BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ical.marudot.com//iCal Event Maker
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:Asia/Riyadh
LAST-MODIFIED:20240422T053450Z
TZURL:https://www.tzurl.org/zoneinfo-outlook/Asia/Riyadh
X-LIC-LOCATION:Asia/Riyadh
BEGIN:STANDARD
TZNAME:+03
TZOFFSETFROM:+0300
TZOFFSETTO:+0300
DTSTART:19700101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20250121T164638Z
UID:1714303616324-30895@ical.marudot.com
DTSTART;TZID=Asia/Riyadh:20250127T110000
DTEND;TZID=Asia/Riyadh:20250127T120000
SUMMARY:Deception approach for effective network monitoring
DESCRIPTION:Deception approach for effective network monitoring\n\nOverview and Agenda:\n\n- Introduction\n- Case 1: Web based trap with TOP 10 OWASP\n- Case 2: Active network monitoring with SEEKER\n- Case 3: Guiding the adversary using Breadcrumbs\n- Case 4: Two-way integration with SIEM tools\n\nSpeakers:\nAnastasiia Dorosh: Cybersecurity implementation team lead\n\nDate & Time:\nJanuary 27\, 2025\, from 11:00 AM to 12:00 PM KSA time.
BEGIN:VALARM
ACTION:DISPLAY
DESCRIPTION:Deception approach for effective network monitoring
TRIGGER:-PT15M
END:VALARM
END:VEVENT
END:VCALENDAR