BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//InfraGard National Members Alliance - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:InfraGard National Members Alliance
X-ORIGINAL-URL:https://www.infragardnational.org
X-WR-CALDESC:Events for InfraGard National Members Alliance
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20220313T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20221106T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20230312T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20231105T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20240310T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20241103T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20220313T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20221106T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20230312T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20231105T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20240310T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20241103T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20220313T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20221106T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20230312T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20231105T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20240310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20241103T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230927T090000
DTEND;TZID=America/Los_Angeles:20230927T110000
DTSTAMP:20260403T185021
CREATED:20230818T150313Z
LAST-MODIFIED:20230831T234956Z
UID:4949-1695805200-1695812400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: FBI Quarterly - Artificial Intelligence
DESCRIPTION:This is a free quarterly briefing by the LA FBI. \nFBI Los Angeles’ Intelligence Division will provide an overview of generative artificial intelligence (AI)\, with a focus on ChatGPT and a discussion of threat implications from this emerging technology. The team will examine the potential impact of ChatGPT on different threats\, including domestic and international terrorism\, cyber and financial crimes\, and foreign malign influence. The analysts will also briefly examine other generative AI applications being developed nationally and globally\, and how this technology may evolve in the near future. \nPlease note\, you must be an Infragard member to attend this briefing. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nRegistration: \n\n\n\n\n\nRefer to the weekly InfraGard events newsletter for registration information
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-fbi-quarterly-artificial-intelligence/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230926T090000
DTEND;TZID=America/Los_Angeles:20230926T100000
DTSTAMP:20260403T185021
CREATED:20230831T235630Z
LAST-MODIFIED:20230831T235630Z
UID:4957-1695718800-1695722400@www.infragardnational.org
SUMMARY:AZ InfraGard Webinar: Introduction to Russian Intelligence and Security Service
DESCRIPTION:Learn about the history\, mission\, organization\, and functions of Russia’s primary intelligence and security services to include; Foreign Intelligence Service (SVR); Federal Security Service (FSB); Federal Protective Service (FSO); Federal Border Service (FPS); the Main Directorate of the General Staff-Intelligence (GRU); Special Purpose Police Unit (OMON)\, and the role of Spetsnaz in intelligence.\n\n\nLearning Outcomes/Objectives\n\n\nLecture provides insights with real world examples with emphasis on; traditional intelligence missions of: human\, signals\, and imagery; domestic and foreign counterintelligence; electronic warfare; space operations; and economic intelligence. Additionally\, cyber\, Active Measures\, disinformation\, propaganda\, assassination\, influence operations\, counter terrorism\, and the use of proxies are discussed. \n\n\n\nOpen only to vetted InfraGard members \nRefer to the weekly InfraGard events newsletter for registration information
URL:https://www.infragardnational.org/event/az-infragard-webinar-introduction-to-russian-intelligence-and-security-service/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230925T080000
DTEND;TZID=America/New_York:20230927T170000
DTSTAMP:20260403T185021
CREATED:20230804T153833Z
LAST-MODIFIED:20230804T153833Z
UID:4940-1695628800-1695834000@www.infragardnational.org
SUMMARY:InfoSec World
DESCRIPTION:InfraGard National Members Alliance is pleased to partner once again with InfoSec World. Now in its 29th year\, InfoSec World is known as the “Business of Security” conference bringing together practitioners and executives for multiple days of top-notch education\, networking\, world-class conference programming\, enlightening keynotes\, a vibrant expo floor featuring the latest security solutions\, and more. \nClick to register. 
URL:https://www.infragardnational.org/event/infosec-world/
LOCATION:Disney Coronado Springs Resort\, 1000 W Buena Vista Dr\, Lake Buena Vista\, Florida\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230921T140000
DTEND;TZID=America/New_York:20230921T150000
DTSTAMP:20260403T185021
CREATED:20230917T164137Z
LAST-MODIFIED:20230917T170003Z
UID:4966-1695304800-1695308400@www.infragardnational.org
SUMMARY:A CISO’s Guide to Effective Vulnerability Management
DESCRIPTION:This briefing is based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing effective vulnerability management practices. Topics discussed include: (1) managing vulnerabilities on premises\, in the Cloud\, and in third-party environments; (2) identification\, classification\, prioritization\, and remediation best practices; (3) standards\, charters; (4) organizational structures; and (5) scanning tools. \nLearning Outcomes/Objectives \n\nUpon completion of this webinar\, the attendee/student will be able to manage vulnerabilities on premises\, in the Cloud and in third-party environments\nUpon completion of this webinar\, the attendee/student will be able to execute identification\, classification\, prioritization\, and remediation best practices\nUpon completion of this webinar\, the attendee/student will be able to develop standards and charters around vulnerability management\n\nPresenters \nKristina Belnap\, CISO\, HealthEquity – As the SVP\, CISO at HealthEquity\, I am responsible for overseeing the security and compliance of the company’s data\, systems\, and operations in the healthcare industry. I have over 15 years of experience in leading and managing security\, compliance\, BCP/disaster recovery\, policy/procedures/plan development\, information technology\, banking technology regulation\, and online gaming regulations project \nJohn Nagencast\, Sr. Information Security Architect at Penn National Insurance – John Nagengast\, CISSP\, MSIT\, is a certified security professional currently employed as a Senior Information Security Architect at Penn National Insurance where he has been involved with infrastructure architecture and security design for the past 23 years. As a lead architect within the Information Security Unit\, he was responsible for the overall design and implementation of the organization’s \nJeremy Rowley\, Vulnerability Management\, Lenovo and Motorola Mobility – Jeremy Rowley is a professional with a noteworthy track record in the field of information technology. Jeremy has been a valuable asset to Lenovo’s Vulnerability Management division\, demonstrating exceptional expertise and unwavering commitment. \nClick to Register
