BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20250429T233000Z
DTEND:20250430T010000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Smart Cybersecurity for Small Business: Simple Strategies to Reduce Risk
DESCRIPTION:Cybersecurity can feel overwhelming\, especially for small business owners with limited resources and time. Protecting your business from cyber threats does not have to be complicated or expensive.\n						\n					\n				\n			\n			\n		\n	\n\n\n\n	\n		\n			\n			\n				\n					\n						\n						At this workshop:\n\n						\n							Learn how to approach cybersecurity with confidence\n							Build your understanding of cyber risks and how to manage them\n							Hear what security strategies used by large businesses and how you can apply them affordably\n							Learn the practical steps to protect against phishing\, ransomware and data breaches\n							Get information about free and low-cost resources to help you strengthen cybersecurity\n							 \n						\n\n						We'll breakdown cybersecurity into simple terms so you can take action with confidence. Join us to learn how to better protect your business!\n\n						\n\n						Meet Your Speaker ~ John Germain\n\n						John is the founder of Security Moments\, a cybersecurity services provider dedicated to helping small businesses navigate the seemingly complex world of cybersecurity. He has over 20 years of experience\, and a proven track record of developing and implementing effective security strategies that enable business's to manage cyber risk.\n\n						John previously served as the VP & Chief Operating Officer for a startup software company that went public\, and was a VP of infrastructure and security services at a Fortune 500 multinational company.
X-ALT-DESC;FMTTYPE=text/html:<table border="0" cellpadding="0" cellspacing="0" class="x_layout x_layout--1-column" style="font-variant-numeric: inherit\; font-variant-east-asian: inherit\; font-variant-alternates: inherit\; font-variant-position: inherit\; font-variant-emoji: inherit\; font-stretch: inherit\; font-size: 15px\; line-height: inherit\; font-family: &quot\;Segoe UI&quot\;\, &quot\;Segoe UI Web (West European)&quot\;\, -apple-system\, BlinkMacSystemFont\, Roboto\, &quot\;Helvetica Neue&quot\;\, sans-serif\; font-optical-sizing: inherit\; font-size-adjust: inherit\; font-kerning: inherit\; font-feature-settings: inherit\; font-variation-settings: inherit\; table-layout: fixed\; min-width: 100%\; color: rgb(36\, 36\, 36)\;" width="100%">\n	<tbody>\n		<tr>\n			<td align="center" class="x_column x_column--1 x_scale x_stack" style="width: 600.014px\;" valign="top">\n			<table border="0" cellpadding="0" cellspacing="0" class="x_text x_text--padding-vertical" style="font: inherit\; table-layout: fixed\;" width="100%">\n				<tbody>\n					<tr>\n						<td align="left" class="x_text_content-cell x_content-padding-horizontal" style="font-family: Lato\, sans-serif\; font-size: 16px\; line-height: 1.2\; display: block\; overflow-wrap: break-word\; padding: 10px 20px\; color: rgb(40\, 40\, 41) !important\;" valign="top">\n						<p data-olk-copy-source="MessageBody" style="margin: 0px\; padding: 0px\;">Cybersecurity can feel overwhelming\, especially for small business owners with limited resources and time. Protecting your business from cyber threats does not have to be complicated or expensive.