BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//InfraGard National Members Alliance - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:InfraGard National Members Alliance
X-ORIGINAL-URL:https://www.infragardnational.org
X-WR-CALDESC:Events for InfraGard National Members Alliance
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20200308T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20201101T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20210314T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20211107T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20220313T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20221106T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20230312T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20231105T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20200308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20201101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20210314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20211107T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20220313T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20221106T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20230312T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20231105T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211116T080000
DTEND;TZID=America/New_York:20211117T153000
DTSTAMP:20260403T163355
CREATED:20211022T143912Z
LAST-MODIFIED:20211022T143912Z
UID:4235-1637049600-1637163000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: 2021 Financial Fraud Summit
DESCRIPTION:Infragard members and guests\, join us FREE and ONLINE for our 3rd Annual Financial Fraud Summit. On 16NOV and 17NOV\, agents\, prosecutors\, fraud examiners\, and other financial crime experts come together for this one-of-a-kind education opportunity. Brought to you by InfraGard Birmingham Members Alliance and the FBI Birmingham Division. \nLearning Objectives: \nUpon completion attendees will have knowledge of: Current investigation and prosecution trends from the US Attorney and FBI\, mostly related to COVID\, PPP\, Unemployment Fraud; Tactics and best practices when conducting fraud examinations\, including case studies; Legal updates and current issues with SARS\, white collar crime\, etc.; and updates on cyber-trends\, and new threats\, and the IC3 kill-chain process. \nPresenters:\nDavid Chenkin\, Managing Partner\, Zeichner Ellman & Krause\nChenkin is nationally recognized for expertise in anti-money laundering (“AML”)/financial crime compliance and is certified as an Anti-Money Laundering Specialist by ACAMS (which is not affiliated with any governmental authority). \nLynn Shobe\, Certified Fraud Examiner\nLynn Shobe in a Certified Fraud Examiner and retired Senior Special Agent with the Alabama State Bureau of Investigation. Prior to that he served as an Agent at the Alabama Criminal Justice Information Center. \nJoe Borg\, Director\, Alabama Securities Commission\nJoseph Borg has been Director of the Alabama Securities Commission (ASC) since 1994. Borg served as the only three term president of the North American Securities Administrators Association (NASAA). \nJim Phillips\, Managing Director for Compliance and Risk Management with Everett Advisory Partners\nJim was a Special Agent with the Federal Bureau of Investigation investigating white collar\ncrimes in the St. Louis area\, Chicago\, and New York City. He spent twenty-six years as a federal\nprosecutor with the USAO as a federal prosecutor. \nWho Should Attend:\nOpen only to InfraGard members and their guests. Particularly suited to financial officers\, risk management officers\, attorneys\, accountants\, fraud examiners\, law enforcement focused on financial crimes\, and information technologist in the financial sectors. \nRegistration:\nhttps://hopin.com/events/2021-sars-financial-fraud-summit/registration?code=kBpDZcqbideKDGDNkDKjcA2SB \nSpecial Note: Event submitted to Ala. Bar\, Ala. Board of CPAs\, and Ala. Peace Officers S&T Assoc. for up to 11 hours of CE credit. These\, plus a general certificate will be available for admin fee of $29.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-2021-financial-fraud-summit/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211116T130000
DTEND;TZID=America/New_York:20211116T140000
DTSTAMP:20260403T163355
CREATED:20211025T144134Z
LAST-MODIFIED:20211025T144134Z
UID:4237-1637067600-1637071200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Asset Management - Traditional and IIoT
DESCRIPTION:In our series of Asset Discovery talks\, Tyler Reguly will first focus on how traditional asset discovery works. While a refresher for some\, many may be unfamiliar with the complexities of asset discovery and how small changes to the process can make or break the results. This is a great time to refamiliarize yourself with the basics of asset discovery. Dr. Lane Thames will pick up where Tyler leaves off\, diving into the world of the Industrial Internet of Things. Dr. Thames will look at how Industry 4.0 has changed how we think about networks\, how we consider the devices within our networks\, and how we must adjust our detection techniques to handle some of the most fragile devices that humankind has ever networked. If you think printers have weak TCP stacks\, wait until you see Industrial Control System in action. \nPresenters:\nTyler Reguly\, Manager Security R&D\, VERT – Tripwire\nTyler Reguly is the Manager of Security R&D at Tripwire\, and a key member of Tripwire’s Vulnerability and Exposure Research Team (VERT). Tyler has contributed to multiple industry standards and spoken at several cybersecurity conferences. \nLane Thames\, Principal Security Researcher\, VERT at Tripwire\nLane Thames is a principal security researcher with Tripwire’s Vulnerability and Exposure Research Team (VERT) where he develops vulnerability detection and management software. \nWho Can Attend:\nOpen only to InfraGard members and their guests. Particularly aimed toward anyone that manages assets in their environment \nRegistration:\nhttps://attendee.gotowebinar.com/register/3330022016350058764
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-asset-management-traditional-and-iiot/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211116T130000
DTEND;TZID=America/New_York:20211116T141500
DTSTAMP:20260403T163355
CREATED:20211105T144442Z
LAST-MODIFIED:20211105T144442Z
UID:4239-1637067600-1637072100@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: It Takes a Village – Human Trafficking Victims and The Importance of Mentoring in Today’s Society
DESCRIPTION:We will talk through lessons learned from the investigative interaction with Human Trafficking victims and their need for assistance\, and an introduction to The Phoenix Project\, an evidence-based program that works to address the short and long-term needs of human trafficking survivors and protect young people at risk of trafficking. \nUpon completion of this webinar\, the attendee will learn:\n-About investigative interaction with Human Trafficking victims\n-About the Phoenix Project\, an evidence-based program that works to address the short and long-term needs of human trafficking survivors and protect young people at risk of trafficking. \nPresenters:\nShelly Burke\, Program Director\, Phoenix Project\nShelly is a Licensed Mental Health Counselor in New York who specializes in providing evidence-based\ntherapy for children\, adolescents\, and adults who are experiencing symptoms of posttraumatic stress. \nKamille Stine\, Vice President\, Phoenix Project\nKamille Stine is a Licensed Mental Health Counselor in New York state. She earned her master’s degree\nin Mental Health Counseling from New York University. Kamille has been at the NY Foundling since 2013. \nSA Brian Gander\, FBI-NYO\nSpecial Agent Brian G. Gander\, Criminal Division\, New York Field Office\nBrian G. Gander entered on duty with the FBI in 2002. He was assigned to the money laundering\nwith potential for terrorism squad at the New York Office (NYO). \nNatika Carey\, Staff Operations Specialist\, FBI-NYO\nIn 2012\, Natika Carey transferred from the Seattle Field Office to commence working for the New York Intelligence Division. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nRegistration:\nhttps://register.gotowebinar.com/register/3661395029619628301
