BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//InfraGard National Members Alliance - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:InfraGard National Members Alliance
X-ORIGINAL-URL:https://www.infragardnational.org
X-WR-CALDESC:Events for InfraGard National Members Alliance
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20220313T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20221106T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20230312T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20231105T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20240310T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20241103T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20220313T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20221106T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20230312T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20231105T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20240310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20241103T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230419T143000
DTEND;TZID=America/New_York:20230419T153000
DTSTAMP:20260403T165015
CREATED:20230327T142830Z
LAST-MODIFIED:20230327T142830Z
UID:4858-1681914600-1681918200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Protecting Our Children Online
DESCRIPTION:It’s unthinkable\, but every year\, thousands of children become victims of crime from online predators. These crimes include the production of child sexual abuse material (CSAM)\, sextortion\, and domestic and foreign travel by individuals to engage in sexual activity with children. In 1995\, the FBI launched the Innocent Images National Initiative to combat child exploitation. Today\, there are several hundred Task Forces across the country to help prevent children from becoming victims of crimes. \nPresenters:\nJanette Bringuel\, Special Agent\, FBI\nSA Bringuel is with the Albany\, New York FBI Field Office. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nRegistration:\nhttps://www.eventbrite.com/e/fbi-protecting-our-children-online-tickets-597767307107
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-protecting-our-children-online/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230420T120000
DTEND;TZID=America/New_York:20230420T130000
DTSTAMP:20260403T165015
CREATED:20220520T142530Z
LAST-MODIFIED:20230327T143316Z
UID:4543-1681992000-1681995600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Autonomous Systems Threats\, Counter Autonomy\, and the Challenges Facing Us
DESCRIPTION:Today’s Drones and Future Threats: We are fairly good at detecting and tracking commercial\, off the shelf UAVs (aka drones) but lack the legal and regulatory authority to effectively counter them. At the start of the presentation\, we will briefly review the legal state of play for countering UAVs domestically. We are also technically ill prepared for future threats. There are many examples of drones\, and drone capabilities that we are not prepared to track\, investigate\, or counter. We will review a number of examples of potential future drone threats to keep in mind. David Kovar\, a private sector member of the NH Information and Analysis Center\, will take us through these issues\, the risks they pose to society\, and the challenges we face in mitigating those risks. \nPresenters:\nDavid Kovar\, CEO\, Founder\nDavid Kovar has been involved with cybersecurity and digital forensics for over 20 years.  In 2015 he gave his first public presentation on drone forensics while working for Ernst and Young as an incident response senior manager. In 2018 he founded URSA\, Unmanned and Robotics Systems Analysis\, to develop tools and processes for extracting and presenting data relating to drones and other autonomous systems. In addition he volunteers with the New Hampshire Information and Analysis Center on UAV\, CUAS\, and cybersecurity topics. \nWho Can Attend:\nOpen only to InfraGard members and their guests \nTarget Audience:\nLaw Enforcement\, Private Sector\, Researchers. \nRegistration:\nhttps://attendee.gotowebinar.com/register/3020725008912680024\nWebinar ID: 457-457-083
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-todays-drones-and-future-threats/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230423T090000
DTEND;TZID=America/Los_Angeles:20230424T170000
DTSTAMP:20260403T165015
CREATED:20230217T162049Z
LAST-MODIFIED:20230217T162112Z
UID:4794-1682240400-1682355600@www.infragardnational.org
SUMMARY:Cyber Defenders: Guardians of Critical Infrastructure\, Presented by  InfraGard National Members Alliance
DESCRIPTION:Overview: \nOur nation is constantly at war in the cyber realm. From cyber criminals to highly sophisticated foreign adversaries\, the relentless assaults on the private sector pose the single greatest threat to our national security\, economic interests\, and critical infrastructure – the foundation of American life. This two-day executive training session will arm cybersecurity professionals and non-technical executives alike with the knowledge\, tools and resources to become cyber defenders and prevail on this vital warfront. \n  \nSession I: Heroes and Villains: An FBI Threat Briefing \nSession II: The Rules of Engagement: Emerging Cyber Laws and ‘Reasonable Security’ \nSession III: Threat Hunters: Cyber Intelligence for CIKR \nSession IV: Under Attack: Foreign Adversaries and the Threat to National Security \nSession V: Hunting the Enemy Within: Insights from a Mature Insider Threat Program \nSession VI: The Moment of Boom: Attacks on American Soil \nSession VII: The End Game: Putting Your Cyber Investigation on Trial \nSession VIII: Harnessing Your Superpowers: The Business of Cyber \n  \nLearning Objectives: \nAttendees will gain an understanding of today’s threat actors with briefings from the FBI Cyber Division and other government agencies; learn the rules of engagement with an exploration of emerging cyber laws and legal trends shaping the regulatory environment; understand foreign adversaries and the tactics\, techniques\, and procedures (TTPs) they use to gain information with briefings from the FBI Counterintelligence Division; learn how to leverage cyber threat intelligence; and participate in how-to sessions with private sector experts on developing ‘reasonable security’ and insider threat programs. \nFlyer: Click here to view the flyer and full session descriptions. \n  \nCost: $2000 \nRegistration: https://www.rsaconference.com/usa/networking/tutorials-and-trainings
URL:https://www.infragardnational.org/event/4794/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230424T080000
DTEND;TZID=America/Los_Angeles:20230427T170000
DTSTAMP:20260403T165015
CREATED:20230217T161807Z
LAST-MODIFIED:20230217T161807Z
UID:4793-1682323200-1682614800@www.infragardnational.org
SUMMARY:RSA Conference 2023
DESCRIPTION:RSAC 2023 is April 24 – 27 in San Francisco. Attend expert-led sessions\, innovation programs\, and much more. Register by Mar. 24 to save up to $900*. InfraGard members save an additional $150. Check your InfraGard email for the discount code. Click the logo above to register and learn more.\nInfraGard National Members Alliance has proudly partnered with RSA Conference! RSAC 2023 is April 24 – 27 in San Francisco. Attend expert-led sessions\, innovation programs\, and much more. Register by March 24 to save up to $900*. InfraGard members save an additional $150. Check your InfraGard email for the discount code. \nRegistration:\nhttps://www.rsaconference.com/usa?utm_source=assoc infgrd&utm_medium=referral&utm_campaign=textad-us2023
