BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Insane Cyber - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://insanecyber.com
X-WR-CALDESC:Events for Insane Cyber
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20240310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20241103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251021T130000
DTEND;TZID=America/Chicago:20251021T140000
DTSTAMP:20260501T162805
CREATED:20250918T185512Z
LAST-MODIFIED:20250918T185512Z
UID:3783-1761051600-1761055200@insanecyber.com
SUMMARY:Webinar: The Missing Link in Threat Detection:  Connecting Host and Network Data
DESCRIPTION:The Missing Link in Threat Detection: Connecting Host and Network Data\nFeatured Speaker: John Guptill\, Director of Professional and Managed Services\, Insane Cyber\nTuesday\, October 21\, 2025 | 2:00pm ET; 11:00am PT | 60 minutes \n  \nClick here to Register \n  \nWhen it comes to securing industrial environments\, host and network data are two halves of the same story. Network data shows you what’s moving\, where it’s going\, and how it flows\, but without host data\, you can miss the “why” and “how” behind suspicious activity. \n  \nHost data gives the inside view: process activity\, system changes\, and user actions that can reveal the root cause of an incident. \n  \nWithout both puzzle pieces\, you’re left with blind spots: gaps that attackers can exploit\, incidents that can escalate unnoticed\, and risks that remain hidden until it’s too late. \n  \nIn this webinar\, we will explore how bringing host and network data together in a single platform changes the outcome. Correlating events gives security teams the full picture of an attack\, helps validate alerts quickly\, and uncovers threats that would otherwise remain hidden. You will see how this approach works in OT environments and why it is becoming essential for agencies and critical infrastructure operators. \n  \nREGISTER TODAY!
URL:https://insanecyber.com/event/webinar-connecting-host-and-network-data/
LOCATION:Online
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/jpeg:https://insanecyber.com/wp-content/uploads/2025/09/Insane-Cyber-10.21-Webinar_Social-TW-1.jpg
END:VEVENT
END:VCALENDAR