BEGIN:VCALENDAR
VERSION:2.0
CALSCALE:GREGORIAN
METHOD:PUBLISH
PRODID://DRTO//518908
BEGIN:VEVENT
DTSTAMP:20260511T034318
VTIMEZONE:America/New_York
DTSTART:20260608T153000Z
DTEND:20260608T203000Z
UID:518908
SUMMARY:Cyber Resilience: Threats, Response & Recovery
LOCATION:
DESCRIPTION:Cyber Resilience: Threats, Response & Recovery\n\n06/08/26 11:30 AM EST\n - 06/08/26 04:30 PM EST\Description:\nRIE Toronto is pleased to announce Cyber Resilience: Threats, Response &Recovery,\na half day symposium / working session that examines how organizations\nassess, decide, and respond when a cyber incident is already underway.\n\nThe day is guided by two well respected cybersecurity practitioners. Terry Cutler opens\nthe symposium by pulling back the curtain on how modern cyber attacks actually\nhappen. This is followed by From Hack to Response, a cyber incident tabletop\nexercise facilitated by keynote speaker Robert Beggs, CISSP, MBA.\n\nTerry’s opening session explores the attacker’s mindset — how threat actors gather\ninformation, exploit human behavior, and take advantage of everyday gaps that often\ngo unnoticed. His session looks at how attacks begin, setting the context for the\nresponse challenges that follow.\n\nFollowing this opening perspective, Robert Beggs introduces the incident scenario and\noutlines how participants will work through the tabletop exercise. Teams are then guided\nthrough a realistic breach scenario, with live threat injections introduced as conditions\nevolve.\n\nParticipants will assess emerging risks, make decisions with incomplete information,\ncoordinate technical and executive communications, and work through response and\nrecovery actions under pressure. The session concludes with a facilitated debrief,\nincluding insights from the attacker’s perspective to surface gaps, assumptions, and\nblind spots.\n\nTogether, these sessions draw a clear line between how attacks start and how\norganizations respond — highlighting the judgment, coordination, and communication\nthat define real cyber resilience.
X-ALT-DESC;FMTTYPE=text/html:Cyber Resilience: Threats, Response & Recovery<br /><br />06/08/26 11:30 AM EST - 06/08/26 04:30 PM EST<br />Description:<br />RIE Toronto is pleased to announce <strong>Cyber Resilience: Threats, Response &amp;Recovery</strong>,<br />
a half day symposium / working session that examines how organizations<br />
assess, decide, and respond when a cyber incident is already underway.<br />
<br />
The day is guided by two well respected cybersecurity practitioners. Terry Cutler opens<br />
the symposium by pulling back the curtain on how modern cyber attacks actually<br />
happen. This is followed by From Hack to Response, a cyber incident tabletop<br />
exercise facilitated by keynote speaker Robert Beggs, CISSP, MBA.<br />
<br />
Terry&rsquo;s opening session explores the attacker&rsquo;s mindset &mdash; how threat actors gather<br />
information, exploit human behavior, and take advantage of everyday gaps that often<br />
go unnoticed. His session looks at how attacks begin, setting the context for the<br />
response challenges that follow.<br />
<br />
Following this opening perspective, Robert Beggs introduces the incident scenario and<br />
outlines how participants will work through the tabletop exercise. Teams are then guided<br />
through a realistic breach scenario, with live threat injections introduced as conditions<br />
evolve.<br />
<br />
Participants will assess emerging risks, make decisions with incomplete information,<br />
coordinate technical and executive communications, and work through response and<br />
recovery actions under pressure. The session concludes with a facilitated debrief,<br />
including insights from the attacker&rsquo;s perspective to surface gaps, assumptions, and<br />
blind spots.<br />
<br />
Together, these sessions draw a clear line between how attacks start and how<br />
organizations respond &mdash; highlighting the judgment, coordination, and communication<br />
that define real cyber resilience.
PRIORITY:3
TRANSP:TRANSPARENT
BEGIN:VALARM
TRIGGER:-PT5M
ACTION:DISPLAY
DESCRIPTION:Reminder
END:VALARM
END:VEVENT
END:VCALENDAR
