BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//IDnext - ECPv5.14.0.4//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:IDnext
X-ORIGINAL-URL:https://idnext.eu
X-WR-CALDESC:Events for IDnext
BEGIN:VTIMEZONE
TZID:Europe/Amsterdam
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20210328T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20211031T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Europe/Amsterdam:20210520T000000
DTEND;TZID=Europe/Amsterdam:20210520T130000
DTSTAMP:20260314T210338
CREATED:20210216T160841Z
LAST-MODIFIED:20210325T113051Z
UID:2949-1621468800-1621515600@idnext.eu
SUMMARY:IDnext Lunch Break: Trust or Zero Trust: Working Remotely and Going Beyond Privileged Access Management
DESCRIPTION:Topic of this Lunch Break is: “Trust or Zero Trust: Working Remotely and Going Beyond Privileged Access Management” \nRemote work has become the norm. IT leaders must secure a broader\, more diverse attack surface than ever before. Cyber risks increase\, especially when workers are temporary or new to working from home. Join Thycotic as they discuss the best practises around securing your remote workforce\, while still maintaining productivity. \nWhat will I learn? \n\nHow to limit risk in a preventive way after allowing a privileged account logon. (We cover the 3 areas of post-logon preventive control)\nWhy cyber-attacks continue to occur\, and what layers of security can be added to thwart them\nHow to approach zero trust\, least privilege and application control\nWhat counts as privileged access and how attackers use it to their advantage\n\nSpeaker of this Lunch Break is: \nThomas Svensson – Sales Engineer at Thycotic Nordics \nRegistration is free. \nThis Lunch Break is supported by:
URL:https://idnext.eu/event/idnext-lunch-break-8-april-2021
CATEGORIES:IDnext events
ATTACH;FMTTYPE=image/jpeg:https://idnext.eu/wp-content/uploads/2021/02/banner-LB-20-May-2021-scaled.jpg
END:VEVENT
END:VCALENDAR