BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Security.World - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://security.world
X-WR-CALDESC:Events for Security.World
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20140309T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20141102T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20150308T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20151101T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20160313T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20161106T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20150414T120000
DTEND;TZID=America/Los_Angeles:20150414T123000
DTSTAMP:20260418T012452
CREATED:20150409T201715Z
LAST-MODIFIED:20150409T201719Z
UID:355491-1429012800-1429014600@security.world
SUMMARY:Audio – Axis Communications Webinar
DESCRIPTION:Dependent upon local laws and regulations\, audio can be a useful feature for IP video surveillance solutions. We invite you to join this presentation to learn how audio\, a capability of certain Axis products\, can be a great addition to surveillance solutions.
URL:https://security.world/event/audio-axis-communications-webinar/
LOCATION:Webinar\, United States
CATEGORIES:Company Webinar
ATTACH;FMTTYPE=image/png:https://security.world/wp-content/uploads/2015/04/axis.png
ORGANIZER;CN="Axis Communications":MAILTO:training.services@axis.com 
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20150413T110000
DTEND;TZID=America/Los_Angeles:20150413T130000
DTSTAMP:20260418T012452
CREATED:20150311T061804Z
LAST-MODIFIED:20150311T162223Z
UID:346136-1428922800-1428930000@security.world
SUMMARY:Webinar: Is Cloud-Based Recovery Right for Midsize Enterprises?
DESCRIPTION:The current state of cloud-based recovery provider service maturity\nWhether cloud-based recovery is a viable solution for your organization\nSteps midsize organizations should take to minimize monthly service costs\n\nSince their early beginnings in 2008\, cloud-based recovery service offerings are now available from more than 170 different service providers. However\, these services are far from being the same in terms of monthly pricing\, as well as how service delivery is actually managed. This session presents the finding from the Gartner Disaster Recovery as a Service (DRaaS) Magic Quadrant and shares lessons learned from reviewing cloud recovery contract reviews from your peers. This webinar is a must-attend for any midmarket IT professional responsible for disaster recovery in their organization. \n 
URL:https://security.world/event/webinar-is-cloud-based-recovery-right-for-midsize-enterprises/
LOCATION:Webinar\, United States
CATEGORIES:Company Webinar
ATTACH;FMTTYPE=image/gif:https://security.world/wp-content/uploads/2015/03/gartner2.gif
ORGANIZER;CN="Gartner Inc.":MAILTO:inquiry@gartner.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20150409T213000
DTEND;TZID=America/Los_Angeles:20150409T223000
DTSTAMP:20260418T012452
CREATED:20150401T211022Z
LAST-MODIFIED:20150401T211025Z
UID:352743-1428615000-1428618600@security.world
SUMMARY:Biometric Enablement Program
DESCRIPTION:ENTERTECH SYSTEMS hosts a bi-weekly FREE webinar on how to be successful with biometrics.The webinars are designed to provide biometric hardware and software solutions education and tools for systems integrators\, installers\, dealers and partners
URL:https://security.world/event/biometric-enablement-program/
LOCATION:Webinar\, United States
CATEGORIES:Company Webinar
ATTACH;FMTTYPE=image/png:https://security.world/wp-content/uploads/2015/03/enter.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20150408T110000
DTEND;TZID=America/Los_Angeles:20150408T120000
DTSTAMP:20260418T012452
CREATED:20150311T064743Z
LAST-MODIFIED:20150311T162618Z
UID:346148-1428490800-1428494400@security.world
SUMMARY:Webinar: Fight Fraud and Offer a Better Customer Experience With Voice Biometrics
DESCRIPTION:Determined fraudsters today bypass security measures like passwords and knowledge-based authentication\, and they use social engineering to collect credentials to take over victims’ accounts. Customers who engage with customer service representatives and interactive voice response systems expect businesses to protect their identities and privacy\, and do so without materially affecting the convenience of these interactions. In this Webinar\, we cover how performance and technology advances are elevating voice biometrics as a viable option for customer authentication and fraud prevention\, and we highlight the key players to watch in this market.