URL:https://www.infragardnational.org/event/a-cisos-guide-to-effective-vulnerability-management/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230921T140000
DTEND;TZID=America/New_York:20230921T150000
DTSTAMP:20260403T185021
CREATED:20230907T155726Z
LAST-MODIFIED:20230907T155800Z
UID:4962-1695304800-1695308400@www.infragardnational.org
SUMMARY:INMA Partner Event: A CISO’s Guide to Effective Vulnerability Management
DESCRIPTION:This briefing is based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing effective vulnerability management practices. Topics discussed include: (1) managing vulnerabilities on premises\, in the Cloud\, and in third-party environments; (2) identification\, classification\, prioritization\, and remediation best practices; (3) standards\, charters; (4) organizational structures; and (5) scanning tools. Supporting tools that will be shown during the briefing include: (1) A CISO’s Guide to Effective Vulnerabilities; and (2) Vulnerability Management Maturity Checklist. \nJohn Nagencast\, Senior Information Security Architect\, Penn National Insurance\nJohn Nagengast is a certified security professional currently employed at Penn National Insurance where he has been involved with infrastructure architecture and security design for the past 23 years. As a lead architect within the Information Security Unit\, he was responsible for the overall design and implementation of the organization’s Vulnerability Management Program. \nJeremy Rowley\, Vulnerability Management\, Lenovo and Motorola Mobility\nJeremy Rowley is a professional with a noteworthy track record in the field of information technology. Jeremy has been a valuable asset to Lenovo’s Vulnerability Management division\, demonstrating exceptional expertise and unwavering commitment. \nBrad Skrbec\, Senior Manager Risk & Vulnerability Management\, Lenovo and Motorola Mobility\nBrad Skrbec boasts an impressive career spanning over 35 years at Motorola/Lenovo\, where he has continuously evolved his role to meet the demands of the ever-changing technological landscape. With humble beginnings as a software engineer\, Brad’s journey has led him to become a cybersecurity veteran\, amassing over two decades of expertise in the field. \nPresented by CyberRisk Alliance\, an INMA Partner \nClick to register \n 
URL:https://www.infragardnational.org/event/inma-partner-event-a-cisos-guide-to-effective-vulnerability-management/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230920T090000
DTEND;TZID=America/Los_Angeles:20230920T120000
DTSTAMP:20260403T185021
CREATED:20230818T145919Z
LAST-MODIFIED:20230831T215818Z
UID:4947-1695200400-1695211200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: OSINT Tools 1 (Utilizing Open-Source Intelligence Tools)
DESCRIPTION:In an era where threats to critical infrastructure are evolving rapidly\, the demand for advanced OSINT tools is at its zenith. Whether you’re safeguarding national assets\, working within Federal\, State\, or Local Law Enforcement\, serving in the military\, or ensuring corporate security\, mastering and collating the right OSINT tools can be a game-changer. Introducing a specialized OSINT Tools course meticulously crafted for professionals in the critical infrastructure protection sectors\, law enforcement at all levels\, military personnel\, and corporate security analysts. Empower yourself with the expertise to adeptly harness the potential of OSINT tools. Elevate your defense and intelligence strategies with the pinnacle of open-source intelligence! \nTopics:\n1. Deep Dive into OSINT: Grasp the expansive realm of Open-Source Intelligence and its indispensable role in contemporary security.\n2. Cross Sector Modules: Content uniquely designed to address the distinct needs of critical infrastructure sectors\, law enforcement agencies\, military operations\, and corporate security.\n3. OSINT Tools: Collect\, collate and rid yourself of that Excel worksheet when it comes to current online open-source tools.\n4. Advanced Techniques: Delve deeper than the basics and uncover state-of-the-art strategies and tools that are revolutionizing intelligence gathering. \nPresenter:\nSubject Matter Expert (SME) is C-T Watch\, Inc. OSINT investigator and has developed their online research skills from the early days of the internet and previous law enforcement career spanning 3 decades. Currently certified in OSINT and several advanced online investigation disciplines\, SME serves as an internal Investigator for a global NGO operating in dozens of countries. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nTarget Audience:\nCritical Infrastructure Protection and Key Resource (CIKR) Partners\, InfraGard members\, Telecommunication Operators\, Crime Analysts\, Criminal Intelligence Analysts and Fusion Center partners and law enforcement. \nRegistration: \nhttps://attendee.gotowebinar.com/register/9205398753458095193
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-osint-tools-1-utilizing-open-source-intelligence-tools/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230914T123000
DTEND;TZID=America/New_York:20230914T133000
DTSTAMP:20260403T185021
CREATED:20230811T153601Z
LAST-MODIFIED:20230811T153601Z
UID:4945-1694694600-1694698200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Elder Fraud / Scams
DESCRIPTION:Chris is a voice of the industry who has worked with multiple fraud teams and presented at many senior centers to educate the public about these crimes. Chris will share his real experiences listening to seniors who have been victimized by scams\, and you’ll leave this webinar with invaluable information on the telltale signs of these scams. This webinar will empower you\, your family\, and friends to fight back against Scams Affecting Elders. \nPresenter:\nChris St. Aubin\, Principal & VP\, Deer Brook Consulting\nChris is a certified cybercrime investigator with 12 years of experience working with fraud teams in community banking. As a principal at Deer Brook Consulting\, he delivers fractional CISO and compliance consulting services to community banks\, credit unions\, and non-profit organizations. Chris serves as President of InfraGard’s Maine chapter \nWho Can Attend:\nOpen to anyone. \nTarget Audience:\nThis webinar will empower you\, your family\, and friends to fight back against Scams Affecting Elders. With Grandparent’s Day being September 12th\, now is a great time to think about the elders in your life and how you can protect them. \nRegistration:\nhttps://attendee.gotowebinar.com/register/4302744574751374429
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-elder-fraud-scams/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230913T090000
