BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P1H
REFRESH-INTERVAL:P1H
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=2SU
DTSTART:20070101T000000
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:Central Daylight Time
END:DAYLIGHT
BEGIN:STANDARD
RRULE:FREQ=YEARLY;BYMONTH=11;BYDAY=1SU
DTSTART:20070101T000000
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:Central Standard Time
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260416T130000
DTEND;TZID=America/Chicago:20260416T140000
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:The Biggest Risk in Your Business Isn’t Cyber Threats or Compliance—It’s What You Don’t Know
DESCRIPTION:Most insurance agencies believe their biggest risks come from cyber threats or compliance requirements. In reality\, the greater risk is what hasn't been identified.\n\nIn this Catalyit Live Hot Topic\, Walter Contreras of Motiva Networks will explore the hidden gaps that exist in many IT environments   not because businesses are negligent\, but because those gaps are rarely uncovered or validated. Drawing from real-world experience examining how IT operations actually function\, this session will break down where risk truly lives and why it often goes unnoticed until it's too late.What You'll Learn:Why many businesses focus on the wrong areas when it comes to cybersecurity and complianceWhere hidden risks typically exist within IT environmentsThe difference between assumed protection and validated protectionHow gaps form between tools\, processes\, and responsibilityWhat to look for to better understand your current level of exposureWhy It Matters:Insurance agencies handle highly sensitive client and financial dataRegulatory expectations continue to increaseBusiness owners remain accountable for security and compliance\, regardless of who manages ITMany of the biggest risks live in assumptions\, gaps\, and areas that were never fully evaluatedVisibility is the first step to reducing real risk and improving confidence in your environmentThings to Think About:How confident are you in your agency's current security and compliance posture?Do you have full visibility into how your IT environment is managed today?Are your protections actually validated   or simply assumed?Who is accountable if something goes wrong?What risks might exist in the gaps between your tools\, vendors\, and internal processes?
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE html><html><head><title></title></head><body aria-disabled="false"><p><img src="https://res.cloudinary.com/micronetonline/image/upload/v1774966112/tenants/32026d86-e9f1-4028-adde-482ec53e28bd/3476514294444b919cb5780f942adfcf/1774966112551.png" style="width: 691px\; display: block\; vertical-align: top\; margin: 5px auto 5px 0px\; text-align: left\; height: 260.277px\; position: relative\; max-width: 100%\; cursor: pointer\; padding: 0px 1px\;" width="691" height="260.277" fr-original-style="width: 691px\; display: block\; vertical-align: top\; margin: 5px auto 5px 0px\; text-align: left\; height: 260.277px\;" fr-original-class="fr-draggable"></p><p data-end="234" data-start="0" style="box-sizing: border-box\; margin: 0px 0px 24px\; color: rgb(75\, 79\, 88)\; font-family: Montserrat\, sans-serif\; font-size: 20px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-weight: 400\; letter-spacing: normal\; orphans: 2\; text-align: start\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\;">Most insurance agencies believe their biggest risks come from cyber threats or compliance requirements. In reality\, the greater risk is what hasn&rsquo\;t been identified.<br style="box-sizing: border-box\;"><br style="box-sizing: border-box\;">In this Catalyit Live Hot Topic\, Walter Contreras of&nbsp\;<strong fr-original-style="box-sizing: border-box\; font-family: Montserrat\, sans-serif\; font-style: normal\; font-weight: 700\;" style="box-sizing: border-box\; font-family: Montserrat\, sans-serif\; font-style: normal\; font-weight: 700\;"><a fr-original-style="box-sizing: border-box\; color: rgb(51\, 164\, 222)\; cursor: pointer\; text-decoration: none\;" href="https://catalyit.com/solution-provider-directory/motiva?hsLang=en" rel="noopener" style="box-sizing: border-box\; color: rgb(51\, 164\, 222)\; cursor: pointer\; text-decoration: none\; user-select: auto\;">Motiva Networks</a></strong> will explore the hidden gaps that exist in many IT environments &mdash\; not because businesses are negligent\, but because those gaps are rarely uncovered or validated. Drawing from real-world experience examining how IT operations actually function\, this session will break down where risk truly lives and why it often goes unnoticed until it&rsquo\;s too late.