BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20260421T140000Z
DTEND:20260421T150000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Cybersecurity Essentials Webinar Series: Technology & IT Protection
DESCRIPTION:This three-part Cybersecurity Essentials Series is designed to give small organizations\n\npractical tools\, real-world awareness\, and actionable next steps to reduce risk. Each 30-minute session is led by a chamber member expert and focuses on a different layer of protection including technology\, insurance\, and financial systems\, so participants can walk away better informed and better prepared to safeguard their operations.\n\n\n\nWhy the Chamber Is Offering This Series\n\nAs part of our strategic focus on delivering innovative\, high-impact services\, the Chamber is committed to helping businesses and nonprofits navigate emerging challenges that directly affect their sustainability and growth. Cybersecurity is no longer a niche or optional concern it is a core operational risk for organizations of every size. By offering this Cybersecurity Essentials Series\, the Chamber is proactively equipping our members with timely knowledge\, practical tools\, and trusted local expertise to help them operate more securely\, confidently\, and resiliently in an increasingly digital business environment.\n\n\n\n \n\nSession 1: Technology & IT Protection\n\nPresented by: Rick Brooks\, Nsight IT Services\n\n \n\nCyber criminals are constantly evolving their tactics\, and technology is often the first line of defense. This session will introduce participants to the most common cyber scams targeting small organizations and outline the essential hardware\, software\, and IT practices that can significantly reduce risk. The focus will be on practical\, scalable protections not overly complex or enterprise-level solutions.\n\n \n\nParticipants will:\n\n\n	Understand common cyber threats such as phishing\, ransomware\, malware\, and business email compromise\n	Learn basic hardware and software protections every small organization should have in place\n	Identify key IT policies (passwords\, access control\, updates\, backups\, remote work\, etc.)\n	Gain clarity on what protections are "must-haves" versus "nice-to-haves" for small organizations\n	Leave with a short checklist of questions to ask their IT provider or internal staff
X-ALT-DESC;FMTTYPE=text/html:<p class="p1" style="margin: 0px\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-size-adjust: none\; font-kerning: auto\; font-optical-sizing: auto\; font-feature-settings: normal\; font-variation-settings: normal\; font-variant-position: normal\; font-variant-emoji: normal\; font-stretch: normal\; font-size: 12px\; line-height: normal\; font-family: Helvetica\; color: rgb(0\, 0\, 0)\;">This three-part Cybersecurity Essentials Series is designed to give small organizations</p>\n\n<p class="p1" style="margin: 0px\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-size-adjust: none\; font-kerning: auto\; font-optical-sizing: auto\; font-feature-settings: normal\; font-variation-settings: normal\; font-variant-position: normal\; font-variant-emoji: normal\; font-stretch: normal\; font-size: 12px\; line-height: normal\; font-family: Helvetica\; color: rgb(0\, 0\, 0)\;">practical tools\, real-world awareness\, and actionable next steps to reduce risk. Each 30-minute session is led by a chamber member expert and focuses on a different layer of protection including technology\, insurance\, and financial systems\, so participants can walk away better informed and better prepared to safeguard their operations.</p>\n\n<p class="p1" style="margin: 0px\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-size-adjust: none\; font-kerning: auto\; font-optical-sizing: auto\; font-feature-settings: normal\; font-variation-settings: normal\; font-variant-position: normal\; font-variant-emoji: normal\; font-stretch: normal\; font-size: 12px\; line-height: normal\; font-family: Helvetica\; color: rgb(0\, 0\, 0)\;"><br />\n<strong>Why the Chamber Is Offering This Series</strong></p>\n\n<p class="p1" style="margin: 0px\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-size-adjust: none\; font-kerning: auto\; font-optical-sizing: auto\; font-feature-settings: normal\; font-variation-settings: normal\; font-variant-position: normal\; font-variant-emoji: normal\; font-stretch: normal\; font-size: 12px\; line-height: normal\; font-family: Helvetica\; color: rgb(0\, 0\, 0)\;">As part of our strategic focus on delivering innovative\, high-impact services\, the Chamber is committed to helping businesses and nonprofits navigate emerging challenges that directly affect their sustainability and growth. Cybersecurity is no longer a niche or optional concern&mdash\;it is a core operational risk for organizations of every size. By offering this Cybersecurity Essentials Series\, the Chamber is proactively equipping our members with timely knowledge\, practical tools\, and trusted local expertise to help them operate more securely\, confidently\, and resiliently in an increasingly digital business environment.