BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20110223T153000Z
DTEND:20110223T170000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Salem/Keizer Networking
DESCRIPTION:This meeting is designed for networking\, wherein you will be invited to introduce yourself & your business or organization during the meeting\, as well as meet with other guests & members before & after the meeting.  There will also be a short presentation regarding the Chamber\, as well as a special guest speaker or round table discussion in regards to a topic designed to help you Connect\, Learn\, Grow\, Save &/or Engage with your community.\n\n	\n\n	\n\n	 \n\n	Our special guest speaker for February is George Guntermann of Invisus/Info Safe\, presenting legal requirement to protect the personally identifiable information of your business customers\, employees and colleagues from identify theft and cyber-crime.  "If you're in business today\, you'd better make information security an important part of how you do business." \n\n	\n\n	If your business handles customer information\, even charging purchases\, you need:\n\n	 \n\n	\n		The strongest computer security systems to make sure hackers can't break in and steal company and customer data and/or money\n	\n		Encryption programs and how to properly dispose of computers and customer information\n	\n		Compliance with federal\, state and industryinformation security regulations\n	\n		Regular security checkups and assessments\n	\n		Train employees on security practices and detect potential identify theft\n	\n		Increase customer confidence with privacy policies for customers to view\n	\n		Stay current on the latest threats and industry-leading standards for protecting personal information\n	\n		A prompt and practical 'Breach Recovery' plan to help you restore customer confidence\, should a security breach take place.\n\n\n	Also on the program will be a brief presentation by Jim Moore of the Salem House of Prayer and their ministry to provide prayer and a place for prayer 24/7 in Salem.
X-ALT-DESC;FMTTYPE=text/html:<p>\n	<span style="font-size: 12px"><span style="font-family: arial"><span style="font-size: 14px">This meeting is designed for networking\, wherein you will be invited to introduce yourself &amp\; your business or organization during the meeting\, as well as meet with other guests &amp\; members before &amp\; after the meeting.&nbsp\; There will also be a short presentation regarding the Chamber\, as well as a special guest speaker or round table discussion in regards to a topic designed to help you Connect\, Learn\, Grow\, Save &amp\;/or Engage with your community.</span><br />\n	<br />\n	<img alt="" height="159" src="http://cloud.chambermaster.com/userfiles/UserFiles/chambers/811/Image/George Guntermann.jpg" style="width: 153px\; height: 186px" width="115" /></span></span><br />\n	&nbsp\;</p>\n<p>\n	<span style="font-size: 14px"><span style="font-family: arial">Our special guest speaker for February is George Guntermann of&nbsp\;<a href="http://www.invisus.com/is_consumer.php"><em>Invisus/Info Safe</em></a>\,</span>&nbsp\;presenting <span style="font-family: arial">legal requirement&nbsp\;</span>to protect&nbsp\;the personally identifiable information&nbsp\;of your business customers\, employees and colleagues from identify theft and cyber-crime.&nbsp\; &quot\;If you&#39\;re in business today\, you&#39\;d better make information security an important part of how you do business.&quot\;&nbsp\;<br />\n	<br />\n	If your business&nbsp\;handles customer information\, even charging purchases\, you need:</span><br />\n	&nbsp\;</p>\n<ul>\n	<li>\n		<span style="font-size: 14px"><span style="font-family: arial">The strongest </span>computer security systems to make sure hackers can&#39\;t break in and steal&nbsp\;company and customer data and/or money</span></li>\n	<li>\n		<span style="font-size: 14px"><span style="font-family: arial">Encryption programs and how to properly dispose of computers and customer information</span></span></li>\n	<li>\n		<span style="font-size: 14px"><span style="font-family: arial">Compliance with federal\, state and industryinformation security regulations</span></span></li>\n	<li>\n		<span style="font-size: 14px"><span style="font-family: arial">Regular security checkups and assessments</span></span></li>\n	<li>\n		<span style="font-size: 14px"><span style="font-family: arial">Train employees on security practices and detect potential identify theft</span></span></li>\n	<li>\n		<span style="font-size: 14px"><span style="font-family: arial">Increase customer confidence with privacy policies for customers to view</span></span></li>\n	<li>\n		<span style="font-size: 14px"><span style="font-family: arial">Stay current on the latest threats and industry-leading standards for protecting personal information</span></span></li>\n	<li>\n		<span style="font-size: 14px"><span style="font-family: arial">A prompt and practical &#39\;Breach Recovery&#39\; plan to help you restore customer confidence\, should a security breach take place.</span></span></li>\n</ul>\n<p>\n	<span style="font-size: 14px"><span style="font-family: arial">Also on the program will be a brief presentation by Jim Moore of the <a href="http://salemhouseofprayer.org"><em>Salem House of Prayer</em></a> and their ministry to provide prayer and a place for prayer 24/7 in Salem.</span><br />\n	&nbsp\;</span></p>\n
LOCATION:We are meeting at the Broadway Commons\, Room 205\, located at 1300 Broadway NE\, Salem\, OR 97301.
UID:e.811.3105
SEQUENCE:3
DTSTAMP:20260409T142339Z
URL:http://christiannw.chambermaster.com/events/details/salem-keizer-networking-02-23-2011-3105
END:VEVENT

END:VCALENDAR