URL:https://www.infragardnational.org/event/rsa-conference-2023/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230427T090000
DTEND;TZID=America/Los_Angeles:20230427T113000
DTSTAMP:20260403T165015
CREATED:20230403T142708Z
LAST-MODIFIED:20230403T142708Z
UID:4863-1682586000-1682595000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Global Threat Overview and Ukraine Update
DESCRIPTION:This is another in our FREE series of Global Threat & Ukraine updates. \nGlobal Threat Overview and Ukraine Update is a slight variation on the well-received webinars (with unprecedented registration/participation) that have become an InfraGard staple over the last 14 months. This begins by providing a worldwide threat overview looking at actual or potential flashpoints\, conflicts\, tensions and strategic dynamics that will feature Iran\, the Middle East\, China\, the South China Sea\, and other regions\, then a deep dive into the latest developments with the Russo-Ukraine War that both includes but goes beyond the battlefield to examining larger economic and global supply chain implications from this conflict. It will also address emerging technologies\, weapons and other rapid changes in warfighting that have been seen in this conflict. This webinar will start with a Cyberthreat update from the FBI\, then will go into global threats\, and then a comprehensive Ukraine War update followed by a Q&A session. \nPresenter:\nHal Kempfer is an instructor for InfraGard programs going back nearly two decades and is a regular on-air “expert” on National Security and Homeland Security matters featured on Fox\, NewsNation\, ABC\, CBS\, NPR and a variety of other media outlets.\nA retired Marine Corps Intelligence Officer (LtCol)\, he has travelled the country and world addressing a variety of strategic threat issues such as terrorism\, war and both man-made and natural disasters/emergency preparedness\, and today is part of a global engagement by the United States government dealing with a host of strategic and maritime security issues\, while also assisting a variety of venues\, agencies and organizations improve their emergency preparedness and overall safety/security posture. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nRegistration:\nhttps://attendee.gotowebinar.com/register/4763405859032083805
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-global-threat-overview-and-ukraine-update/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230428T083000
DTEND;TZID=America/New_York:20230428T113000
DTSTAMP:20260403T165015
CREATED:20230331T143332Z
LAST-MODIFIED:20230331T155015Z
UID:4861-1682670600-1682681400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Train Derailment Tabletop Exercise
DESCRIPTION:This train derailment exercise will simulate an emergency situation in an informal environment. The goal is to reinforce emergency preparedness and response along with exercise the organizational\, facility and service-level contingency plans in response to a chemical spill and explosion with multiple train cars affected. \nPresenters:\nBrian Schrock\, Union Bank\nBrian has been in the banking industry for over 20 years focusing on cyber/information security roles. He recently joined Union Bank last year where he currently holds the title of Information Security Officer. \nMelissa Joseph\, Premier Bank\nMelissa is a Security Analyst at Premier Bank currently with 11 years in the banking industry. She specializes in a physical security role to help ensure bank employees and customers are provided a safe environment to work and conduct business. \nWho Can Attend:\nOpen only to InfraGard members.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-train-derailment-tabletop-exercise/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230518T083000
DTEND;TZID=America/Los_Angeles:20230518T113000
DTSTAMP:20260403T165015
CREATED:20230421T143334Z
LAST-MODIFIED:20230421T143334Z
UID:4880-1684398600-1684409400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Active Shooter - Facility Best Practices & Tactical Mindset
DESCRIPTION:Mass shootings seem to be more and more prevalent nowadays. As the world focuses all its attention on the “why”\, we must focus our attention on how we can better prepare ourselves to not only respond to but also learn and understand key concepts that are critical in potentially preventing these tragedies within our critical infrastructure sectors and our communities alike.\nThe first part of the session will cover best practices for facilities such as educational campuses\, offices\, manufacturing facilities\, warehouses and multi-structure campuses such as shopping centers/malls. The second half of the presentation will be focused on the “tactical mindset” immediately pre-attack and during an attack. This portion will cover how to process information quickly and assess your options.\nPlease note that this is NOT a “Run\, Hide\, Fight” presentation. \nTopics:\n1. Best practices (Access Control\, Threat Management & Team\, Security Considerations\, CCTV and external access\, Mass Communications and Enhanced Building Security options).\n2. Tactical Mindset & Situational Awareness\n3. Expert panel discussion on “Best Practices” and active shooter/active assailant mitigation strategies \nPresenters:\nSME 1: Subject Matter Expert (SME) is a retired school Police Captain who successfully confronted and neutralized an active shooter on a California school campus and subsequently was awarded the Medal of Valor for Public Safety by the President of the United States. \nSME 2: Subject Matter Expert (SME) is a retired FBI SWAT Operator\, team leader\, defensive tactics instructor and FBI Principal Firearms instructor. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nTarget Audience:\nTarget audience are Critical Infrastructure Protection and Key Resource (CIKR) Partners\, InfraGard members\, Private Security\, Fusion Center partners and law enforcement agencies. \nRegistration:\nhttps://attendee.gotowebinar.com/register/5117813641325912671
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-active-shooter-facility-best-practices-tactical-mindset/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230518T115000
DTEND;TZID=America/New_York:20230518T130000
DTSTAMP:20260403T165015
CREATED:20230512T002911Z
LAST-MODIFIED:20230512T002911Z
UID:4891-1684410600-1684414800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Know your Supplier in the Healthcare Industry
