BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//UST Education - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:UST Education
X-ORIGINAL-URL:https://usteducation.org
X-WR-CALDESC:Events for UST Education
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210824T110000
DTEND;TZID=America/New_York:20210824T123000
DTSTAMP:20260403T155155
CREATED:20220328T190501Z
LAST-MODIFIED:20240531T213722Z
UID:10000076-1629802800-1629808200@usteducation.org
SUMMARY:B116: The War for Talent: How to Recruit and Retain the Right People
DESCRIPTION:Does your recruitment strategy fit your corporate strategy?\nBut do you have Strategy\, or tactics?\nIf you have strategy\, is winning based on Differentiation or Transactional styles\nWhy? These are 2 different attitudes\nFinally\, are you hiring on this attitude and behavior\, or just resumes\nHow to attract and align your talent – Compelling Sagas\nHow to fit talent into appropriate levels – Dr. Elliott Jaques work\nHow to get the most out of Talent – Gaining speed by destroying Evil\nReview of the Samurai models.\nIf time:\nHow to inculcate our new hires into your culture\nWhat Initiation Rituals do you use?\nHow to align your culture with your strategy\nHow to Adapt in an age of disruption\n\n\n\n\n\nLEARNING OBJECTIVES\n\n\nHow to attract and align your talent – Compelling Sagas\nHow to fit talent into appropriate levels – Dr. Elliott Jaques work\nHow to get the most out of Talent – Gaining speed by destroying Evil
URL:https://usteducation.org/event/b116-the-war-for-talent-how-to-recruit-and-retain-the-right-people/
LOCATION:Group Internet-Based
CATEGORIES:ASSOCIATIONS & NONPROFITS,B2B/B2G,Business Strategy,Business Strategy,Business Strategy,Hiring/Retention/HR,Hiring/Retention/HR,Hiring/Retention/HR,MICROSOFT DYNAMICS
ATTACH;FMTTYPE=image/png:https://usteducation.org/wp-content/uploads/2022/03/BACKLOG-FOR-RELAUNCH-Eli-website-1200X600-px-22.png
ORGANIZER;CN="Don Schmincke":MAILTO:don@sagaleadership.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210805T150000
DTEND;TZID=America/New_York:20210805T163000
DTSTAMP:20260403T155155
CREATED:20220328T190234Z
LAST-MODIFIED:20240531T213753Z
UID:10000029-1628175600-1628181000@usteducation.org
SUMMARY:B113: Meta Trends and the Next Economy-See the Future More Accurately
DESCRIPTION:Meta-Trends and the Next Economy utilizes demographics to forecast the health of every economy/industry in the world. Meta-Trends allows you to know the knowable future i.e. Know which businesses should you start today\, Know which industries will survive and thrive in the next 15 years\, Know which areas of the economy are worth investing resources in\, Know future government trends from a threat perspective\, Know why past trends happened and were actually predictable The future breaks down into threats and opportunities. Meta-Trends motivates you to plan better so that you don’t just survive\, you thrive in the next 15 years. Change is happening so rapidly in society that the need for reliable forecasts is paramount. It turns out that demographics are the single most powerful ingredient in forecasting what the future will look like. Meta-Trends and the Next Economy\, will answer the question: “What will the next five to fifteen years look like?” \n\nLEARNING OBJECTIVES\n\n\nTactical strategies to improve your net worth (and for your members and constituents)\, and the motivation to do so today.\nHow to protect the health of your Association in the next economy.\nWhat are the prospects for the industry you serve and your members in the next 15 years.\n\n\n\n\n 
URL:https://usteducation.org/event/b113-meta-trends-and-the-next-economy-see-the-future-more-accurately/
LOCATION:Group Internet-Based
CATEGORIES:ASSOCIATIONS & NONPROFITS,B2B/B2G,Business Strategy,Business Strategy,Finance,Finance
ATTACH;FMTTYPE=image/png:https://usteducation.org/wp-content/uploads/2022/03/BACKLOG-FOR-RELAUNCH-Eli-website-1200X600-px-22.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210721T110000
DTEND;TZID=America/New_York:20210721T123000
DTSTAMP:20260403T155155
CREATED:20220328T190234Z
LAST-MODIFIED:20220713T033348Z
UID:10000032-1626865200-1626870600@usteducation.org
