BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//UST Education - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://usteducation.org
X-WR-CALDESC:Events for UST Education
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20270314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20271107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260507T110000
DTEND;TZID=America/New_York:20260507T120000
DTSTAMP:20260410T135836
CREATED:20260213T175022Z
LAST-MODIFIED:20260213T183401Z
UID:10000879-1778151600-1778155200@usteducation.org
SUMMARY:Cybersecurity in a Nutshell: A High-Level Guide for Executives
DESCRIPTION:Course Description:  \nWhen you’re running an association\, you don’t have time to get into the weeds of how every cyberattack works or why one detection tool is better than another.\n \nAll you need to know is what you’re susceptible to and how to know you’re as protected as you should be. Our session will cover:\n \n* Your biggest threat: AI-powered financial fraud\n* Outdated defenses: multi-factor authentication\n* Signs you’re protected: pessimistic permissions\n* Action items to delegate: 5-point framework\n \nWe’ll keep it high-level\, plain-English\, and practical.\n  \nLearning Objectives: \nIdentify AI-powered financial fraud as the primary cybersecurity threat facing associations.\n \nEvaluate current security measures\, including the limitations of multi-factor authentication.\n \nApply pessimistic permissions principles to assess organizational protection levels.\n \nImplement a 5-point cybersecurity framework through appropriate delegation to staff.\n \n \n  \n  \n 
URL:https://usteducation.org/event/cybersecurity-in-a-nutshell-a-high-level-guide-for-executives-free-cpe-credit-free-cae-credit/
LOCATION:zoom.us/j/91992885484
CATEGORIES:Association IT,ASSOCIATIONS & NONPROFITS,Cybersecurity
ATTACH;FMTTYPE=image/png:https://usteducation.org/wp-content/uploads/2025/09/Chris24-2.png
ORGANIZER;CN="Heinan Landa":MAILTO:hlanda@optimalnetworks.com
END:VEVENT
END:VCALENDAR