BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20250416T190000Z
DTEND:20250416T200000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Cybersecurity Essentials for Construction Companies
DESCRIPTION:Cyber threats are real\, and they don't wait - neither should you.  \n\nRegister now for the April 16\, 2025\, session on Cybersecurity Essentials for Construction Companies to discover practical strategies to protect your project data and keep your business secure\, both on-site and online. \n\nLearning Outcomes:\n\n-Understand basic cybersecurity threats and how they impact construction projects.\n\n-Recognize simple actions that protect data on-site and online.\n\n-Learn how to create secure passwords and use MFA for added security.\n\n-Learn how to identify and handle suspicious emails and messages.\n\nEmpower your team with the knowledge to recognize suspicious emails and take proactive steps to protect your business.  Don't let cyber risks derail your projects - register today and build a safer\, more resilient construction operation!\n\nThis is the 1st workshop in the 4-part Tech Workshop Series designed for construction company owners and managers to help them effectively plan and manage their IT needs.  \n\nAny questions about the workshop can be directed to Hawaii Tech Support at info@hitechsupport.net
X-ALT-DESC;FMTTYPE=text/html:<p dir="ltr" style="line-height:1.2\;margin-top:12pt\;margin-bottom:12pt\;"><span id="docs-internal-guid-137e9d53-7fff-5bd6-9ca5-5e1d6099c54f"><span style="font-family: Arial\, sans-serif\; font-size: 11pt\; white-space-collapse: preserve\;">Cyber threats are real\, and they don&rsquo\;t wait - neither should you.&nbsp\;&nbsp\;</span></span></p>\n\n<p dir="ltr" style="line-height:1.2\;margin-top:0pt\;margin-bottom:12pt\;"><span id="docs-internal-guid-137e9d53-7fff-5bd6-9ca5-5e1d6099c54f"><span style="font-size: 11pt\; font-family: Arial\, sans-serif\; font-weight: 700\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-variant-position: normal\; font-variant-emoji: normal\; vertical-align: baseline\; white-space-collapse: preserve\;">Register now for the April 16\, 2025\, session on Cybersecurity Essentials for Construction Companies to discover practical strategies to protect your project data and keep your business secure\, both on-site and online.&nbsp\;</span></span></p>\n\n<p dir="ltr" style="line-height:1.2\;margin-top:0pt\;margin-bottom:12pt\;"><span id="docs-internal-guid-137e9d53-7fff-5bd6-9ca5-5e1d6099c54f"><span style="font-size: 11pt\; font-family: Arial\, sans-serif\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-variant-position: normal\; font-variant-emoji: normal\; vertical-align: baseline\; white-space-collapse: preserve\;">Learning Outcomes:</span></span></p>\n\n<p dir="ltr" role="presentation" style="list-style-type: decimal\; font-size: 11pt\; font-family: Arial\, sans-serif\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-variant-position: normal\; font-variant-emoji: normal\; vertical-align: baseline\; white-space: pre\;line-height:1.2\;margin-top:0pt\;margin-bottom:0pt\;"><span id="docs-internal-guid-137e9d53-7fff-5bd6-9ca5-5e1d6099c54f"><span style="font-size: 11pt\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-variant-position: normal\; font-variant-emoji: normal\; vertical-align: baseline\; text-wrap-mode: wrap\;">-Understand basic cybersecurity threats and how they impact construction projects.</span></span></p>\n\n<p dir="ltr" role="presentation" style="list-style-type: decimal\; font-size: 11pt\; font-family: Arial\, sans-serif\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-variant-position: normal\; font-variant-emoji: normal\; vertical-align: baseline\; white-space: pre\;line-height:1.2\;margin-top:0pt\;margin-bottom:0pt\;"><span id="docs-internal-guid-137e9d53-7fff-5bd6-9ca5-5e1d6099c54f"><span style="font-size: 11pt\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-variant-position: normal\; font-variant-emoji: normal\; vertical-align: baseline\; text-wrap-mode: wrap\;">-Recognize simple actions that protect data on-site and online.</span></span></p>\n\n<p dir="ltr" role="presentation" style="list-style-type: decimal\; font-size: 11pt\; font-family: Arial\, sans-serif\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-variant-position: normal\; font-variant-emoji: normal\; vertical-align: baseline\; white-space: pre\;line-height:1.2\;margin-top:0pt\;margin-bottom:0pt\;"><span id="docs-internal-guid-137e9d53-7fff-5bd6-9ca5-5e1d6099c54f"><span style="font-size: 11pt\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-variant-position: normal\; font-variant-emoji: normal\; vertical-align: baseline\; text-wrap-mode: wrap\;">-Learn how to create secure passwords and use MFA for added security.