BEGIN:VCALENDAR
PRODID:-//Microsoft Corporation//Outlook 12.0 MIMEDIR//EN
VERSION:2.0
METHOD:PUBLISH
X-MS-OLK-FORCEINSPECTOROPEN:TRUE
BEGIN:VEVENT
CLASS:PUBLIC
CREATED:20260511T153044Z
DESCRIPTION:Critical infrastructure industries are prime targets for cyberattacks, and more than 70% of breaches exploit stolen credentials. Multi-factor authentication (MFA) should be a first-line defense of any cybersecurity strategy to protect critical data, information technology (IT) and operational technology (OT) environments from ransomware and other cyberattacks. But not all forms of MFA are created equal.  \n \nJoin us to hear from thought leaders at Schneider Electric and Yubico as they discuss the role of phishing-resistant authentication and hardware backed security using Zero Trust principles across your company and supply chain.  \n \nYou will learn:  \n \n              - Schneider Electric’s journey to using modern phishing-resistant FIDO protocols to secure users, IT and OT environments, such as SCADA systems  \n              - How Schneider Electric is protecting critical infrastructure through their IEC-62443 certified solutions for users and hardware-backed security for devices, positioning them well to meet higher-level cybersecurity regulations in the future \n             - Best practices that can apply to your organization and how phishing-resistant MFA is a business differentiator and can even help drive revenue  \nSpeakers\n \nChad Lloyd | Director, Security Engineering Team and Senior Fellow | Schneider Electric \nFor more than 15 years, Chad Lloyd has served in a variety of roles at Schneider Electric,  a global leader in digital transformation of energy management and automation. Lloyd leads the Schneider Electric Cybersecurity Architecture Team involved with secure solution design and development (primarily for critical infrastructure). Lloyd holds numerous patents related to his work in cybersecurity, hardware, and software. \n \nLloyd has earned multiple certifications including CISSP (Certified Information Systems Security Professional) and CEH (Certified Ethical Hacker). He obtained his M.S. in Computer Science and his M.S. in Computer Engineering from Middle Tennessee State University.  \n \nDavid Treece | Vice President, Solutions Architecture and Integrations | Yubico \n \nDavid Treece focuses on enterprise solutions and partner integrations at Yubico, a global leader in modern phishing-resistant hardware authentication. Treece works with enterprise organizations to deploy strong authentication and the IT industry to provide phishing-resistant authentication solutions that are easy to use. He also works with the FIDO Alliance to define implementation patterns for the FIDO standards. He has over 20 years’ experience architecting and implementing Identity and Access Management systems for enterprises in the retail, manufacturing, IT and services industries.  \n \nTreece is CISSP certified and has a Master’s of Science degree in Business Administration focused on Information Systems from San Diego State University. \n \n \n
DTSTART:20230629T200000
DTEND:20230629T210000
DTSTAMP:20260511T153044Z
LOCATION:Online
PRIORITY:5
SEQUENCE:0
SUMMARY;LANGUAGE=es-es:Tecnowebinars.com - :: Ciberseguridad en entornos industriales con Yubico y Schneider Electric
TRANSP:OPAQUE
UID:08d6b4f7e5f90a8dc2f57e880dd37699 Tecnowebinars.com
X-MICROSOFT-CDO-BUSYSTATUS:BUSY
X-MICROSOFT-CDO-IMPORTANCE:1
X-MICROSOFT-DISALLOW-COUNTER:FALSE
X-MS-OLK-ALLOWEXTERNCHECK:TRUE
X-MS-OLK-AUTOFILLLOCATION:FALSE
X-MS-OLK-CONFTYPE:0
BEGIN:VALARM
TRIGGER:-PT1440M
ACTION:DISPLAY
DESCRIPTION:Reminder
END:VALARM
END:VEVENT
END:VCALENDAR
