BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//UST Education - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:UST Education
X-ORIGINAL-URL:https://usteducation.org
X-WR-CALDESC:Events for UST Education
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210615T110000
DTEND;TZID=America/New_York:20210615T123000
DTSTAMP:20260403T165348
CREATED:20220328T190429Z
LAST-MODIFIED:20240531T213816Z
UID:10000066-1623754800-1623760200@usteducation.org
SUMMARY:B108: 7 Reasons Your Business Needs Data Recovery and Backup
DESCRIPTION:How can you shift from a traditional cyber security approach to an approach that will mitigate today’s risks? \nThe many cyber attacks and data breaches worldwide show that these incidents are becoming more intense\, are on the rise\, and the environment has become much more complex to secure. \nMany of the current security methods\, tools\, and techniques used by businesses to secure their environment and protect their brand have been effective so far\, but attacks are now coming from all directions. Hackers\, hacktivists\, cyber criminals\, nation states\, and insiders (like employees) are all pounding security protocols to find a weak spot to get in. \nKnowing that data streams in from various entry points\, organizations that still differentiate between internal and perimeter security should urgently reconsider their security approach—specifically the roll of digital assets (i.e.\, domains\, domain name system (DNS)\, and digital certificates)—in enabling the day-to-day successful operation of their business. \n\n\n\n\nLEARNING OBJECTIVES\n\n\nDigital Assets Management Best Practices (Core Domain Name Portfolio – Defensive Portfolio – Consumer Grade vs Enterprise Security)\nAlignment of domain names portfolio and infringement landscape.\nHow to protect your organization and end users online.\n\n\n\n\n\n\n\n 
URL:https://usteducation.org/event/b108-7-reasons-your-business-needs-data-recovery-and-backup/
LOCATION:Group Internet-Based
CATEGORIES:B2B/B2G,B2B/B2G IT,Business Strategy,Data Management,Growth/Sales
ATTACH;FMTTYPE=image/png:https://usteducation.org/wp-content/uploads/2022/03/BACKLOG-FOR-RELAUNCH-Eli-website-1200X600-px-22.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210603T130000
DTEND;TZID=America/New_York:20210603T143000
DTSTAMP:20260403T165348
CREATED:20220328T190501Z
LAST-MODIFIED:20240531T210918Z
UID:10000074-1622725200-1622730600@usteducation.org
SUMMARY:N112: Best Budgeting Practices - Beginning to End
DESCRIPTION:This course will review the best practices for establishing corporate wide budgets\, forecasting\, controlling and monitoring budgets. We will also review budgeting products with a focus on NetSuite ERP system. An overview of the budgeting process will drive the topics from the initial creation of budgets to successful execution of the budget. \n\n\n\n\n\n \n\n\n\n\n\n\n \n\n\nLEARNING OBJECTIVES\n\n\nUnderstand budgeting terminology\nIdentify the general enterprise level budgeting processes.\nPreview forecasting options for creating budgets.\nAnalyze typical budget reporting such as budget vs actual report.\nGain knowledge of budgeting data flows and integration technology
URL:https://usteducation.org/event/n112-best-budgeting-practices-beginning-to-end/
LOCATION:Group Internet-Based
ATTACH;FMTTYPE=image/png:https://usteducation.org/wp-content/uploads/2022/03/BACKLOG-FOR-RELAUNCH-Eli-website-1200X600-px-22.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210525T150000
DTEND;TZID=America/New_York:20210525T163000
DTSTAMP:20260403T165348
CREATED:20220328T190501Z
LAST-MODIFIED:20240531T213835Z
UID:10000073-1621954800-1621960200@usteducation.org
SUMMARY:B111: Artificial Intelligence (AI) & Business Process Automation for SMBS
DESCRIPTION:Working remotely has exposed critical gaps and inefficiencies in the way we work. But it has also provided a unique opportunity to innovate and transform your organization’s processes and operations – particularly to eliminate frustration or roadblocks. \nWe’ll move past the buzzwords and share how automated processes and workflows\, digital forms\, virtual agents\, and chatbots can streamline operations\, increase productivity\, and drive efficiency across your organization. \n\n\n\n\n\n\n\n\n \n\n\nLEARNING OBJECTIVES\n\n\nWhy automation is more important an ever in today’s remote work environment.\nThe different types of automation including robotic process automation (RPA)\, business process automation (BPA) with workflows\, and customer service automation with virtual agents and chatbots  – and how they work.\nHow AI and machine learning fit in.\nWhen to use low code technologies versus a professional developer.\nReal-world scenarios.\nTips for getting started – and why planning is key to success.\nBest practices for your automation journey including governance\, security\, and adoption.