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-it-takes-a-village-human-trafficking-victims-and-the-importance-of-mentoring-in-todays-society/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20211117T100000
DTEND;TZID=America/Los_Angeles:20211117T110000
DTSTAMP:20260403T163355
CREATED:20211022T141716Z
LAST-MODIFIED:20211022T141716Z
UID:4233-1637143200-1637146800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: NAVIGATING THE SUPPLY CHAIN GAUNTLET:  AWARENESS\, CHALLENGES and SOLUTIONS
DESCRIPTION:Please join InfraGard San Diego as it hosts Philip Palin\, former Supply Chain Resilience subject-matter-expert with the National Academies of Sciences\, Engineering\, and Medicine\, Department of Homeland Security\, FEMA\, and several states and cities\, as well as author of Out of the Whirlwind: Supply and Demand After Hurricane Maria and He Looks at the Earth: Catastrophe\, Recovery\, and the Cascadia Earthquake. He has researched and engaged a wide range of extreme events including the\n2011 Triple Disaster in Japan\, Superstorm Sandy in 2012\, Hurricane Haiyan (Yolanda) in 2013\, Hurricanes Harvey\, Irma\, and Maria\, etc.\, and recently COVID-19 pandemic response and preparedness for flows of\nfood and medical goods. He works with public and private sector leaders to prepare for and respond to complex wide-area catastrophic events involving dense populations. \nJoining Mr. Palin is Robert Mielish\, San Diego’s Protective Security Advisor at the U.S. Department of Homeland Security where he facilitates information sharing amongst public and private sector critical infrastructure partners. Robert also coordinates and conducts training related to the protection of critical infrastructure both physical and cyber. He organizes and conducts a variety of complex studies and assessments that seek to understand critical infrastructure\, its dependencies and interdependencies\, its “points of failure.” Robert also provides options that owners and operators of critical infrastructure can leverage to improve their security and resiliency. \nWho Can Attend:\nOpen only to InfraGard members and their guests. \nRegistration:\nhttps://zoom.us/meeting/register/tJYtcu6uqz8jGdSlZm8YU609sBzD0mD0JBI9
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-navigating-the-supply-chain-gauntlet-awareness-challenges-and-solutions/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211118T140000
DTEND;TZID=America/New_York:20211118T150000
DTSTAMP:20260403T163355
CREATED:20211108T144222Z
LAST-MODIFIED:20211108T144222Z
UID:4242-1637244000-1637247600@www.infragardnational.org
SUMMARY:SMB Cybersecurity Series: What CISA is Doing to Help SMBs Tackle Remote/Hybrid Workforces
DESCRIPTION:Last year’s shift to remote work is here to stay. According to one study\, 74% of professionals expect remote work to become a standard. \nJoin Bradford Willke\, Senior Advisor at CISA\, as he discusses: \n• The challenges of securing remote/hybrid workplaces\n• What CISA is doing to help SMBs support this new normal\n• Actionable information and resources available for SMBs \nThe SMB Cybersecurity Series is a free webinar series to provide insights and advice to SMBs\, MSPs\, MSSP’s\, CISOs\, and partners who are actively securing small and midsize businesses. \nObjectives:\n-The challenges of securing remote/hybrid workplaces\n-What CISA is doing to help SMBs support this new normal\n-Actionable information and resources available for SMBs \nPresenters:\nBradFord Willke\, DHS/CISA\nA senior advisor to the new Director of the Cybersecurity and Infrastructure Security Agency which is an operational component under Department of Homeland Security \nWho Should Attend:\nThis is an open free webinar for anyone interest in helping organizations of all sizes the are dealing with the new norm – the remote/hybrid workforce. \nRegistration:\nhttps://attendee.gotowebinar.com/register/1533330955945439243?source=InfraGard
URL:https://www.infragardnational.org/event/smb-cybersecurity-series-what-cisa-is-doing-to-help-smbs-tackle-remote-hybrid-workforces/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20211130T090000
DTEND;TZID=America/Los_Angeles:20211130T120000
DTSTAMP:20260403T163355
CREATED:20211115T151004Z
LAST-MODIFIED:20211115T151004Z
UID:4246-1638262800-1638273600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Suspicious Activity Reporting (SAR)
DESCRIPTION:Infragard Los Angeles and CTWatch present the following class\, eligible for 3 CPE credits from ASIS.\nThis class will begin with a briefing from an FBI Bomb Tech on “Bomb Threats and Suspicious Package Indicators.”\nThe objective of this course is to instruct and advise attendees on how and when to submit Suspicious Activity Reports (SAR). Instruction will work through the Nationwide SAR Cycle to assist with a description of the trained attendee’s role in suspicious activity reporting. Training will examine available resources\, tools\, and methods for submitting SARs\, examine the observable behaviors that should be reported as SARs\, identify the essential information to include in a SAR\, and examine the privacy\, civil rights\, and civil liberty guidelines for SAR reporting. Furthermore\, some examples and testing of attendees knowledge on what is considered a SAR reportable incident vs an immediate emergent situation that requires calling emergency services (911). A section on how to write an appropriate SAR (key elements such as who\, what\, where\, when and photographic and or video documentation guidelines) will also be covered. \nTopics:\n1. What is the definition of a SAR?\n2. SAR statistics (local and national)\n3. Privacy\, Civil Rights and Civil Liberty considerations and guidelines.\n4. The role of law enforcement and fusion centers in the SAR process\n5. Background on the NSI (National Suspicious Activity Reporting) initiative.\n6. Where do SAR reports go?\n7. Key elements of reportable suspicious activities (indicators and behaviors)\n8. Examples of indicators and behaviors (breach\, misrepresentation\, sabotage\, etc.)\n9. Who can submit a SAR?\n10. The difference between when to call 911 vs submitting a SAR\n11. How to write a SAR (private sector)\n12. Where to submit a SAR (local: Fusion center\, FBI\, LAPD\, LASD / Domestic: Fusion center or local agency)\n13. Case studies of SAR’s from the private sector \nPresenters:\nRoque Wicker\, CEO CT Watch\nHead of Counter Terrorism Watch\, has produced and presented 100’s of security and Intelligence related classes for Infragard. \nWho Should Attend:\nOpen to anyone. The target audience is Critical Infrastructure Protection and Key Resource (CIKR) Partners\, InfraGard members\, Telecommunication Operators\, Crime Analysts\, Criminal Intelligence Analysts and Fusion Center partners and law enforcement. \nRegistration:\nhttps://attendee.gotowebinar.com/register/729481303681277963
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-suspicious-activity-reporting-sar/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211130T140000