</p><p style="box-sizing: border-box\; margin: 0px 0px 24px\; color: rgb(75\, 79\, 88)\; font-family: Montserrat\, sans-serif\; font-size: 20px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-weight: 400\; letter-spacing: normal\; orphans: 2\; text-align: start\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\;"><strong fr-original-style="box-sizing: border-box\; font-family: Montserrat\, sans-serif\; font-style: normal\; font-weight: 700\;" style="box-sizing: border-box\; font-family: Montserrat\, sans-serif\; font-style: normal\; font-weight: 700\;">What You&rsquo\;ll Learn:</strong></p><ul fr-original-style="box-sizing: border-box\; margin-bottom: 24px\; margin-top: 0px\; color: rgb(75\, 79\, 88)\; font-family: Montserrat\, sans-serif\; font-size: 20px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-weight: 400\; letter-spacing: normal\; orphans: 2\; text-align: start\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\;" style="box-sizing: border-box\; margin-bottom: 24px\; margin-top: 0px\; color: rgb(75\, 79\, 88)\; font-family: Montserrat\, sans-serif\; font-size: 20px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-weight: 400\; letter-spacing: normal\; orphans: 2\; text-align: start\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\; list-style-position: inside\;"><li style="box-sizing: border-box\;">Why many businesses focus on the wrong areas when it comes to cybersecurity and compliance</li><li style="box-sizing: border-box\;">Where hidden risks typically exist within IT environments</li><li style="box-sizing: border-box\;">The difference between assumed protection and validated protection</li><li style="box-sizing: border-box\;">How gaps form between tools\, processes\, and responsibility</li><li style="box-sizing: border-box\;">What to look for to better understand your current level of exposure</li></ul><p style="box-sizing: border-box\; margin: 0px 0px 24px\; color: rgb(75\, 79\, 88)\; font-family: Montserrat\, sans-serif\; font-size: 20px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-weight: 400\; letter-spacing: normal\; orphans: 2\; text-align: start\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\;"><strong fr-original-style="box-sizing: border-box\; font-family: Montserrat\, sans-serif\; font-style: normal\; font-weight: 700\;" style="box-sizing: border-box\; font-family: Montserrat\, sans-serif\; font-style: normal\; font-weight: 700\;">Why It Matters:</strong></p><ul fr-original-style="box-sizing: border-box\; margin-bottom: 24px\; margin-top: 0px\; color: rgb(75\, 79\, 88)\; font-family: Montserrat\, sans-serif\; font-size: 20px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-weight: 400\; letter-spacing: normal\; orphans: 2\; text-align: start\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\;" style="box-sizing: border-box\; margin-bottom: 24px\; margin-top: 0px\; color: rgb(75\, 79\, 88)\; font-family: Montserrat\, sans-serif\; font-size: 20px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-weight: 400\; letter-spacing: normal\; orphans: 2\; text-align: start\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\; list-style-position: inside\;"><li style="box-sizing: border-box\;">Insurance agencies handle highly sensitive client and financial data</li><li style="box-sizing: border-box\;">Regulatory expectations continue to increase</li><li style="box-sizing: border-box\;">Business owners remain accountable for security and compliance\, regardless of who manages IT</li><li style="box-sizing: border-box\;">Many of the biggest risks live in assumptions\, gaps\, and areas that were never fully evaluated</li><li style="box-sizing: border-box\;">Visibility is the first step to reducing real risk and improving confidence in your environment</li></ul><p style="box-sizing: border-box\; margin: 0px 0px 24px\; color: rgb(75\, 79\, 88)\; font-family: Montserrat\, sans-serif\; font-size: 20px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-weight: 400\; letter-spacing: normal\; orphans: 2\; text-align: start\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\;"><strong fr-original-style="box-sizing: border-box\; font-family: Montserrat\, sans-serif\; font-style: normal\; font-weight: 700\;" style="box-sizing: border-box\; font-family: Montserrat\, sans-serif\; font-style: normal\; font-weight: 700\;">Things to Think About:</strong></p><ul fr-original-style="box-sizing: border-box\; margin-bottom: 24px\; margin-top: 0px\; color: rgb(75\, 79\, 88)\; font-family: Montserrat\, sans-serif\; font-size: 20px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-weight: 400\; letter-spacing: normal\; orphans: 2\; text-align: start\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\;" style="box-sizing: border-box\; margin-bottom: 24px\; margin-top: 0px\; color: rgb(75\, 79\, 88)\; font-family: Montserrat\, sans-serif\; font-size: 20px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-weight: 400\; letter-spacing: normal\; orphans: 2\; text-align: start\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\; list-style-position: inside\;"><li style="box-sizing: border-box\;">How confident are you in your agency&rsquo\;s current security and compliance posture?</li><li style="box-sizing: border-box\;">Do you have full visibility into how your IT environment is managed today?</li><li style="box-sizing: border-box\;">Are your protections actually validated &mdash\; or simply assumed?</li><li style="box-sizing: border-box\;">Who is accountable if something goes wrong?</li><li style="box-sizing: border-box\;">What risks might exist in the gaps between your tools\, vendors\, and internal processes?</li></ul></body></html>
LOCATION:
UID:e.1273.1432678
SEQUENCE:3
DTSTAMP:20260407T143627Z
URL:https://members.kaia.com/education-calendar/Details/the-biggest-risk-in-your-business-isn-t-cyber-threats-or-compliance-it-s-what-you-don-t-know-1695644?sourceTypeId=Hub
END:VEVENT
END:VCALENDAR
