BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Devenings - ECPv5.16.0//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://devenings.com
X-WR-CALDESC:Events for Devenings
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20200101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=UTC:20200711T180000
DTEND;TZID=UTC:20200711T193000
DTSTAMP:20260502T064503
CREATED:20201218T155051Z
LAST-MODIFIED:20201218T155149Z
UID:5676235-1594490400-1594495800@devenings.com
SUMMARY:Cyber Security Evening
DESCRIPTION:[vc_row side_background_title_alignment=”right” side_background_title_color=”#f2f2f2″ css=”.vc_custom_1605176394625{background-image: url(https://devenings.com/wp-content/uploads/2020/11/CyberSecurity_Evening_Cover01.jpg?id=5674212) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;border-radius: 10px !important;}” el_id=”coverevent” el_class=”coverevent”][vc_column width=”5/12″ css=”.vc_custom_1604953118051{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}” offset=”vc_col-xs-12″ el_class=”sticky” el_id=”sticky”][vc_empty_space height=”80px” el_id=”eventtopspacer” el_class=”eventtopspacer”][vc_row_inner equal_height=”yes” content_placement=”top” gap=”5″][vc_column_inner width=”2/12″][/vc_column_inner][vc_column_inner width=”5/12″ css=”.vc_custom_1605176453890{margin-right: -10px !important;padding-left: 22% !important;background-color: #3863bb !important;border-radius: 10px !important;}”][vc_empty_space height=”8px”]\n	\n			\n					 \n	\n	\n	\n		11th July	\n\n	\n		\n[vc_empty_space height=”25px”][/vc_column_inner][vc_column_inner width=”4/12″ css=”.vc_custom_1605176458575{margin-left: -10px !important;background-color: #3863bb !important;border-radius: 10px !important;}” offset=”vc_hidden-md vc_hidden-sm vc_hidden-xs”][vc_empty_space height=”12px”]\n\n			\n						\n								\n	\n			\n						\n								\n	\n	\n	\n	\n			\n						\n								\n	\n	\n	\n	\n	\n	\n	\n	\n	\n	\n	\n	\n	\n	\n	\n	\n	\n	\n[vc_empty_space height=”25px”][/vc_column_inner][vc_column_inner width=”1/12″][/vc_column_inner][/vc_row_inner][vc_row_inner el_id=”eventtile” css=”.vc_custom_1604937502089{border-radius: 10px !important;}”][vc_column_inner width=”2/12″][/vc_column_inner][vc_column_inner el_class=”tilesmall” width=”9/12″ css=”.vc_custom_1605176987769{margin-bottom: -70px !important;padding-right: 10% !important;padding-left: 12% !important;background-color: #113b8c !important;border-radius: 10px !important;}” el_id=”tile”][vc_empty_space height=”35px”]\n	\n			\n					 \n	\n	\n	\n		Cyber Security Evening	\n\n	\n		\n[vc_empty_space height=”40px”]\n\n	\n\n					\n		\n		\n			Watch Now		\n\n		\n			\n\n[vc_empty_space height=”70px”][/vc_column_inner][vc_column_inner width=”1/12″][/vc_column_inner][/vc_row_inner][/vc_column][vc_column width=”7/12″][/vc_column][/vc_row][vc_row content_placement=”top” side_background_title_alignment=”right” side_background_title_color=”#f2f2f2″ css=”.vc_custom_1604670569242{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column width=”5/12″ css=”.vc_custom_1604571677431{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}” offset=”vc_col-xs-12″][vc_row_inner][vc_column_inner width=”2/12″][/vc_column_inner][vc_column_inner width=”8/12″ css=”.vc_custom_1604573003316{padding-right: 5% !important;padding-left: 5% !important;}”][vc_empty_space height=”90px”][vc_widget_sidebar sidebar_id=”norebro-sidebar-blog” el_id=”tags” el_class=”tags”][/vc_column_inner][vc_column_inner width=”2/12″][/vc_column_inner][/vc_row_inner][/vc_column][vc_column width=”7/12″][vc_row_inner][vc_column_inner width=”1/4″]\n\n	\n					\n			\n\n	\n\n		\n			\n				Online Event\n									\n						Event Type					 \n							\n		\n		\n			\n		\n		\n					 \n\n		\n		\n[/vc_column_inner][vc_column_inner