<br />\n<br />\n&nbsp\;</p>\n\n<p class="p1" style="margin: 0px\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-size-adjust: none\; font-kerning: auto\; font-optical-sizing: auto\; font-feature-settings: normal\; font-variation-settings: normal\; font-variant-position: normal\; font-variant-emoji: normal\; font-stretch: normal\; font-size: 18px\; line-height: normal\; font-family: Helvetica\; color: rgb(0\, 0\, 0)\;"><strong>Session 1: Technology &amp\; IT Protection</strong></p>\n\n<p class="p2" style="margin: 0px\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-size-adjust: none\; font-kerning: auto\; font-optical-sizing: auto\; font-feature-settings: normal\; font-variation-settings: normal\; font-variant-position: normal\; font-variant-emoji: normal\; font-stretch: normal\; font-size: 12px\; line-height: normal\; font-family: Helvetica\; color: rgb(0\, 0\, 0)\;"><em>Presented by: Rick Brooks<span style="color: inherit\; font-family: inherit\; font-size: inherit\; font-style: inherit\; font-variant-ligatures: inherit\; font-variant-caps: inherit\; font-weight: inherit\;">\,&nbsp\;</span><span style="color: inherit\; font-family: inherit\; font-size: inherit\; font-style: inherit\; font-variant-ligatures: inherit\; font-variant-caps: inherit\; font-weight: inherit\;">Nsight IT Services</span></em></p>\n\n<p class="p3" style="margin: 0px\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-size-adjust: none\; font-kerning: auto\; font-optical-sizing: auto\; font-feature-settings: normal\; font-variation-settings: normal\; font-variant-position: normal\; font-variant-emoji: normal\; font-stretch: normal\; font-size: 13.6px\; line-height: normal\; font-family: Helvetica\; color: rgb(0\, 0\, 0)\;">&nbsp\;</p>\n\n<p class="p2" style="margin: 0px\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-size-adjust: none\; font-kerning: auto\; font-optical-sizing: auto\; font-feature-settings: normal\; font-variation-settings: normal\; font-variant-position: normal\; font-variant-emoji: normal\; font-stretch: normal\; font-size: 12px\; line-height: normal\; font-family: Helvetica\; color: rgb(0\, 0\, 0)\;">Cyber criminals are constantly evolving their tactics\, and technology is often the first line of defense. This session will introduce participants to the most common cyber scams targeting small organizations and outline the essential hardware\, software\, and IT practices that can significantly reduce risk. The focus will be on practical\, scalable protections&mdash\;not overly complex or enterprise-level solutions.</p>\n\n<p class="p3" style="margin: 0px\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-size-adjust: none\; font-kerning: auto\; font-optical-sizing: auto\; font-feature-settings: normal\; font-variation-settings: normal\; font-variant-position: normal\; font-variant-emoji: normal\; font-stretch: normal\; font-size: 13.6px\; line-height: normal\; font-family: Helvetica\; color: rgb(0\, 0\, 0)\;">&nbsp\;</p>\n\n<p class="p2" style="margin: 0px\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-size-adjust: none\; font-kerning: auto\; font-optical-sizing: auto\; font-feature-settings: normal\; font-variation-settings: normal\; font-variant-position: normal\; font-variant-emoji: normal\; font-stretch: normal\; font-size: 12px\; line-height: normal\; font-family: Helvetica\; color: rgb(0\, 0\, 0)\;">Participants will:</p>\n\n<ul>\n	<li class="p2" style="margin: 0px\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-size-adjust: none\; font-kerning: auto\; font-optical-sizing: auto\; font-feature-settings: normal\; font-variation-settings: normal\; font-variant-position: normal\; font-variant-emoji: normal\; font-stretch: normal\; font-size: 12px\; line-height: normal\; font-family: Helvetica\; color: rgb(0\, 0\, 0)\;">Understand common cyber threats such as phishing\, ransomware\, malware\, and business email compromise</li>\n	<li class="p2" style="margin: 0px\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-size-adjust: none\; font-kerning: auto\; font-optical-sizing: auto\; font-feature-settings: normal\; font-variation-settings: normal\; font-variant-position: normal\; font-variant-emoji: normal\; font-stretch: normal\; font-size: 12px\; line-height: normal\; font-family: Helvetica\; color: rgb(0\, 0\, 0)\;">Learn basic hardware and software protections every small organization should have in place</li>\n	<li class="p2" style="margin: 0px\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-size-adjust: none\; font-kerning: auto\; font-optical-sizing: auto\; font-feature-settings: normal\; font-variation-settings: normal\; font-variant-position: normal\; font-variant-emoji: normal\; font-stretch: normal\; font-size: 12px\; line-height: normal\; font-family: Helvetica\; color: rgb(0\, 0\, 0)\;">Identify key IT policies (passwords\, access control\, updates\, backups\, remote work\, etc.)</li>\n	<li class="p2" style="margin: 0px\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-size-adjust: none\; font-kerning: auto\; font-optical-sizing: auto\; font-feature-settings: normal\; font-variation-settings: normal\; font-variant-position: normal\; font-variant-emoji: normal\; font-stretch: normal\; font-size: 12px\; line-height: normal\; font-family: Helvetica\; color: rgb(0\, 0\, 0)\;">Gain clarity on what protections are &ldquo\;must-haves&rdquo\; versus &ldquo\;nice-to-haves&rdquo\; for small organizations</li>\n	<li class="p2" style="margin: 0px\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-size-adjust: none\; font-kerning: auto\; font-optical-sizing: auto\; font-feature-settings: normal\; font-variation-settings: normal\; font-variant-position: normal\; font-variant-emoji: normal\; font-stretch: normal\; font-size: 12px\; line-height: normal\; font-family: Helvetica\; color: rgb(0\, 0\, 0)\;">Leave with a short checklist of questions to ask their IT provider or internal staff</li>\n</ul>\n
LOCATION:Online Webinar via Zoom Link to Webinar will be provided in Confirmation Email
UID:e.361.20635
SEQUENCE:3
DTSTAMP:20260415T215712Z
URL:https://business.chambermanitowoccounty.org/events/details/cybersecurity-essentials-webinar-series-technology-it-protection-20635
END:VEVENT

END:VCALENDAR
