BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//NorthStar - ECPv6.9.0//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:NorthStar
X-ORIGINAL-URL:https://www.northstar.io
X-WR-CALDESC:Events for NorthStar
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20190101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=UTC:20190617T080000
DTEND;TZID=UTC:20190620T170000
DTSTAMP:20260403T205156
CREATED:20190513T180225Z
LAST-MODIFIED:20190520T184228Z
UID:3142-1560758400-1561050000@www.northstar.io
SUMMARY:Gartner Security and Risk Summit 2019
DESCRIPTION:Understand new threats and challenges.  Secure rapid innovation.  Prepare for emerging technologies. Prioritize resilience.\n  \n\n\n\n\n\n\nMake sure you have the latest insights on fast-moving IT trends such as IoT and AI\, evolving security technologies and the ever-changing threat landscape. At Gartner Security & Risk Management Summit 2019\, you’ll find comprehensive coverage of today’s top priorities for security and risk leaders. Join us for the latest advice to help you: \n\n\n\n\n\n\n\n\n\n\n\n\n\nKeep up with cybersecurity standards\, frameworks\, and guidance\nLearn how to prioritize resilience\nMeet major compliance challenges\nExplore how to develop an integrated risk management program\nLearn how to establish governance within your organization\nPrepare for the Internet of Things (IoT)\, artificial intelligence (AI) and analytics\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nMove forward with cloud security\nAddress skilled staffing shortages\nHone your leadership skills and compel a shift in how the whole organization approaches security\nEnsure your investments are aligned to the current threat environment\nExpect the latest on privacy\, DevOps and edge computing\nUnderstand the impact of blockchain\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nWhether you’re a CISO looking to improve your leadership skills\, a security professional who needs practical advice to accelerate progress on your next initiative or a BCM leader trying to implement resilience practices across the organization\, you’ll find your program\, peers and strategic partners at this event. When you attend\, you connect with a community focused on finding solutions to your next big challenge.
URL:https://www.northstar.io/event/gartner-security-and-risk-summit-2019/
LOCATION:Gaylord National Resort & Convention Center\, 201 Waterfront Street\, National Harbor\, MD\, 20745\, United States
CATEGORIES:Tradeshow
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20190620T080000
DTEND;TZID=UTC:20190620T173000
DTSTAMP:20260403T205156
CREATED:20190523T163815Z
LAST-MODIFIED:20190523T163815Z
UID:3201-1561017600-1561051800@www.northstar.io
SUMMARY:SecureXIII - 13th Annual ISACA and ISSA Chicago Chapters Security Conference and Networking Cruise
DESCRIPTION:Join us for our annual joint ISACA and ISSA training and networking event to be held on Thursday\, June 20\, 2019.  We would like to extend the invitation to you to enjoy the Odyssey’s multi-million-dollar renovation with five (5) hours of educational training (5 CPE’s) and a magnificent two (2) hour boat cruise on Lake Michigan. \n    **(Note: The afternoon networking is 3 hours from 2:30 – 5:30\,\nbut the actual boat cruise on the lake is 2 hours.)** \nLearn how to implement and improve IT Risk Management and IT Security for your organization\, network with industry colleagues and friends\, and enjoy breathtaking scenery aboard Chicago’s premier luxury vessel\, the Odyssey. \nAttendance at the training includes 5 hours of top-notch educational sessions with complimentary breakfast\, sumptuous lunch and an afternoon networking cocktail cruise with hors d’oeuvres.  For those who can only attend the afternoon cruise\, it includes a delicious food buffet and appetizers with soft drinks and cocktails.
URL:https://www.northstar.io/event/securexiii-13th-annual-isaca-and-issa-chicago-chapters-security-conference-and-networking-cruise/
LOCATION:Odyssey Cruises on Lake Michigan\, Navy Pier\, Chicago\, IL\, 60611\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20190827T130000
DTEND;TZID=UTC:20190827T143000
DTSTAMP:20260403T205156
CREATED:20190724T145300Z
LAST-MODIFIED:20190724T190510Z
UID:3219-1566910800-1566916200@www.northstar.io
SUMMARY:Is Traditional Vulnerability Management Broken?