SUMMARY:B114: B2B Cloud Commerce for the D365 enterprise — 5 steps to deeper customer interaction & sales analytics
DESCRIPTION:The changing world of digital interaction requires businesses to engage their customers’ more productive way. Customers are not only looking for more information\, they are also looking for superior and faster services. That’s why a digital commerce platform should not only meet your customer’s demands but operate ahead of your customer’s need. \nHere are ways that B2B Digital Commerce should bring your online and offline sales processes together to creates deeper interaction with customers. \n\nShopping Cart Features\n\n\nA shopping cart should do more than hold products. With the use of artificial intelligence\, it should customize product recommendations and recognize top selling products. The customer can reorder lists and recommendations\, as well as schedule orders and make credit card payments. \n\nB2B Features\n\n\nB2B features means the having the versatility of multi-branding\, multi-stores\, multi-catalogs\, and multi-ship to capabilities. Pickups can also be scheduled\, pick up and delivery (COD)\, and sell on payment terms. \n\n\n\nInvoice & Statements\n\n\nA B2B digital platform should offer convenient online invoices and payments\, accessible from anywhere. Customer statements are also catalogued online. Invoice reminders\, including late invoice reminders\, are designed to keep payments on track automatically. Credit card payments and ACH payments are easily completed by the customer 24/7/365 across hosted payment pages or payment fields\, in a manner which minimizes PCI compliance scope. \n\n\n\n\n\nLEARNING OBJECTIVES\n\n\nLearn what the most important elements are to an effective B2B Cloud Commerce solution\nUnderstand how Artificial Intelligence (AI) can be used to increase sales order size in a B2B eCommerce environment\nUnderstand how automation is used to streamline cash receipts for sales orders and outstanding invoices\, including management of outstanding Accounts Receivable with minimal labor effort.\nSee examples of how other B2B enterprises have effectively implemented the critical success elements mentioned above.
URL:https://usteducation.org/event/b114-b2b-cloud-commerce-for-the-d365-enterprise-5-steps-to-deeper-customer-interaction-sales-analytics/
LOCATION:Group Internet-Based
ATTACH;FMTTYPE=image/png:https://usteducation.org/wp-content/uploads/2022/03/BACKLOG-FOR-RELAUNCH-Eli-website-1200X600-px-22.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210708T110000
DTEND;TZID=America/New_York:20210708T123000
DTSTAMP:20260403T155155
CREATED:20220328T190429Z
LAST-MODIFIED:20220713T033349Z
UID:10000067-1625742000-1625747400@usteducation.org
SUMMARY:B115: PCI Workshop for B2B and B2G enterprise organizations
DESCRIPTION:Did you know that PCI Compliance starts with your finance team? \nIn this course you will learn best practices of  organizations in implementing PCI Compliance.  The course starts with a basic overview of what PCI Compliance is and what it is designed to achieve.  Next we review 9 practical tips that you can implement immediately in your organization to ensure a more secure payment environment.  Finally we review the Self-Assessment-Questionnaire (SAQ)\, and what you should know about it. \n\n\n\n\nLEARNING OBJECTIVES\n\n\nGain an overview of the PCI Compliance Requirements\nLearn 9 practical tips to achieve a more secure payment environment\nUnderstand what are the annual SAQ requirements
URL:https://usteducation.org/event/b115-pci-workshop-for-b2b-and-b2g-enterprise-organizations/
LOCATION:Group Internet-Based
CATEGORIES:B2B/B2G
ATTACH;FMTTYPE=image/png:https://usteducation.org/wp-content/uploads/2022/03/BACKLOG-FOR-RELAUNCH-Eli-website-1200X600-px-22.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210615T110000
DTEND;TZID=America/New_York:20210615T123000
DTSTAMP:20260403T155155
CREATED:20220328T190429Z
LAST-MODIFIED:20240531T213816Z
UID:10000066-1623754800-1623760200@usteducation.org
SUMMARY:B108: 7 Reasons Your Business Needs Data Recovery and Backup