</span></span></p>\n\n<p dir="ltr" role="presentation" style="list-style-type: decimal\; font-size: 11pt\; font-family: Arial\, sans-serif\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-variant-position: normal\; font-variant-emoji: normal\; vertical-align: baseline\; white-space: pre\;line-height:1.2\;margin-top:0pt\;margin-bottom:12pt\;"><span id="docs-internal-guid-137e9d53-7fff-5bd6-9ca5-5e1d6099c54f"><span style="font-size: 11pt\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-variant-position: normal\; font-variant-emoji: normal\; vertical-align: baseline\; text-wrap-mode: wrap\;">-Learn how to identify and handle suspicious emails and messages.</span></span></p>\n\n<p dir="ltr" style="line-height:1.2\;margin-top:12pt\;margin-bottom:12pt\;"><span id="docs-internal-guid-137e9d53-7fff-5bd6-9ca5-5e1d6099c54f"><span style="font-size: 11pt\; font-family: Arial\, sans-serif\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-variant-position: normal\; font-variant-emoji: normal\; vertical-align: baseline\; white-space-collapse: preserve\;">Empower your team with the knowledge to recognize suspicious emails and take proactive steps to protect your business.&nbsp\; Don&rsquo\;t let cyber risks derail your projects - register today and build a safer\, more resilient construction operation!</span></span></p>\n\n<p dir="ltr" style="line-height:1.2\;margin-top:12pt\;margin-bottom:12pt\;"><span id="docs-internal-guid-137e9d53-7fff-5bd6-9ca5-5e1d6099c54f"><span style="font-size: 11pt\; font-family: Arial\, sans-serif\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-variant-position: normal\; font-variant-emoji: normal\; vertical-align: baseline\; white-space-collapse: preserve\;">This is the 1st workshop in the </span><span style="font-size: 11pt\; font-family: Aptos\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-variant-position: normal\; font-variant-emoji: normal\; vertical-align: baseline\; white-space-collapse: preserve\;">4-part Tech Workshop Series designed for construction company owners and managers to help them effectively plan and manage their IT needs.&nbsp\;&nbsp\;</span></span></p>\n\n<p dir="ltr" style="line-height:1.2\;margin-top:12pt\;margin-bottom:12pt\;"><span id="docs-internal-guid-137e9d53-7fff-5bd6-9ca5-5e1d6099c54f"><span style="font-size: 11pt\; font-family: Arial\, sans-serif\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-variant-position: normal\; font-variant-emoji: normal\; vertical-align: baseline\; white-space-collapse: preserve\;">Any questions about the workshop can be directed to </span><a href="https://www.hitechsupport.net/" style="text-decoration-line: none\;"><span style="font-size: 11pt\; font-family: Arial\, sans-serif\; color: rgb(17\, 85\, 204)\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-variant-position: normal\; font-variant-emoji: normal\; text-decoration-line: underline\; text-decoration-skip-ink: none\; vertical-align: baseline\; white-space-collapse: preserve\;">Hawaii Tech Support</span></a><span style="font-size: 11pt\; font-family: Arial\, sans-serif\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-variant-position: normal\; font-variant-emoji: normal\; vertical-align: baseline\; white-space-collapse: preserve\;"> at </span><a href="mailto:info@hitechsupport.net" style="text-decoration-line: none\;"><span style="font-size: 11pt\; font-family: Arial\, sans-serif\; color: rgb(17\, 85\, 204)\; font-variant-numeric: normal\; font-variant-east-asian: normal\; font-variant-alternates: normal\; font-variant-position: normal\; font-variant-emoji: normal\; text-decoration-line: underline\; text-decoration-skip-ink: none\; vertical-align: baseline\; white-space-collapse: preserve\;">info@hitechsupport.net</span></a></span></p>\n\n<div><img alt="" height="777" src="https://chambermaster.blob.core.windows.net/userfiles/UserFiles/chambers/9314/Image/HTS-WorkshopSeries-GRAPHIC2.2.jpg.jpg" style="cursor: default\; color: rgb(51\, 51\, 51)\; font-family: sans-serif\, Arial\, Verdana\, &quot\;Trebuchet MS&quot\;\; font-size: 13px\; background-color: rgb(255\, 255\, 255)\; width: 600px\; height: 777px\;" width="600" /></div>\n
LOCATION:BIA Hawaii 94-487 Akoki St. Room 205 Waipahu\, HI 96797
UID:e.9314.887120
SEQUENCE:3
DTSTAMP:20260422T083358Z
URL:https://members.biahawaii.org/events/details/cybersecurity-essentials-for-construction-companies-887120
END:VEVENT

END:VCALENDAR