DESCRIPTION:Breaches of suppliers\, partners\, and other third parties continue to make headlines and headaches for organizations. In this presentation\, the audience will learn about the drivers of third-party cyber risk\, the challenges many organizations face (internally and externally)\, and how they can overcome them using tried and true best practices and methodologies. Participants will walk away from the presentation understanding the supplier cybersecurity lifecycle\, processes that align with the lifecycle they can implement in their organization\, and the types of controls they can consider utilizing. \nPresenter:\nRyan Spelman\, K Logix Security\, Managing Director\, Cyber Risk\nRyan Spelman has over 15 years of experience in homeland security and cybersecurity. He is currently K logix’s Managing Director of Cyber Risk Consulting\, focused on helping organizations navigate complex cyber risks. Ryan previously held leadership positions at Kroll\, Center for Internet Security (CIS)\, and New York State Senate Committee on Veterans’\, Homeland Security and Military Affairs. \nWho Can Attend:\nOpen only to InfraGard members and their guests. \nTarget Audience:\nSecurity and Healthcare managers\, security engineers\, Administrators \nRegistration:\nhttps://attendee.gotowebinar.com/register/314416776079199067\nWebinar ID 225-662-035
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-know-your-supplier-in-the-healthcare-industry/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230518T140000
DTEND;TZID=America/New_York:20230518T150000
DTSTAMP:20260403T165015
CREATED:20230428T143958Z
LAST-MODIFIED:20230428T143958Z
UID:4885-1684418400-1684422000@www.infragardnational.org
SUMMARY:INMA Partner Webinar: A CISO’s Guide to Effective Risk Assessments
DESCRIPTION:This briefing is based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing and conducting risk assessments to meet compliance requirements and to promote a “risk culture” throughout their organizations. Topics discussed will include: (1) guidance for maturing your risk management program from “good” to “better” to “best”; (2) criteria for choosing and using a risk assessment methodology; (3) the components of an industry-accepted risk assessment methodology; (4) the makeup of a risk register (5) developing management-approved risk acceptance criteria; and (6) tips for improving risk mitigation. \nObjectives: \nUpon completion of this webinar\, the attendee/student will be able to mature your risk management program from “good” to “better” to “best”; \nUpon completion of this webinar\, the attendee/student will be able to understand criteria for choosing and using a risk assessment methodology \nUpon completion of this webinar\, the attendee/student will be able to understand the components of an industry-accepted risk assessment methodology; \nUpon completion of this webinar\, the attendee/student will be able to learn the makeup of a risk register \nUpon completion of this webinar\, the attendee/student will be able to learn the developing management-approved risk acceptance criteria \nUpon completion of this webinar\, the attendee/student will be able to learn tips for improving risk mitigation. \nPresenters:\nLou Klubenspies\, CISO\, PerkinElmer\nLou Klubenspies is the CISO of PerkinElmer. Lou participated as an executive sponsor of a Risk Assessments task force hosted by the Cybersecurity Collaborative. \nRich Nagle\, CISO\, Ohio State University\nRich Nagle is the CISO of The Ohio State University. Rich participated as an executive sponsor of a Risk Assessments task force hosted by the Cybersecurity Collaborative. \nRichard Rushing\, CISO\, Motorola Mobility\nRichard Rushing is the CISO of Motorola Mobility. Richard participated as an executive sponsor of a Risk Assessments task force hosted by the Cybersecurity Collaborative. \nWho Can Attend:\nOpen to anyone \nTarget Audience:\nCISOs\, Cybersecurity leaders\, Cyber practitioners. aspiring cyber leaders \nRegistration:\nhttps://us02web.zoom.us/webinar/register/7016825179362/WN_dLDw-udgSIuyZhT30Ajr_g
URL:https://www.infragardnational.org/event/inma-partner-webinar-a-cisos-guide-to-effective-risk-assessments/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230524T090000
DTEND;TZID=America/Los_Angeles:20230524T120000
DTSTAMP:20260403T165015
CREATED:20230428T143115Z
LAST-MODIFIED:20230515T230614Z
UID:4883-1684918800-1684929600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: OSINT INTERMEDIATE - Organizing and Optimizing your Investigations
DESCRIPTION:In this intermediate OSINT course\, tailored specifically for critical infrastructure protection security and analysis teams\, participants will learn effective methods for organizing\, recording\, and retrieving vital information during their investigations. These proven techniques will enable attendees to conduct faster and more efficient investigations\, ensuring no critical details are overlooked. \nBy employing organized search surfaces and decision trees\, participants will gain a deeper understanding of how to visualize their investigations and create a systematic approach to uncovering essential pieces of the puzzle. This course will empower security and analysis professionals to enhance their critical infrastructure protection efforts through optimized OSINT practices. \nTopics:\n1. Effective organization of OSINT searches\n2. Techniques for recording and retrieving essential information\n3. Streamlining investigations for faster and more efficient outcomes\n4. Utilizing organized search surfaces in investigations\n5. Implementing decision trees for structured analysis\n6. Practical Case Studies and Live Demos \nPresenter:\nSubject Matter Expert (SME) is C-T Watch\, Inc. OSINT investigator and has developed their online research skills from the early days of the internet and previous law enforcement career spanning 3 decades. Currently certified in OSINT and several advanced online investigation disciplines\, SME serves as an internal Investigator for a global NGO operating in dozens of countries. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nTarget Audience:\nTarget audience are Critical Infrastructure Protection and Key Resource (CIKR) Partners\, InfraGard members\, Telecommunication Operators\, Crime Analysts\, Criminal Intelligence Analysts and Fusion Center partners and law enforcement. \nRegistration:\nhttps://attendee.gotowebinar.com/register/4393805025864049499
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-osint-intermediate-organizing-and-optimizing-your-investigations/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230524T110000
DTEND;TZID=America/New_York:20230524T120000
DTSTAMP:20260403T165015
CREATED:20230505T020258Z
LAST-MODIFIED:20230505T020258Z
UID:4886-1684926000-1684929600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Elder Fraud - How to Detect/Prevent/Report - FBI Presentation
DESCRIPTION:Each year\, millions of elderly Americans fall victim to some type of financial fraud or confidence scheme\, including romance\, lottery\, and sweepstakes scams\, to name a few. Criminals will gain their targets’ trust and may communicate with them directly via computer\, text and phone. \nThe InfraGard Albany Chapter invites you to learn directly from an FBI subject matter expert regarding Elder Fraud. We all have family and friends who are being targeted and some may already be victims. This presentation revolves around recognizing\, protecting\, and reporting fraud targeting the elderly and family members. \nPresenters:\nMatthew Wabby\, Special Agent\, FBI\nMatthew Wabby is a Special Agent with the FBI Albany Field Office. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nRegistration:\nhttps://www.eventbrite.com/e/elder-fraud-how-to-detectpreventreport-fbi-presentation-tickets-630506370527