DTEND;TZID=America/New_York:20211130T150000
DTSTAMP:20260403T163355
CREATED:20211119T150709Z
LAST-MODIFIED:20211119T150709Z
UID:4248-1638280800-1638284400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Nashville Bombing - Christmas 2020
DESCRIPTION:On 12/25/2020\, Anthony Warner detonated his VBIED in downtown Nashville\, TN. This explosion crippled critical infrastructure\, and damaged historical buildings and vehicles. Experts have labeled this explosion the fourth largest in U.S. History leaving evidence scattered over 36 city blocks covering 25+ buildings\, four miles of roadway\, one mile of riverbank\, and over one million sq ft. of parking lot. FBI led the investigation through a unified command spanning nine agencies and over 350 personnel. Search operations were conducted over a five-day span. FBI victim specialist worked to identify over 2000 victims and worked with hundreds of building owners\, tenants\, and contractors to conduct a site visit during search operations. \nPresenters:\nTammy Laskowski\, FBI Special Agent\nBrent Hervey\, FBI Special Agent\nAdriaan Valk\, FBI Special Agent Bomb Technician \nWho Can Attend:\nOpen only to vetted InfraGard members. \nRegistration:\nhttps://attendee.gotowebinar.com/register/2034596108625032205
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-nashville-bombing-christmas-2020/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20211202T120000
DTEND;TZID=America/Chicago:20211202T131500
DTSTAMP:20260403T163355
CREATED:20211119T152515Z
LAST-MODIFIED:20211119T152515Z
UID:4250-1638446400-1638450900@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Old Meets New: the 1st\, 4th\, and 5th Amendments Face the Digital World
DESCRIPTION:The webinar will discuss how judicial decisions address new technology in light of the Bill of Rights. The examples discussed include drone cases\, license plate readers\, among others. \nPresenters:\nPierre Grosdidier\, Attorney\nPierre Grosdidier belongs to the first group of attorneys board certified in construction law by the Texas Board of Legal Specialization in 2017. His practice also includes data privacy & unauthorized computer access issues & litigation. \nWho Can Attend:\nOpen to anyone. \nRegistration:\nhttps://attendee.gotowebinar.com/register/3635608184147972364
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-old-meets-new-the-1st-4th-and-5th-amendments-face-the-digital-world/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211203T130000
DTEND;TZID=America/New_York:20211203T140000
DTSTAMP:20260403T163355
CREATED:20211111T235534Z
LAST-MODIFIED:20211111T235534Z
UID:4245-1638536400-1638540000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: The Evolving Cyber Threat
DESCRIPTION:This webinar will highlight some evolving tactics of malicious cyber actors observed by the FBI over the last several years. This presentation will focus on the issues and/or vulnerabilities that adversaries are most consistently exploiting\, why and/or how they are exploiting those vulnerabilities\, and provide some recommendations suggestions on how to mitigate those tactics. Case studies\, best practices and other lessons learned will be covered. \nPresenters:\nKristen Lane\, Intelligence Analyst\, FBI\nKristen Lane is an Intelligence Analyst assigned to the FBI’s Cyber Division. \nWho Can Attend:\nOpen to anyone. \nRegistration:\nhttps://attendee.gotowebinar.com/register/1574050269991217678
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-the-evolving-cyber-threat/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211206T140000
DTEND;TZID=America/New_York:20211206T150000
DTSTAMP:20260403T163355
CREATED:20211129T141657Z
LAST-MODIFIED:20211129T141657Z
UID:4259-1638799200-1638802800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: MSTIC Threat Brief - Decoding NOBELIUM's Recent Supply Chain Intrusions
DESCRIPTION:Following disclosures of supply chain attacks in December of 2020\, the Microsoft Threat Intelligence Center (MSTIC) continues to track and disrupt NOBELIUM activity impacting organizations worldwide. A hallmark characteristic of NOBELIUM intrusions is their abuse of trust to gain and maintain access to their ultimate victims\, allowing them to disguise their activity in legitimate business operations. In May of 2021\, MSTIC identified a new sustained effort by NOBELIUM targeting IT services providers with the intent of leveraging access to those providers for access to downstream victims. This presentation will provide a strategic overview of the NOBELIUM threat actor\, detail technical methods used by the actor to compromise victim cloud and on-premise environments\, and summarize recent campaigns against IT service providers. \nPresenter:\nJustin Warner\, Analyst\, Microsoft Threat Intelligence Center\nJustin has served in both highly technical and senior leadership roles within counterintelligence\, threat research\, and red team operations. Justin is also a graduate of the US Air Force Academy and an Air Force veteran. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nRegistration:\nhttps://register.gotowebinar.com/register/4944066603616873227
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-mstic-threat-brief-decoding-nobeliums-recent-supply-chain-intrusions/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20211214T090000
DTEND;TZID=America/Los_Angeles:20211214T130000
DTSTAMP:20260403T163355
CREATED:20211119T152034Z
LAST-MODIFIED:20211119T152034Z
UID:4249-1639472400-1639486800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: OSINT Level 6 -- SAFETY / LEGALITIES RELATED TO OSINT
DESCRIPTION:*This course is eligible for 4 ASIS CPE credits\nLEVEL 6 – SAFETY / LEGALITIES RELATED TO OSINT\nCOURSE OVERVIEW:\nInfraGard Los Angeles and CT Watch\, Inc. present Open Source Intelligence (OSINT) LEVEL 6 – SAFETY / LEGALITIES RELATED TO OSINT. This course ends the curriculum series and seeks to leverage technologies and standards used by the Internet at large to allow investigators to collect information about the technologies used\, personnel associated with an organization\, and proliferation of web presence for a target domain or organization. Additionally\, this course will address Google Dorking and survey a technique for identifying fraud and brand impersonation using Google Dorking. *This course is eligible for 4 ASIS CPE credits \nObjectives:\n1. Leveraging Domain Name System (DNS) to collect information about an organization\na. Introduction to DNS\nb. Querying DNS in the command-line\nc. Querying DNS from the browser\ni. Various sites with pros and cons\n2. Google Dorking\n3. Fraud and brand impersonation case study\n4. Personal safety online\n5. Legalities of OSINT in the modern age \nPresenters:\nJoe Gray\, VP\, CT Watch\nA native of Eastern Tennessee\, SME is an Open-Source Intelligence (OSINT) and investigations expert specializing in assessing public information for evaluating external risks\, finding missing persons\, threat modeling\, and operations security. The SME possess several cybersecurity industry certifications including Certified Information Systems Security Professional (CISSP®) and GIAC Certified Incident Handler (GCIH®). SME is a former Navy Submarine Navigation Electronics Technician and transitioned into the private sector offering collaborative attitude and expertise to support a variety of organizations\, both public and private in implementing better cybersecurity. \nWho Can Attend:\nOpen to anyone. \nRegistration:\nhttps://attendee.gotowebinar.com/register/752103755755014159