URL:https://security.world/event/webinar-fight-fraud-and-offer-a-better-customer-experience-with-voice-biometrics/
LOCATION:Webinar\, United States
CATEGORIES:Company Webinar
ATTACH;FMTTYPE=image/png:https://security.world/wp-content/uploads/2015/03/f.png
ORGANIZER;CN="Forrester Research%2C Inc":MAILTO: flb@forrester.com 
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20150403T110000
DTEND;TZID=America/Los_Angeles:20150403T110000
DTSTAMP:20260418T012452
CREATED:20150327T174717Z
LAST-MODIFIED:20150327T174720Z
UID:351480-1428058800-1428058800@security.world
SUMMARY:CSO Roundtable: Next Generation Security Threats
DESCRIPTION:11:00am – 12:00pm EDT\nThe CSO Roundtable is pleased to host author Marc Goodman to discuss next generation security threats and his new book Future Crimes: Everything is Connected\, Everyone is Vulnerable and What We Can Do About It. The book covers a wide variety of emerging security threats that all CSO?s should be aware of and has been endorsed by the President of Interpol\, the Deputy Assistant Director of the FBI and many others. \n 
URL:https://security.world/event/cso-roundtable-next-generation-security-threats/
LOCATION:Webinar\, United States
CATEGORIES:Company Webinar
ATTACH;FMTTYPE=image/png:https://security.world/wp-content/uploads/2015/03/asis4.png
ORGANIZER;CN="ASIS International":MAILTO:asis@asisonline.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20150402T130000
DTEND;TZID=America/Los_Angeles:20150402T140000
DTSTAMP:20260418T012452
CREATED:20150327T174658Z
LAST-MODIFIED:20150327T174701Z
UID:351470-1427979600-1427983200@security.world
SUMMARY:(ISC)
DESCRIPTION:Your users demand access everywhere\, any time\, via any device. Whether it’s a cloud or enterprise application\, they still need access to maintain productivity. And what you need is to maintain compliance and minimize access risk. Join (ISC)
URL:https://security.world/event/isc%c2%b2-security-briefings-part-2-iam-the-internet-of-things-how-to-provide-access-everywhere/
LOCATION:Webinar\, United States
CATEGORIES:Company Webinar,Training
ATTACH;FMTTYPE=image/jpeg:https://security.world/wp-content/uploads/2015/03/isc1.jpg
ORGANIZER;CN="ISC2 Events":MAILTO:ifisher@isc2.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20150326T090000
DTEND;TZID=America/Los_Angeles:20150326T120000
DTSTAMP:20260418T012452
CREATED:20150311T061140Z
LAST-MODIFIED:20150311T162900Z
UID:346132-1427360400-1427371200@security.world
SUMMARY:Top Security Trends for 2015 ? 2016
DESCRIPTION:Which social\, business and technology forces continue to shape business risks and responses\nWhich security technologies and processes work and which ones may be needed in the months ahead\nHow businesses can balance security and risk effectively\n\nDuring 2014 we’ve seen profound changes in cybersecurity\, altering planning\, delivery\, operations and management in an attempt to keep up with new and increasing threats to the enterprise. Traditional approaches to IT security have limited impact and require changes as well. This webinar will review the lessons learned and inform listeners to use the past to create the future.