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-elder-fraud-how-to-detect-prevent-report-fbi-presentation/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230601T090000
DTEND;TZID=America/Los_Angeles:20230601T110000
DTSTAMP:20260403T165015
CREATED:20230515T144339Z
LAST-MODIFIED:20230515T144339Z
UID:4895-1685610000-1685617200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: ChatGPT Prompting (Intermediate): Enhancing Interaction and Engagement
DESCRIPTION:Note: This is an Intermediate Level course \nThis course introduces participants to the art of “effective prompting” with the ChatGPT AI model. Attendees will learn to shape outputs\, construct prompts\, and adjust system level controls to suit their needs. \nIn this 2 hour workshop\, we will examine the art of prompting ChatGPT effectively. This course provides a blend of theoretical knowledge and practical exercises to ensure participants can effectively utilize ChatGPT in their tasks. \nPresenter:\nSME\, CTWatch\nA native of Eastern Tennessee\, SME is an Open-Source Intelligence (OSINT) and investigations expert specializing in assessing public information for evaluating external risks\, finding missing persons\, threat modeling\, and operations security. The SME possess several cybersecurity industry certifications including Certified Information Systems Security Professional (CISSP®) and GIAC Certified. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nTarget Audience:\nCritical Infrastructure Protection and Key Resource (CIKR) Partners\, InfraGard members\, Telecommunication Operators\, Crime Analysts\, Criminal Intelligence Analysts and Fusion Center partners and law enforcement. \nRegistration:\nhttps://attendee.gotowebinar.com/register/252203109751603552
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-chatgpt-prompting-intermediate-enhancing-interaction-and-engagement/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20230601T120000
DTEND;TZID=America/Chicago:20230601T131500
DTSTAMP:20260403T165015
CREATED:20230526T150353Z
LAST-MODIFIED:20230526T150353Z
UID:4902-1685620800-1685625300@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Due Diligence in M&A
DESCRIPTION:Join the Legal CSC for a virtual webinar about digital due diligence in mergers and acquisitions. \nPresenter:\nShawn Tuma\, Attorney & Co-Chair\, Data Privacy & Cybersecurity Practice\, Spencer Fane\, LLP.\nShawn Tuma represents clients across the globe in dealing with cybersecurity\, data privacy\, data breach and incident response\, regulatory compliance\, computer fraud related legal issues\, and cyber-related litigation. Having practiced in this area of law since 1999\, Shawn is widely recognized in cybersecurity and data privacy law. \nWho Can Attend:\nOpen only to InfraGard members and their guests. \nTarget Audience:\nLawyers & legal community \nRegistration:\nhttps://attendee.gotowebinar.com/register/7733352792986927446
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-due-diligence-in-ma/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230606T090000
DTEND;TZID=America/Los_Angeles:20230606T110000
DTSTAMP:20260403T165015
CREATED:20230515T143425Z
LAST-MODIFIED:20230515T143425Z
UID:4894-1686042000-1686049200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: FBI Quarterly: Unmanned Aircraft Systems and WMD
DESCRIPTION:Unmanned Aircraft System (UAS) technology is becoming cheaper\, easier to use\, more durable\, and more available to the general public. With criminals and extremists\, both overseas and domestically\, wanting to develop UAS technology for illicit means\, what does that mean for you? \nJames Peaco\, FBI Special Agent and WMD Coordinator and Krista Lam\, FBI SA and Associate WMD Coordinator\, will provide an overview of the FBI’s UAS and Weapons of Mass Destruction (WMD) programs. They will discuss their roles\, responsibilities\, and efforts to mitigate threats\, provide education\, and coordinate UAS and WMD efforts across the FBI\, as well as the private sector. The presentation will include examples of illicit UAS use\, and how the government responded. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nRegistration:\nhttps://attendee.gotowebinar.com/register/9015326176264720987
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-fbi-quarterly-unmanned-aircraft-systems-and-wmd/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230608T130000
DTEND;TZID=America/New_York:20230608T140000
DTSTAMP:20260403T165015
CREATED:20230424T142331Z
LAST-MODIFIED:20230424T142331Z
UID:4881-1686229200-1686232800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: TikTok Lessons Learned: Reducing National Security Risk on Mobile Devices
DESCRIPTION:With the high prevalence of bring-your-own-device (BYOD) in today’s hybrid-first world\, there is a significantly higher likelihood that personal apps pose serious risk to your data and overall security posture. Without visibility into the risk posed by personal apps and devices\, it’s impossible to fully understand your organization’s potential data exposure risk. This webinar will help understand the greater challenges and future issues that are currently being highlighted by TikTok. In order to protect your organization and align with government and industry compliance standards\, you need to understand what data mobile\napps can access\, where it gets sent\, and who has control over it at its final destination. \nPresenters:\nChristoph Hebeisan\, Director\, Security Intelligence Research\nChristoph Hebeisan leads the Security Intelligence Research division at Lookout. In this role he oversees the company’s suite of research activities\, which cover malware\, device compromise\, network threats\, phishing and threat intelligence services. \nWho Can Attend:\nOpen only to InfraGard members and their guests. \nTarget Audience:\nAnyone who has an interest in or professional responsibility for data security and how to manage risk and compliance with apps like TikTok in a modern enterprise environment. \nRegistration:\nhttps://register.gotowebinar.com/register/1679033851130138464
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-tiktok-lessons-learned-reducing-national-security-risk-on-mobile-devices/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230622T090000
DTEND;TZID=America/Los_Angeles:20230622T113000
DTSTAMP:20260403T165015
CREATED:20230602T144844Z
LAST-MODIFIED:20230602T150423Z
UID:4905-1687424400-1687433400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Global Threat Overview and Ukraine Update
