAMP:20260512T214044Z
URL:http://members.durhamchamber.org/events/details/it-s-2015-you-will-be-hacked-01-21-2015-1626
END:VEVENT

END:VCALENDAR