DTEND;TZID=America/Los_Angeles:20230913T120000
DTSTAMP:20260403T185021
CREATED:20230818T144958Z
LAST-MODIFIED:20230831T234835Z
UID:4946-1694595600-1694606400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Digital Footprint & Removal (Finding\, Protecting and Removing your personal information online)
DESCRIPTION:In today’s digital age\, your personal information is more exposed than ever. Advertisers\, hackers\, and even stalkers can exploit your digital footprint\, impacting not just you but your friends\, family\, your critical infrastructure sector and organization. But what if you could take control? Introducing a comprehensive course that demystifies the concept of finding your personal information online\, protecting your data and “opting out” – a term often heard in the world of Open-Source Intelligence (OSINT). If you’ve ever wondered how to shield your personal details from prying eyes\, this course is your guide. \nTopics:\n1. Digital Privacy 101: Understand the significance of your digital footprint and why it’s crucial to protect it.\n2. The Art of Opting Out: Dive deep into the process of removing your personal information from search sites and data brokers who might be selling your details.\n3. Strategies & Tools: Learn how to track websites that harvest your data and maintain a log of URLs where your information is found.\n4. Guard Your Personal Info: Discover techniques to manage and shield your name\, address\, phone number\, and more from unwanted online searches.\n5. Share Smartly: Grasp strategies to minimize the personal data you share online\, ensuring you’re not an easy target. \nPresenter:\nSubject Matter Expert (SME) is C-T Watch\, Inc. OSINT investigator and has developed their online research skills from the early days of the internet and previous law enforcement career spanning 3 decades. Currently certified in OSINT and several advanced online investigation disciplines\, SME serves as an internal Investigator for a global NGO operating in dozens of countries\, investigating risk\, threats and criminal acts against the organization and its stakeholders around the world. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nTarget Audience:\nCritical Infrastructure Protection and Key Resource (CIKR) Partners\, InfraGard members\, Telecommunication Operators\, Crime Analysts\, Criminal Intelligence Analysts and Fusion Center partners and law enforcement. \nRegistration: \n\n\n\n\n\nRefer to the weekly InfraGard events newsletter for registration information
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-digital-footprint-removal-finding-protecting-and-removing-your-personal-information-online/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20230911T080000
DTEND;TZID=America/Chicago:20230913T170000
DTSTAMP:20260403T185021
CREATED:20230804T153316Z
LAST-MODIFIED:20230804T153316Z
UID:4939-1694419200-1694624400@www.infragardnational.org
SUMMARY:Global Security Exchange (GSX) 2023 – Powered by ASIS
DESCRIPTION:InfraGard National Members Alliance is pleased to partner once again with ASIS. Global Security Exchange (GSX) 2023 is an integrated experience with in-person and digital features that will take place September 11-13 in Dallas\, Texas. The three-day event features daily global keynote and game-changer presentations\, as well as concurrent education sessions focusing on the most pressing issues faced by the security profession. The event will also feature an expansive exhibit hall both in-person and online via the GSX digital platform. \nPlease visit InfraGard National Members Alliance at booth #1819 in the Expo Hall with our sponsoring partners. \nClick to register.
URL:https://www.infragardnational.org/event/global-security-exchange-gsx-2023-powered-by-asis/
LOCATION:Kay Bailey Hutchinson Convention Center\, 650 S. Griffin St.\, Dallas\, TX 75202\, 650 S. Griffin St\, Dallas\, TX\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20230909T130000
DTEND;TZID=America/Chicago:20230909T170000
DTSTAMP:20260403T185021
CREATED:20230804T152243Z
LAST-MODIFIED:20230804T153438Z
UID:4936-1694264400-1694278800@www.infragardnational.org
SUMMARY:Fundamentals of Homeland Security: Critical Infrastructure Protection for Security Executives and Practitioners @ GSX 2023
DESCRIPTION:We live in a period of massive digital transformation with more and more of our critical infrastructure technology moving online and becoming increasingly interconnected. When combined with current international conflicts and emerging nationstate and organizational threats\, our nation now faces exceptional challenges in safeguarding its 16 critical infrastructure sectors from attack\, disruption\, and exploitation.\nOur national security and economic vitality is up to you\, the front line professionals\, executives\, practitioners\, and service providers who operate the majority of our nation’s critical infrastructure. To help strengthen your organization’s physical and cybersecurity\, InfraGard National Members Alliance proudly presents a signature workshop via our flagship National infrastructure Security and Resilience U education program. \nThis half-day workshop will provide attendees with knowledge\, skills and practical guidance in the following areas: what critical infrastructure protection is; the nature of the physical\, cyber\, and human (insider) threats; primary stakeholders and their roles and responsibilities; and the tools and resources available to help them better protect U.S. critical infrastructure \nSpeakers:\nMajor General James Williams\, USMC (ret)\, InfraGard North Texas Members Alliance\nChad Johnston\, Cybersecurity Advisor\, Cybersecurity and Infrastructure Security Agency\nCharles Kim\, FA Public-Private Partnership and Exercise Program Manager\, San Diego Law Enforcement Coordination Center\nPhilip Oglesby\, Critical Infrastructure Protection Unit\, San Diego Law Enforcement Coordination Center\nKimberly Pratt\, Director of Private Sector Engagement\, Northern California Regional Intelligence Center \nRegistration:\nhttps://www.gsx.org/gsx-pre-conference-programming/
URL:https://www.infragardnational.org/event/fundamentals-of-homeland-security/
LOCATION:Kay Bailey Hutchinson Convention Center\, 650 S. Griffin St.\, Dallas\, TX 75202\, 650 S. Griffin St\, Dallas\, TX\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20230907T120000
DTEND;TZID=America/Chicago:20230907T131500
DTSTAMP:20260403T185021
CREATED:20230728T152223Z
LAST-MODIFIED:20230831T234935Z
UID:4928-1694088000-1694092500@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Responsible by Design - The Emerging Frontier of AI Regulation and Governance
