BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20170614T160000Z
DTEND:20170614T170000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:June Lunchbox Session: Phishing for Answers: What Will You Do When You're Caught?
DESCRIPTION:Be ready to learn as your Chamber peers provide informal but in depth learning that is immediately applicable. \n\n \nPresenter: Jennifer Kazy\, BasicILY..a better way\n\n\n\nIn this day and age\, it's not a matter of if\, but when we find ourselves a target of a cyber attack. But just because we are targets\, does not mean we ultimately become victims. Oftentimes we are a target of opportunity\; it isn't that the attacker is purposefully trying to hack us\, but because we have under-addressed vulnerabilities that make us easy targets.\n\n \n\nJoin us as we dispel common myths about cyber security\, and takeaway some practical tips we can all use to reduce our cyber risk.\n\n \n\nExplore things like:\n\nMyth #5 - The computer is the problem\n\nMyth #4 - Cyber Security is hard\n\nMyth #3 - It's hard to be a cyber hacker\n\nMyth #2 - All computer hackers are bad\n\nMyth #1 - You are not a target
X-ALT-DESC;FMTTYPE=text/html:<span style="font-family:arial\;">Be ready to learn as your Chamber peers provide informal but in depth learning that is immediately applicable.&nbsp\;</span><br />\n&nbsp\;\n<div style="color: rgb(33\, 33\, 33)\; font-family: wf_segoe-ui_normal\, 'Segoe UI'\, 'Segoe WP'\, Tahoma\, Arial\, sans-serif\; font-size: 15.5555562973022px\; line-height: normal\; margin: 0px\;"><span style="font-family:arial\;"><strong>Presenter:&nbsp\;</strong>Jennifer Kazy\, BasicILY..a better way</span>\n\n<div style="color: rgb(33\, 33\, 33)\; font-family: wf_segoe-ui_normal\, &quot\;Segoe UI&quot\;\, &quot\;Segoe WP&quot\;\, Tahoma\, Arial\, sans-serif\, serif\, EmojiFont\; font-size: 15px\;"><br />\nIn this day and age\, it&rsquo\;s not a matter of if\, but when we find ourselves a target of a cyber attack. But just because we are targets\, does not mean we ultimately become victims. Oftentimes we are a target of opportunity\; it isn&rsquo\;t that the attacker is purposefully trying to hack us\, but because we have under-addressed vulnerabilities that make us easy targets.</div>\n\n<div style="color: rgb(33\, 33\, 33)\; font-family: wf_segoe-ui_normal\, &quot\;Segoe UI&quot\;\, &quot\;Segoe WP&quot\;\, Tahoma\, Arial\, sans-serif\, serif\, EmojiFont\; font-size: 15px\;">&nbsp\;</div>\n\n<div style="color: rgb(33\, 33\, 33)\; font-family: wf_segoe-ui_normal\, &quot\;Segoe UI&quot\;\, &quot\;Segoe WP&quot\;\, Tahoma\, Arial\, sans-serif\, serif\, EmojiFont\; font-size: 15px\;">Join us as we dispel common myths about cyber security\, and takeaway some practical tips we can all use to reduce our cyber risk.</div>\n\n<div style="color: rgb(33\, 33\, 33)\; font-family: wf_segoe-ui_normal\, &quot\;Segoe UI&quot\;\, &quot\;Segoe WP&quot\;\, Tahoma\, Arial\, sans-serif\, serif\, EmojiFont\; font-size: 15px\;">&nbsp\;</div>\n\n<div style="color: rgb(33\, 33\, 33)\; font-family: wf_segoe-ui_normal\, &quot\;Segoe UI&quot\;\, &quot\;Segoe WP&quot\;\, Tahoma\, Arial\, sans-serif\, serif\, EmojiFont\; font-size: 15px\;">Explore things like:</div>\n\n<div style="color: rgb(33\, 33\, 33)\; font-family: wf_segoe-ui_normal\, &quot\;Segoe UI&quot\;\, &quot\;Segoe WP&quot\;\, Tahoma\, Arial\, sans-serif\, serif\, EmojiFont\; font-size: 15px\;">Myth #5 - The computer is the problem</div>\n\n<div style="color: rgb(33\, 33\, 33)\; font-family: wf_segoe-ui_normal\, &quot\;Segoe UI&quot\;\, &quot\;Segoe WP&quot\;\, Tahoma\, Arial\, sans-serif\, serif\, EmojiFont\; font-size: 15px\;">Myth #4 - Cyber Security is hard</div>\n\n<div style="color: rgb(33\, 33\, 33)\; font-family: wf_segoe-ui_normal\, &quot\;Segoe UI&quot\;\, &quot\;Segoe WP&quot\;\, Tahoma\, Arial\, sans-serif\, serif\, EmojiFont\; font-size: 15px\;">Myth #3 - It&rsquo\;s hard to be a cyber hacker</div>\n\n<div style="color: rgb(33\, 33\, 33)\; font-family: wf_segoe-ui_normal\, &quot\;Segoe UI&quot\;\, &quot\;Segoe WP&quot\;\, Tahoma\, Arial\, sans-serif\, serif\, EmojiFont\; font-size: 15px\;">Myth #2 - All computer hackers are bad</div>\n\n<div style="color: rgb(33\, 33\, 33)\; font-family: wf_segoe-ui_normal\, &quot\;Segoe UI&quot\;\, &quot\;Segoe WP&quot\;\, Tahoma\, Arial\, sans-serif\, serif\, EmojiFont\; font-size: 15px\;">Myth #1 - You are not a target</div>\n</div>\n
LOCATION:Chamber Headquarters\, Wexford 5000 Brooktree Road Wexford\, PA 15090
UID:e.890.4044
SEQUENCE:3
DTSTAMP:20260509T173753Z
URL:https://members.pghnorthchamber.com/events/details/june-lunchbox-session-cyber-security-what-will-you-do-when-you-re-attacked-4044
END:VEVENT

END:VCALENDAR
