BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Women Cyber Force - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.womencyberforce.lu
X-WR-CALDESC:Events for Women Cyber Force
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Europe/Luxembourg
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20240331T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20241027T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20250330T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20251026T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20260329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20261025T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250515
DTEND;VALUE=DATE:20250516
DTSTAMP:20260404T172759
CREATED:20250122T135053Z
LAST-MODIFIED:20250122T135125Z
UID:4595-1747267200-1747353599@www.womencyberforce.lu
SUMMARY:Next IT Security:Our C-Suites are our strength
DESCRIPTION:WHY YOU SHOULD JOIN OUR CONFERENCE \n\n\n\nFocus:\n\n\n\n\nAre you affected by NIS2 & DORA?\nCybersecurity for Essential Sectors\n2025 – The year of Quantum computing\nWho Bears the Responsibility When Cloud Services Fail?\nThe Future of Cyber Supply Chains\n\n\nhttps://nextitsecurity.com/benelux-2025-may/#register
URL:https://www.womencyberforce.lu/event/next-it-securityour-c-suites-are-our-strength/
END:VEVENT
END:VCALENDAR