</p>\n						</td>\n					</tr>\n				</tbody>\n			</table>\n			</td>\n		</tr>\n	</tbody>\n</table>\n\n<table border="0" cellpadding="0" cellspacing="0" class="x_layout x_layout--1-column" style="font-variant-numeric: inherit\; font-variant-east-asian: inherit\; font-variant-alternates: inherit\; font-variant-position: inherit\; font-variant-emoji: inherit\; font-stretch: inherit\; font-size: 15px\; line-height: inherit\; font-family: &quot\;Segoe UI&quot\;\, &quot\;Segoe UI Web (West European)&quot\;\, -apple-system\, BlinkMacSystemFont\, Roboto\, &quot\;Helvetica Neue&quot\;\, sans-serif\; font-optical-sizing: inherit\; font-size-adjust: inherit\; font-kerning: inherit\; font-feature-settings: inherit\; font-variation-settings: inherit\; table-layout: fixed\; min-width: 100%\; color: rgb(36\, 36\, 36)\;" width="100%">\n	<tbody>\n		<tr>\n			<td align="center" class="x_column x_column--1 x_scale x_stack" style="width: 600.014px\;" valign="top">\n			<table border="0" cellpadding="0" cellspacing="0" class="x_text x_text--padding-vertical" style="font: inherit\; table-layout: fixed\;" width="100%">\n				<tbody>\n					<tr>\n						<td align="left" class="x_text_content-cell x_content-padding-horizontal" style="line-height: 1.2\; font-family: Lato\, sans-serif\; font-size: 16px\; display: block\; overflow-wrap: break-word\; padding: 10px 20px\; color: rgb(40\, 40\, 41) !important\;" valign="top">\n						<p style="margin: 0px\; padding: 0px\;"><span style="border: 0px\; font-style: inherit\; font-variant: inherit\; font-weight: bold\; font-stretch: inherit\; font-size: inherit\; line-height: inherit\; font-family: inherit\; font-optical-sizing: inherit\; font-size-adjust: inherit\; font-kerning: inherit\; font-feature-settings: inherit\; font-variation-settings: inherit\; margin: 0px\; padding: 0px\; vertical-align: baseline\; color: inherit\;">At this workshop:</span></p>\n\n						<ul style="padding-right: 0px\; padding-left: 0px\; margin: 0px 0px 0px 40px\;">\n							<li style="padding: 0px\; margin: 0px\;">Learn how to approach cybersecurity with confidence</li>\n							<li style="padding: 0px\; margin: 0px\;">Build your understanding of cyber risks and how to manage them</li>\n							<li style="padding: 0px\; margin: 0px\;">Hear what security strategies used by large businesses and how you can apply them affordably</li>\n							<li style="padding: 0px\; margin: 0px\;">Learn the practical steps to protect against phishing\, ransomware and data breaches</li>\n							<li style="padding: 0px\; margin: 0px\;">Get information about free and low-cost resources to help you strengthen cybersecurity</li>\n							<li style="padding: 0px\; margin: 0px\;">&nbsp\;</li>\n						</ul>\n\n						<p style="margin: 0px\; padding: 0px\;">We&#39\;ll breakdown cybersecurity into simple terms so you can take action with confidence.&nbsp\;<a data-auth="NotApplicable" data-linkindex="6" href="https://f7btjwgbb.cc.rs6.net/tn.jsp?f=001OsFfY_9kgNgYgwREeFEoQ3bo3WLUVAXwswVO7z3KqOUlt6tqTZoccvJC_5zPjEfxPzMEJrXr8DIoohiCW1mTdyHOG-ZlEqHz2gOA40ZpKiGfu0k4CrmCZaU-jmOgDD56rUaV2gbECGn674BwckzLyiMMOTz0PnisWc4DoyLnsIg_OfeYSDOLICUBh70mS7qrb1FGHEBb4rPmtA4nUHw3zXsWOz4QiintnWzOAo2tFA4hsyz7bIOjXvry-cGoQDIvYPZn4sRhWq6BQEo7F_DVYWX4y6OssD6KVuFNVY_QAlFgdXaJFvwzsAwKaHhCo7PVTSyAAp6Lz0hGvXXM6BfCqUu2o1OAib1_lJM7FJKygiGySQGbQ_k7e9OK4vVSfma7tXLtlGzCddhNSf6yXbdKHGaFBRABomaODWt32W3Eu4NNhMwA1jDIF-V-bEGb95AJw9gIV0psyTfV0PYpyKxZI2eRBsU8HoGH5BCRVhVMQ1XD9DDPKLDZfPXHRwKNwLUIzp4VAoFOeKRPZ4ma_v_24EkagIfLNB49t8FMxTYcXeqePnXmtyrDtkUilkVMcWdzDXcSZZMIOqsEDKEpEYunQTDOxK_MtB7vRb8J8hOaFYpAz-6H2Z-E6ihygKiu7GS2hy4dIr3BZCPh9HQ-mN9_juM4FiokPrLEjQL-LZKqemkWGGI9zQMQkvapPjCkCCShscOCobaq817MpVk64PnfwUj4jCxCgtE4yNRE7cvQV8-uXLj4mdJpMCk8REjkqagB86HlmOKgGJV8f-rGkcYRSPJskTBrdZEd4X7o8PuTwdXGelhW4rsQXeZcp9rgdSOm&amp\;c=hMjltj_eq_HHE4XwPb82pyScB7wbO4t0XGWKjb3B1Cp_OrQf_H8LAA==&amp\;ch=-EZb-p6RXtERlrwaFwMUV9HcftQN_y8YHAXTLFB4mUvxpUtwF4Kf2g==" style="border: 0px\; font-style: inherit\; font-variant: