Blog iconCalendar

Carolina Advanced Digital, Inc. > Calendar
Mar
29
Tue
Executive Briefing: The Savvy CIO’s Guide to Planning a Mobile-first Enterprise @ Olde Mecklenburg Brewery
Mar 29 @ 4:00 pm – 6:00 pm

The Savvy CIO’s Guide to Planning a Mobile-first Enterprise
Lead your team through successful implementations of resilient and secure networks.

Carolina Advanced Digital Vice President of Engineering Jennifer Minella is headlining an upcoming event titled ‘The Savvy CIO’s Guide to Planning a Mobile-First Enterprise.’ The event is being held on two dates in March and is open to corporate CIOs, CISOs, Vice Presidents and Directors responsible for technology, mobile integration and network security topics.

Read more.

Mar
31
Thu
Executive Briefing: The Savvy CIO’s Guide to Planning a Mobile-first Enterprise @ 18 Seaboard Restaurant
Mar 31 @ 11:30 am – 1:30 pm

The Savvy CIO’s Guide to Planning a Mobile-first Enterprise
Lead your team through successful implementations of resilient and secure networks.

Carolina Advanced Digital Vice President of Engineering Jennifer Minella is headlining an upcoming event titled ‘The Savvy CIO’s Guide to Planning a Mobile-First Enterprise.’ The event is being held on two dates in March and is open to corporate CIOs, CISOs, Vice Presidents and Directors responsible for technology, mobile integration and network security topics.

Read more.

Jan
23
Thu
Cybersecurity Dinner – Zero Trust Networking @ The Capital City Chop House
Jan 23 @ 4:30 pm – 8:30 pm
Cybersecurity Dinner - Zero Trust Networking @ The Capital City Chop House

Contact sales at cadinc com or your account manager for an invitation or to RSVP

Join us with Fortinet for dinner at The Capital City Chop House on January 23rd as we cover a broad range of vital cybersecurity topics such as:

  • Why protecting the perimeter is not sufficient
  • Micro–segmenting your network to block malicious or unauthorized lateral movement
  • Protecting your data from identity thieves and compromised devices
  • Avoiding complex deployment and inherent security gaps caused by adding point solutions
  • Empowering Zero Trust implementation with threat prevention and centralized security management
  • How to determine if zero day threat enabled intruder onto network?
getcomixxx.com