DESCRIPTION:How can you shift from a traditional cyber security approach to an approach that will mitigate today’s risks? \nThe many cyber attacks and data breaches worldwide show that these incidents are becoming more intense\, are on the rise\, and the environment has become much more complex to secure. \nMany of the current security methods\, tools\, and techniques used by businesses to secure their environment and protect their brand have been effective so far\, but attacks are now coming from all directions. Hackers\, hacktivists\, cyber criminals\, nation states\, and insiders (like employees) are all pounding security protocols to find a weak spot to get in. \nKnowing that data streams in from various entry points\, organizations that still differentiate between internal and perimeter security should urgently reconsider their security approach—specifically the roll of digital assets (i.e.\, domains\, domain name system (DNS)\, and digital certificates)—in enabling the day-to-day successful operation of their business. \n\n\n\n\nLEARNING OBJECTIVES\n\n\nDigital Assets Management Best Practices (Core Domain Name Portfolio – Defensive Portfolio – Consumer Grade vs Enterprise Security)\nAlignment of domain names portfolio and infringement landscape.\nHow to protect your organization and end users online.\n\n\n\n\n\n\n\n 
URL:https://usteducation.org/event/b108-7-reasons-your-business-needs-data-recovery-and-backup/
LOCATION:Group Internet-Based
CATEGORIES:B2B/B2G,B2B/B2G IT,Business Strategy,Data Management,Growth/Sales
ATTACH;FMTTYPE=image/png:https://usteducation.org/wp-content/uploads/2022/03/BACKLOG-FOR-RELAUNCH-Eli-website-1200X600-px-22.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210603T130000
DTEND;TZID=America/New_York:20210603T143000
DTSTAMP:20260403T155155
CREATED:20220328T190501Z
LAST-MODIFIED:20240531T210918Z
UID:10000074-1622725200-1622730600@usteducation.org
SUMMARY:N112: Best Budgeting Practices - Beginning to End
DESCRIPTION:This course will review the best practices for establishing corporate wide budgets\, forecasting\, controlling and monitoring budgets. We will also review budgeting products with a focus on NetSuite ERP system. An overview of the budgeting process will drive the topics from the initial creation of budgets to successful execution of the budget. \n\n\n\n\n\n \n\n\n\n\n\n\n \n\n\nLEARNING OBJECTIVES\n\n\nUnderstand budgeting terminology\nIdentify the general enterprise level budgeting processes.\nPreview forecasting options for creating budgets.\nAnalyze typical budget reporting such as budget vs actual report.\nGain knowledge of budgeting data flows and integration technology
URL:https://usteducation.org/event/n112-best-budgeting-practices-beginning-to-end/
LOCATION:Group Internet-Based
ATTACH;FMTTYPE=image/png:https://usteducation.org/wp-content/uploads/2022/03/BACKLOG-FOR-RELAUNCH-Eli-website-1200X600-px-22.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210525T150000
DTEND;TZID=America/New_York:20210525T163000
DTSTAMP:20260403T155155
CREATED:20220328T190501Z
LAST-MODIFIED:20240531T213835Z
UID:10000073-1621954800-1621960200@usteducation.org
SUMMARY:B111: Artificial Intelligence (AI) & Business Process Automation for SMBS
DESCRIPTION:Working remotely has exposed critical gaps and inefficiencies in the way we work. But it has also provided a unique opportunity to innovate and transform your organization’s processes and operations – particularly to eliminate frustration or roadblocks. \nWe’ll move past the buzzwords and share how automated processes and workflows\, digital forms\, virtual agents\, and chatbots can streamline operations\, increase productivity\, and drive efficiency across your organization. \n\n\n\n\n\n\n\n\n \n\n\nLEARNING OBJECTIVES\n\n\nWhy automation is more important an ever in today’s remote work environment.\nThe different types of automation including robotic process automation (RPA)\, business process automation (BPA) with workflows\, and customer service automation with virtual agents and chatbots  – and how they work.\nHow AI and machine learning fit in.\nWhen to use low code technologies versus a professional developer.\nReal-world scenarios.\nTips for getting started – and why planning is key to success.\nBest practices for your automation journey including governance\, security\, and adoption.
