BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.surf.nl//spc26//speaker//LGQQ93
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-spc26-PVG7ND@pretalx.surf.nl
DTSTART;TZID=CET:20260625T120500
DTEND;TZID=CET:20260625T123500
DESCRIPTION:**Shadow IT\, the use of unauthorized IT in the workplace\, is 
 widespread across organizations and takes many forms. While it offers flex
 ibility and helps people get their work done\, it also creates new attack 
 vectors and challenges for cybersecurity management. In this talk\, we com
 bine results from several research studies to better understand and addres
 s these risks.**
DTSTAMP:20260415T005638Z
LOCATION:Sessie 4
SUMMARY:Exploring Shadow IT in the Digital Ecosystem: Occurrences\, Mindset
 s\, and Measurement - Kate Labunets\, Acken\, J. van (Jan)
URL:https://pretalx.surf.nl/spc26/talk/PVG7ND/
END:VEVENT
END:VCALENDAR
