BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P1H
REFRESH-INTERVAL:P1H
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=2SU
DTSTART:20070101T000000
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:Pacific Daylight Time
END:DAYLIGHT
BEGIN:STANDARD
RRULE:FREQ=YEARLY;BYMONTH=11;BYDAY=1SU
DTSTART:20070101T000000
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:Pacific Standard Time
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20260422T120000
DTEND;TZID=America/Los_Angeles:20260422T133000
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Chamber Exclusive Lunch & Learn -Cybersecurity Today - Protecting What Matters: Risk\, People & Technology
DESCRIPTION:In today's mobile-first business landscape\, securing your remote workforce is essential for protecting sensitive data and maintaining operational continuity. This meeting equips small businesses with practical security strategies that safeguard information while enabling employees to work effectively from anywhere. Discover how to implement cutting-edge solutions\, including Secure Access Service Edge (SASE) architecture\, mobile device management (MDM)\, zero-trust security models\, and secure Bring Your Own Device (BYOD) policies. Learn how these technologies create a protective framework that follows your team members regardless of location without compromising productivity or flexibility. Whether managing hybrid teams or fully remote workforces\, these proven approaches will help shield your digital assets from emerging cyber threats while supporting your business growth objectives.\nAt the conclusion of this workshop you'll be able to:          Identify the key security challenges facing mobile workforces         Implement effective SASE (Secure Access Service Edge) solutions for remote teams         Develop a comprehensive mobile device management (MDM) strategy         Establish secure network connectivity protocols for remote workers         Balance security requirements with employee productivity needs         Create an incident response plan for mobile security breaches\nJoin us to hear from Seana Fippin\, Founder - Red Box Business Solutions and Dennis Sewell\, CIC\, CISC\, CRIS\, Broker-President with RC Fischer & Co.\nCIC\, CISC\, C
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE html><html><head><title></title></head><body aria-disabled="false"><div data-olk-copy-source="MessageBody" style="border: 0px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-variant-numeric: inherit\; font-variant-east-asian: inherit\; font-variant-alternates: inherit\; font-variant-position: inherit\; font-variant-emoji: inherit\; font-weight: 400\; font-stretch: inherit\; font-size: 12pt\; line-height: inherit\; font-family: Aptos\, Aptos_EmbeddedFont\, Aptos_MSFontService\, Calibri\, Helvetica\, sans-serif\; font-optical-sizing: inherit\; font-size-adjust: inherit\; font-kerning: inherit\; font-feature-settings: inherit\; font-variation-settings: inherit\; font-language-override: inherit\; margin: 0in\; padding: 0px\; vertical-align: baseline\; color: rgb(0\, 0\, 0)\; letter-spacing: normal\; orphans: 2\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\; text-align: left\;"><span style="font-family: Georgia\,serif\;">In today&#39\;s mobile-first business landscape\, securing your remote workforce is essential for protecting sensitive data and maintaining operational continuity. This meeting equips small businesses with practical security strategies that safeguard information while enabling employees to work effectively from anywhere. Discover how to implement cutting-edge solutions\, including Secure Access Service Edge (SASE) architecture\, mobile device management (MDM)\, zero-trust security models\, and secure Bring Your Own Device (BYOD) policies. Learn how these technologies create a protective framework that follows your team members regardless of location without compromising productivity or flexibility. Whether managing hybrid teams or fully remote workforces\, these proven approaches will help shield your digital assets from emerging cyber threats while supporting your business growth objectives.