BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20130606T130000Z
DTEND:20130606T210000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:ITAR Training:
DESCRIPTION:This comprehensive ITAR training class is designed to provide the fundamental requirements to regulate the export of hardware and technology from and within the U.S. \n\n	ITAR Technical Data Security Controls Course \n\n	This ITAR training class is designed to focus on which processes should be includedwithin your Technology Control Plan (TCP) to ensure the "technical data" is secure. \n\n	Chances are that your IT staff already has good IT data security controls in place. Learn why it is critical for you to understand the IT language and tools available to ensure these controls are applied where the "technical data" resides within your IT infrastructure. Once you have identified what types of files are defined as "technical data"\, where this data resides within your IT applications and how it is transferred outside of your company this course will provide the fundamental requirements to control the export of "technical data". Understanding the regulation and collaboration between Export and IT staff is crucial in creating an accurate TCP.
X-ALT-DESC;FMTTYPE=text/html:<p>\n	<font color="#626365" size="4"><font color="#626365" size="4">This comprehensive ITAR training class is designed to provide the fundamental requirements to regulate the export of hardware and technology from and within the U.S. </font></font></p>\n<p>\n	<font color="#57585a" face="Franklin Gothic Demi\,Franklin Gothic Demi" size="6"><font color="#57585a" face="Franklin Gothic Demi\,Franklin Gothic Demi" size="6"><font color="#57585a" face="Franklin Gothic Demi\,Franklin Gothic Demi" size="6">ITAR Technical Data Security Controls Course </font></font></font></p>\n<p>\n	<font color="#626365" size="4"><font color="#626365" size="4">This ITAR training class is designed to focus on which processes should be includedwithin your Technology Control Plan (TCP) to ensure the &quot\;technical data&quot\; is secure. </font></font></p>\n<p>\n	<font color="#626365" face="Franklin Gothic Book\,Franklin Gothic Book" size="2"><font color="#626365" face="Franklin Gothic Book\,Franklin Gothic Book" size="2"><font color="#626365" face="Franklin Gothic Book\,Franklin Gothic Book" size="2">Chances are that your IT staff already has good IT data security controls in place. Learn why it is critical for you to understand the IT language and tools available to ensure these controls are applied where the &quot\;technical data&quot\; resides within your IT infrastructure. Once you have identified what types of files are defined as &quot\;technical data&quot\;\, where this data resides within your IT applications and how it is transferred outside of your company this course will provide the fundamental requirements to control the export of &quot\;technical data&quot\;. Understanding the regulation and collaboration between Export and IT staff is crucial in creating an accurate TCP.</font></font></font></p>\n
LOCATION:Madison Crowne Plaza
UID:e.1220.1966
SEQUENCE:3
DTSTAMP:20260422T101115Z
URL:http://greatermadisonchamber.chambermaster.com/events/details/itar-training-06-06-2013-1966
END:VEVENT

END:VCALENDAR