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-osint-level-6-safety-legalities-related-to-osint/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20211214T113000
DTEND;TZID=America/Chicago:20211214T130000
DTSTAMP:20260403T163355
CREATED:20211126T134625Z
LAST-MODIFIED:20211126T134625Z
UID:4257-1639481400-1639486800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: December Meeting - Gary Warner Cyber Year In Review
DESCRIPTION:Gary Warner\, Director of Research in Computer Forensics at UAB\, will present his annual review of the year’s cyber security wins\, losses\, heroes\, and villains. This informative and always candid presentation will highlight the most important breaches as well as law enforcement take downs. \nObjectives:\nAttendees will learn about the current trends in cyber attacks\, international law enforcement actions\, and the efforts of public and private sector cyber security professionals to detect\, prevent\, and defeat the criminals. \nPresenters:\nGary Warner\, UAB / Dark Tower\nGary is the Dir. of Research in Computer Forensics at UAB. He teaches Cybercrime\, Computer Forensics\, and malware analysis courses\, and directs a 90+ analyst lab providing investigative and intelligence services Fortune 500 companies. \nWho Should Attend:\nOpen only to InfraGard members and their guests. Aimed toward cyber security professionals\, law enforcement\, security and compliance officers\, etc. \nRegistration:\nhttps://www.eventbrite.com/e/central-alabama-issa-chapter-meeting-december-2021-tickets-214699862067
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-december-meeting-gary-warner-cyber-year-in-review/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211215T080000
DTEND;TZID=America/New_York:20211215T110000
DTSTAMP:20260403T163355
CREATED:20211210T150210Z
LAST-MODIFIED:20211210T150210Z
UID:4264-1639555200-1639566000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: NY Metro IMA Annual Healthcare Security Summit
DESCRIPTION:Join Leaders from the New York Metropolitan Area to learn about the most pressing issues facing the healthcare sector today! \nPresenters include…\nDr. Mark Jarrett\, Sr. VP Northwell Health & InfraGard National Sector Chief\nKathy Hughes\, CISO Northwell\nS.A. George Rusuloj\, FBI-NYO Healthcare Fraud Squad \nWho Can Attend:\nOpen to anyone. \nRegistration:\nhttps://bit.ly/3riSXa3)
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-ny-metro-ima-annual-healthcare-security-summit/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211215T092500
DTEND;TZID=America/New_York:20211215T113000
DTSTAMP:20260403T163355
CREATED:20211105T145207Z
LAST-MODIFIED:20211105T145207Z
UID:4240-1639560300-1639567800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Protecting Municipal Government Through Public-Private Partnerships
DESCRIPTION:In this talk\, The Atom Group and Primex will guide participants through an interactive overview of concepts developed through the first years of a public private partnership in defense of NH municipal organizations. They will cover an innovated approach to cooperating including cyber incident response with state and federal law enforcement agencies. We will focus together on understanding the leadership techniques used to build partnerships that help identify and mitigate cybersecurity risk and build resilient organizations\, not just meet the latest in an ever-evolving landscape of threats. Leaders at all levels of the organization will gain an understanding how to analyze organizational readiness\, prepare for next generation attacks\, and build a network of professional relationships ready to meet the challenge of protecting the trust placed in you. \nPresenters:\nJason Sgro\, Sr. Partner\, The Atom Group\nJason serves as Sr. Partner and Head of Cybersecurity & Human Privacy at The ATOM Group as Director of the NH Office for Cooperation in Cybersecurity and leads its Emergency Cyber Incident Response and Cyber Counterintelligence functions. \nTy Gagne\, CEO\, Primex\nChief Executive Officer of Primex\, Ty has held executive positions in the municipal\, non-profit\, and healthcare sectors\, and was a two-term school board member. Ty holds a Master of Public Administration from the University of NH. \nWho Can Attend:\nOpen to anyone. \nRegistration:\nhttps://us02web.zoom.us/j/89263584424?pwd=Um9lUmx2c1c2K1pRam5ycEgzTWVxQT09\nPass Code: 262185
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-protecting-municipal-government-through-public-private-partnerships/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211216T150000
DTEND;TZID=America/New_York:20211216T160000
DTSTAMP:20260403T163355
CREATED:20211203T150129Z
LAST-MODIFIED:20211203T150129Z
UID:4261-1639666800-1639670400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: A CISO Developed Ransomware Threat Guide and Toolkit
DESCRIPTION:This briefing shares the findings of a cross-sector task force of CISOs and staff who developed a comprehensive guide and toolkit for preventing\, detecting\, and responding to the ransomware threat. The Best Practices Guide: (1) prioritizes controls and strategies based on effectiveness\, cost\, and implementation difficulty; (2) provides insights on incident response and business continuity; (3) shares approaches for presenting the threat to the Board; and (4) offers perspectives on making the “pay or not pay” decision. \nSupporting tools that will be shown during the briefing are: \n• Ransomware Preparedness Questionnaire (preparedness measures and strategy options)\n• Incident Response Reference Architecture (IR process and technology references)\n• Boardroom Education and Presentations (communications to the Board)\n• Pay-No-Pay Decision Criteria (discussion criteria for determining whether to pay the ransom) \nPlease join members of the Task Force as they share key insights and tools to help organizations effectively address the ransomware threat. \nPresenters:\nArlan McMillan\, Chief Security Officer\, Kirkland & Ellis LLP\nArlan McMillan is the Chief Security Officer (CSO) for Kirkland & Ellis LLP. Kirkland is an international law firm that serves a broad range of clients around the world in private equity\, M&A and other corporate transactions and litigation. \nTom Scurrah\, V.P. Cybersecurity Programs and Content\, Cybersecurity Collaborative\nFor over 20 years\, Tom has practiced as a cyber security professional in the following capacities: (1) an executive director of information security for a Fortune 20 company; (2) a consultant in two cyber security consulting firms. \nWho Should Attend:\nOpen to anyone. CISO’s\, CIO’s and all cybersecurity practitioners from both the private and public sector. \nRegistration:\nhttps://us02web.zoom.us/webinar/register/8516382094272/WN_zBXA4RAWRe-Als3A6PlKsQ
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-a-ciso-developed-ransomware-threat-guide-and-toolkit/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20211220T090000
DTEND;TZID=America/Los_Angeles:20211220T113000
DTSTAMP:20260403T163355
CREATED:20211122T154614Z
LAST-MODIFIED:20211122T154634Z
UID:4253-1639990800-1639999800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Counterterrorism in the Modern Age - with "First Casualty" author Toby Harnden
