BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20240305T170000Z
DTEND:20240305T180000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:TechSolve's Byte-Sized Insights: Mastering Microsoft Permissions For Enhanced Cybersecurity
DESCRIPTION:Join TechSolve Cybersecurity experts on a journey through the intricacies of Active Directory (AD) security and discover how it can be used to fortify your organization against cyber threats. With Microsoft's Active Directory being the backbone of identity and access management for many organizations over 20 years\, its security is paramount to your business's safety. However\, inherent complexities\, default configurations\, and potential oversight can open doors to attackers that standard vulnerability scans might overlook. In this lunch & learn\, unpack the significance of AD objects\, from users to organizational units\, and equate this to the critical aspects of permissions\, passwords\, and access to classified business information. Explore the authentication\, authorization\, and Group Policy functionalities that safeguard your network.
X-ALT-DESC;FMTTYPE=text/html:<span style="color: rgb(0\, 0\, 0)\; font-family: Arial\; white-space-collapse: preserve\;">Join TechSolve Cybersecurity experts on a journey through the intricacies of Active Directory (AD) security and discover how it can be used to fortify your organization against cyber threats. With Microsoft&rsquo\;s Active Directory being the backbone of identity and access management for many organizations over 20 years\, its security is paramount to your business&rsquo\;s safety. However\, inherent complexities\, default configurations\, and potential oversight can open doors to attackers that standard vulnerability scans might overlook. In this lunch &amp\; learn\, unpack the significance of AD objects\, from users to organizational units\, and equate this to the critical aspects of permissions\, passwords\, and access to classified business information. Explore the authentication\, authorization\, and Group Policy functionalities that safeguard your network.</span>
LOCATION:Virtual through Microsoft Teams
UID:e.1583.13210
SEQUENCE:3
DTSTAMP:20260419T063402Z
URL:http://wilmington-clintonchamber.chambermaster.com/events/details/techsolve-s-byte-sized-insights-mastering-microsoft-permissions-for-enhanced-cybersecurity-13210
END:VEVENT

END:VCALENDAR