DESCRIPTION:Join the Legal CSC for a virtual discussion on recent regulatory trends and legislative developments concerning the use and impact of artificial intelligence technology. We will also examine potential intersections with data privacy laws and consider a common set of principles for corporate AI governance in the United States. \nPresenter:\nAaron Ting\, Associate General Counsel at Meta\nAaron Ting is an internet & policy lawyer in the tech industry\, including at Meta (formerly Facebook)\, Snapchat\, & Comcast. At the intersect of emerging tech & societal trends\, Aaron counseled new products from inception to launch\, architected global compliance programs\, advised on competition & consumer protection matters\, & conducted regulatory advocacy for globally-consistent consumer rights. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nTarget Audience:\nIndividuals interested in AI regulation and governance. \nRegistration: \n\n\n\n\n\nRefer to the weekly InfraGard events newsletter for registration information
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-responsible-by-design-the-emerging-frontier-of-ai-regulation-and-governance/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230823T090000
DTEND;TZID=America/Los_Angeles:20230823T120000
DTSTAMP:20260403T185021
CREATED:20230804T143827Z
LAST-MODIFIED:20230804T143827Z
UID:4934-1692781200-1692792000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: ADVANCED SITUATIONAL AWARENESS (ASAT)
DESCRIPTION:Situational awareness involves perceiving behaviors and environmental factors happening around you and how they can translate into threats. Most people don’t have a problem perceiving behaviors and environments but few know how to analyze the information you see to keep yourself safe. \nAdvanced awareness was designed for the military to increase situational awareness and make better decisions in times of stress or threat. With new and emerging threats to workplaces\, critical infrastructure facilities and while out in the general public it’s not just for the military anymore\, but for everyone who is out and about while shopping\, eating at restaurants or even simply taking a walk on the street. \nThis course will go over a variety of high-level behaviors and situations that you need to be aware of while you are at the workplace\, at home and especially out in public with your friends and family. \nTopics:\n• The Threat Timeline\n• Disrupting Dangerous Chain of Events\n• Behavior and Environmental Indicators of Potential Threats\n• Speeding Up Decision Making Under Stress and Anticipating your next Move (action vs reaction) \nPresenter: \nSME: Former USMC Combat Hunter Course instructor and the longest standing member of the Marine Corps Combat Hunter Program \nWho Can Attend:\nOpen only to InfraGard members and their guests. \nRegistration:\nhttps://attendee.gotowebinar.com/register/1130115867149306966
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-advanced-situational-awareness-asat/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230817T090000
DTEND;TZID=America/Los_Angeles:20230817T233000
DTSTAMP:20260403T185021
CREATED:20230721T151320Z
LAST-MODIFIED:20230721T151320Z
UID:4923-1692262800-1692315000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Global Threat Overview and Ukraine Update
DESCRIPTION:This is another in our FREE series of Global Threat & Ukraine updates.\nGlobal Threat Overview and Ukraine Update is a slight variation on the well-received webinars (with unprecedented registration/participation) that have become an InfraGard staple over the last 16 months. This begins by providing a worldwide threat overview looking at actual or potential flashpoints\, conflicts\, tensions and strategic dynamics that will feature Iran\, the Middle East\, China\, the South China Sea\, and other regions\, then a deep dive into the latest developments with the Russo-Ukraine War that both includes but goes beyond the battlefield to examining larger economic and global supply chain implications from this conflict. It will also address emerging technologies\, weapons and other rapid changes in warfighting that have been seen in this conflict. This webinar will start with a Cyberthreat update from the FBI\, then will go into global threats\, and then a comprehensive Ukraine War update followed by a Q&A session. \nPresenter:\nHal Kempfer is an instructor for InfraGard programs going back nearly two decades and is a regular on-air “expert” on National Security and Homeland Security matters featured on Fox\, NewsNation\, ABC\, CBS\, NPR and a variety of other media outlets. \nA retired Marine Corps Intelligence Officer (LtCol)\, he has travelled the country and world addressing a variety of strategic threat issues such as terrorism\, war and both man-made and natural disasters/emergency preparedness\, and today is part of a global engagement by the United States government dealing with a host of strategic and maritime security issues\, while also assisting a variety of venues\, agencies and organizations improve their emergency preparedness and overall safety/security posture. \nWho Can Attend:\nOpen to anyone. \nRegistration:\nhttps://attendee.gotowebinar.com/register/4375674081069504349
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-global-threat-overview-and-ukraine-update-3/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20230809T100000
DTEND;TZID=America/Chicago:20230809T110000
DTSTAMP:20260403T185021
CREATED:20230721T145800Z
LAST-MODIFIED:20230721T145800Z
UID:4922-1691575200-1691578800@www.infragardnational.org
SUMMARY:Navigating the Future: Modernizing Cyber Security Risk in the Age of Quantum Computers
DESCRIPTION:In today’s rapidly evolving technological landscape\, the emergence of quantum computers and the unprecedented advancements in artificial intelligence (AI) have introduced new dimensions of complexity and uncertainty to the realm of cybersecurity. As organizations strive to protect their valuable data and systems from ever-evolving threats\, it is crucial to understand how to adapt and modernize cybersecurity risk management practices. \nPresenters:\nLester J. Millet III\, Port of South Louisiana / InfraGard Louisiana President\nLester Millet III has held the positions of Policy & Planning Director and Safety Risk Agency Manager for the Port of South Louisiana for the past Seventeen years\, serving as a public / private stakeholder liaison on issues pertaining to Port Security and Emergency Preparedness\, along with his policy & grant writing subject matter expertise. Lester is currently President of InfraGard Louisiana. \nRyan Cloutier\, Chief Information Security Officer /SynapTech Services\nRyan Cloutier is the Chief Information Security Officer and Visionary for SynapTech Services. He is an experienced IT/Cyber Security professional with over 15 years of experience developing Cyber Security programs. Ryan is a virtual Chief Information Security Officer for organizations across the country and is Certified Information Systems Security Professional CISSP® proficient in cloud security \nJon B. Davis\, CEO SecureNation\nJon Davis is the CEO and founder of SecureNation. John’s background is in compliance driven IT security initiatives such as FISMA\, GLBA\, SOX\, FDIC\, NCUA\, OCC and HIPAA. For the past ten years he has worked with some of the nation’s top network security providers and has helped to secure many of the largest businesses and financial institutions in the country. \nWho Can Attend:\nOpen to anyone. \nTarget Audience:\nAnyone Interested in learning how quantum computers & AI are revolutionizing the cyber landscape. \nRegistration:\nhttps://attendee.gotowebinar.com/register/3463908461759227998
