BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//NorthStar - ECPv6.9.0//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:NorthStar
X-ORIGINAL-URL:https://www.northstar.io
X-WR-CALDESC:Events for NorthStar
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20190101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=UTC:20210219T080000
DTEND;TZID=UTC:20210219T170000
DTSTAMP:20260417T085004
CREATED:20210219T155249Z
LAST-MODIFIED:20210219T155249Z
UID:3911-1613721600-1613754000@www.northstar.io
SUMMARY:RBVM:The Next Evolution of Vulnerability Management [WEBINAR]
DESCRIPTION:  \nJoin this live webinar to discover the keys to implementing a risk-based approach to vulnerability management & enter to win a Peloton bike! \nLearn how to leverage the critically important data unique to your business to effectively frame security decisions in a business context for maximum risk reduction.\nDiscussion Topics Include: \n\nThe what and why of risk-based vulnerability management and the shortcomings of CVSS and CVE as a prioritization mechanism\nThe importance of business context and how to determine business context\nWhat data already exists in the environment and how you can combine it with threat intel to make vulnerability prioritization easy\nThe key data points of the underlying data that drives risk scores for prioritization\nThe importance of a prioritization solution that supports exceptions and compensating controls\n\nDATE & TIME:  Thursday\, February 25 \,2021 @ 11:00am  ET | 10:00 am CT\n  \nPLEASE NOTE: Zoom details will be sent only to registered attendees. If you can’t attend the live webinar\, please register and we will send you the webinar recording. Please reach out to Ulysses at ucanlas@northstar.io (904) 728-4420 with any questions. \nRegister HERE \n 
URL:https://www.northstar.io/event/rbvmthe-next-evolution-of-vulnerability-management-webinar/
CATEGORIES:Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20190827T130000
DTEND;TZID=UTC:20190827T143000
DTSTAMP:20260417T085004
CREATED:20190724T145300Z
LAST-MODIFIED:20190724T190510Z
UID:3219-1566910800-1566916200@www.northstar.io
SUMMARY:Is Traditional Vulnerability Management Broken?
DESCRIPTION:Learn how to leverage the critically important data unique to your business to effectively frame security decisions in a business context for maximum risk reduction.\n\n  \nThe problem of figuring out what vulnerabilities pose the greatest risk and which systems to remediate first remains a critical challenge for organizations. Traditional vulnerability management practices have become unsustainable given the sheer volume of vulnerabilities and constraints in time and resources for security teams. The key to success is to implement a risk-based approach to vulnerability management. \n  \n\nBy 2022\, organizations that use the risk-based vulnerability management method will suffer 80% less breaches.\n* Gartner\, Implement a Risk-Based Approach to Vulnerability Management\, 21 August 2018 \n  \nJoin us for a live webinar “Traditional Vulnerability Management Is Broken – Why Prioritization Is The Key To Successful Risk-Based Vulnerability Management” on Tuesday\, August 27th at 2pm ET. \n  \nDiscussion Topics Include: \n\nThe what and why of risk-based vulnerability management\nThe shortcomings of CVSS and CVE as a prioritization mechanism\nThe importance of understanding exposures vs vulnerabilities\nBest practices for reducing vulnerability overload\nStrategies to dramatically reduce organizational risk through prioritization\n\n\nDATE & TIME: Tuesday\, August 27 \,2019 @ 2 PM ET | 1 PM CT | 11 AM PT  REGISTER HERE
URL:https://www.northstar.io/event/traditional-vulnerability-management-broken/
CATEGORIES:Webinar
ORGANIZER;CN="Conventus":MAILTO:info@conventus.com
END:VEVENT
END:VCALENDAR