DESCRIPTION:Learn how to leverage the critically important data unique to your business to effectively frame security decisions in a business context for maximum risk reduction.\n\n  \nThe problem of figuring out what vulnerabilities pose the greatest risk and which systems to remediate first remains a critical challenge for organizations. Traditional vulnerability management practices have become unsustainable given the sheer volume of vulnerabilities and constraints in time and resources for security teams. The key to success is to implement a risk-based approach to vulnerability management. \n  \n\nBy 2022\, organizations that use the risk-based vulnerability management method will suffer 80% less breaches.\n* Gartner\, Implement a Risk-Based Approach to Vulnerability Management\, 21 August 2018 \n  \nJoin us for a live webinar “Traditional Vulnerability Management Is Broken – Why Prioritization Is The Key To Successful Risk-Based Vulnerability Management” on Tuesday\, August 27th at 2pm ET. \n  \nDiscussion Topics Include: \n\nThe what and why of risk-based vulnerability management\nThe shortcomings of CVSS and CVE as a prioritization mechanism\nThe importance of understanding exposures vs vulnerabilities\nBest practices for reducing vulnerability overload\nStrategies to dramatically reduce organizational risk through prioritization\n\n\nDATE & TIME: Tuesday\, August 27 \,2019 @ 2 PM ET | 1 PM CT | 11 AM PT  REGISTER HERE
URL:https://www.northstar.io/event/traditional-vulnerability-management-broken/
CATEGORIES:Webinar
ORGANIZER;CN="Conventus":MAILTO:info@conventus.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20191113T080000
DTEND;TZID=UTC:20191113T170000
DTSTAMP:20260403T205156
CREATED:20191106T180956Z
LAST-MODIFIED:20191106T180956Z
UID:3342-1573632000-1573664400@www.northstar.io
SUMMARY:Global Cyber Security Initiative (GCSI) Conference
DESCRIPTION:Schedule \n8:45 – 9:00 am Welcoming Remarks \n9:00 – 9:50 am Keynote Speaker: Joe Norton\, Chairman Advisory Board\, NextEra Transformation Group \nTitle of the Keynote: “HIC SUNT DRACONES”… Here be Dragons! You should be Very Afraid! \n9:50 – 10:40 am Cybersecurity Panel: Why Don’t We Defend Better? \nModerator: Richard Warner\, Faculty Director\, Chicago-Kent’s Center for Law and Computers \nSpeakers: \n\nJennifer Inserro\,Sr Dir IT & Security Policy\, Blue Cross Blue Shield\nProf. Wulf Kaal\, CEO\, Kaal Consulting\nDave Melchers\,GVP ExP-Americas\, Executive Programs\, Gartner\nRicardo Lafosse\, CISO\, Morningstar\n\n10:40 – 10:55 am Break \n10:55 – 11:45 am Panel Discussion on Cybersecurity at C-Level \nModerator: Ray Trygstad\, Interim Associate Director\, Center for Cyber Security and Forensics Education \nSpeakers: \n\nMaurice Dawson\, Director of the Center For Cyber Security and Forensics Education\, IIT\nMark Las\, Chief Information Officer\, Chicago State University\nOphir Trigalo\, Chief Information Officer\, IIT\nRavi Mani\, CISO\, IBM\n\nNoon – 1:00 pm Lunch \nCISO Round Table (By Invitation only) Moderator: Jeffrey Welgan\, Executive Director\, Head of Executive & Professional Training Programs at CyberVista \n1:00 – 1:40 pm Keynote Speaker: Laszlo Gonc\, Transformation Strategist & Chief Cybersecurity Evangelist \nTitle of the Keynote: The Next Perfect Storm: The Convergence of AI\, IoT\, Blockchain and Cybersecurity \n1:40 – 2:30 pm Panel Discussion: Cybersecurity for highly regulated areas – Fintech\, Healthcare and Insurance \nModerator: Nitesh Dixit\, Director\, North America Practice Leader at Auctus Advisors \nSpeakers: \n\nErik Decker\, Chief Information Security & Privacy Officer\nWendy Betts\, VP & Sr. Security Engineer\, Bank of America\nSean O’Kelly\, CIO\, Technology Leader\nBruce Coffing\, CISO\, City of Chicago\n\n2:30 – 2:45 pm Break \n2:45 – 3:25 pm Keynote Speaker Tina LaCroix\, Co-Founder and President\, Bradford Garrett Group\, Inc \nTitle of the Keynote: “CyberEthics: Just Because You Can…DON’T” \n3:25 – 4:15 pm Panel Discussion on IOT : The New Infrastructure \nModerator: Glenn Kapetansky\, Senior Principal & CSO\, Trexin \nSpeakers: \n\nAlex Moss\, Founder and CEO\, Coventus\nJasper Ossentjuk\, Chief Information Security Officer/SVP at TransUnion\nJosh Kriss\, Director\, DarkTrace\n\n5:00-6:00 pm \nNetworking sponsored by riskrecon\nFor more information and videos of GCSI2018\, please visit. gcsiconference.com
URL:https://www.northstar.io/event/global-cyber-security-initiative-gcsi-conference/
LOCATION:Chicago-Kent College of Law at Illinois Institute of Technology\, 565 West Adams Street\, Chicago\, IL\, 60661\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200601
DTEND;VALUE=DATE:20200605
DTSTAMP:20260403T205156
CREATED:20200214T162812Z
LAST-MODIFIED:20200214T162812Z
UID:3641-1590969600-1591315199@www.northstar.io
SUMMARY:Gartner Security & Risk Management Summit 2020
DESCRIPTION:In today’s risk reality\, you have to anticipate new cybersecurity threats\, deal with disruptive technologies like vulnerability prioritization technologies and build resilience in a world where anything seems possible. \nGartner Security & Risk Management Summit 2020 is the one place you can hear independent experts on what matters most now and how to prepare for what’s ahead. You’ll learn how to create the security and IT risk management plans you need to give your organization the freedom to grow and innovate with confidence. \nSecurity and risk leaders from around the world attend to update and improve your cybersecurity and risk management strategy. Join us for the insights\, inspiration and information you need to deal with whatever the new decade brings your way. \nConventus is a proud sponsor at the upcoming Gartner Security & Risk Management Summit 2020.
URL:https://www.northstar.io/event/gartner-security-risk-management-summit-2020/
LOCATION:Gaylord National Resort & Convention Center\, 201 Waterfront Street\, National Harbor\, MD\, 20745\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20210219T080000
DTEND;TZID=UTC:20210219T170000
DTSTAMP:20260403T205156
CREATED:20210219T155249Z
LAST-MODIFIED:20210219T155249Z
UID:3911-1613721600-1613754000@www.northstar.io
SUMMARY:RBVM:The Next Evolution of Vulnerability Management [WEBINAR]
DESCRIPTION:  \nJoin this live webinar to discover the keys to implementing a risk-based approach to vulnerability management & enter to win a Peloton bike! \nLearn how to leverage the critically important data unique to your business to effectively frame security decisions in a business context for maximum risk reduction.\nDiscussion Topics Include: \n\nThe what and why of risk-based vulnerability management and the shortcomings of CVSS and CVE as a prioritization mechanism\nThe importance of business context and how to determine business context\nWhat data already exists in the environment and how you can combine it with threat intel to make vulnerability prioritization easy\nThe key data points of the underlying data that drives risk scores for prioritization\nThe importance of a prioritization solution that supports exceptions and compensating controls\n\nDATE & TIME:  Thursday\, February 25 \,2021 @ 11:00am  ET | 10:00 am CT\n  \nPLEASE NOTE: Zoom details will be sent only to registered attendees. If you can’t attend the live webinar\, please register and we will send you the webinar recording. Please reach out to Ulysses at ucanlas@northstar.io (904) 728-4420 with any questions. \nRegister HERE \n 
URL:https://www.northstar.io/event/rbvmthe-next-evolution-of-vulnerability-management-webinar/
CATEGORIES:Webinar
END:VEVENT
END:VCALENDAR