URL:https://www.infragardnational.org/event/navigating-the-future-modernizing-cyber-security-risk-in-the-age-of-quantum-computers/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230808T090000
DTEND;TZID=America/Los_Angeles:20230808T113000
DTSTAMP:20260403T185021
CREATED:20230728T150420Z
LAST-MODIFIED:20230728T150420Z
UID:4926-1691485200-1691494200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Suspicious Activity Reporting (SAR)
DESCRIPTION:The objective of this course is to instruct and advise attendees on how and when to submit Suspicious Activity Reports (SAR). Instruction will work through the Nationwide SAR Cycle to assist with a description of the trained attendee’s role in suspicious activity reporting. Training will examine available resources\, tools\, and methods for submitting SARs\, examine the observable behaviors that should be reported as SARs\, identify the essential information to include in a SAR\, and examine the privacy\, civil rights\, and civil liberty guidelines for SAR reporting. Furthermore\, some examples and testing of attendees knowledge on what is considered a SAR reportable incident vs an immediate emergent situation that requires calling emergency services (911). A section on how to write an appropriate SAR (key elements such as who\, what\, where\, when and photographic and or video documentation guidelines) will also be covered. \nTopics:\n1. What is the definition of a SAR?\n2. SAR statistics (local and national)\n3. Privacy\, Civil Rights and Civil Liberty considerations and guidelines.\n4. The role of law enforcement and fusion centers in the SAR process\n5. Background on the NSI (National Suspicious Activity Reporting) initiative.\n6. Where do SAR reports go?\n7. Key elements of reportable suspicious activities (indicators and behaviors)\n8. Examples of indicators and behaviors (breach\, misrepresentation\, sabotage\, etc.)\n9. Who can submit a SAR?\n10. The difference between when to call 911 vs submitting a SAR\n11. How to write a SAR (private sector)\n12. Where to submit a SAR (local: Fusion center\, FBI\, LAPD\, LASD / Domestic: Fusion center or local agency)\n13. Case studies of SAR’s from the private sector\n14. DHS: The Power of Hello – De-escalation \nWho Can Attend:\nOpen to anyone. \nTarget Audience:\nTarget audience are Critical Infrastructure Protection and Key Resource (CIKR) Partners\, InfraGard members\, Telecommunication Operators\, Crime Analysts\, Criminal Intelligence Analysts and Fusion Center partners and law enforcement. \nRegistration:\nhttps://attendee.gotowebinar.com/register/6290594527120331103
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-suspicious-activity-reporting-sar-3/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230803T140000
DTEND;TZID=America/New_York:20230803T150000
DTSTAMP:20260403T185021
CREATED:20230721T152158Z
LAST-MODIFIED:20230721T152158Z
UID:4924-1691071200-1691074800@www.infragardnational.org
SUMMARY:INMA Partner Webinar: Effective Cybersecurity Policies for AI and Emerging Technologies
DESCRIPTION:This briefing is based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing effective cybersecurity policies that address the security challenges of AI and other emerging technologies. Topics discussed include: (1) policies frameworks; (2) administration (updates\, approvals); (3) communication (e.g.\, to employees\, contractors); (4) traditional policies (AUP\, Functional\, Data Classification\, Privacy); (5) emerging technology policies (AI\, Robotics); and (6) policy refresh best practices. \nPresenters:\nRaul Iglesias\, Cloud Risk and Compliance Architect\, Cloud Center of Excellence\, Regions Bank\nRaul Iglesias has been with Regions Bank for almost 3 years and in his current role as Information Security Architect\, among other responsibilities\, he is responsible for drafting cybersecurity-related policies and standards based on leading cybersecurity frameworks and industry and regulatory requirements. Raul is an active member in various cybersecurity-related working groups. \nKyle Way\, Director\, Information Security\, Heaven Hill \nSelamawit (Sally) Lulu\, Senior Vice President- Director\, GRC\, Risk Treatment & Cybersecurity Education and Awareness at Northern Trust Corporation\nResult driven Information Security & Technology Governance\, Risk and Control professional with over 15+ years of exprience in IT\, Operational\, Advisory and Compliance audits\, Operational Risk Management and development and maintenance of Information Security and Technology policy\, program\, standards and guidelines. \nJames Gibson\, Director\, Systems Configuration & Compliance at BlueHalo \nWho Can Attend:\nOpen to anyone. \nTarget Audience:\nCISOs\, Cyber Leaders\, Cyber Policy professionals\, BISO\, Director of IT\, Cybersecurity Managers\, GRC\, Compliance \nRegistration:\nhttps://us02web.zoom.us/webinar/register/9816897751552/WN_B6eHHLenQnm8WfFO_QrSXg
URL:https://www.infragardnational.org/event/inma-partner-webinar-effective-cybersecurity-policies-for-ai-and-emerging-technologies/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230726T090000
DTEND;TZID=America/Los_Angeles:20230726T113000
DTSTAMP:20260403T185021
CREATED:20230707T141043Z
LAST-MODIFIED:20230707T141043Z
UID:4916-1690362000-1690371000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Open-Source Information (OSIF) Lab 4: Finding People & Social Media Intelligence (SOCMINT)
DESCRIPTION:Social Media information gathering (SOCMINT) lab series will cover the basics of conducting social media research. This will be a “how-to” on intermediate and advanced search and location techniques (AST) of social media accounts\, activity and monitoring. The series will be structured in a manner where audience participation is an option (attendees can shadow the instructor and conduct searches of their own while listening to the SME). Imparting this knowledge and skills to those who work in critical infrastructure and key resources (CIKR) is important\, will save the attendee time and will assist in narrowing the search results to the relevancy of the search conducted. \nTopics:\n1. Types of Social Media content and platforms\n2. Social Media search methods and advanced search operators\n3. Find social media users across multiple platforms\n4. Privacy risks to the information collector \nPresenter:\nSubject Matter Expert (SME) is C-T Watch\, Inc. OSINT investigator and has developed their online research skills from the early days of the internet and previous law enforcement career spanning 3 decades. Currently certified in OSINT and several advanced online investigation disciplines\, SME serves as an internal Investigator for a global NGO operating in dozens of countries\, investigating risk\, \nWho Can Attend:\nOpen only to vetted InfraGard members. \nTarget Audience:\nTarget audience are Critical Infrastructure Protection and Key Resource (CIKR) Partners\, InfraGard members\, Telecommunication Operators\, Crime Analysts\, Criminal Intelligence Analysts and Fusion Center partners and law enforcement. \nRegistration:\nhttps://attendee.gotowebinar.com/register/1575179481733886815
