BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//UST Education - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://usteducation.org
X-WR-CALDESC:Events for UST Education
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250910T130000
DTEND;TZID=America/New_York:20250910T140000
DTSTAMP:20260429T075706
CREATED:20250827T133810Z
LAST-MODIFIED:20250912T134233Z
UID:10000777-1757509200-1757512800@usteducation.org
SUMMARY:Cyber Deception for Associations: Stop Breaches Before They Start
DESCRIPTION:Course Description:  \nDeception is a proactive defense strategy that uses canaries\, honeypots\, honeytokens\, and decoy credentials or endpoints to surface high fidelity alerts and reduce dwell time. This session explains what deception is\, where it fits in a modern security program\, and how associations can put it to work in real world environments. \nWho should attend: Association executives\, IT and operations leaders\, administrators\, and anyone responsible for safeguarding member and organizational data. \n  \nLearning Objectives: \nExplain key deception tactics (e.g.\, canaries\, honeypots\, honeytokens) and identify scenarios where they add value in an association’s security program. \nDesign a minimal\, high-impact deception plan that aligns with existing security tools and workflows. \nDemonstrate implementation steps and analyze examples tailored to common association technology stacks. \nEvaluate measurable benefits of deception\, including earlier detection\, reduced dwell time\, and clearer incident signals. \nAssess governance considerations\, identify common pitfalls\, and recommend strategies to strengthen a proactive security posture. \n  \nTo Watch this Webinar on the Media Library CLICK HERE!
URL:https://usteducation.org/event/cyber-deception-for-associations-stop-breaches-before-they-start/
LOCATION:zoom.us/j/96943373577
CATEGORIES:Association IT,ASSOCIATIONS & NONPROFITS,Cybersecurity
ATTACH;FMTTYPE=image/png:https://usteducation.org/wp-content/uploads/2025/08/BenRyan25-2.png
ORGANIZER;CN="Ben Muscolino":MAILTO:ben@amsgeek.com
END:VEVENT
END:VCALENDAR