DESCRIPTION:This is another in our FREE series of Global Threat & Ukraine updates.\nGlobal Threat Overview and Ukraine Update is a slight variation on the well-received webinars (with unprecedented registration/participation) that have become an InfraGard staple over the last 16 months. This begins by providing a worldwide threat overview looking at actual or potential flashpoints\, conflicts\, tensions and strategic dynamics that will feature Iran\, the Middle East\, China\, the South China Sea\, and other regions\, then a deep dive into the latest developments with the Russo-Ukraine War that both includes but goes beyond the battlefield to examining larger economic and global supply chain implications from this conflict. It will also address emerging technologies\, weapons and other rapid changes in warfighting that have been seen in this conflict. This webinar will start with a Cyberthreat update from the FBI\, then will go into global threats\, and then a comprehensive Ukraine War update followed by a Q&A session. \nPresenter:\nHal Kempfer is an instructor for InfraGard programs going back nearly two decades and is a regular on-air “expert” on National Security and Homeland Security matters featured on Fox\, NewsNation\, ABC\, CBS\, NPR and a variety of other media outlets. \nWho Can Attend:\nOpen only to vetted InfraGard members \nRegistration:\nhttps://attendee.gotowebinar.com/register/7886972159695163221
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-global-threat-overview-and-ukraine-update-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230622T120000
DTEND;TZID=America/New_York:20230622T130000
DTSTAMP:20260403T165015
CREATED:20230609T002321Z
LAST-MODIFIED:20230609T002321Z
UID:4907-1687435200-1687438800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: CISA- Resources for Building Operational Resilience
DESCRIPTION:The Cybersecurity and Infrastructure Security Agency (CISA) will be conducting a presentation on several topics including their organization’s mission and regional structure and operations. Other topics covered will focus on CISA Cybersecurity Advisor roles and responsibilities\, CISA Cyber services\, tools\, training and exercises available to critical infrastructure entities. The cybersecurity advisor will also discuss CISA’s victim notification process in which CISA alerts potential victims of incidents like breached credentials and real time or recent activity by suspected (or confirmed) ransomware actors on a stakeholders’ IT systems and networks. \nPresenters:\nJoseph Flores\, CISA\, Cyber Security Advisor (CSA) for Massachusetts\, Cybersecurity State Coordinator Talk Summary:\nJoseph “Joe” Flores serves as the Massachusetts Cybersecurity Advisor (CSA) for the Cybersecurity and Infrastructure Security Agency (CISA). CISA is an Agency within the U.S. Department of Homeland Security (DHS) that maintains 10 regional offices around the country. \nWho Can Attend:\nOpen only to InfraGard members and their guests. \nTarget Audience:\nIndustry security managers or leaders who may wish or need to contact CISA in the case of a cyber related event. \nRegistration:\nhttps://attendee.gotowebinar.com/register/1332264377292208223
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-cisa-resources-for-building-operational-resilience/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230627T110000
DTEND;TZID=America/New_York:20230627T120000
DTSTAMP:20260403T165015
CREATED:20230609T004713Z
LAST-MODIFIED:20230609T004713Z
UID:4909-1687863600-1687867200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Human Factor Controls and Behavior Change
DESCRIPTION:Security Awareness is well known for being the “best bang for the buck” out of all the risk mitigation techniques\, but is it really? For Security Awareness to be effective it must change the behaviors of employees and ideally lead to a mature security culture in your organization. \nMany programs that do not use adult education techniques and neuroscience fail to achieve behavior change and can even make things worse. Once employees start to have a negative impression about information security\, feel helpless or begin to consider remediation as punitive\, great damage has been done to the security culture and this can be difficult to reverse. This fun and interactive presentation will help you to gain an understanding about effective Security Awareness program creation and implementation as well as to build buy-in for a mature security culture. \nPresenter:\nTimothy O’Connor\, Cadre Information Security\nAs a multidisciplinary leader in the field of Information Security\, Tim O’Connor assists organizations\, employees\, and individuals in aligning their business processes with risk through practical policies\, frameworks\, presentations\, seminars\, and customized events like tabletop exercises and assessments. \nWho Can Attend:\nOpen only to InfraGard members and their guests. \nRegistration:\nhttps://events.teams.microsoft.com/event/95306e03-76c0-407c-b058-50875ae15e9c@64b581ec-5e8a-4ff1-9d3a-b50e57ae0fd1
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-human-factor-controls-and-behavior-change/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230628T110000
DTEND;TZID=America/New_York:20230628T120000
DTSTAMP:20260403T165015
CREATED:20230616T143512Z
LAST-MODIFIED:20230616T143512Z
UID:4911-1687950000-1687953600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Impact of Artificial Intelligence (AI) on Threats\, Defenses\, and Technology
DESCRIPTION:Impact of Artificial Intelligence (AI) on threats\, defenses\, chatGPT technology\, and HODL (Hold On For Dear Life). Malicious cyber actors threaten public safety and our national and economics security. The schemes and techniques of cyber criminals are constantly evolving\, and their threats are becoming more complex. The FBI is committed to working with our federal counterparts\, our foreign partners\, and the private sector to address those threats. \nThe Albany InfraGard Chapter invites you to learn directly from the FBI subject matter experts about some the current trending topics including threats and defense relative to Artificial Intelligence\, Machine Learning\, and ChatGPT\, including HODL\, and a case study about crypto investment fraud as part of a romance scam. \nPresenters:\nRoderick Link\, Computer Scientist\, FBI\nRoderick Link is a computer scientist with the FBI Albany field office. \nMichael Lim\, Digital Operations Specialist\, FBI\nMichael Lim is a Digital Operations Specialist with the Albany FBI field office. \nWho Can Attend:\nOpen to anyone. \nRegistration:\nhttps://www.eventbrite.com/e/impact-of-artificial-intelligence-ai-on-threats-defenses-and-technology-tickets-656789333577
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-impact-of-artificial-intelligence-ai-on-threats-defenses-and-technology/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230628T130000
DTEND;TZID=America/New_York:20230628T140000
DTSTAMP:20260403T165015
CREATED:20230602T143954Z
LAST-MODIFIED:20230602T143954Z
UID:4903-1687957200-1687960800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: The Anti-Human Trafficking Intelligence Initiative
DESCRIPTION:Maine’s InfraGard Member Alliance invites you to attend a presentation with the Anti-Human\nTrafficking Intelligence Initiative. Sponsored by Deer Brook Consulting\, Kennebunk Maine\nThe AHTII processes open-source and other intelligence to detect links between online human\ntrafficking and local businesses. This service can greatly enhance BSA\, AML\, KYC\, and fraud\nprevention. They provide financial institutions with the ability identify likely connections\nbetween customer accounts belonging to traffickers. \nPresenter:\nLarry Cameron\, CISO\, The Anti-Human Trafficking Intelligence Initiative\nLarry has 20+ years of experience in the technology and cyber security industries. He is the CISO at the Anti-Human Trafficking Intelligence Initiative (ATII) and an OSINT Investigator / Lead Cryptocurrency Forensic Specialist for the National Child Protection Task Force (NCPTF). \nWho Can Attend:\nOpen only to vetted InfraGard members. \nTarget Audience:\nFinancial Services Sector\, Cybersecurity\, BSA\, AML\, KYC\, Fraud Prevention Units \nRegistration:\nhttps://www.eventbrite.com/e/the-anti-human-trafficking-intelligence-initiative-tickets-647453219007