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-open-source-information-osif-lab-4-finding-people-social-media-intelligence-socmint/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230720T110000
DTEND;TZID=America/New_York:20230720T120000
DTSTAMP:20260403T185021
CREATED:20230707T141853Z
LAST-MODIFIED:20230707T141853Z
UID:4917-1689850800-1689854400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Internet Crime Complaint Center (IC3)
DESCRIPTION:The InfraGard West Virginia Member Alliance is pleased to present West Virginia’s very own Rachelle Barnette\, a senior analyst with the Internet Crime Complaint Center for a discussion of the current threat landscape and how the Internet Crime Complaint Center can benefit you. \nPresenter:\nRachelle Barnette\, FBI Management and Program Analyst (IC3)\nAs a senior analyst at the Internet Crime Complaint Center (IC3)\, Mrs. Barnette is an active member of the Cyber Threat Team\, has been employed with the FBI for 26 years\, and with the IC3 for 19 years. Accolades received include\, but not limited to\, two FBI Assistant Director’s Awards for Outstanding Contributions to State and Local Public Safety and Excellence in Investigative Support. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nTarget Audience:\nInfraGard members. \nRegistration:\nhttps://www.eventbrite.com/e/internet-crime-and-complaint-center-tickets-673053028727
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-internet-crime-complaint-center-ic3/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230712T100000
DTEND;TZID=America/Los_Angeles:20230712T110000
DTSTAMP:20260403T185021
CREATED:20230630T144945Z
LAST-MODIFIED:20230630T144945Z
UID:4915-1689156000-1689159600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: AZ InfraGard Webinar - Cyber Threat Landscape Update
DESCRIPTION:Join us in July as we present a webinar with a different take on cyber threats. We’ve got Joe Marshall from Cisco’s Talos Intelligence Group joining us to share what they have been seeing at Talos. Joe specializes industrial control systems\, critical infrastructure protection\, and IoT device security. If you’ve got SCADA\, ICS\, or IoT devices in your environment\, you’re not going to miss this one! \nPresenter:\nJoe Marshall\, Senior Strategist\, ICS/Threat Research\nJoe Marshall is with Cisco Talos Intelligence Group\, one of the largest commercial threat intelligence teams in the world. Joe specializes in industrial control systems\, critical infrastructure protection\, and IoT device security. Joe has worked with public and private industry around the world to help secure critical ICS and IoT assets from threats both mundane a and exotic. \nWho Can Attend:\nOpen only to InfraGard members and their guests. \nTarget Audience:\nIT Sector\nCybersecurity Professionals\nAnyone else concerned about Cyber \nRegistration:\nhttps://attendee.gotowebinar.com/register/1569304790839140697
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-az-infragard-webinar-cyber-threat-landscape-update/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230712T090000
DTEND;TZID=America/Los_Angeles:20230712T100000
DTSTAMP:20260403T185021
CREATED:20230623T150605Z
LAST-MODIFIED:20230623T150605Z
UID:4913-1689152400-1689156000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: FBI Brief - Artificial Intelligence
DESCRIPTION:This is a free briefing by the LA FBI. \nFBI Los Angeles’ Intelligence Division will provide an overview of generative artificial intelligence (AI)\, with a focus on ChatGPT and a discussion of threat implications from this emerging technology. The team will examine the potential impact of ChatGPT on different threats\, including domestic and international terrorism\, cyber and financial crimes\, and foreign malign influence. The analysts will also briefly examine other generative AI applications being developed nationally and globally\, and how this technology may evolve in the near future. \nPlease note\, you must be an Infragard member to attend this briefing. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nRegistration:\nhttps://attendee.gotowebinar.com/register/862834485194346330
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-fbi-brief-artificial-intelligence/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230629T140000
DTEND;TZID=America/New_York:20230629T150000
DTSTAMP:20260403T185021
CREATED:20230609T003251Z
LAST-MODIFIED:20230609T003251Z
UID:4908-1688047200-1688050800@www.infragardnational.org
SUMMARY:INMA Partner Webinar: Security Metrics in the Boardroom and in the Backroom
DESCRIPTION:This briefing is based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing boardroom metrics and KPI metrics to support their cybersecurity programs. Topics discussed will include: (1) designing and implementing a metrics program using the Cybersecurity Collaborative (CSC) Metrics Three-Tiered Framework (operational metrics\, security program metrics\, and risk/compliance metrics for the Board); (2) the use of the CSC Security Metrics Workbook to gauge program maturity and measure operational performance; and (3) developing an effective boardroom presentation using security metrics. \nPresenters:\nArlan McMillan\, CISO\, Kirkland & Ellis\nArlan McMillan is the Chief Security Officer (CSO) for Kirkland & Ellis LLP. Kirkland is an international law firm that serves a broad range of clients around the world in private equity\, M&A and other corporate transactions\, litigation\, white collar and government disputes\, restructurings and intellectual property matters. \nScott Schmuhl\, CISO\, Merrick Bank\nTransforming customer experience and business operations through improved processes\, technology\, and security. Even more passionate about enabling the transformation of people as they grow in their careers and life.Path-finding\, aligning\, empowering\, and serving people to do the right things\, and do things right. I’m a troubleshooter\, an organizer\, and a leader. \nLou Klubenspies\, CISO\, Revvity \nNick Tzanev\nPragmatic trailblazer in a regulated industry\, focused on Information Security\, Digital Employment Experience\, Software\, and Talent Development. Driven by challenge\, innovation\, and competition\, I excel at managing shifting priorities. I focus on talent development\, and believe in simplicity\, integrity\, and results. Will lead\, transform\, and deliver. \nWho Can Attend:\nOpen to anyone. \nTarget Audience:\nCISOs\, Senior Cybersecurity Professionals\, Cyber Professionals and Practitioners \nRegistration:\nhttps://us02web.zoom.us/webinar/register/6016860781700/WN_9qgnFYb9TuyunayjHnI2LA
URL:https://www.infragardnational.org/event/inma-partner-webinar-security-metrics-in-the-boardroom-and-in-the-backroom/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230629T083000
