BEGIN:VCALENDAR
METHOD:PUBLISH
PRODID:-//github.com/rianjs/ical.net//NONSGML ical.net 4.0//EN
URL:https://www.staffsunion.com/ents/event/ics/28462/
VERSION:2.0
X-PUBLISHED-TTL:PT1H
X-WR-CALNAME:Hacker vs Human: GUEST SPEAKER EVENT (28462)
BEGIN:VTIMEZONE
TZID:GMT Standard Time
X-LIC-LOCATION:Europe/London
BEGIN:STANDARD
DTSTART:20241027T020000
RRULE:FREQ=YEARLY;BYDAY=4SU;BYMONTH=10
TZNAME:GMT
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20250330T010000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:BST
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
CATEGORIES:Learning and Development
CATEGORIES:Academic Interests
CATEGORIES:Featured Events
CREATED:20260108T034055
DESCRIPTION:WIN £40! This session dives into the current state of cybersec
 urity\, moving past the headlines to explore the true cost of a breach an
 d the practical risk management steps that separate resilient companies f
 rom the victims.\n\nhttps://www.staffsunion.com/events/19942/28462/\n
DTEND:20260325T150000
DTSTAMP:20260414T222144Z
DTSTART:20260325T130000
LAST-MODIFIED:20260310T143204
LOCATION:Mellor S507
SEQUENCE:0
SUMMARY:Hacker vs Human: GUEST SPEAKER EVENT
UID:6a00c90f-035d-4e37-8357-c7a9c031d472
URL:https://www.staffsunion.com/events/19942/28462/
X-ALT-DESC;FMTTYPE=text/html:<html><head><base href="https://www.staffsuni
 on.com"></head><body><p>WIN £40! This session dives into the current stat
 e of cybersecurity\, moving past the headlines to explore the true cost o
 f a breach and the practical risk management steps that separate resilien
 t companies from the victims.</p>\n<img src="https://www.staffsunion.com/
 asset/Event/19942/hacker.png?thumbnail_width=100&thumbnail_height=100&res
 ize_type=ResizeFitAllFill" alt="" style="float:left\;width:100\;height:10
 0\;" />\n<p>https://www.staffsunion.com/events/19942/28462/</p>\n<h1>Hack
 er Versus Human</h1>\n\n<p>Mellor S520\, 1-3PM.</p>\n\n<p>The modern thre
 at landscape is evolving faster than most organisations can patch. For un
 iversity students entering the tech industry\, understanding the &quot\;h
 ow&quot\; and &quot\;why&quot\; of a breach is just as critical as knowin
 g how to code. This session dives into the current state of cybersecurity
 \, moving past the headlines to explore the true cost of a breach and the
  practical risk management steps that separate resilient companies from t
 he victims. We&rsquo\;ll go beyond theory with an exclusive look at the o
 perational tooling used by real businesses and cybersecurity providers wi
 th the Huntress SOC\, demonstrating how analysts hunt for persistent foot
 holds and &quot\;living-off-the-land&quot\; attacks in real-time. To wrap
  up\, put your knowledge to the test in an interactive Q&amp\;A&mdash\; w
 here the quickest mind walks away with a &pound\;40 Amazon gift card.<img
  alt="" src="/asset/Event/19942/SCS-EVENTS-16.png" style="width: 1080px\;
  height: 1350px\;" /></p></body></html>
END:VEVENT
END:VCALENDAR