URL:https://security.world/event/top-security-trends-for-2015-2016-gartner/
LOCATION:Webinar
CATEGORIES:Company Webinar
ATTACH;FMTTYPE=image/gif:https://security.world/wp-content/uploads/2015/03/gartner1.gif
ORGANIZER;CN="Gartner Inc.":MAILTO:inquiry@gartner.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20150326
DTEND;VALUE=DATE:20150327
DTSTAMP:20260418T012452
CREATED:20150323T201516Z
LAST-MODIFIED:20150325T055236Z
UID:349567-1427328000-1427414399@security.world
SUMMARY:The Complete Grandstream Surveillance Solution [Webinar]
DESCRIPTION:In this webinar we will take a look at the Complete Surveillance Solution by Grandstream. \nGrandstream IP Video Surveillance Solutions include Box IP Cameras\, Cube & Mini Dome IP Cameras\,
URL:https://security.world/event/the-complete-grandstream-surveillance-solution-webinar/
LOCATION:Webinar\, United States
CATEGORIES:Company Webinar
ATTACH;FMTTYPE=image/gif:https://security.world/wp-content/uploads/2015/03/888.gif
ORGANIZER;CN="American Technologies%2C LLC":MAILTO:support@888voip.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20150326
DTEND;VALUE=DATE:20150327
DTSTAMP:20260418T012452
CREATED:20150310T164927Z
LAST-MODIFIED:20150310T164935Z
UID:345873-1427328000-1427414399@security.world
SUMMARY:Risk Assessment – the First Step to Effective Security Measures\, Webinar
DESCRIPTION:The assessment of risk and vulnerabilities is a key responsibility of every security professional. The ability to properly manage risk by implementing effective security measures is also critical for a successful program. Attendees will gain an understanding of the fundamentals needed to perform a risk assessment
URL:https://security.world/event/risk-assessment-the-first-step-to-effective-security-measures-webinar/
LOCATION:Webinar\, United States
CATEGORIES:Company Webinar
ATTACH;FMTTYPE=image/png:https://security.world/wp-content/uploads/2015/03/ASIS1.png
ORGANIZER;CN="ASIS International":MAILTO:asis@asisonline.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20150320T160000
DTEND;TZID=America/Los_Angeles:20150320T170000
DTSTAMP:20260418T012452
CREATED:20150225T122220Z
LAST-MODIFIED:20150306T105259Z
UID:339081-1426867200-1426870800@security.world
SUMMARY:Access Control:   Manage the Transition to a New Industry Standard
DESCRIPTION:How challenging will it be to transition to a new access control standard? Join Cypress Integration Solutions to find out more about the Security Industry Association’s emerging OSDP standard. Learn what OSDP really is\, why some are calling OSDP the new Wiegand\, and how to manage the transition.
URL:https://security.world/event/access-control-manage-the-transition-to-a-new-industry-standard/
LOCATION:webinar
CATEGORIES:Company Webinar
ATTACH;FMTTYPE=image/png:https://security.world/wp-content/uploads/2015/02/psa2.png
ORGANIZER;CN="PSA Security Network":MAILTO:info@PSAsecurity.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20150318T100000
DTEND;TZID=America/Los_Angeles:20150318T110000
DTSTAMP:20260418T012452
CREATED:20150310T164957Z
LAST-MODIFIED:20150310T165005Z
UID:345889-1426672800-1426676400@security.world
SUMMARY:How to Make Security Audits Easy With  Audit Master\, Webinar
DESCRIPTION:The AlertEnterprise Airport Audit package is a simple\, affordable\, and quick way to streamline your audits from scheduling through certification.
URL:https://security.world/event/how-to-make-security-audits-easy-with-audit-master-webinar/
LOCATION:Webinar\, United States
CATEGORIES:Company Webinar
ATTACH;FMTTYPE=image/png:https://security.world/wp-content/uploads/2015/03/alert.png
ORGANIZER;CN="AlertEnterprise%2C Inc.":MAILTO: info@alertenterprise.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20150313T160000
DTEND;TZID=America/Los_Angeles:20150313T170000
DTSTAMP:20260418T012452
CREATED:20150226T163114Z
LAST-MODIFIED:20150306T105523Z
UID:339078-1426262400-1426266000@security.world
SUMMARY:Thermal Detection Technology for a More Secure Perimeter
DESCRIPTION:How does thermal detection technology make for a more secure perimeter? Join an informative session with Sightlogix to learn how! We will help you to better understand how thermal detection is used to detect intrusion in all weather conditions\, in addition to which verticals are using perimeter intrusion detection today and how to approach them. Evaluate your options to expand your portfolio of intrusion detection technologies on current and future projects. Who Should Attend? ? Integrators who support critical infrastructure sites and customers ? Integrators who recognize the need for a more comprehensive perimeter protection system