URL:https://usteducation.org/event/b111-artificial-intelligence-ai-business-process-automation-for-smbs/
LOCATION:Group Internet-Based
CATEGORIES:B2B/B2G,Business Strategy,Growth/Sales
ATTACH;FMTTYPE=image/png:https://usteducation.org/wp-content/uploads/2022/03/BACKLOG-FOR-RELAUNCH-Eli-website-1200X600-px-22.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210518T150000
DTEND;TZID=America/New_York:20210518T163000
DTSTAMP:20260403T165348
CREATED:20220328T190445Z
LAST-MODIFIED:20240531T210949Z
UID:10000072-1621350000-1621355400@usteducation.org
SUMMARY:N105: 2 NetSuite Automations That Will Immediately Improve the Productivity of Your Remote Workforce
DESCRIPTION:Part 1:  Now more than ever before\, getting important emails into NetSuite for full 360-degree visibility is CRITICAL. CloudExtend already makes that easy. Our latest feature\, Autopilot\, will make email syncing even easier by eliminating the manual work that was required before\, saving valuable time. \nAutopilot enables Outlook users to put an email thread on “autopilot” — once you attach the email to a NetSuite record\, all subsequent emails in the same thread will automatically be attached to the same set of records. \nPart 2: What if your finance and accounting team could manage NetSuite data without ever leaving Excel? You could increase data visibility across your organization. You could transform time consuming and repetitive tasks into more efficient processes to save significant time and resources\, especially during month end. \n\n\n\n \n\n\n\n\n\n\n \n\n\nLEARNING OBJECTIVES\n\n\nWhat is Autopilot and How can I get it?\nLive demo of Autopilot for Outlook\nCreating/updating large journal entries\nCreating/editing invoices in bulk\nUploading/tracking vendor bills\nDemo and overview of CloudExtend Excel for NetSuite
URL:https://usteducation.org/event/n105-2-netsuite-automations-that-will-immediately-improve-the-productivity-of-your-remote-workforce/
LOCATION:Group Internet-Based
ATTACH;FMTTYPE=image/png:https://usteducation.org/wp-content/uploads/2022/03/BACKLOG-FOR-RELAUNCH-Eli-website-1200X600-px-22.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210428T150000
DTEND;TZID=America/New_York:20210428T163000
DTSTAMP:20260403T165348
CREATED:20220328T190445Z
LAST-MODIFIED:20240531T211008Z
UID:10000071-1619622000-1619627400@usteducation.org
SUMMARY:N109: The Future of EPM - Enabling World-Class Performance Management
DESCRIPTION:There are many EPM (Enterprise Performance Management) software solution options available today\, but which one is right for your organization? Some things to keep in mind when evaluating EPM solutions include integration capabilities\, functionality\, scalability\, delivery mode\, usability\, accessibility\, reliability and support. Join us as we provide insight into the different options\, how best to decide what functionality is important for your organization\, and which tools are going to provide the best solution to meet your needs. \n\n\n\n \n\n\n\n\n\n\n \n\n\nLEARNING OBJECTIVES\n\n\nBest practices for evaluating EPM options\nUnderstanding what functionality is important\nA look at the future of EPM and choosing a solution for your organization
URL:https://usteducation.org/event/n109-the-future-of-epm-enabling-world-class-performance-management/
LOCATION:Group Internet-Based
ATTACH;FMTTYPE=image/png:https://usteducation.org/wp-content/uploads/2022/03/BACKLOG-FOR-RELAUNCH-Eli-website-1200X600-px-22.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210427T110000
DTEND;TZID=America/New_York:20210427T123000
DTSTAMP:20260403T165348
CREATED:20220328T190445Z
LAST-MODIFIED:20240531T203958Z
UID:10000070-1619521200-1619526600@usteducation.org
