BEGIN:VCALENDAR
VERSION:2.0
CALSCALE:GREGORIAN
METHOD:PUBLISH
BEGIN:VEVENT
SUMMARY:ERM: Manage exposure\, Prioritize Threats & Reduce Risk with Check
 Point & Westcon
DTSTART:20250925T100000Z
DTEND:20250925T120000Z
DTSTAMP:20260502T030114Z
CATEGORIES:
DESCRIPTION:\nCyber Threats Are Evolving — Is Your Organization Ready?\n
 \n	The attack surface is expanding to new dimensions\, presenting major ch
 allenges for security teams.\n\n	In addition to the strategic business cha
 llenges facing security leaders\, operational and tactical challenges have
  also arisen. Corporate digital footprints are growing at a rapid rate. \
 n\n	Cyberattacks are becoming increasingly frequent\, severe\, and sophist
 icated. Threat actors are exploring new digital arenas\, developing novel 
 techniques\, and pursuing new attack vectors. Security leaders must be pre
 pared to defend their organizations across an increasingly large and compl
 ex attack surface.\n\nTraditional Attack Surface\n\n	Traditionally\, the e
 xternal attack surface is thought of as an organization's domains\, subdom
 ains\, IP addresses\, certificates\, and Internet-facing services. While t
 his is a limited understanding of the attack surface\, it remains relevant
  and must be continuously monitored and protected.\n\nModern Attack Surfac
 e\n\n	Almost every organization manages applications—even those that are
 n't technology companies. This leads to the modern attack surface: custome
 r-facing apps\, both mobile and web\, as well as the cloud environments in
  which they operates and the credentials and data collected from customers
 .\n\nExtended Attack Surface\n\n	The extended attack surface includes all 
 the potential attack vectors that exist beyond the organization's infrastr
 ucture and assets. This includes everything from 3rd party vendors and sou
 rce code repositories to social media platforms and deep and dark web foru
 ms where threat actors lurk.\n\n	During this round table we will discuss t
 hose external cybersecurity challenges :\n\n\nLack of visibility on the Pu
 blicly exposed assets: organizations often don’t know what digital asset
 s they expose to the internet—especially those created by different team
 s or vendors.\n\nThreats from the Deep and Dark web: leaked credentials\, 
 stolen data\, or brand abuse often circulate on hidden parts of the intern
 et where traditional tools can’t see.\n\nDigital Brand Protection: attac
 kers impersonate trusted brands via phishing sites\, fake social profiles\
 , and rogue apps to steal user data or damage trust.\n\nThird-Party and su
 pply chain risk: vendors and partners often maintain weaker security prac
 tices\, introducing indirect risks into your environment.\n\nThreat Intell
 igence management and Response: many security teams struggle with too much
  irrelevant or low-quality threat intelligence and often learn about threa
 ts too late—after damage is done. \n\n\n	 \n\nEvent Details:\n\n> Dat
 e: September 25\, 2025\n> Time: 12:00 - 14:00 (Lunch provided)\n> Locati
 on: Hôtel le Place d'Armes\, 18 Pl. d'Armes\, 1136 Ville-Haute\, Luxembo
 urg\n\n	 \n\nThis roundtable is an exclusive opportunity to connect with 
 industry peers\, exchange insights\, and gain actionable strategies to acc
 elerate FSI sector AI-driven innovation securely in your organization.\n\n
 	 \n\n	We look forward to welcoming you!\n
LOCATION:18\, Place d’Armes L-1136 Luxembourg - LU
ORGANIZER:MAKANA - ITnation
END:VEVENT
END:VCALENDAR