URL:https://security.world/event/thermal-detection-technology-for-a-more-secure-perimeter/
LOCATION:webinar
CATEGORIES:Company Webinar
ATTACH;FMTTYPE=image/png:https://security.world/wp-content/uploads/2015/02/psa1.png
ORGANIZER;CN="PSA Security Network":MAILTO:info@PSAsecurity.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20150312T170000
DTEND;TZID=America/Los_Angeles:20150312T180000
DTSTAMP:20260418T012452
CREATED:20150310T164942Z
LAST-MODIFIED:20150310T164950Z
UID:345881-1426179600-1426183200@security.world
SUMMARY:Access Control Obstacles: How to Win the Challenge of IT vs. Business Units
DESCRIPTION:Attribute Based Access Control (ABAC) may be the future of identity and access management* (just ask analyst Gartner and KuppingerCole) but up until now there have been certain obstacles. In the main these are non-technical ? and they are now being overcome. \nWith the launch of the Axiomatics Policy Server 6.0\, Axiomatics is bridging the gap between business and IT by bringing business managers into the policy lifecycle management process ? and giving them a tool whereby they can easily view the entire authorization process flow. \nIn this webinar we will be discussing: \n\nHow the gap is being closed between process owners/policy makers and policy authors\nHow auditors\, compliance managers and business line owners can get an instant overview of who can access what sensitive information\nHow collaborative policy management is being utilized by companies to gain a competitive advantage\nHow you can get the most from the new Axiomatics Policy Server user interface
URL:https://security.world/event/access-control-obstacles-how-to-win-the-challenge-of-it-vs-business-units/
LOCATION:Webinar\, United States
CATEGORIES:Company Webinar
ATTACH;FMTTYPE=image/png:https://security.world/wp-content/uploads/2015/03/axio.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20150312T130000
DTEND;TZID=America/Los_Angeles:20150312T140000
DTSTAMP:20260418T012452
CREATED:20150305T162020Z
LAST-MODIFIED:20150305T162344Z
UID:343831-1426165200-1426168800@security.world
SUMMARY:Automating Access Control With Digital Mustering\, Webinar
DESCRIPTION:Emergency preparedness and personnel tracking processes have been around for years. Yet it?s only recently that these typically arduous and manual processes have become automated\, digitized and more widely adopted. \nJoin experts from Avigilon on March 12th at 1 p.m. ET as they provide you with the latest applications and innovations in digital mustering. The time is now to start leveraging actionable data to protect your people\, increase organizational efficiencies and save money: \n\nTime to gain real-time insight to safety drills and procedures\, while achieving a higher level of organizational safety preparedness\nTime to ensure employees are tracked and safe during an emergency situation\nTime to utilize occupancy counting as a powerful business intelligence tool and uncover operational efficiencies while reducing unnecessary overhead costs\nTime to get a return on your security investment faster\, with a lower total cost of ownership
URL:https://security.world/event/automating-access-control-with-digital-mustering-webinar/
CATEGORIES:Company Webinar
ATTACH;FMTTYPE=image/jpeg:https://security.world/wp-content/uploads/2015/03/avi.jpg
ORGANIZER;CN="Jim Judson":MAILTO:support@avigilon.com. 
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20150306T170000
DTEND;TZID=America/Los_Angeles:20150306T180000
DTSTAMP:20260418T012452
CREATED:20150226T163110Z
LAST-MODIFIED:20150306T105508Z
UID:339075-1425661200-1425664800@security.world
SUMMARY:Is Facial Recognition Here to Stay?
DESCRIPTION:If you harbor any doubt about the future of facial recognition then Stone Lock? Pro may just change your mind. In this session we will demonstrate a sophisticated biometric device that provides instant\, reliable confirmation of identity. You will learn about the use of near-infrared wavelengths and why it is ideal for capturing the instrinsic properties of a face. This technology is well suited for a wide variety of critical access control situations. Facial features are scanned\, with a match typically confirmed in less than a second. Furthermore\, we will breakdown the multi factor access with high throughput rates and discuss integrations to access control platforms.