SUMMARY:B101: Government Contracting: NAV-Business Central & Power BI for DCAA Compliance
DESCRIPTION:How can you shift from a traditional cyber security approach to an approach that will mitigate today’s risks? \nThe many cyber attacks and data breaches worldwide show that these incidents are becoming more intense\, are on the rise\, and the environment has become much more complex to secure. \nMany of the current security methods\, tools\, and techniques used by businesses to secure their environment and protect their brand have been effective so far\, but attacks are now coming from all directions. Hackers\, hacktivists\, cyber criminals\, nation states\, and insiders (like employees) are all pounding security protocols to find a weak spot to get in. \nKnowing that data streams in from various entry points\, organizations that still differentiate between internal and perimeter security should urgently reconsider their security approach—specifically the roll of digital assets (i.e.\, domains\, domain name system (DNS)\, and digital certificates)—in enabling the day-to-day successful operation of their business. \n\n\n\n\n\n\n\n\n \n\n\nLEARNING OBJECTIVES\n\n\nDigital Assets Management Best Practices (Core Domain Name Portfolio – Defensive Portfolio – Consumer Grade vs Enterprise Security)\nAlignment of domain names portfolio and infringement landscape.\nHow to protect your organization and end users online.
URL:https://usteducation.org/event/b101-government-contracting-nav-business-central-power-bi-for-dcaa-compliance/
LOCATION:Group Internet-Based
CATEGORIES:MICROSOFT DYNAMICS
ATTACH;FMTTYPE=image/png:https://usteducation.org/wp-content/uploads/2022/03/BACKLOG-FOR-RELAUNCH-Eli-website-1200X600-px-22.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210407T110000
DTEND;TZID=America/New_York:20210407T123000
DTSTAMP:20260403T165348
CREATED:20220328T190445Z
LAST-MODIFIED:20240531T213903Z
UID:10000069-1617793200-1617798600@usteducation.org
SUMMARY:B106: 7 Reasons Your Business Needs Data Recovery & Backup
DESCRIPTION:How can you shift from a traditional cyber security approach to an approach that will mitigate today’s risks? \nThe many cyber attacks and data breaches worldwide show that these incidents are becoming more intense\, are on the rise\, and the environment has become much more complex to secure. \nMany of the current security methods\, tools\, and techniques used by businesses to secure their environment and protect their brand have been effective so far\, but attacks are now coming from all directions. Hackers\, hacktivists\, cyber criminals\, nation states\, and insiders (like employees) are all pounding security protocols to find a weak spot to get in. \nKnowing that data streams in from various entry points\, organizations that still differentiate between internal and perimeter security should urgently reconsider their security approach—specifically the roll of digital assets (i.e.\, domains\, domain name system (DNS)\, and digital certificates)—in enabling the day-to-day successful operation of their business. \n\n\n\n\n\n\n\n\n \n\n\nLEARNING OBJECTIVES\n\n\nDigital Assets Management Best Practices (Core Domain Name Portfolio – Defensive Portfolio – Consumer Grade vs Enterprise Security)\nAlignment of domain names portfolio and infringement landscape.\nHow to protect your organization and end users online.
URL:https://usteducation.org/event/b106-7-reasons-your-business-needs-data-recovery-backup/
LOCATION:Group Internet-Based
CATEGORIES:B2B/B2G,B2B/B2G IT,Data Management
ATTACH;FMTTYPE=image/png:https://usteducation.org/wp-content/uploads/2022/03/BACKLOG-FOR-RELAUNCH-Eli-website-1200X600-px-22.png
END:VEVENT
END:VCALENDAR