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-the-anti-human-trafficking-intelligence-initiative/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230629T083000
DTEND;TZID=America/Los_Angeles:20230629T113000
DTSTAMP:20260403T165015
CREATED:20230602T145536Z
LAST-MODIFIED:20230602T145536Z
UID:4906-1688027400-1688038200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Recognizing Hostile Surveillance by Terrorist Groups and Organized Criminals
DESCRIPTION:Step into the world of crime prevention with our immersive course on “Recognizing Hostile Surveillance”. This three-hour training is designed to provide you with the knowledge and skills to detect and report effectively on hostile surveillance activities. \nHostile surveillance is a process by which individuals or groups systematically observe and gather information about a person\, group\, or location with malicious intent. This may be carried out by criminal groups\, terrorists\, stalkers\, or any other entities with intent to harm or exploit. The purpose of hostile surveillance can vary\, but it is often conducted as a precursor to serious crimes like kidnappings\, bombings\, thefts\, or acts of terrorism. The surveillance provides valuable information to these individuals or groups\, allowing them to plan and execute their harmful actions more effectively. They may be looking for patterns\, routines\, vulnerabilities\, or any other useful information that would facilitate their intended crime. \nThis course will help you to:\n· Understand the nature of surveillance tactics used by criminal groups and organized crime syndicates.\n· Identify signs of physical and digital surveillance.\n· Grasp the motivations behind criminal surveillance activities.\n· Learn from real-world case studies to see how surveillance has been successfully detected and addressed.\n· Develop effective strategies for countering surveillance and improving personal and professional security. \nPresenter:\nCTWatch\nSubject Matter Expert (SME) is a retired 25-year veteran Operations Officer from the CIA (Central Intelligence Agency. SME’s operational background includes Counter-Terrorism Operations\, Counter-Proliferation Operations\, Counter-Intelligence Operations\, Counter-Narcotics Operations\, and HUMINT (Human-Intelligence) Operations. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nTarget Audience:\nCritical Infrastructure Protection and Key Resource (CIKR) Partners\, InfraGard members\, Private Security\, DOD\, IC\, Fusion Center partners and law enforcement agencies. \nRegistration:\nhttps://attendee.gotowebinar.com/register/3184369723962553946
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-recognizing-hostile-surveillance-by-terrorist-groups-and-organized-criminals/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230629T140000
DTEND;TZID=America/New_York:20230629T150000
DTSTAMP:20260403T165015
CREATED:20230609T003251Z
LAST-MODIFIED:20230609T003251Z
UID:4908-1688047200-1688050800@www.infragardnational.org
SUMMARY:INMA Partner Webinar: Security Metrics in the Boardroom and in the Backroom
DESCRIPTION:This briefing is based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing boardroom metrics and KPI metrics to support their cybersecurity programs. Topics discussed will include: (1) designing and implementing a metrics program using the Cybersecurity Collaborative (CSC) Metrics Three-Tiered Framework (operational metrics\, security program metrics\, and risk/compliance metrics for the Board); (2) the use of the CSC Security Metrics Workbook to gauge program maturity and measure operational performance; and (3) developing an effective boardroom presentation using security metrics. \nPresenters:\nArlan McMillan\, CISO\, Kirkland & Ellis\nArlan McMillan is the Chief Security Officer (CSO) for Kirkland & Ellis LLP. Kirkland is an international law firm that serves a broad range of clients around the world in private equity\, M&A and other corporate transactions\, litigation\, white collar and government disputes\, restructurings and intellectual property matters. \nScott Schmuhl\, CISO\, Merrick Bank\nTransforming customer experience and business operations through improved processes\, technology\, and security. Even more passionate about enabling the transformation of people as they grow in their careers and life.Path-finding\, aligning\, empowering\, and serving people to do the right things\, and do things right. I’m a troubleshooter\, an organizer\, and a leader. \nLou Klubenspies\, CISO\, Revvity \nNick Tzanev\nPragmatic trailblazer in a regulated industry\, focused on Information Security\, Digital Employment Experience\, Software\, and Talent Development. Driven by challenge\, innovation\, and competition\, I excel at managing shifting priorities. I focus on talent development\, and believe in simplicity\, integrity\, and results. Will lead\, transform\, and deliver. \nWho Can Attend:\nOpen to anyone. \nTarget Audience:\nCISOs\, Senior Cybersecurity Professionals\, Cyber Professionals and Practitioners \nRegistration:\nhttps://us02web.zoom.us/webinar/register/6016860781700/WN_9qgnFYb9TuyunayjHnI2LA
URL:https://www.infragardnational.org/event/inma-partner-webinar-security-metrics-in-the-boardroom-and-in-the-backroom/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230712T090000
DTEND;TZID=America/Los_Angeles:20230712T100000
DTSTAMP:20260403T165015
CREATED:20230623T150605Z
LAST-MODIFIED:20230623T150605Z
UID:4913-1689152400-1689156000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: FBI Brief - Artificial Intelligence
DESCRIPTION:This is a free briefing by the LA FBI. \nFBI Los Angeles’ Intelligence Division will provide an overview of generative artificial intelligence (AI)\, with a focus on ChatGPT and a discussion of threat implications from this emerging technology. The team will examine the potential impact of ChatGPT on different threats\, including domestic and international terrorism\, cyber and financial crimes\, and foreign malign influence. The analysts will also briefly examine other generative AI applications being developed nationally and globally\, and how this technology may evolve in the near future. \nPlease note\, you must be an Infragard member to attend this briefing. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nRegistration:\nhttps://attendee.gotowebinar.com/register/862834485194346330
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-fbi-brief-artificial-intelligence/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230712T100000
DTEND;TZID=America/Los_Angeles:20230712T110000
DTSTAMP:20260403T165015
CREATED:20230630T144945Z
LAST-MODIFIED:20230630T144945Z
UID:4915-1689156000-1689159600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: AZ InfraGard Webinar - Cyber Threat Landscape Update
