IMA Webinar Broadcast: Suspicious Activity Reporting (SAR)
The objective of this course is to instruct and advise attendees on how and when to submit Suspicious Activity Reports (SAR). Instruction will work through the Nationwide SAR Cycle to […]
The objective of this course is to instruct and advise attendees on how and when to submit Suspicious Activity Reports (SAR). Instruction will work through the Nationwide SAR Cycle to […]
In today's rapidly evolving technological landscape, the emergence of quantum computers and the unprecedented advancements in artificial intelligence (AI) have introduced new dimensions of complexity and uncertainty to the realm […]
This is another in our FREE series of Global Threat & Ukraine updates. Global Threat Overview and Ukraine Update is a slight variation on the well-received webinars (with unprecedented registration/participation) […]
Situational awareness involves perceiving behaviors and environmental factors happening around you and how they can translate into threats. Most people don’t have a problem perceiving behaviors and environments but few […]
Join the Legal CSC for a virtual discussion on recent regulatory trends and legislative developments concerning the use and impact of artificial intelligence technology. We will also examine potential intersections […]
We live in a period of massive digital transformation with more and more of our critical infrastructure technology moving online and becoming increasingly interconnected. When combined with current international conflicts […]
InfraGard National Members Alliance is pleased to partner once again with ASIS. Global Security Exchange (GSX) 2023 is an integrated experience with in-person and digital features that will take place […]
In today's digital age, your personal information is more exposed than ever. Advertisers, hackers, and even stalkers can exploit your digital footprint, impacting not just you but your friends, family, […]
Chris is a voice of the industry who has worked with multiple fraud teams and presented at many senior centers to educate the public about these crimes. Chris will share […]
In an era where threats to critical infrastructure are evolving rapidly, the demand for advanced OSINT tools is at its zenith. Whether you're safeguarding national assets, working within Federal, State, […]
This briefing is based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing effective vulnerability management practices. Topics […]
This briefing is based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing effective vulnerability management practices. Topics […]