BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Grva Technology - ECPv6.6.3//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Grva Technology
X-ORIGINAL-URL:https://grva-tech.co.tz
X-WR-CALDESC:Events for Grva Technology
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20240101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240812
DTEND;VALUE=DATE:20240824
DTSTAMP:20260421T105656
CREATED:20240711T064618Z
LAST-MODIFIED:20240815T162149Z
UID:16154-1723420800-1724457599@grva-tech.co.tz
SUMMARY:ISO 27001 (Information Security Management System)
DESCRIPTION:Definition:\nA standard for managing information security\, ensuring that organizations have adequate security controls in place. \nKey Components: \n\nInformation Security Policies: Defining security management direction.\nRisk Management: Identifying and addressing risks.\nAsset Management: Managing information assets.\nAccess Control: Ensuring only authorized access.\nCryptography: Protecting information through encryption.\nPhysical and Environmental Security: Securing physical and environmental aspects.\nOperational Security: Ensuring secure operations.\nSupplier Relationships: Managing security in supplier relationships.\nIncident Management: Responding to and managing incidents.\nCompliance: Adhering to legal and regulatory requirements.
URL:https://grva-tech.co.tz/training/iso-27001-information-security-management-system/
LOCATION:White Sands Resort\, Dar es Salaam\, Tanzania\, United Republic of
CATEGORIES:Cyber Security
ATTACH;FMTTYPE=image/jpeg:https://grva-tech.co.tz/wp-content/uploads/2024/07/WhatsApp-Image-2024-08-15-at-18.56.58.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240814
DTEND;VALUE=DATE:20240817
DTSTAMP:20260421T105656
CREATED:20240711T072014Z
LAST-MODIFIED:20240711T072047Z
UID:16155-1723593600-1723852799@grva-tech.co.tz
SUMMARY:Disaster Recovery Planning
DESCRIPTION:Definition:\nA set of procedures to recover and protect IT infrastructure and systems in the event of a disaster. \nKey Steps: \n\nRisk Assessment: Identifying potential threats and vulnerabilities.\nBusiness Impact Analysis: Determining the effects of disruptions.\nStrategy Development: Creating recovery strategies.\nPlan Development: Documenting procedures and resources required.\nTesting and Maintenance: Regularly testing and updating the plan.
URL:https://grva-tech.co.tz/training/disaster-recovery-planning/
LOCATION:White Sands Resort\, Dar es Salaam\, Tanzania\, United Republic of
CATEGORIES:Cyber Security
ATTACH;FMTTYPE=image/jpeg:https://grva-tech.co.tz/wp-content/uploads/2024/07/NIKONCORPORATIONNIKOND7506032x4032_000700-scaled.jpg
END:VEVENT
END:VCALENDAR