DESCRIPTION:Join us in July as we present a webinar with a different take on cyber threats. We’ve got Joe Marshall from Cisco’s Talos Intelligence Group joining us to share what they have been seeing at Talos. Joe specializes industrial control systems\, critical infrastructure protection\, and IoT device security. If you’ve got SCADA\, ICS\, or IoT devices in your environment\, you’re not going to miss this one! \nPresenter:\nJoe Marshall\, Senior Strategist\, ICS/Threat Research\nJoe Marshall is with Cisco Talos Intelligence Group\, one of the largest commercial threat intelligence teams in the world. Joe specializes in industrial control systems\, critical infrastructure protection\, and IoT device security. Joe has worked with public and private industry around the world to help secure critical ICS and IoT assets from threats both mundane a and exotic. \nWho Can Attend:\nOpen only to InfraGard members and their guests. \nTarget Audience:\nIT Sector\nCybersecurity Professionals\nAnyone else concerned about Cyber \nRegistration:\nhttps://attendee.gotowebinar.com/register/1569304790839140697
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-az-infragard-webinar-cyber-threat-landscape-update/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230720T110000
DTEND;TZID=America/New_York:20230720T120000
DTSTAMP:20260403T165015
CREATED:20230707T141853Z
LAST-MODIFIED:20230707T141853Z
UID:4917-1689850800-1689854400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Internet Crime Complaint Center (IC3)
DESCRIPTION:The InfraGard West Virginia Member Alliance is pleased to present West Virginia’s very own Rachelle Barnette\, a senior analyst with the Internet Crime Complaint Center for a discussion of the current threat landscape and how the Internet Crime Complaint Center can benefit you. \nPresenter:\nRachelle Barnette\, FBI Management and Program Analyst (IC3)\nAs a senior analyst at the Internet Crime Complaint Center (IC3)\, Mrs. Barnette is an active member of the Cyber Threat Team\, has been employed with the FBI for 26 years\, and with the IC3 for 19 years. Accolades received include\, but not limited to\, two FBI Assistant Director’s Awards for Outstanding Contributions to State and Local Public Safety and Excellence in Investigative Support. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nTarget Audience:\nInfraGard members. \nRegistration:\nhttps://www.eventbrite.com/e/internet-crime-and-complaint-center-tickets-673053028727
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-internet-crime-complaint-center-ic3/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230726T090000
DTEND;TZID=America/Los_Angeles:20230726T113000
DTSTAMP:20260403T165015
CREATED:20230707T141043Z
LAST-MODIFIED:20230707T141043Z
UID:4916-1690362000-1690371000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Open-Source Information (OSIF) Lab 4: Finding People & Social Media Intelligence (SOCMINT)
DESCRIPTION:Social Media information gathering (SOCMINT) lab series will cover the basics of conducting social media research. This will be a “how-to” on intermediate and advanced search and location techniques (AST) of social media accounts\, activity and monitoring. The series will be structured in a manner where audience participation is an option (attendees can shadow the instructor and conduct searches of their own while listening to the SME). Imparting this knowledge and skills to those who work in critical infrastructure and key resources (CIKR) is important\, will save the attendee time and will assist in narrowing the search results to the relevancy of the search conducted. \nTopics:\n1. Types of Social Media content and platforms\n2. Social Media search methods and advanced search operators\n3. Find social media users across multiple platforms\n4. Privacy risks to the information collector \nPresenter:\nSubject Matter Expert (SME) is C-T Watch\, Inc. OSINT investigator and has developed their online research skills from the early days of the internet and previous law enforcement career spanning 3 decades. Currently certified in OSINT and several advanced online investigation disciplines\, SME serves as an internal Investigator for a global NGO operating in dozens of countries\, investigating risk\, \nWho Can Attend:\nOpen only to vetted InfraGard members. \nTarget Audience:\nTarget audience are Critical Infrastructure Protection and Key Resource (CIKR) Partners\, InfraGard members\, Telecommunication Operators\, Crime Analysts\, Criminal Intelligence Analysts and Fusion Center partners and law enforcement. \nRegistration:\nhttps://attendee.gotowebinar.com/register/1575179481733886815
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-open-source-information-osif-lab-4-finding-people-social-media-intelligence-socmint/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230803T140000
DTEND;TZID=America/New_York:20230803T150000
DTSTAMP:20260403T165015
CREATED:20230721T152158Z
LAST-MODIFIED:20230721T152158Z
UID:4924-1691071200-1691074800@www.infragardnational.org
SUMMARY:INMA Partner Webinar: Effective Cybersecurity Policies for AI and Emerging Technologies
DESCRIPTION:This briefing is based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing effective cybersecurity policies that address the security challenges of AI and other emerging technologies. Topics discussed include: (1) policies frameworks; (2) administration (updates\, approvals); (3) communication (e.g.\, to employees\, contractors); (4) traditional policies (AUP\, Functional\, Data Classification\, Privacy); (5) emerging technology policies (AI\, Robotics); and (6) policy refresh best practices. \nPresenters:\nRaul Iglesias\, Cloud Risk and Compliance Architect\, Cloud Center of Excellence\, Regions Bank\nRaul Iglesias has been with Regions Bank for almost 3 years and in his current role as Information Security Architect\, among other responsibilities\, he is responsible for drafting cybersecurity-related policies and standards based on leading cybersecurity frameworks and industry and regulatory requirements. Raul is an active member in various cybersecurity-related working groups. \nKyle Way\, Director\, Information Security\, Heaven Hill \nSelamawit (Sally) Lulu\, Senior Vice President- Director\, GRC\, Risk Treatment & Cybersecurity Education and Awareness at Northern Trust Corporation\nResult driven Information Security & Technology Governance\, Risk and Control professional with over 15+ years of exprience in IT\, Operational\, Advisory and Compliance audits\, Operational Risk Management and development and maintenance of Information Security and Technology policy\, program\, standards and guidelines. \nJames Gibson\, Director\, Systems Configuration & Compliance at BlueHalo \nWho Can Attend:\nOpen to anyone. \nTarget Audience:\nCISOs\, Cyber Leaders\, Cyber Policy professionals\, BISO\, Director of IT\, Cybersecurity Managers\, GRC\, Compliance \nRegistration:\nhttps://us02web.zoom.us/webinar/register/9816897751552/WN_B6eHHLenQnm8WfFO_QrSXg
URL:https://www.infragardnational.org/event/inma-partner-webinar-effective-cybersecurity-policies-for-ai-and-emerging-technologies/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230808T090000
DTEND;TZID=America/Los_Angeles:20230808T113000
DTSTAMP:20260403T165015
CREATED:20230728T150420Z