DTEND;TZID=America/Los_Angeles:20230629T113000
DTSTAMP:20260403T185021
CREATED:20230602T145536Z
LAST-MODIFIED:20230602T145536Z
UID:4906-1688027400-1688038200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Recognizing Hostile Surveillance by Terrorist Groups and Organized Criminals
DESCRIPTION:Step into the world of crime prevention with our immersive course on “Recognizing Hostile Surveillance”. This three-hour training is designed to provide you with the knowledge and skills to detect and report effectively on hostile surveillance activities. \nHostile surveillance is a process by which individuals or groups systematically observe and gather information about a person\, group\, or location with malicious intent. This may be carried out by criminal groups\, terrorists\, stalkers\, or any other entities with intent to harm or exploit. The purpose of hostile surveillance can vary\, but it is often conducted as a precursor to serious crimes like kidnappings\, bombings\, thefts\, or acts of terrorism. The surveillance provides valuable information to these individuals or groups\, allowing them to plan and execute their harmful actions more effectively. They may be looking for patterns\, routines\, vulnerabilities\, or any other useful information that would facilitate their intended crime. \nThis course will help you to:\n· Understand the nature of surveillance tactics used by criminal groups and organized crime syndicates.\n· Identify signs of physical and digital surveillance.\n· Grasp the motivations behind criminal surveillance activities.\n· Learn from real-world case studies to see how surveillance has been successfully detected and addressed.\n· Develop effective strategies for countering surveillance and improving personal and professional security. \nPresenter:\nCTWatch\nSubject Matter Expert (SME) is a retired 25-year veteran Operations Officer from the CIA (Central Intelligence Agency. SME’s operational background includes Counter-Terrorism Operations\, Counter-Proliferation Operations\, Counter-Intelligence Operations\, Counter-Narcotics Operations\, and HUMINT (Human-Intelligence) Operations. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nTarget Audience:\nCritical Infrastructure Protection and Key Resource (CIKR) Partners\, InfraGard members\, Private Security\, DOD\, IC\, Fusion Center partners and law enforcement agencies. \nRegistration:\nhttps://attendee.gotowebinar.com/register/3184369723962553946
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-recognizing-hostile-surveillance-by-terrorist-groups-and-organized-criminals/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230628T130000
DTEND;TZID=America/New_York:20230628T140000
DTSTAMP:20260403T185021
CREATED:20230602T143954Z
LAST-MODIFIED:20230602T143954Z
UID:4903-1687957200-1687960800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: The Anti-Human Trafficking Intelligence Initiative
DESCRIPTION:Maine’s InfraGard Member Alliance invites you to attend a presentation with the Anti-Human\nTrafficking Intelligence Initiative. Sponsored by Deer Brook Consulting\, Kennebunk Maine\nThe AHTII processes open-source and other intelligence to detect links between online human\ntrafficking and local businesses. This service can greatly enhance BSA\, AML\, KYC\, and fraud\nprevention. They provide financial institutions with the ability identify likely connections\nbetween customer accounts belonging to traffickers. \nPresenter:\nLarry Cameron\, CISO\, The Anti-Human Trafficking Intelligence Initiative\nLarry has 20+ years of experience in the technology and cyber security industries. He is the CISO at the Anti-Human Trafficking Intelligence Initiative (ATII) and an OSINT Investigator / Lead Cryptocurrency Forensic Specialist for the National Child Protection Task Force (NCPTF). \nWho Can Attend:\nOpen only to vetted InfraGard members. \nTarget Audience:\nFinancial Services Sector\, Cybersecurity\, BSA\, AML\, KYC\, Fraud Prevention Units \nRegistration:\nhttps://www.eventbrite.com/e/the-anti-human-trafficking-intelligence-initiative-tickets-647453219007
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-the-anti-human-trafficking-intelligence-initiative/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230628T110000
DTEND;TZID=America/New_York:20230628T120000
DTSTAMP:20260403T185021
CREATED:20230616T143512Z
LAST-MODIFIED:20230616T143512Z
UID:4911-1687950000-1687953600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Impact of Artificial Intelligence (AI) on Threats\, Defenses\, and Technology
DESCRIPTION:Impact of Artificial Intelligence (AI) on threats\, defenses\, chatGPT technology\, and HODL (Hold On For Dear Life). Malicious cyber actors threaten public safety and our national and economics security. The schemes and techniques of cyber criminals are constantly evolving\, and their threats are becoming more complex. The FBI is committed to working with our federal counterparts\, our foreign partners\, and the private sector to address those threats. \nThe Albany InfraGard Chapter invites you to learn directly from the FBI subject matter experts about some the current trending topics including threats and defense relative to Artificial Intelligence\, Machine Learning\, and ChatGPT\, including HODL\, and a case study about crypto investment fraud as part of a romance scam. \nPresenters:\nRoderick Link\, Computer Scientist\, FBI\nRoderick Link is a computer scientist with the FBI Albany field office. \nMichael Lim\, Digital Operations Specialist\, FBI\nMichael Lim is a Digital Operations Specialist with the Albany FBI field office. \nWho Can Attend:\nOpen to anyone. \nRegistration:\nhttps://www.eventbrite.com/e/impact-of-artificial-intelligence-ai-on-threats-defenses-and-technology-tickets-656789333577
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-impact-of-artificial-intelligence-ai-on-threats-defenses-and-technology/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230627T110000
DTEND;TZID=America/New_York:20230627T120000
DTSTAMP:20260403T185021
CREATED:20230609T004713Z
LAST-MODIFIED:20230609T004713Z
UID:4909-1687863600-1687867200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Human Factor Controls and Behavior Change
DESCRIPTION:Security Awareness is well known for being the “best bang for the buck” out of all the risk mitigation techniques\, but is it really? For Security Awareness to be effective it must change the behaviors of employees and ideally lead to a mature security culture in your organization. \nMany programs that do not use adult education techniques and neuroscience fail to achieve behavior change and can even make things worse. Once employees start to have a negative impression about information security\, feel helpless or begin to consider remediation as punitive\, great damage has been done to the security culture and this can be difficult to reverse. This fun and interactive presentation will help you to gain an understanding about effective Security Awareness program creation and implementation as well as to build buy-in for a mature security culture. \nPresenter:\nTimothy O’Connor\, Cadre Information Security\nAs a multidisciplinary leader in the field of Information Security\, Tim O’Connor assists organizations\, employees\, and individuals in aligning their business processes with risk through practical policies\, frameworks\, presentations\, seminars\, and customized events like tabletop exercises and assessments. \nWho Can Attend:\nOpen only to InfraGard members and their guests. \nRegistration:\nhttps://events.teams.microsoft.com/event/95306e03-76c0-407c-b058-50875ae15e9c@64b581ec-5e8a-4ff1-9d3a-b50e57ae0fd1