URL:https://security.world/event/is-facial-recognition-here-to-stay/
LOCATION:webinar
CATEGORIES:Company Webinar
ATTACH;FMTTYPE=image/png:https://security.world/wp-content/uploads/2015/02/psa.png
ORGANIZER;CN="PSA Security Network":MAILTO:	info@PSAsecurity.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20150305T100000
DTEND;TZID=America/Los_Angeles:20150305T110000
DTSTAMP:20260418T012452
CREATED:20150226T102913Z
LAST-MODIFIED:20150306T105402Z
UID:339762-1425549600-1425553200@security.world
SUMMARY:How to Access Federal Funding for Biometric Technology
DESCRIPTION:MorphoTrak\, the nation?s leading provider of biometric identification solutions including facial recognition\, Rapid DNA\, mobile ID\, PIV-based access control\, and multimodal biometric systems\, will present How to Access Federal Funding for Biometric Technology\, Thursday March 5\, 10 am ? 11 am \nYour organization?s struggle to acquire funding for AFIS and other biometric technologies is over. Biometric devices are included on the Authorized Equipment Lists for both the Department of Justice and the Department of Homeland Security\, and are an allowable and encouraged use of federal grant funds. Last year the government provided just over a billion dollars for state and local governments to purchase biometric systems and devices\, and robust funding levels are expected again this year. \nDuring the webinar\, MorphoTrak speakers Barry Fisher\, Sr. Director of State and Local Sales\, and Tamara Coffey\, DNA Business Development Manager\, will introduce you to MorphoTrak?s innovative biometric solutions. Amanda Wood\, Senior Government Relations Consultant with Becker & Poliakoff\, will present strategies for securing funding for biometric products and systems.\n 
URL:https://security.world/event/how-to-access-federal-funding-for-biometric-technology/
LOCATION:webinar
CATEGORIES:Company Webinar
ATTACH;FMTTYPE=image/png:https://security.world/wp-content/uploads/2015/02/safran.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20150223
DTEND;VALUE=DATE:20150224
DTSTAMP:20260418T012452
CREATED:20150220T172946Z
LAST-MODIFIED:20150306T103854Z
UID:336286-1424649600-1424735999@security.world
SUMMARY:Exploring IOT: Security\, Silicon\, Software and Sensors Webinar
DESCRIPTION:Internet of Things is a broad-reaching concept traversing virtually every market segment. The IoT space has created a market opportunity valued as high as $14.4 trillion by analysts. IoT implies that devices with information become “smart” by adding connectivity and a means to provide or consume information to and/or from other external systems. The silicon and sensor components play a big role in the capabilities and cost of the IoT device. Software that incorporates connectivity to enable “smart” is required. And once a device is “smart’\, non-trivial security issues need to be addressed. Join us as a diverse panel of experts discuss IoT applications and dissect what puts the “smart” in IoT devices.
URL:https://security.world/event/exploring-iot-security-silicon-software-and-sensors-webinar/
LOCATION:webinar
CATEGORIES:Company Webinar
ATTACH;FMTTYPE=image/png:https://security.world/wp-content/uploads/2015/02/eurotech-logo.png
ORGANIZER;CN="Eurotech":MAILTO:support.us@eurotech.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20150218T083000
DTEND;TZID=America/Los_Angeles:20150218T093000
DTSTAMP:20260418T012452
CREATED:20150126T180958Z
LAST-MODIFIED:20150126T195912Z
UID:309372-1424248200-1424251800@security.world
SUMMARY:Arecont Vision Webinar: Focus on Large Venues
DESCRIPTION:This is a monthly webinar in which Arecont Vision employees and guests speak about the benefits of Megapixel IP surveillance and cover the basics of the technology and provide guest speakers from NVR/VMS partners. \nLength: 60 minutes\nSpeakers: Arecont Vision and Guests \n 
URL:https://security.world/event/arecont-vision-webinar-focus-on-large-venues/
LOCATION:Online Webinar
CATEGORIES:Company Webinar
ORGANIZER;CN="Arecont Vision":MAILTO:mespenschied@arecontvision.com
END:VEVENT
END:VCALENDAR