URL:https://usteducation.org/event/b111-artificial-intelligence-ai-business-process-automation-for-smbs/
LOCATION:Group Internet-Based
CATEGORIES:B2B/B2G,Business Strategy,Growth/Sales
ATTACH;FMTTYPE=image/png:https://usteducation.org/wp-content/uploads/2022/03/BACKLOG-FOR-RELAUNCH-Eli-website-1200X600-px-22.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210518T150000
DTEND;TZID=America/New_York:20210518T163000
DTSTAMP:20260403T155155
CREATED:20220328T190445Z
LAST-MODIFIED:20240531T210949Z
UID:10000072-1621350000-1621355400@usteducation.org
SUMMARY:N105: 2 NetSuite Automations That Will Immediately Improve the Productivity of Your Remote Workforce
DESCRIPTION:Part 1:  Now more than ever before\, getting important emails into NetSuite for full 360-degree visibility is CRITICAL. CloudExtend already makes that easy. Our latest feature\, Autopilot\, will make email syncing even easier by eliminating the manual work that was required before\, saving valuable time. \nAutopilot enables Outlook users to put an email thread on “autopilot” — once you attach the email to a NetSuite record\, all subsequent emails in the same thread will automatically be attached to the same set of records. \nPart 2: What if your finance and accounting team could manage NetSuite data without ever leaving Excel? You could increase data visibility across your organization. You could transform time consuming and repetitive tasks into more efficient processes to save significant time and resources\, especially during month end. \n\n\n\n \n\n\n\n\n\n\n \n\n\nLEARNING OBJECTIVES\n\n\nWhat is Autopilot and How can I get it?\nLive demo of Autopilot for Outlook\nCreating/updating large journal entries\nCreating/editing invoices in bulk\nUploading/tracking vendor bills\nDemo and overview of CloudExtend Excel for NetSuite
URL:https://usteducation.org/event/n105-2-netsuite-automations-that-will-immediately-improve-the-productivity-of-your-remote-workforce/
LOCATION:Group Internet-Based
ATTACH;FMTTYPE=image/png:https://usteducation.org/wp-content/uploads/2022/03/BACKLOG-FOR-RELAUNCH-Eli-website-1200X600-px-22.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210428T150000
DTEND;TZID=America/New_York:20210428T163000
DTSTAMP:20260403T155155
CREATED:20220328T190445Z
LAST-MODIFIED:20240531T211008Z
UID:10000071-1619622000-1619627400@usteducation.org
SUMMARY:N109: The Future of EPM - Enabling World-Class Performance Management
DESCRIPTION:There are many EPM (Enterprise Performance Management) software solution options available today\, but which one is right for your organization? Some things to keep in mind when evaluating EPM solutions include integration capabilities\, functionality\, scalability\, delivery mode\, usability\, accessibility\, reliability and support. Join us as we provide insight into the different options\, how best to decide what functionality is important for your organization\, and which tools are going to provide the best solution to meet your needs. \n\n\n\n \n\n\n\n\n\n\n \n\n\nLEARNING OBJECTIVES\n\n\nBest practices for evaluating EPM options\nUnderstanding what functionality is important\nA look at the future of EPM and choosing a solution for your organization
URL:https://usteducation.org/event/n109-the-future-of-epm-enabling-world-class-performance-management/
LOCATION:Group Internet-Based
ATTACH;FMTTYPE=image/png:https://usteducation.org/wp-content/uploads/2022/03/BACKLOG-FOR-RELAUNCH-Eli-website-1200X600-px-22.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210427T110000
DTEND;TZID=America/New_York:20210427T123000
DTSTAMP:20260403T155155
CREATED:20220328T190445Z
LAST-MODIFIED:20240531T203958Z
UID:10000070-1619521200-1619526600@usteducation.org