DESCRIPTION:As a year-end special treat\, Infragard Los Angeles and CTWatch present this special FREE Guest Speaker event on Counterterrorism. \nThis is a special 2.5 hour Guest Speaker series event focused on best practices in counterterrorism for those charged with the responsibility of protecting our critical infrastructure and key resources. This interactive panel discussion will feature award-winning author Toby Harnden\, who recently released the bestselling book\, “First Casualty” – the untold story of the CIA’s mission to avenge 9/11. This dramatic true story reveals the secret mission of the eight members of the CIA’s Special Operations Team Alpha\, the first Americans to be dropped behind enemy lines in Afghanistan after 9/11. In addition\, retired CIA operations officer Bob Dougherty will provide subject matter expert commentary on how the key takeaways provided by Toby’s riveting story are applicable today and in the future for both the private sector\, local and state law enforcement and the FBI in combatting extremism and ensuring the security of the Homeland’s critical infrastructure. \nTopics:\n1. Counterterrorism strategies in the protection of critical infrastructure\n2. Best practices in counterterrorism and crisis management\n3. Panel discussion and Q & A \nPresenters:\nRobert Dougherty\, VP Intelligence\, CT Watch\nA 25 year veteran of the CIA (Central Intelligence Agency) Mr. Dougherty’s operational background includes Counter-Terrorism Operations\, Counter-Proliferation Operations\, Counter-Intelligence Operations\, Counter-Narcotics Operations. \nToby Harnden\, Guest lecturer\, CT Watch\nToby Harnden is a winner of the Orwell Prize for Books. A former foreign correspondent for the Sunday Times of London and the Daily Telegraph who reported from thirty-three countries\, he specializes in terrorism and war. \nWho Can Attend:\nOpen to anyone. Target audience are Critical Infrastructure Protection and Key Resource (CIKR) Partners\, InfraGard members\, Telecommunication Operators\, Crime Analysts\, Criminal Intelligence Analysts and Fusion Center partners and law enforcement. \nRegistration:\nhttps://attendee.gotowebinar.com/register/5774760832567465995
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-counterterrorism-in-the-modern-age-with-first-casualty-author-toby-harnden/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20211220T090000
DTEND;TZID=America/Los_Angeles:20211220T113000
DTSTAMP:20260403T163355
CREATED:20211126T134203Z
LAST-MODIFIED:20211126T134203Z
UID:4255-1639990800-1639999800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Counterterrorism in the Modern Age - with "First Casualty" author Toby Harnden
DESCRIPTION:As a year-end special treat\, Infragard Los Angeles and CTWatch present this special FREE Guest Speaker event on Counterterrorism. \nThis is a special 2.5 hour Guest Speaker series event focused on best practices in counterterrorism for those charged with the responsibility of protecting our critical infrastructure and key resources. This interactive panel discussion will feature award-winning author Toby Harnden\, who recently released the bestselling book\, “First Casualty” – the untold story of the CIA’s mission to avenge 9/11. This dramatic true story reveals the secret mission of the eight members of the CIA’s Special Operations Team Alpha\, the first Americans to be dropped behind enemy lines in Afghanistan after 9/11. In addition\, retired CIA operations officer Bob Dougherty will provide subject matter expert commentary on how the key takeaways provided by Toby’s riveting story are applicable today and in the future for both the private sector\, local and state law enforcement and the FBI in combatting extremism and ensuring the security of the Homeland’s critical infrastructure. \nObjectives:\n1. Counterterrorism strategies in the protection of critical infrastructure\n2. Best practices in counterterrorism and crisis management\n3. Panel discussion and Q & A \nPresenters:\nRobert Dougherty\, VP Intelligence\, CT Watch\nA 25 year veteran of the CIA (Central Intelligence Agency) Mr. Dougherty’s operational background includes Counter-Terrorism Operations\, Counter-Proliferation Operations\, Counter-Intelligence Operations. \nToby Harnden\, Guest Speaker\nToby Harnden is a winner of the Orwell Prize for Books. A former foreign correspondent for the Sunday Times of London and the Daily Telegraph who reported from thirty-three countries\, he specializes in terrorism and war. \nWho Should Attend:\nOpen to anyone. Target audiences are Critical Infrastructure Protection and Key Resource (CIKR) Partners\, InfraGard members\, Telecommunication Operators\, Crime Analysts\, Criminal Intelligence Analysts and Fusion Center partners and law enforcement. \nRegistration:\nhttps://attendee.gotowebinar.com/register/5774760832567465995
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-counterterrorism-in-the-modern-age-with-first-casualty-author-toby-harnden-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20220119T090000
DTEND;TZID=America/Los_Angeles:20220119T110000
DTSTAMP:20260403T163355
CREATED:20211217T150702Z
LAST-MODIFIED:20211217T150702Z
UID:4362-1642582800-1642590000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: FBI Quarterly Threat Briefing – Human Trafficking – Exploiting the Most Vulnerable
DESCRIPTION:**FREE Event**\n**You must pre-register for this event. After registering\, a link for the webinar will be sent to you with a reminder link sent one hour prior to the start of course. \nBriefing Description: January is National Slavery and Human Trafficking Prevention Month\, but for the FBI\, combatting human trafficking is a priority every day. Please join the FBI and InfraGard Los Angeles for our FBI Quarterly Threat briefing on Human Trafficking with briefings from the FBI Los Angeles Crimes Against Children and Human Trafficking Squad. Under the human trafficking program\, the FBI investigates: Sex trafficking\, Labor trafficking\, and Domestic servitude. The most effective way to investigate human trafficking is through a collaborative\, multi-agency approach with our federal\, state\, local\, tribal and non-governmental organization partners. FBI Los Angeles operates Child Exploitation and Human Trafficking Task Forces which are comprised of FBI and task force officers from local and state agencies. The ultimate goal of these task forces is to recover victims and investigate traffickers at the state and federal level. \nBriefing Overview:\n• Human Trafficking Indicators\n• Human Trafficking Laws & Prosecutions\n• Reporting Trafficking & Victim Assistance\n• Human Trafficking Case Study \nWho Can Attend:\nOpen to anyone. \nRegistration:\n https://attendee.gotowebinar.com/register/1521161562607889677
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-fbi-quarterly-threat-briefing-human-trafficking-exploiting-the-most-vulnerable/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220119T120000
DTEND;TZID=America/New_York:20220119T140000
DTSTAMP:20260403T163355
CREATED:20220112T163808Z
LAST-MODIFIED:20220112T163808Z
UID:4374-1642593600-1642600800@www.infragardnational.org
SUMMARY:NISRU Workshop Wednesdays: Building an Effective Detection and Response Program
DESCRIPTION:Detection of cyber intrusions is one of the most under-appreciated\, and vital\, areas of the cybersecurity field. How do you know when you have been hacked? When ransomware locks up your system it is pretty clear. Is that the only kind of hacking that occurs? How do you know when other types of attacks are ongoing in your system? This presentation will discuss building an effective detection program that meshes with your effective response program. Response involves “and what do we do about it.” Having an incident response plan and exercising it is a critical piece of preparation. We will cover standard IR practice and how to link Threat Intelligence\, Detection\, and Response to provide effective risk reduction for organizations. \nClick to register – InfraGard Members use IG2021WWIGMbrDisc1 discount code; Patriots Circle Members will receive a separate email with the code for an additional 10% discount.