width=”1/4″]\n\n	\n					\n			\n\n	\n\n		\n			\n				July 11\, 2020\n									\n						Date					 \n							\n		\n		\n			\n		\n		\n					 \n\n		\n		\n[/vc_column_inner][vc_column_inner width=”1/4″]\n\n	\n					\n			\n\n	\n\n		\n			\n				6PM – 7:30PM\n									\n						Time					 \n							\n		\n		\n			\n		\n		\n					 \n\n		\n		\n[/vc_column_inner][vc_column_inner width=”1/4″]\n\n	\n					\n			\n\n	\n\n		\n			\n				~1.5 Hours\n									\n						Duration					 \n							\n		\n		\n			\n		\n		\n					 \n\n		\n		\n[/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner][vc_empty_space height=”60px”]\n	\n	\n	\n	\n		About the Event	\n\n	\n			\n					 \n		\n[vc_empty_space height=”15px”][vc_separator align=”align_left”][vc_empty_space height=”10px”]\n\n	A virtual evening with developers and industry experts from the Cyber Security space in Pakistan. Join to us for an exciting keynote talk and a panel discussion around landscape of cyber security industry in Pakistan.\n	\n\n\n	The aim of this event is to give an introduction of the overall Cyber Security landscape of the country. Developers will get to know about Cyber Security\, its applications and the relevant jobs available in Pakistan. \nOur experts are from all sectors like Banking\, Government and Development as well. They will share their knowledge and experience about the how Cyber Security Developers are utilized for maintaining data\, application and information security in their projects etc. \n	\n[/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row content_placement=”middle” parallax=”content-moving” side_background_title_color=”rgba(0\,0\,0\,0.04)” side_background_title_typo=”font_size~70||letter_spacing~-1||weight~600||uppercase~1″ css=”.vc_custom_1604676958607{background-color: #ffffff !important;}”][vc_column width=”5/12″][/vc_column][vc_column width=”7/12″][vc_empty_space height=”35px”]\n	\n	\n	\n	\n		Speaker Lineup	\n\n	\n			\n					 \n		\n[vc_empty_space height=”15px”][vc_separator align=”align_left”][vc_empty_space height=”35px”][vc_row_inner][vc_column_inner width=”8/12″]\n	\n	\n	\n	\n		Shamail Khan	\n\n	\n			\n			Lead Information Security Engineer @ Tranchulas		 \n		\n[vc_empty_space height=”10px”][vc_separator align=”align_left” style=”dotted”][vc_empty_space height=”10px”]\n\n	\nAuthorization Issues in Modern Applications\n\n	\n[/vc_column_inner][vc_column_inner width=”4/12″][vc_single_image image=”5675773″ img_size=”full” style=”vc_box_rounded”][/vc_column_inner][/vc_row_inner][vc_empty_space][vc_separator align=”align_left”][vc_empty_space height=”35px”]\n	\n	\n	\n	\n		Panel Discussion	\n\n	\n			\n					 \n		\n\n	\n	\n	\n	\n		Landscape of Cyber Security Industry in Pakistan	\n\n	\n			\n					 \n		\n[vc_empty_space height=”20px”][vc_row_inner][vc_column_inner width=”8/12″]\n	\n	\n	\n	\n		Usama Maqbool	\n\n	\n			\n			Cyber Security Analyst @ VaporVM		 \n		\n[vc_empty_space height=”10px”][vc_separator align=”align_left” style=”dotted”][vc_empty_space height=”10px”]\n\n	\nModerator\n\n	\n[/vc_column_inner][vc_column_inner width=”4/12″][vc_single_image image=”5675782″ img_size=”full” style=”vc_box_rounded”][/vc_column_inner][/vc_row_inner][vc_empty_space height=”20px”][vc_separator align=”align_left”][vc_empty_space height=”20px”]\n\n	\n\n	\n		\n			Ammar Jaffri\n			Founder E-Pakistan & Ex ADG - FIA \n			 \n\n			\n					\n	\n\n\n\n\n	\n				\n			\n\n\n	\n		\n			Ibad Shah\n			Head of Cyber Security @ JS Bank \n			 \n\n			\n					\n	\n\n\n\n\n	\n				\n			\n\n\n\n	\n\n	\n		\n			Khaula Karim\n			Application Security Analyst @ Telenor Microfinance Bank \n			 \n\n			\n					\n	\n\n\n\n\n	\n				\n			\n\n\n	\n		\n			Maria Khan\n			Information Security Analyst @ The First Microfinance Bank \n			 \n\n			\n					\n	\n\n\n\n\n	\n				