SUMMARY:B101: Government Contracting: NAV-Business Central & Power BI for DCAA Compliance
DESCRIPTION:How can you shift from a traditional cyber security approach to an approach that will mitigate today’s risks? \nThe many cyber attacks and data breaches worldwide show that these incidents are becoming more intense\, are on the rise\, and the environment has become much more complex to secure. \nMany of the current security methods\, tools\, and techniques used by businesses to secure their environment and protect their brand have been effective so far\, but attacks are now coming from all directions. Hackers\, hacktivists\, cyber criminals\, nation states\, and insiders (like employees) are all pounding security protocols to find a weak spot to get in. \nKnowing that data streams in from various entry points\, organizations that still differentiate between internal and perimeter security should urgently reconsider their security approach—specifically the roll of digital assets (i.e.\, domains\, domain name system (DNS)\, and digital certificates)—in enabling the day-to-day successful operation of their business. \n\n\n\n\n\n\n\n\n \n\n\nLEARNING OBJECTIVES\n\n\nDigital Assets Management Best Practices (Core Domain Name Portfolio – Defensive Portfolio – Consumer Grade vs Enterprise Security)\nAlignment of domain names portfolio and infringement landscape.\nHow to protect your organization and end users online.
URL:https://usteducation.org/event/b101-government-contracting-nav-business-central-power-bi-for-dcaa-compliance/
LOCATION:Group Internet-Based
CATEGORIES:MICROSOFT DYNAMICS
ATTACH;FMTTYPE=image/png:https://usteducation.org/wp-content/uploads/2022/03/BACKLOG-FOR-RELAUNCH-Eli-website-1200X600-px-22.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210407T110000
DTEND;TZID=America/New_York:20210407T123000
DTSTAMP:20260403T155155
CREATED:20220328T190445Z
LAST-MODIFIED:20240531T213903Z
UID:10000069-1617793200-1617798600@usteducation.org
SUMMARY:B106: 7 Reasons Your Business Needs Data Recovery & Backup
DESCRIPTION:How can you shift from a traditional cyber security approach to an approach that will mitigate today’s risks? \nThe many cyber attacks and data breaches worldwide show that these incidents are becoming more intense\, are on the rise\, and the environment has become much more complex to secure. \nMany of the current security methods\, tools\, and techniques used by businesses to secure their environment and protect their brand have been effective so far\, but attacks are now coming from all directions. Hackers\, hacktivists\, cyber criminals\, nation states\, and insiders (like employees) are all pounding security protocols to find a weak spot to get in. \nKnowing that data streams in from various entry points\, organizations that still differentiate between internal and perimeter security should urgently reconsider their security approach—specifically the roll of digital assets (i.e.\, domains\, domain name system (DNS)\, and digital certificates)—in enabling the day-to-day successful operation of their business. \n\n\n\n\n\n\n\n\n \n\n\nLEARNING OBJECTIVES\n\n\nDigital Assets Management Best Practices (Core Domain Name Portfolio – Defensive Portfolio – Consumer Grade vs Enterprise Security)\nAlignment of domain names portfolio and infringement landscape.\nHow to protect your organization and end users online.
URL:https://usteducation.org/event/b106-7-reasons-your-business-needs-data-recovery-backup/
LOCATION:Group Internet-Based
CATEGORIES:B2B/B2G,B2B/B2G IT,Data Management
ATTACH;FMTTYPE=image/png:https://usteducation.org/wp-content/uploads/2022/03/BACKLOG-FOR-RELAUNCH-Eli-website-1200X600-px-22.png
END:VEVENT
END:VCALENDAR