BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20180524T160000Z
DTEND:20180524T190000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Cyber Awareness 360: Data Security\, Disposal\, and Incident Response
DESCRIPTION:Cyber Awareness 360 : Data Security\, Disposal\, and Incident Response\n\n\n\nIt Can't Be Hacked if You No Longer Have It: How Data Retention is Key to Data Security\n\nUncontrolled\, unnecessary data is not only costly and inefficient- it also increases your data security exposures. Join Information Governance lawyer Peter Sloan as we explore how to establish effective retention and disposal for your business data.\n\n \n\nData Disposal: The Good\, the Bad\, and the Ugly\n\nPaden Wilcox gives a brief overview of what to look for in a data destruction vendor and the most common mistakes organizations make when destroying end of life data containing material.\n\n \n\nManaging Your Security Incident Response: Tales from the Trenches\n\nThrough the telling of stories\, Peter Enko and Chris Budke will cover legal obligations and practical consideration associated with incident response\, especially as they relate to coordinating with law enforcement\, conducting a forensic investigation\, and executing on state and federal reporting obligations. \n\n_____________________________________
X-ALT-DESC;FMTTYPE=text/html:<div class="cc-block" id="cc-block3" style="margin: 0px 0px 18px\; padding: 0px\; text-align: left\; color: rgb(0\, 0\, 0)\; text-transform: none\; text-indent: 0px\; letter-spacing: normal\; overflow: hidden\; font-family: Arial\, Helvetica\, sans-serif\; font-size: 12px\; font-style: normal\; font-weight: 400\; word-spacing: 0px\; white-space: normal\; orphans: 2\; widows: 2\; background-color: rgb(250\, 250\, 250)\; font-variant-ligatures: normal\; font-variant-caps: normal\; -webkit-text-stroke-width: 0px\; text-decoration-style: initial\; text-decoration-color: initial\;">\n<h1 id="evm-event-title" style="margin: 0px\; padding: 0px\; text-align: center\; color: rgb(0\, 0\, 0)\; font-family: Arial\, Helvetica\, sans-serif\; font-size: 24px\;"><span class="cc-var" title="">Cyber Awareness 360&deg\;: Data Security\, Disposal\, and Incident Response</span></h1>\n</div>\n\n<div class="cc-block" id="cc-block4" style="margin: 0px 0px 18px\; padding: 0px\; width: 437px\; height: 480px\; text-align: left\; color: rgb(0\, 0\, 0)\; text-transform: none\; text-indent: 0px\; letter-spacing: normal\; overflow: hidden\; font-family: Arial\, Helvetica\, sans-serif\; font-size: 12px\; font-style: normal\; font-weight: 400\; word-spacing: 0px\; white-space: normal\; orphans: 2\; widows: 2\; background-color: rgb(250\, 250\, 250)\; font-variant-ligatures: normal\; font-variant-caps: normal\; -webkit-text-stroke-width: 0px\; text-decoration-style: initial\; text-decoration-color: initial\;">\n<p style="margin: 0px 0px 18px\; padding: 0px\;"><strong>It Can&#39\;t Be Hacked if You No Longer Have It: How Data Retention is Key to Data Security</strong></p>\n\n<p style="margin: 0px 0px 18px\; padding: 0px\;">Uncontrolled\, unnecessary data is not only costly and inefficient- it also increases your data security exposures. Join Information Governance lawyer Peter Sloan as we explore how to establish effective retention and disposal for your business data.</p>\n\n<p style="margin: 0px 0px 18px\; padding: 0px\;">&nbsp\;</p>\n\n<p style="margin: 0px 0px 18px\; padding: 0px\;"><strong>Data Disposal: The Good\, the Bad\, and the Ugly</strong></p>\n\n<p style="margin: 0px 0px 18px\; padding: 0px\;">Paden Wilcox gives a brief overview of what to look for in a data destruction vendor and the most common mistakes organizations make when destroying end of life data containing material.</p>\n\n<p style="margin: 0px 0px 18px\; padding: 0px\;">&nbsp\;</p>\n\n<p style="margin: 0px 0px 18px\; padding: 0px\;"><strong>Managing Your Security Incident Response: Tales from the Trenches</strong></p>\n\n<p style="margin: 0px 0px 18px\; padding: 0px\;">Through the telling of stories\, Peter Enko and Chris Budke will cover legal obligations and practical consideration associated with incident response\, especially as they relate to coordinating with law enforcement\, conducting a forensic investigation\, and executing on state and federal reporting obligations.&nbsp\;</p>\n\n<p style="margin: 0px 0px 18px\; padding: 0px\;"><b>_____________________________________</b></p>\n</div>\n
LOCATION:North End Zone\, MSSU The North End Zone Facility is located north of (and Adjacent to) Fred G. Hughes Stadium on the campus of Missouri Southern State University.
UID:e.2144.2091
SEQUENCE:3
DTSTAMP:20260429T123528Z
URL:https://www.neoshocc.com/events/details/cyber-awareness-360-data-security-disposal-and-incident-response-2091
END:VEVENT

END:VCALENDAR
