BEGIN:VCALENDAR
VERSION:2.0
CALSCALE:GREGORIAN
METHOD:PUBLISH
BEGIN:VEVENT
SUMMARY:Building a Resilient East-West IT Strategy in Uncertain Times
DTSTART:20251021T100000Z
DTEND:20251021T120000Z
DTSTAMP:20260417T101520Z
CATEGORIES:
DESCRIPTION:\nBuilding a Resilient East-West IT Strategy in Uncertain Time
 s\n\n	In today’s uncertain geopolitical climate\, organisations are incr
 easingly factoring political and economic realities into their business st
 rategies.\n\n	Questions such as which applications to trust\, where to sto
 re data\, and which countries to purchase hardware from are no longer pure
 ly operational — they have become strategic decisions with far-reaching 
 implications. At the heart of all decisions lie security\, trust\, resilie
 nce and regulatory compliance. These have to be based on facts not just me
 dia reports.\n\n	 \n\nJoin us to discuss:\n\n\n		How geopolitical tension
 s and tarifs are shaping IT and data strategies.\n\n		The opportunities of
  sourcing technology from different regions.\n\n		Approaches to balancing 
 security\, compliance\, and innovation.\n\n		What a pragmatic East–West 
 strategy could look like for your organisation\n\n\nModern Attack Surface\
 n\n	Almost every organization manages applications—even those that aren'
 t technology companies. This leads to the modern attack surface: customer-
 facing apps\, both mobile and web\, as well as the cloud environments in w
 hich they operates and the credentials and data collected from customers.\
 n\nExtended Attack Surface\n\n	The extended attack surface includes all th
 e potential attack vectors that exist beyond the organization's infrastruc
 ture and assets. This includes everything from 3rd party vendors and sourc
 e code repositories to social media platforms and deep and dark web forums
  where threat actors lurk.\n\n	During this round table we will discuss tho
 se external cybersecurity challenges :\n\n\nLack of visibility on the Publ
 icly exposed assets: organizations often don’t know what digital assets 
 they expose to the internet—especially those created by different teams 
 or vendors.\n\nThreats from the Deep and Dark web: leaked credentials\, st
 olen data\, or brand abuse often circulate on hidden parts of the internet
  where traditional tools can’t see.\n\nDigital Brand Protection: attacke
 rs impersonate trusted brands via phishing sites\, fake social profiles\, 
 and rogue apps to steal user data or damage trust.\n\nThird-Party and supp
 ly chain risk: vendors and partners often maintain weaker security practi
 ces\, introducing indirect risks into your environment.\n\nThreat Intellig
 ence management and Response: many security teams struggle with too much i
 rrelevant or low-quality threat intelligence and often learn about threats
  too late—after damage is done. \n\n\n	 \n\nEvent Details:\n\n> Date:
  October 21\, 2025\n> Time: 12:00 - 14:00 (Lunch provided)\n> Location:
  Hôtel le Place d'Armes\, 18 Pl. d'Armes\, 1136 Ville-Haute\, Luxembourg
 \n\n	 \n\nThis roundtable is an exclusive opportunity to connect with ind
 ustry peers\, exchange insights\, and gain actionable strategies to accele
 rate FSI sector AI-driven innovation securely in your organization.\n\n	 
 \n\n	We look forward to welcoming you!\n
LOCATION:18\, Place d’Armes L-1136 Luxembourg - LU
ORGANIZER:MAKANA - ITnation
END:VEVENT
END:VCALENDAR