</span></div><div style="border: 0px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-variant-numeric: inherit\; font-variant-east-asian: inherit\; font-variant-alternates: inherit\; font-variant-position: inherit\; font-variant-emoji: inherit\; font-weight: 400\; font-stretch: inherit\; font-size: 12pt\; line-height: inherit\; font-family: Aptos\, Aptos_EmbeddedFont\, Aptos_MSFontService\, Calibri\, Helvetica\, sans-serif\; font-optical-sizing: inherit\; font-size-adjust: inherit\; font-kerning: inherit\; font-feature-settings: inherit\; font-variation-settings: inherit\; font-language-override: inherit\; margin: 0in\; padding: 0px\; vertical-align: baseline\; color: rgb(0\, 0\, 0)\; letter-spacing: normal\; orphans: 2\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\; text-align: left\;"><span style="font-family: Georgia\,serif\;"><strong fr-original-style="" style="font-weight: 700\;"><br></strong></span></div><div style="border: 0px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-variant-numeric: inherit\; font-variant-east-asian: inherit\; font-variant-alternates: inherit\; font-variant-position: inherit\; font-variant-emoji: inherit\; font-weight: 400\; font-stretch: inherit\; font-size: 12pt\; line-height: inherit\; font-family: Aptos\, Aptos_EmbeddedFont\, Aptos_MSFontService\, Calibri\, Helvetica\, sans-serif\; font-optical-sizing: inherit\; font-size-adjust: inherit\; font-kerning: inherit\; font-feature-settings: inherit\; font-variation-settings: inherit\; font-language-override: inherit\; margin: 0in\; padding: 0px\; vertical-align: baseline\; color: rgb(0\, 0\, 0)\; letter-spacing: normal\; orphans: 2\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\; text-align: left\;"><span style="font-family: Georgia\,serif\;"><strong fr-original-style="" style="font-weight: 700\;">At the conclusion of this workshop you&#39\;ll be able to:&nbsp\;</strong></span></div><div style="border: 0px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-variant-numeric: inherit\; font-variant-east-asian: inherit\; font-variant-alternates: inherit\; font-variant-position: inherit\; font-variant-emoji: inherit\; font-weight: 400\; font-stretch: inherit\; font-size: 12pt\; line-height: inherit\; font-family: Aptos\, Aptos_EmbeddedFont\, Aptos_MSFontService\, Calibri\, Helvetica\, sans-serif\; font-optical-sizing: inherit\; font-size-adjust: inherit\; font-kerning: inherit\; font-feature-settings: inherit\; font-variation-settings: inherit\; font-language-override: inherit\; margin: 0in\; padding: 0px\; vertical-align: baseline\; color: rgb(0\, 0\, 0)\; letter-spacing: normal\; orphans: 2\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\; text-align: left\;"><span style="font-family: Georgia\,serif\;">&middot\; &nbsp\; &nbsp\; &nbsp\; &nbsp\;Identify the key security challenges facing mobile workforces</span></div><div style="border: 0px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-variant-numeric: inherit\; font-variant-east-asian: inherit\; font-variant-alternates: inherit\; font-variant-position: inherit\; font-variant-emoji: inherit\; font-weight: 400\; font-stretch: inherit\; font-size: 12pt\; line-height: inherit\; font-family: Aptos\, Aptos_EmbeddedFont\, Aptos_MSFontService\, Calibri\, Helvetica\, sans-serif\; font-optical-sizing: inherit\; font-size-adjust: inherit\; font-kerning: inherit\; font-feature-settings: inherit\; font-variation-settings: inherit\; font-language-override: inherit\; margin: 0in\; padding: 0px\; vertical-align: baseline\; color: rgb(0\, 0\, 0)\; letter-spacing: normal\; orphans: 2\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\; text-align: left\;"><span style="font-family: Georgia\,serif\;">&middot\; &nbsp\; &nbsp\; &nbsp\; &nbsp\;Implement effective SASE (Secure Access Service Edge) solutions for remote teams</span></div><div style="border: 0px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-variant-numeric: inherit\; font-variant-east-asian: inherit\; font-variant-alternates: inherit\; font-variant-position: inherit\; font-variant-emoji: inherit\; font-weight: 400\; font-stretch: inherit\; font-size: 12pt\; line-height: inherit\; font-family: Aptos\, Aptos_EmbeddedFont\, Aptos_MSFontService\, Calibri\, Helvetica\, sans-serif\; font-optical-sizing: inherit\; font-size-adjust: inherit\; font-kerning: inherit\; font-feature-settings: inherit\; font-variation-settings: inherit\; font-language-override: inherit\; margin: 0in\; padding: 0px\; vertical-align: baseline\; color: rgb(0\, 0\, 0)\; letter-spacing: normal\; orphans: 2\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\; text-align: left\;"><span style="font-family: Georgia\,serif\;">&middot\; &nbsp\; &nbsp\; &nbsp\; &nbsp\;Develop a comprehensive mobile device management (MDM) strategy</span></div><div style="border: 0px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-variant-numeric: inherit\; font-variant-east-asian: inherit\; font-variant-alternates: inherit\; font-variant-position: inherit\; font-variant-emoji: inherit\; font-weight: 400\; font-stretch: inherit\; font-size: 12pt\; line-height: inherit\; font-family: Aptos\, Aptos_EmbeddedFont\, Aptos_MSFontService\, Calibri\, Helvetica\, sans-serif\; font-optical-sizing: inherit\; font-size-adjust: inherit\; font-kerning: inherit\; font-feature-settings: inherit\; font-variation-settings: inherit\; font-language-override: inherit\; margin: 0in\; padding: 0px\; vertical-align: baseline\; color: rgb(0\, 0\, 0)\; letter-spacing: normal\; orphans: 2\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\; text-align: left\;"><span style="font-family: Georgia\,serif\;">&middot\; &nbsp\; &nbsp\; &nbsp\; &nbsp\;Establish secure network connectivity protocols for remote workers</span></div><div style="border: 0px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-variant-numeric: inherit\; font-variant-east-asian: inherit\; font-variant-alternates: inherit\; font-variant-position: inherit\; font-variant-emoji: inherit\; font-weight: 400\; font-stretch: inherit\; font-size: 12pt\; line-height: inherit\; font-family: Aptos\, Aptos_EmbeddedFont\, Aptos_MSFontService\, Calibri\, Helvetica\, sans-serif\; font-optical-sizing: inherit\; font-size-adjust: inherit\; font-kerning: inherit\; font-feature-settings: inherit\; font-variation-settings: inherit\; font-language-override: inherit\; margin: 0in\; padding: 0px\; vertical-align: baseline\; color: rgb(0\, 0\, 0)\; letter-spacing: normal\; orphans: 2\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\; text-align: left\;"><span style="font-family: Georgia\,serif\;">&middot\; &nbsp\; &nbsp\; &nbsp\; &nbsp\;Balance security requirements with employee productivity needs</span></div><div style="border: 0px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-variant-numeric: inherit\; font-variant-east-asian: inherit\; font-variant-alternates: inherit\; font-variant-position: inherit\; font-variant-emoji: inherit\; font-weight: 400\; font-stretch: inherit\; font-size: 12pt\; line-height: inherit\; font-family: Aptos\, Aptos_EmbeddedFont\, Aptos_MSFontService\, Calibri\, Helvetica\, sans-serif\; font-optical-sizing: inherit\; font-size-adjust: inherit\; font-kerning: inherit\; font-feature-settings: inherit\; font-variation-settings: inherit\; font-language-override: inherit\; margin: 0in\; padding: 0px\; vertical-align: baseline\; color: rgb(0\, 0\, 0)\; letter-spacing: normal\; orphans: 2\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\; text-align: left\;"><span style="font-family: Georgia\,serif\;">&middot\; &nbsp\; &nbsp\; &nbsp\; &nbsp\;Create an incident response plan for mobile security breaches</span></div><p><br></p><p><span style="font-family: Georgia\,serif\;">Join us to hear from Seana Fippin\, Founder - Red Box Business Solutions and Dennis Sewell\, CIC\, CISC\, CRIS\, Broker-President with RC Fischer &amp\; Co.</span></p><p><br></p><h1 style="box-sizing: border-box\; font-family: Philosopher\, sans-serif\; font-size: 54px\; margin: 0px\; font-weight: bold\; text-transform: capitalize\; color: rgb(255\, 255\, 255)\; padding: 0px\; letter-spacing: normal\; line-height: normal\; text-align: center\; width: 1170px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; orphans: 2\; text-indent: 0px\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\;">CIC\, CISC\, C</h1><p><img src="https://res.cloudinary.com/micronetonline/image/upload/v1768613514/tenants/fa9e7c9d-9aae-4c16-a660-10beb114a5d0/ae133b652a8c4c68930b161f08c384a3/Seana-Fippin-Headshot.jpg" style="width: 206px\; height: 206px\; position: relative\; max-width: 100%\; cursor: pointer\; padding: 0px 1px\;" width="206" height="206" fr-original-style="width: 206px\; height: 206px\;" fr-original-class="fr-draggable"> <img src="https://res.cloudinary.com/micronetonline/image/upload/c_limit\,w_200\,h_200/v1768597150/tenants/fa9e7c9d-9aae-4c16-a660-10beb114a5d0/e8aa6ca90145415992f3ce0ece590d05/Dennis-Sewell.jpg" style="width: 204px\; height: 204px\; position: relative\; max-width: 100%\; cursor: pointer\; padding: 0px 1px\;" width="204" height="204" fr-original-style="width: 204px\; height: 204px\;" fr-original-class="fr-draggable"><br></p></body></html>
LOCATION:1280 Civic Dr #100 Walnut Creek CA 94596
UID:e.4347.1376393
SEQUENCE:3
DTSTAMP:20260413T233444Z
URL:https://members.walnut-creek.com/events/Details/chamber-exclusive-lunch-learn-cybersecurity-today-protecting-what-matters-risk-people-technology-1624956?sourceTypeId=Hub
END:VEVENT
END:VCALENDAR
