BEGIN:VCALENDAR
PRODID:-//Microsoft Corporation//Outlook 12.0 MIMEDIR//EN
VERSION:2.0
METHOD:PUBLISH
X-MS-OLK-FORCEINSPECTOROPEN:TRUE
BEGIN:VEVENT
CLASS:PUBLIC
CREATED:20260308T210943Z
DESCRIPTION:F5's source code leak underscored a critical reality: thousands of organizations run vulnerable edge devices that attackers are actively exploiting. Combined with Cisco ASA compromises, the RedNovember campaign, and recent CISA emergency directives, network infrastructure has become the most active battleground in cybersecurity.\nThese attacks succeed because most organizations can't see what's happening on their routers, VPNs, and firewalls. Attackers exploit this blindness to maintain hidden access for months, enabling data theft and ransomware deployment.\nThis webinar delivers immediate, actionable defense strategies:\n- Which devices and firmware versions are being targeted right now\n- The specific monitoring gaps attackers exploit to stay hidden\n- Detection rules and log sources you can implement today\n- A prioritized checklist to find and stop active compromises\n
DTSTART:20251217T180000
DTEND:20251217T190000
DTSTAMP:20260308T210943Z
LOCATION:Online
PRIORITY:5
SEQUENCE:0
SUMMARY;LANGUAGE=es-es:Tecnowebinars.com - :: Edge of Catastrophe: How Network Device Attacks Became The Biggest Cyber Battleground
TRANSP:OPAQUE
UID:8214b7bd71f5ec8ccb1befa953206af6 Tecnowebinars.com
X-MICROSOFT-CDO-BUSYSTATUS:BUSY
X-MICROSOFT-CDO-IMPORTANCE:1
X-MICROSOFT-DISALLOW-COUNTER:FALSE
X-MS-OLK-ALLOWEXTERNCHECK:TRUE
X-MS-OLK-AUTOFILLLOCATION:FALSE
X-MS-OLK-CONFTYPE:0
BEGIN:VALARM
TRIGGER:-PT1440M
ACTION:DISPLAY
DESCRIPTION:Reminder
END:VALARM
END:VEVENT
END:VCALENDAR
