• IMA Webinar Broadcast: Your Strategy for Recovery

    Building a resilient organization that can withstand a cyber intrusion goes beyond compliance and notification requirements. Cyber criminals can bring an organization’s operations to a halt with a single ransomware virus, leaving it without the financial means to meet payroll, deliver client services, or even pay for the necessary breach response services to revert its […]

  • IMA Webinar Broadcast: Product Security Incident Response & Vulnerability Handling – Electronics & Computer Investigations

    Hamilton County Sheriffs Office Regional Electronics and Computer Investigations (RECI) Unit Product Security Incident Response, Vulnerability Handling, and the CVD Challenge. Objectives: Sergeant Dave Ausdenmoore of the HCSO will introduce some of the resources and assets the RECI uses, including tracking or other types of electronic surveillance and analysis for law enforcement agencies in southwest […]

  • SolarWinds Breach- Is It Over Yet? IOC / Tactics, Techniques, & Procedures

    In early 2020, hackers secretly broke into Texas-based SolarWind's systems and added malicious code into the company's software system. The system, called "Orion," is widely used by companies to manage IT resources and has 33,000 customers that use Orion, according to SEC documents. Most software providers regularly send out updates to their systems, whether it's […]

  • IMA Webinar Broadcast: All About Intellectual Property Rights and Theft of Trade Secrets

    Join us and learn about the differences in Intellectual Property crimes, the elements of Trade Secrets and the relationship between investigators and rights holders in IP cases. A case example will be included! Presenters: Jennifer French, Supervisory Special Agent FBI FBI Supervisory Special Agent Jennifer French is assigned to the National Intellectual Property Rights Coordination […]

  • IMA Webinar Broadcast: It’s Not About You: 3rd Party & Supply Chain Risk for Financial Services in a Post-SolarWinds World

    InfraGardNCR, the American Bar Association, and the Financial Services Information Sharing and Analysis Center (FS-ISAC) have partnered to bring you this webinar. Financial institutions spend time and money to strengthen their internal cyber defenses, but there are limitations when dealing with third party suppliers and providers of services. Recent high-profile incidents have highlighted the potential […]

  • IMA Webinar Broadcast: Emerging Trends and Threats Against the U.S. Defense Industrial Base

    Emerging trends and threats against the U.S. Defense Industrial Base: How small-to-medium size enterprises (SMEs) can protect themselves. The SolarWinds supply chain attack is just one in a string of threats against the U.S. and its critical infrastructures. The U.S. DIB and its supply chain are prime targets for criminals and securing the supply-chain is […]

  • IMA Webinar Broadcast: 2021 Hazardous Weather Briefing

    This Webinar will cover Severe Storm Developments, 2021 Hurricane Season, Droughts, Fire Weather Season, Flooding Impacts, Tornadic Activity, Watches/Warnings/Advisory guidance, and applications available to the general public and emergency response officials. Our presenter, Ms. Wescott is not affiliated with the National Weather Service, National Oceanic and Atmospheric Administration, or the National Hurricane Center but is […]

  • IMA Webinar Broadcast: Supervisory Control & Data Acquisition (SCADA) & Industrial Control Systems (ICS) Vulnerabilities

    InfraGard Los Angeles and CT Watch, Inc. present Supervisory Control & Data Acquisition (SCADA) & Industrial Control Systems (ICS) Vulnerabilities Webinar. ***There are 4.5 ASIS credits available for this course COURSE OVERVIEW: According to the Cybersecurity and Infrastructure Security Agency (CISA), there are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or […]

  • IMA Webinar Broadcast: Risk Management and What Do Security Researchers Do?

    Tyler Reguly, Manager Security R&D, VERT will discuss risk and prioritization in the environment including the value of CVSS and other metrics. Craig Young, Principal Security Researcher : Will give us a glimpse into the tools and techniques utilized by security researchers when investigating new vulnerabilities. Presenters: Tyler Reguly, Manager of Security Research with Tripwire […]

  • A CISO Developed Third Party Risk Management Framework

    Over a dozen CISOs recently contributed to developing a framework designed to be a powerful tool to build, manage, and scale a third-party risk management program. The foundation of this framework consists of a set of guiding principles identified by members, which are critical to a successful third-party risk management program. The tool presents these […]

  • IMA Webinar Broadcast: The FBI’s Internet Crime Complaint Center (IC3)

    Over the years, the Internet crime landscape has broadened from non-delivery schemes and credit card fraud to ransomware and data breaches costing both individuals and businesses millions of dollars each year. The Internet Crime Complaint Center (IC3) is the FBI's reporting mechanism for suspected Internet facilitated criminal activity. Agents and Analysts pour through hundreds thousands […]

  • IMA Webinar Broadcast: Who You Going to Call?

    Besides the FBI - Who can you call? We have presenters from the MA State Police, NH CISA and the Secret Service. Please join us to meet some other agencies - what they do and how they protect us. Sgt. Brian Gavioli from the Massachusetts State Police Commonwealth Fusion Center will provide an overview of […]