URL:https://www.infragardnational.org/event/nisru-workshop-wednesdays-building-an-effective-detection-and-response-program/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20220122T090000
DTEND;TZID=America/Los_Angeles:20220122T120000
DTSTAMP:20260403T163355
CREATED:20220107T142707Z
LAST-MODIFIED:20220107T143124Z
UID:4372-1642842000-1642852800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Crowd Management Training – Preparing for the Super Bowl and other events
DESCRIPTION:**Please note this class is worth 3 CPE credits from ASIS\nLA Infragard and GRIP present the following virtual training: \nA trained Crowd Manager is a position that is explicitly required in NFPA 1 and referenced in many state and local fire codes for Assembly Occupancies over 50 people. A trained Crowd Manager must know a variety of things\, but their primary purpose is to assist a crowd to more effectively and safely evacuate or move away from harm’s way during an emergency. Large sports venues with the enormous crowds in a relatively confined space are always a management challenge\, and having trained\, prepared staff ready to assist has become a necessity. This has been taught across the county to both public and private sector participants\, for state Homeland Security offices and even working with the DHS sponsored fusion centers. Among the key elements of Crowd Manager instruction are: \n• Understand lessons learned from emergency case studies\n• Understand the movement scenarios of crowds and the crowd manager’s role\n• Understand the crowd manager role in an active shooter scenario\n• Understand the crowd manager role in fire safety\, gas leak\, flood\, power outage\, crowd surge and other scenarios\n• Understand the checklist of key Items to be reviewed in a crowd event\n• Understand the components of the acronym ESCAPE – Exits\, Storage\, Capacity\, Aisles\, Protection\, Emergency \nFollowing the formal Crowd Manager class\, we will feature a dynamic scenario driven panel discussion covering potential events that they may or likely will encounter involving crowd manager roles\, requirements\, tactics\, techniques and procedures. \nPresenters:\nHal Kempfer\, CEO\, GRIP\nHal Kempfer is CEO of Global Risk Intelligence & Planning\, Inc. He is a retired Marine intelligence officer with 24 years of service\, and is a frequent contributor to TV news shows as an international expert on civil-military affairs.\n\nWho Can Attend:\nOpen to anyone\n\nRegistration:\nhttps://attendee.gotowebinar.com/register/1992378161854760717
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-crowd-management-training-preparing-for-the-super-bowl-and-other-events/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20220124T090000
DTEND;TZID=America/Los_Angeles:20220124T113000
DTSTAMP:20260403T163355
CREATED:20211227T160217Z
LAST-MODIFIED:20211227T160407Z
UID:4368-1643014800-1643023800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Persistent Mobile Device Threats and Scams
DESCRIPTION:This class is eligible for 2 CPE credits from ASIS.\nInfragard Los Angeles and CT Watch present: \nThe objective of this course is to instruct and advise attendees on what types of persistent threats are out there targeting their mobile devices in order to 1). Take over financial accounts\, 2). Breach personal and/or business emails\, 3). Target the individual for a scam\, 4). Inject ransomware or conduct a full system takeover of their device to achieve all 4 objectives. Attendees will also learn about modern day scams facing businesses and individuals as well as mitigation strategies\, social engineering attacks and will finish off with several case studies. \nTopics:\n1. What is a mobile device threat and how does it affect me?\n2. Breakdown of different types of mobile device scams:\n• Sim swapping/hijacking\n• Phishing texts and emails\n• Vhishing and Smishing\n• Man-in-the-middle attack\n• Bluetooth and WiFi attacks\n• Device spoofing\n• Ransomware\n3. Best practices on securing your mobile device and its contents\n4. Current scams facing business and individuals and mitigation strategies\n5. Social engineering attacks and defenses\n6. Case studies \nObjectives:\nAttendee will learn:\n1. Best practices on securing your mobile device and its contents\n2. Current scams facing business and individuals and mitigation strategies\n3. Social engineering attacks and defenses \nPresenters:\nLance Larson Ph. D\, Cyber Investigator\nLance Larson is a Cyber Investigator for a Department of Homeland Security designated fusion center and a law enforcement officer for 20+ years. CISSP\, CEH\, GCIH. \nWho Should Attend:\nOpen to anyone. Target audience are Critical Infrastructure Protection and Key Resource (CIKR) Partners\, InfraGard members\, Telecommunication Operators\, Crime Analysts\, Criminal Intelligence Analysts and Fusion Center partners and law enforcement. \nRegistration:\nhttps://attendee.gotowebinar.com/register/1796724465341836558
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-persistent-mobile-device-threats-and-scams/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20220125T103000
DTEND;TZID=America/Los_Angeles:20220125T113000
DTSTAMP:20260403T163355
CREATED:20220103T155752Z
LAST-MODIFIED:20220103T155752Z
UID:4370-1643106600-1643110200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Rare Earth Elements: From San Diego to Afghanistan – Little Rocks\, Geopolitics and Your Smartphone
DESCRIPTION:Rare Earth Elements (REE) aka Rare Earth Minerals are fundamental building blocks of the modern economy\, enabling trillions of dollars in global GDP via a wide range of clean energy\, information technology\, defense\, and industrial applications.  Some rare earth elements include lanthanum\, cerium\, neodymium\, praseodymium – and more familiar elements include aluminum\, gold\, silver\, zinc\, mercury\, and lithium\, etc. REEs are near the front of the supply chain and may be overlooked as critical inputs or sources of supply and touch each of our lives daily and nearly all Critical Infrastructure Sectors. From lithium mining in the Salton Sea to bastnaesite mining in San Bernardino County\, Southern California is in the thick of national security implications and global politics to control REE’s used in the production of electronics\, circuit boards\, military hardware\, electric cars\, etc. Join us as U.S. Department of Homeland Security\, Cybersecurity and Infrastructure Security Agency-Region IX Critical Infrastructure Specialist Ashley McKibbin gives an all-encompassing presentation of the importance of REE and how these items support critical infrastructure. \nWho Can Attend:\nOpen to InfraGard members and government/LE/Fire/Military only. \nRegistration:\nPlease use link provided in weekly email. This is a private event.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-rare-earth-elements-from-san-diego-to-afghanistan-little-rocks-geopolitics-and-your-smartphone/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20220126T100000