LAST-MODIFIED:20230728T150420Z
UID:4926-1691485200-1691494200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Suspicious Activity Reporting (SAR)
DESCRIPTION:The objective of this course is to instruct and advise attendees on how and when to submit Suspicious Activity Reports (SAR). Instruction will work through the Nationwide SAR Cycle to assist with a description of the trained attendee’s role in suspicious activity reporting. Training will examine available resources\, tools\, and methods for submitting SARs\, examine the observable behaviors that should be reported as SARs\, identify the essential information to include in a SAR\, and examine the privacy\, civil rights\, and civil liberty guidelines for SAR reporting. Furthermore\, some examples and testing of attendees knowledge on what is considered a SAR reportable incident vs an immediate emergent situation that requires calling emergency services (911). A section on how to write an appropriate SAR (key elements such as who\, what\, where\, when and photographic and or video documentation guidelines) will also be covered. \nTopics:\n1. What is the definition of a SAR?\n2. SAR statistics (local and national)\n3. Privacy\, Civil Rights and Civil Liberty considerations and guidelines.\n4. The role of law enforcement and fusion centers in the SAR process\n5. Background on the NSI (National Suspicious Activity Reporting) initiative.\n6. Where do SAR reports go?\n7. Key elements of reportable suspicious activities (indicators and behaviors)\n8. Examples of indicators and behaviors (breach\, misrepresentation\, sabotage\, etc.)\n9. Who can submit a SAR?\n10. The difference between when to call 911 vs submitting a SAR\n11. How to write a SAR (private sector)\n12. Where to submit a SAR (local: Fusion center\, FBI\, LAPD\, LASD / Domestic: Fusion center or local agency)\n13. Case studies of SAR’s from the private sector\n14. DHS: The Power of Hello – De-escalation \nWho Can Attend:\nOpen to anyone. \nTarget Audience:\nTarget audience are Critical Infrastructure Protection and Key Resource (CIKR) Partners\, InfraGard members\, Telecommunication Operators\, Crime Analysts\, Criminal Intelligence Analysts and Fusion Center partners and law enforcement. \nRegistration:\nhttps://attendee.gotowebinar.com/register/6290594527120331103
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-suspicious-activity-reporting-sar-3/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20230809T100000
DTEND;TZID=America/Chicago:20230809T110000
DTSTAMP:20260403T165015
CREATED:20230721T145800Z
LAST-MODIFIED:20230721T145800Z
UID:4922-1691575200-1691578800@www.infragardnational.org
SUMMARY:Navigating the Future: Modernizing Cyber Security Risk in the Age of Quantum Computers
DESCRIPTION:In today’s rapidly evolving technological landscape\, the emergence of quantum computers and the unprecedented advancements in artificial intelligence (AI) have introduced new dimensions of complexity and uncertainty to the realm of cybersecurity. As organizations strive to protect their valuable data and systems from ever-evolving threats\, it is crucial to understand how to adapt and modernize cybersecurity risk management practices. \nPresenters:\nLester J. Millet III\, Port of South Louisiana / InfraGard Louisiana President\nLester Millet III has held the positions of Policy & Planning Director and Safety Risk Agency Manager for the Port of South Louisiana for the past Seventeen years\, serving as a public / private stakeholder liaison on issues pertaining to Port Security and Emergency Preparedness\, along with his policy & grant writing subject matter expertise. Lester is currently President of InfraGard Louisiana. \nRyan Cloutier\, Chief Information Security Officer /SynapTech Services\nRyan Cloutier is the Chief Information Security Officer and Visionary for SynapTech Services. He is an experienced IT/Cyber Security professional with over 15 years of experience developing Cyber Security programs. Ryan is a virtual Chief Information Security Officer for organizations across the country and is Certified Information Systems Security Professional CISSP® proficient in cloud security \nJon B. Davis\, CEO SecureNation\nJon Davis is the CEO and founder of SecureNation. John’s background is in compliance driven IT security initiatives such as FISMA\, GLBA\, SOX\, FDIC\, NCUA\, OCC and HIPAA. For the past ten years he has worked with some of the nation’s top network security providers and has helped to secure many of the largest businesses and financial institutions in the country. \nWho Can Attend:\nOpen to anyone. \nTarget Audience:\nAnyone Interested in learning how quantum computers & AI are revolutionizing the cyber landscape. \nRegistration:\nhttps://attendee.gotowebinar.com/register/3463908461759227998
URL:https://www.infragardnational.org/event/navigating-the-future-modernizing-cyber-security-risk-in-the-age-of-quantum-computers/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230817T090000
DTEND;TZID=America/Los_Angeles:20230817T233000
DTSTAMP:20260403T165015
CREATED:20230721T151320Z
LAST-MODIFIED:20230721T151320Z
UID:4923-1692262800-1692315000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Global Threat Overview and Ukraine Update
DESCRIPTION:This is another in our FREE series of Global Threat & Ukraine updates.\nGlobal Threat Overview and Ukraine Update is a slight variation on the well-received webinars (with unprecedented registration/participation) that have become an InfraGard staple over the last 16 months. This begins by providing a worldwide threat overview looking at actual or potential flashpoints\, conflicts\, tensions and strategic dynamics that will feature Iran\, the Middle East\, China\, the South China Sea\, and other regions\, then a deep dive into the latest developments with the Russo-Ukraine War that both includes but goes beyond the battlefield to examining larger economic and global supply chain implications from this conflict. It will also address emerging technologies\, weapons and other rapid changes in warfighting that have been seen in this conflict. This webinar will start with a Cyberthreat update from the FBI\, then will go into global threats\, and then a comprehensive Ukraine War update followed by a Q&A session. \nPresenter:\nHal Kempfer is an instructor for InfraGard programs going back nearly two decades and is a regular on-air “expert” on National Security and Homeland Security matters featured on Fox\, NewsNation\, ABC\, CBS\, NPR and a variety of other media outlets. \nA retired Marine Corps Intelligence Officer (LtCol)\, he has travelled the country and world addressing a variety of strategic threat issues such as terrorism\, war and both man-made and natural disasters/emergency preparedness\, and today is part of a global engagement by the United States government dealing with a host of strategic and maritime security issues\, while also assisting a variety of venues\, agencies and organizations improve their emergency preparedness and overall safety/security posture. \nWho Can Attend:\nOpen to anyone. \nRegistration:\nhttps://attendee.gotowebinar.com/register/4375674081069504349
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-global-threat-overview-and-ukraine-update-3/
END:VEVENT
END:VCALENDAR