BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20240822T210000Z
DTEND:20240822T220000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Cybersecurity Peer Group | Cybersecurity and the Supply Chain: Mitigating Third-Party Risks
DESCRIPTION:NMTC Cybersecurity Peer Group presents\n\nCybersecurity and the Supply Chain: Mitigating Third-Party Risks\n\n\nDiscuss the growing risks of cyberattacks targeting supply chains\, and strategies for managing vendor vulnerabilities and building secure supplier relationships.\n\n\n\nThe primary goal of a cybersecurity peer group is to foster collaboration and facilitate the exchange of ideas regarding emerging threats\, best practices\, innovative technologies\, and effective strategies to mitigate cyber risks. Peer Group activities include educational presentations\, discussions\, and knowledge-sharing sessions to help the participants stay updated on the latest trends and challenges in the ever-evolving landscape of cybersecurity. These groups typically consist of individuals from diverse backgrounds\, including cybersecurity analysts\, engineers\, ethical hackers\, CISOs (Chief Information Security Officers)\, and other experts in the domain.
X-ALT-DESC;FMTTYPE=text/html:<div style="text-align: center\;">NMTC Cybersecurity Peer Group presents<br />\n<span style="font-size:26px\;"><strong><span style="color: rgb(36\, 36\, 36)\; font-family: &quot\;Aptos Narrow&quot\;\, Calibri\, sans-serif\, &quot\;Mongolian Baiti&quot\;\, &quot\;Microsoft Yi Baiti&quot\;\, &quot\;Javanese Text&quot\;\, &quot\;Yu Gothic&quot\;\; white-space-collapse: preserve\;">Cybersecurity and the Supply Chain: Mitigating Third-Party Risks</span></strong></span></div>\n<br />\n<span style="font-family:arial\;"><span style="color: rgb(36\, 36\, 36)\; font-size: 14.6667px\; white-space-collapse: preserve\;">Discuss the growing risks of cyberattacks targeting supply chains\, and strategies for managing vendor vulnerabilities and building secure supplier relationships.</span><br />\n<br />\n<span style="font-size:14px\;"><span class="TextRun SCXW89376374 BCX0" data-contrast="auto" lang="EN-US" style="margin: 0px\; padding: 0px\; user-select: text\; -webkit-user-drag: none\; -webkit-tap-highlight-color: transparent\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-variant-position: normal\; color: windowtext\; font-style: normal\; white-space-collapse: preserve\; background-color: transparent\; line-height: 19.425px\;" xml:lang="EN-US"><span class="NormalTextRun SCXW89376374 BCX0" style="margin: 0px\; padding: 0px\; user-select: text\; -webkit-user-drag: none\; -webkit-tap-highlight-color: transparent\;">The primary goal of a </span><span class="NormalTextRun SCXW89376374 BCX0" style="margin: 0px\; padding: 0px\; user-select: text\; -webkit-user-drag: none\; -webkit-tap-highlight-color: transparent\;">cybersecurity</span><span class="NormalTextRun SCXW89376374 BCX0" style="margin: 0px\; padding: 0px\; user-select: text\; -webkit-user-drag: none\; -webkit-tap-highlight-color: transparent\;"> peer group is to foster collaboration and </span><span class="NormalTextRun SCXW89376374 BCX0" style="margin: 0px\; padding: 0px\; user-select: text\; -webkit-user-drag: none\; -webkit-tap-highlight-color: transparent\;">facilitate</span><span class="NormalTextRun SCXW89376374 BCX0" style="margin: 0px\; padding: 0px\; user-select: text\; -webkit-user-drag: none\; -webkit-tap-highlight-color: transparent\;"> the exchange of ideas </span><span class="NormalTextRun SCXW89376374 BCX0" style="margin: 0px\; padding: 0px\; user-select: text\; -webkit-user-drag: none\; -webkit-tap-highlight-color: transparent\;">regarding</span><span class="NormalTextRun SCXW89376374 BCX0" style="margin: 0px\; padding: 0px\; user-select: text\; -webkit-user-drag: none\; -webkit-tap-highlight-color: transparent\;"> emerging threats\, best practices\, innovative technologies\, and effective strategies to mitigate cyber risks.</span><span class="NormalTextRun SCXW89376374 BCX0" style="margin: 0px\; padding: 0px\; user-select: text\; -webkit-user-drag: none\; -webkit-tap-highlight-color: transparent\;"> </span><span class="NormalTextRun SCXW89376374 BCX0" style="margin: 0px\; padding: 0px\; user-select: text\; -webkit-user-drag: none\; -webkit-tap-highlight-color: transparent\;">Peer Group activities include educational presentations\, discussions\, and knowledge-sharing sessions to help the participants stay updated on the latest trends and challenges in the ever-evolving landscape of cybersecurity.</span><span class="NormalTextRun SCXW89376374 BCX0" style="margin: 0px\; padding: 0px\; user-select: text\; -webkit-user-drag: none\; -webkit-tap-highlight-color: transparent\;"> </span><span class="NormalTextRun SCXW89376374 BCX0" style="margin: 0px\; padding: 0px\; user-select: text\; -webkit-user-drag: none\; -webkit-tap-highlight-color: transparent\;">These groups typically consist of individuals from diverse backgrounds\, including cybersecurity analysts\, engineers\, ethical hackers\, CISOs (Chief Information Security Officers)\, and other experts in the domain.</span></span><span class="EOP SCXW89376374 BCX0" data-ccp-props="{" style="margin: 0px\; padding: 0px\; user-select: text\; -webkit-user-drag: none\; -webkit-tap-highlight-color: transparent\; color: windowtext\; white-space-collapse: preserve\; line-height: 19.425px\;">&nbsp\;</span></span></span>
LOCATION:This meeting is virtual and will occur over a Teams Meeting. The link for the meeting will be provided at the time of registration.
UID:e.9470.2351
SEQUENCE:3
DTSTAMP:20260414T103442Z
URL:http://nmtechcouncil.chambermaster.com/events/details/cybersecurity-peer-group-cybersecurity-and-the-supply-chain-mitigating-third-party-risks-2351
END:VEVENT

END:VCALENDAR