DTEND;TZID=America/Chicago:20220126T120000
DTSTAMP:20260403T163355
CREATED:20220114T151241Z
LAST-MODIFIED:20220114T151241Z
UID:4380-1643191200-1643198400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: A Left of Boom Approach to Comprehensive Phishing Protection
DESCRIPTION:Indicators of Compromise and Recommended Protective Measures in regards to Current Phishing Threats \nPresenters:\nTerry S. McCorkle\, CEO of PhishCloud Inc.\nTerry is the Founder and CEO of PhishCloud Inc. He is an ethical hacker with over twenty\nyears of experience in the cybersecurity industry and has served in a broad range of technical\,\nanalytical\, and leadership roles. \nMark Jaster\, CEO of 418 Intelligence Corp.\nMark Jaster\, an entrepreneur and technology strategy expert with over 30 years of deep\nexpertise in developing technology for complex problems that drive growth\, is the Founder\n& CEO of 418 Intelligence Corp. \nSSA Stephen Fessel\, FBI New Orleans Cyber Squad 6 \nJeffery Mckee\, DHS CISA PSA Baton Rouge \nWho Can Attend:\nOpen to anyone \nRegistration:\nhttps://register.gotowebinar.com/register/1275817637974208781
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-a-left-of-boom-approach-to-comprehensive-phishing-protection/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220126T120000
DTEND;TZID=America/New_York:20220126T140000
DTSTAMP:20260403T163355
CREATED:20220112T164035Z
LAST-MODIFIED:20220112T164035Z
UID:4376-1643198400-1643205600@www.infragardnational.org
SUMMARY:NISRU Workshop Wednesdays: Certified Cyber Security Architect (CCSA) Certification Training
DESCRIPTION:This is a FOUR-HOUR workshop conducted over two days – January 26th and 27th\, 2022. \nDistinguish yourself with the CCSA credential\, the gold standard in cybersecurity space. Learn about the updates in the DoD CMMC 2.0 and the alignment with NIST standards. Examine security incident management\, essential cyber policies\, encryption techniques and more. Explore best practices to establish a credible\, evidence-based cyber defense program. The CCSA program provides knowledge to develop your skills in cybersecurity with focus on the NIST Cybersecurity Framework\, and the U.S. DoD cybersecurity mandate\, CMMC. Upon completion of the workshop\, students will have the option to sit the CCSA certification examination and achieve the CCSA accreditation for the discounted price of $199; a nearly 70% discount off the regular $695 price. Students will learn more about achieving the certification during the workshop. \nClick to register – InfraGard Members use IG2021WWIGMbrDisc1 discount code; Patriots Circle Members will receive a separate email with the code for an additional 10% discount.
URL:https://www.infragardnational.org/event/nisru-workshop-wednesdays-certified-cyber-security-architect-ccsa-certification-training/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20220202T113000
DTEND;TZID=America/Chicago:20220202T130000
DTSTAMP:20260403T163355
CREATED:20220128T154929Z
LAST-MODIFIED:20220128T154929Z
UID:4387-1643801400-1643806800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: CMMC 2.0 Update
DESCRIPTION:Update on the DoD Cybersecurity Compliance framework CMMC 2.0. We will discuss the CMMC requirements and what they likely mean for individual businesses. The discussion will include a brief background on CMMC\, the changes that took place in CMMC 2.0\, and then focus on the implications of the scoping guides which have added new requirements and opportunities to the framework. \nAt the end of this presentation attendees should be able to:\na) Explain the current status of CMMC implementation.\nb) Understand the planned regulatory update\nc) Understand what companies should be doing now to prepare\nd) Understand the impact of the scoping guide and its additional requirements for compliance under CMMC 2.0 \nPresenter:\nVince Scott\, CEO of Defense Cybersecurity Group\nVince is a retired US Navy Cryptologist and serial entrepreneur who has started two companies\, two not for profits\, and has more on the way. He currently serves as the CEO of Defense Cybersecurity Group\, a cyber consulting company focused \nWho Can Attend:\nOpen only to InfraGard members and their guests. Aimed toward anyone responsible for risk management and/or government contracts. \nRegistration:\nhttps://onenet.zoom.us/meeting/register/tJYpfuGuqjkvGNMtI29r_7Gb_RZQFzBNnVnx
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-cmmc-2-0-update/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220202T120000
DTEND;TZID=America/New_York:20220202T140000
DTSTAMP:20260403T163355
CREATED:20220112T164202Z
LAST-MODIFIED:20220112T164202Z
UID:4377-1643803200-1643810400@www.infragardnational.org
SUMMARY:NISRU Workshop Wednesdays: Tipping Point: Keys to Developing/Implementing a Comprehensive Violence Prevention
DESCRIPTION:Even as other types of crime drop\, violence is soaring. FBI data for 2020 show a 30 percent increase in murder\, the highest year-over-year increase ever. Aggravated assault is up 12 percent. Because of this\, it is critical\, now more than ever\, that all organizations develop and implement comprehensive violence prevention programs for their employees\, contractors\, and volunteers. This workshop will provide participants with: \n• An understanding of the key components of the updated ASIS/ANSI Standard on Workplace Violence and Active Assailant – Prevention\, Intervention and Response \n• Background on how COVID\, working from home\, returning to work\, social divisions\, and other factors have triggered record violence \n• An understanding of potential liability exposure to an organization that does not have a Violence Prevention Program in place \n• Strategies for developing effective WPV training programs at 4 different levels\, and for a virtual workforce \n  \nClick to register – InfraGard Members use IG2021WWIGMbrDisc1 discount code; Patriots Circle Members will receive a separate email with the code for an additional 10% discount.