\n			\n\n[/vc_column][/vc_row][vc_row content_placement=”top” side_background_title_alignment=”right” side_background_title_color=”#f2f2f2″ css=”.vc_custom_1604668416336{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column css_animation=”fadeInDown” width=”5/12″ css=”.vc_custom_1604672026276{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}” offset=”vc_col-xs-12″][/vc_column][vc_column width=”7/12″][vc_row_inner][vc_column_inner][vc_empty_space height=”60px”]\n	\n	\n	\n	\n		Detailed Schedule	\n\n	\n			\n					 \n		\n[vc_empty_space height=”15px”][vc_separator align=”align_left”][vc_empty_space height=”70px”][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”3/12″]\n\n	\n	\n		\n		\n		\n		6:00 - 6:30 PM \n		 \n		\n		\n	\n\n[/vc_column_inner][vc_column_inner width=”9/12″]\n	\n	\n	\n	\n		Authorization Issues in Modern Applications	\n\n	\n			\n			Shamail Khan - Lead Information Security Engineer @ Tranchulas		 \n		\n[vc_empty_space height=”15px”]\n\n	Introducing our speaker for the event\, Shamail Ali Khan\, Lead Information Security Engineer at Tranchulas. Shamail will be talking about CyberSecurity & Authorization Issues in Modern Applications. \n	\n[/vc_column_inner][/vc_row_inner][vc_empty_space height=”40px”][vc_separator align=”align_left”][vc_empty_space height=”40px”][vc_row_inner][vc_column_inner width=”3/12″]\n\n	\n	\n		\n		\n		\n		6:30 - 7:30 PM \n		 \n		\n		\n	\n\n[/vc_column_inner][vc_column_inner width=”9/12″]\n	\n	\n	\n	\n		Landscape of Cyber Security Industry in Pakistan	\n\n	\n			\n			Usama Maqbool (Moderator)\, Ammar Jaffri\, Ibad Shah\, Khaula Karim & Maria Khan		 \n		\n[vc_empty_space height=”15px”]\n\n	Introducing our esteemed panelists for the main session of this event about “The landscape of Cyber Security Industry in Pakistan”. \nWe are super excited to host: Mr. Ammar Jaffri (Founder E-Pakistan & Ex ADG FIA) Ibad Shah (Head of Cyber Security @ JS Bank) Khaula Karim (Application Security Analyst @ Telenor Microfinance Bank) Maria Khan (Information Security Analyst @ The First Microfinance Bank) The panel will be moderated by Usama Maqbool (Cyber Security Analyst @ VaporVM) \n	\n[/vc_column_inner][/vc_row_inner][vc_empty_space height=”60px”][/vc_column][/vc_row][vc_row full_width=”stretch_row_content_no_spaces” css=”.vc_custom_1604750014831{background-color: #ffffff !important;}” el_class=”unstick” el_id=”unstick”][vc_column][vc_empty_space height=”40px”][vc_separator][/vc_column][/vc_row][vc_row full_width=”stretch_row” gap=”20″ css=”.vc_custom_1607717602200{padding-top: 30px !important;padding-bottom: 30px !important;background-color: #113b8c !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column width=”1/6″][/vc_column][vc_column width=”2/3″][vc_empty_space height=”80px”]\n	\n	\n	\n	\n		Developers supporting developers	\n\n			\n	\n			\n					 \n		\n[vc_empty_space height=”15px”]\n\n	Have questions\, a big problem\, or advice. Our speakers and event hosts are always\nready to assist and help the community thrive. \n	\n[vc_separator color=”custom” align=”align_left” accent_color=”#cccccc”][vc_empty_space][vc_row_inner content_placement=”middle”][vc_column_inner width=”1/3″][vc_empty_space height=”60px”]\n\n	\n					\n			\n\n	\n\n		\n			\n				Fully Interactive\n							\n		\n		\n			\n		\n		\n			Our online events give you the opportunity to engage directly with the speakers\, just like with face-to-face sessions.		 \n\n		\n		\n[vc_empty_space][/vc_column_inner][vc_column_inner width=”1/3″][vc_empty_space height=”60px”]\n\n	\n					\n			\n\n	\n\n		\n			\n				Live Q&A Session\n							\n		\n		\n			\n		\n		\n			Got a question or didn't get that last bit. Our speakers and panelists engage in a live question and answer session and are more than happy to assist and guide wherever possible.		 \n\n		\n		\n[vc_empty_space][/vc_column_inner][vc_column_inner width=”1/3″][vc_empty_space height=”60px”]\n\n	\n					\n			\n\n	\n\n		\n			\n				Live Coding\n							\n		\n		\n			\n		\n		\n			Real world use cases to demonstrate actual problems faced when working on projects. You get to experience a live coding session with each part thoroughly explained by our experienced speakers.		 \n\n		\n		\n[vc_empty_space][/vc_column_inner][/vc_row_inner][/vc_column][vc_column width=”1/6″][/vc_column][/vc_row][vc_row full_width=”stretch_row_content_no_spaces” css=”.vc_custom_1607717607849{background-color: #113b8c !important;}” el_class=”subscriberow”][vc_column][vc_empty_space height=”35px” el_class=”norebro-phone-space”][vc_separator][/vc_column][/vc_row][vc_row full_width=”stretch_row” content_placement=”top”][vc_column width=”2/12″][/vc_column][vc_column width=”3/12″][vc_empty_space height=”100px” el_class=”norebro-phone-space”]\n	\n	\n	\n	\n		Event Description	\n\n	\n			\n					 \n		\n[vc_empty_space height=”15px” el_class=”norebro-phone-space”]\n\n	As our reliance on IT systems increases\, the number of cases where these systems are compromised increases too. With stakeholders expecting unparalleled level of quality of services/products from businesses\, the need for better information security has never been higher. \nCyber security refers to the body of technologies\, processes\, and practices designed to protect networks\, devices\, programs\, and data from attack\, damage\, or unauthorized access. \n	\n[vc_empty_space height=”25px” el_class=”norebro-phone-space”][/vc_column][vc_column width=”1/12″][/vc_column][vc_column width=”4/12″][vc_empty_space height=”100px” el_class=”norebro-phone-space”]\n	\n	\n	\n	\n		Hosted by	\n\n	\n			\n					 \n		\n[vc_row_inner][vc_column_inner width=”1/3″]\n\n	\n		\n					\n			\n				\n				\n				 \n			\n		\n	\n\n[vc_empty_space height=”30px”]\n\n	\n		\n					\n			\n				\n				\n				 \n			\n		\n	\n\n[/vc_column_inner][vc_column_inner width=”1/3″]\n\n	\n		\n					\n			\n				\n				\n				 \n			\n		\n	\n\n[vc_empty_space height=”30px”]\n\n	\n		\n					\n			\n				\n				\n				 \n			\n		\n	\n\n[/vc_column_inner][vc_column_inner width=”1/3″]\n\n	\n		\n					\n			\n				\n				\n				 \n			\n		\n	\n\n[vc_empty_space height=”30px”][/vc_column_inner][/vc_row_inner][/vc_column][vc_column width=”2/12″][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1603459707738{background-color: #ffffff !important;}”][vc_column][vc_empty_space height=”120px” el_class=”norebro-phone-space”][/vc_column][/vc_row][vc_row full_width=”stretch_row_content_no_spaces” css=”.vc_custom_1604391620506{background-color: #ffffff !important;}” el_class=”subscriberow”][vc_column][vc_separator][vc_empty_space height=”35px” el_class=”norebro-phone-space”][vc_row_inner][vc_column_inner width=”2/12″][/vc_column_inner][vc_column_inner width=”5/12″]\n	\n	\n	\n	\n		Be the first to know	\n\n	\n			\n			Never miss an update; or an event!		 \n		\n[/vc_column_inner][vc_column_inner width=”3/12″][vc_empty_space height=”12px” el_class=”norebro-phone-space”]\n\n	\n		\n			\n				\n					\n					\n					\n				\n				\n					\n				\n			\n		\n	\n\n[/vc_column_inner][vc_column_inner width=”2/12″][/vc_column_inner][/vc_row_inner][vc_empty_space height=”35px” el_class=”norebro-phone-space”][vc_separator][vc_empty_space height=”1px” el_class=”norebro-phone-space”][/vc_column][/vc_row]
URL:https://devenings.com/devenings-event/cyber-security-evening/
LOCATION:Online Event\, Pakistan
ATTACH;FMTTYPE=image/jpeg:https://devenings.com/wp-content/uploads/2020/11/CyberSecurity_Evening_Featured01.jpg
ORGANIZER;CN="Devenings":MAILTO:info@devenings.com
END:VEVENT
END:VCALENDAR