inherit\; font-weight: bold\; font-stretch: inherit\; font-size: inherit\; line-height: inherit\; font-family: inherit\; font-optical-sizing: inherit\; font-size-adjust: inherit\; font-kerning: inherit\; font-feature-settings: inherit\; font-variation-settings: inherit\; margin: 0px\; padding: 0px\; vertical-align: baseline\; text-decoration-line: none\; color: rgb(0\, 110\, 183) !important\;" title="https://f7btjwgbb.cc.rs6.net/tn.jsp?f=001OsFfY_9kgNgYgwREeFEoQ3bo3WLUVAXwswVO7z3KqOUlt6tqTZoccvJC_5zPjEfxPzMEJrXr8DIoohiCW1mTdyHOG-ZlEqHz2gOA40ZpKiGfu0k4CrmCZaU-jmOgDD56rUaV2gbECGn674BwckzLyiMMOTz0PnisWc4DoyLnsIg_OfeYSDOLICUBh70mS7qrb1FGHEBb4rPmtA4nUHw3zXsWOz4QiintnWzOAo2tFA4hsyz7bIOjXvry-cGoQDIvYPZn4sRhWq6BQEo7F_DVYWX4y6OssD6KVuFNVY_QAlFgdXaJFvwzsAwKaHhCo7PVTSyAAp6Lz0hGvXXM6BfCqUu2o1OAib1_lJM7FJKygiGySQGbQ_k7e9OK4vVSfma7tXLtlGzCddhNSf6yXbdKHGaFBRABomaODWt32W3Eu4NNhMwA1jDIF-V-bEGb95AJw9gIV0psyTfV0PYpyKxZI2eRBsU8HoGH5BCRVhVMQ1XD9DDPKLDZfPXHRwKNwLUIzp4VAoFOeKRPZ4ma_v_24EkagIfLNB49t8FMxTYcXeqePnXmtyrDtkUilkVMcWdzDXcSZZMIOqsEDKEpEYunQTDOxK_MtB7vRb8J8hOaFYpAz-6H2Z-E6ihygKiu7GS2hy4dIr3BZCPh9HQ-mN9_juM4FiokPrLEjQL-LZKqemkWGGI9zQMQkvapPjCkCCShscOCobaq817MpVk64PnfwUj4jCxCgtE4yNRE7cvQV8-uXLj4mdJpMCk8REjkqagB86HlmOKgGJV8f-rGkcYRSPJskTBrdZEd4X7o8PuTwdXGelhW4rsQXeZcp9rgdSOm&amp\;c=hMjltj_eq_HHE4XwPb82pyScB7wbO4t0XGWKjb3B1Cp_OrQf_H8LAA==&amp\;ch=-EZb-p6RXtERlrwaFwMUV9HcftQN_y8YHAXTLFB4mUvxpUtwF4Kf2g==">Join us to learn how to better protect your business!</a><br />\n						<br />\n						<span style="color:#000000\;"><!--StartFragment--><span data-olk-copy-source="MessageBody" style="font-size: 23px\; font-family: Arial\, Verdana\, Helvetica\, sans-serif\;">Meet Your Speaker ~ John Germain</span></span><br />\n						<span data-olk-copy-source="MessageBody" style="border: 0px\; font-style: inherit\; font-variant: inherit\; font-weight: inherit\; font-stretch: inherit\; font-size: 13px\; line-height: inherit\; font-family: inherit\; font-optical-sizing: inherit\; font-size-adjust: inherit\; font-kerning: inherit\; font-feature-settings: inherit\; font-variation-settings: inherit\; margin: 0px\; padding: 0px\; vertical-align: baseline\; color: inherit\;">John is the founder of Security Moments\, a cybersecurity services provider dedicated to helping small businesses navigate the seemingly complex world of cybersecurity. He has over 20 years of experience\, and a proven track record of developing and implementing effective security strategies that enable business&#39\;s to manage cyber risk.</span></p>\n\n						<p style="margin: 0px\; padding: 0px\; color: rgb(40\, 40\, 41)\; font-family: Lato\, sans-serif\; font-size: 16px\;"><span style="border: 0px\; font-style: inherit\; font-variant: inherit\; font-weight: inherit\; font-stretch: inherit\; font-size: 13px\; line-height: inherit\; font-family: inherit\; font-optical-sizing: inherit\; font-size-adjust: inherit\; font-kerning: inherit\; font-feature-settings: inherit\; font-variation-settings: inherit\; margin: 0px\; padding: 0px\; vertical-align: baseline\; color: inherit\;">John previously served as the VP &amp\; Chief Operating Officer for a startup software company that went public\, and was a VP of infrastructure and security services at a Fortune 500 multinational company.</span></p>\n\n						<p style="margin: 0px\; padding: 0px\;"><!--EndFragment--></p>\n						</td>\n					</tr>\n				</tbody>\n			</table>\n			</td>\n		</tr>\n	</tbody>\n</table>\n
LOCATION:Zoom
UID:e.1126.30714
SEQUENCE:3
DTSTAMP:20260430T184352Z
URL:https://business.lflbchamber.com/events/details/smart-cybersecurity-for-small-business-simple-strategies-to-reduce-risk-30714
END:VEVENT

END:VCALENDAR