URL:https://www.infragardnational.org/event/nisru-workshop-wednesdays-tipping-point-keys-to-developing-implementing-a-comprehensive-violence-prevention/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220208T130000
DTEND;TZID=America/New_York:20220208T140000
DTSTAMP:20260403T163355
CREATED:20220117T150909Z
LAST-MODIFIED:20220117T150909Z
UID:4381-1644325200-1644328800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Economic Espionage - A Sophisticated Chinese Government Scheme
DESCRIPTION:China wanted to become a naval power\, and needed syntactic foam to do it. But a Chinese manufacturing firm couldn’t figure out a way to make the foam even with Chinese government funding. So instead\, the Chinese firm hired a university professor to create a front company and gave him $3 million to recruit current and former employees of Trelleborg\, the US Company that developed syntactic foam based on decades of research. The employees stole trade secrets from Trelleborg and gave them to the Chinese firm. \nA four-year FBI investigation uncovered the details of the scheme and culminated charges for seven subjects and two companies. This webinar’s case study will include details of the investigation and prosecution\, including how companies were targeted and what kinds of incentives the Chinese government dangled. Our speaker\, SSA Roman Rozhavsky\, will also offer recommendations for safeguarding research and emerging technologies. We hope you can join us! \nPresenters:\nRoman Rozhavsky\, Supervisory Special Agent\, FBI\n\nWho Can Attend:\nOpen to anyone. \nRegistration:\nhttps://attendee.gotowebinar.com/register/7768209499802726928
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-economic-espionage-a-sophisticated-chinese-government-scheme/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20220210T120000
DTEND;TZID=America/Chicago:20220210T130000
DTSTAMP:20260403T163355
CREATED:20220204T154938Z
LAST-MODIFIED:20220204T154938Z
UID:4401-1644494400-1644498000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: AI for Threat Detection: Getting Beyond the Buzzwords of Artificial Intelligence
DESCRIPTION:In this presentation Kevin will establish a foundation on key concepts surrounding the area of AI\, explain how these main concepts work\, then guide us through some examples and case studies on how AI is proving effective in helping to augment the tools and resources of cyber teams tackling today’s modern and emerging threats. \nPresenters:\nKevin Kennedy\, SVP\, Product Management\, Vectra\nKevin Kennedy is SVP\, Product Mgt at Vectra. Before Vectra\, he was VP\, Product Mgt at Agari Data. Prior to Agari\, Kevin was Senior Dir of Security Product Mgt at Juniper. Kevin earned his BSE in computer engineering at the Univ of Michigan. \nWho Can Attend:\nOpen only to InfraGard members and their guests \nRegistration:\nhttps://attendee.gotowebinar.com/register/9067395738139971852
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-ai-for-threat-detection-getting-beyond-the-buzzwords-of-artificial-intelligence/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20220216T090000
DTEND;TZID=America/Los_Angeles:20220216T120000
DTSTAMP:20260403T163355
CREATED:20220128T154057Z
LAST-MODIFIED:20220128T155502Z
UID:4386-1645002000-1645012800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Digital Exhaust / Digital Footprint Removal 1.0
DESCRIPTION:**This class is eligible for 3 CPE credits from ASIS\nThe Digital Exhaust Removal course is a series of classes designed to instruct InfraGard attendees who work in critical infrastructure and key resources in the planning\, assessment\, and mitigation of their personal and/or organizations digital exhaust/digital footprint.\nThe first class (Digital Exhaust 1.0) will cover: \nTopics:\n1. What is digital exhaust / digital footprint?\n2. How does digital exhaust affect your personal and professional life?\n3. Digital exhaust and the tie-in to critical infrastructure and key resources\n4. Is it too late to deal with my digital exhaust (why now)?\n5. Navigating your digital footprint\n6. Starting your digital exhaust removal process (where to start) \nPresenters:\nCounter Terrorism Watch CTW\, CEO\nSubject Matter Expert (SME) is C-T Watch\, Inc. OSINT investigator and has Subject matter OISNT\, SOCMINT\, and cyber investigations. An active member of ASIS\, Women in Tech (WIT) and Women in Defense (WID)\, is a graduate of the FBI CA. \nWho Should Attend: \nOpen to anyone. Target Audience: Target audience are Critical Infrastructure Protection and Key Resource (CIKR) Partners\, InfraGard members\, Telecommunication Operators\, Crime Analysts\, Criminal Intelligence Analysts and Fusion Center partners and law enforcement. \nRegistration:\nhttps://attendee.gotowebinar.com/register/6361443745711430924
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-digital-exhaust-digital-footprint-removal-1-0/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220216T140000
DTEND;TZID=America/New_York:20220216T150000
DTSTAMP:20260403T163355
CREATED:20220131T002655Z
LAST-MODIFIED:20220131T002900Z
UID:4390-1645020000-1645023600@www.infragardnational.org
SUMMARY:Webinar Broadcast: A CISO Developed DevSecOps Supply Chain Best Practices
DESCRIPTION:This briefing is based on the findings of a cross-sector task force of CISOs\, and staff led by Rockwell Automation\, a leading developer of commercial software. The task force was organized in response to the software supply chain attacks\, like SolarWinds and Kaseya\, which have devastated entire commercial ecosystems. \nObjectives:\nThe task force recommended five practices — managing code integrity and employing non-repudiation methods\, among them – that have the greatest impact on reducing risks the risks of becoming a victim or carrier of malware from software acquired or developed. Task force members also cited commercial tools they used to support these practices\, such as insider threat code review and code signing solutions. \nPresenters:\nAndres Andreu\, CISO\, 2U\nCurrent CISO for 2U\, previously a CTO for a variety of companies and a Cybersecurity expert at the DEA. \nBob Pingel\, Senior Manager\, Technical Security Strategy\, Rockwell Automation \nWho Can Attend:\nOpen to anyone. Aimed toward CISO’s\, Directors\, Managers and other cybersecurity leaders. \nRegistration:\nhttps://us02web.zoom.us/webinar/register/6616432079999/WN_7-j53tonQ9u08qLebe2oJA
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-a-ciso-developed-devsecops-supply-chain-best-practices/
END:VEVENT
END:VCALENDAR