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-human-factor-controls-and-behavior-change/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230622T120000
DTEND;TZID=America/New_York:20230622T130000
DTSTAMP:20260403T185021
CREATED:20230609T002321Z
LAST-MODIFIED:20230609T002321Z
UID:4907-1687435200-1687438800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: CISA- Resources for Building Operational Resilience
DESCRIPTION:The Cybersecurity and Infrastructure Security Agency (CISA) will be conducting a presentation on several topics including their organization’s mission and regional structure and operations. Other topics covered will focus on CISA Cybersecurity Advisor roles and responsibilities\, CISA Cyber services\, tools\, training and exercises available to critical infrastructure entities. The cybersecurity advisor will also discuss CISA’s victim notification process in which CISA alerts potential victims of incidents like breached credentials and real time or recent activity by suspected (or confirmed) ransomware actors on a stakeholders’ IT systems and networks. \nPresenters:\nJoseph Flores\, CISA\, Cyber Security Advisor (CSA) for Massachusetts\, Cybersecurity State Coordinator Talk Summary:\nJoseph “Joe” Flores serves as the Massachusetts Cybersecurity Advisor (CSA) for the Cybersecurity and Infrastructure Security Agency (CISA). CISA is an Agency within the U.S. Department of Homeland Security (DHS) that maintains 10 regional offices around the country. \nWho Can Attend:\nOpen only to InfraGard members and their guests. \nTarget Audience:\nIndustry security managers or leaders who may wish or need to contact CISA in the case of a cyber related event. \nRegistration:\nhttps://attendee.gotowebinar.com/register/1332264377292208223
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-cisa-resources-for-building-operational-resilience/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230622T090000
DTEND;TZID=America/Los_Angeles:20230622T113000
DTSTAMP:20260403T185021
CREATED:20230602T144844Z
LAST-MODIFIED:20230602T150423Z
UID:4905-1687424400-1687433400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Global Threat Overview and Ukraine Update
DESCRIPTION:This is another in our FREE series of Global Threat & Ukraine updates.\nGlobal Threat Overview and Ukraine Update is a slight variation on the well-received webinars (with unprecedented registration/participation) that have become an InfraGard staple over the last 16 months. This begins by providing a worldwide threat overview looking at actual or potential flashpoints\, conflicts\, tensions and strategic dynamics that will feature Iran\, the Middle East\, China\, the South China Sea\, and other regions\, then a deep dive into the latest developments with the Russo-Ukraine War that both includes but goes beyond the battlefield to examining larger economic and global supply chain implications from this conflict. It will also address emerging technologies\, weapons and other rapid changes in warfighting that have been seen in this conflict. This webinar will start with a Cyberthreat update from the FBI\, then will go into global threats\, and then a comprehensive Ukraine War update followed by a Q&A session. \nPresenter:\nHal Kempfer is an instructor for InfraGard programs going back nearly two decades and is a regular on-air “expert” on National Security and Homeland Security matters featured on Fox\, NewsNation\, ABC\, CBS\, NPR and a variety of other media outlets. \nWho Can Attend:\nOpen only to vetted InfraGard members \nRegistration:\nhttps://attendee.gotowebinar.com/register/7886972159695163221
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-global-threat-overview-and-ukraine-update-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230608T130000
DTEND;TZID=America/New_York:20230608T140000
DTSTAMP:20260403T185021
CREATED:20230424T142331Z
LAST-MODIFIED:20230424T142331Z
UID:4881-1686229200-1686232800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: TikTok Lessons Learned: Reducing National Security Risk on Mobile Devices
DESCRIPTION:With the high prevalence of bring-your-own-device (BYOD) in today’s hybrid-first world\, there is a significantly higher likelihood that personal apps pose serious risk to your data and overall security posture. Without visibility into the risk posed by personal apps and devices\, it’s impossible to fully understand your organization’s potential data exposure risk. This webinar will help understand the greater challenges and future issues that are currently being highlighted by TikTok. In order to protect your organization and align with government and industry compliance standards\, you need to understand what data mobile\napps can access\, where it gets sent\, and who has control over it at its final destination. \nPresenters:\nChristoph Hebeisan\, Director\, Security Intelligence Research\nChristoph Hebeisan leads the Security Intelligence Research division at Lookout. In this role he oversees the company’s suite of research activities\, which cover malware\, device compromise\, network threats\, phishing and threat intelligence services. \nWho Can Attend:\nOpen only to InfraGard members and their guests. \nTarget Audience:\nAnyone who has an interest in or professional responsibility for data security and how to manage risk and compliance with apps like TikTok in a modern enterprise environment. \nRegistration:\nhttps://register.gotowebinar.com/register/1679033851130138464
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-tiktok-lessons-learned-reducing-national-security-risk-on-mobile-devices/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20230606T090000
DTEND;TZID=America/Los_Angeles:20230606T110000
DTSTAMP:20260403T185021
CREATED:20230515T143425Z
LAST-MODIFIED:20230515T143425Z
UID:4894-1686042000-1686049200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: FBI Quarterly: Unmanned Aircraft Systems and WMD
DESCRIPTION:Unmanned Aircraft System (UAS) technology is becoming cheaper\, easier to use\, more durable\, and more available to the general public. With criminals and extremists\, both overseas and domestically\, wanting to develop UAS technology for illicit means\, what does that mean for you? \nJames Peaco\, FBI Special Agent and WMD Coordinator and Krista Lam\, FBI SA and Associate WMD Coordinator\, will provide an overview of the FBI’s UAS and Weapons of Mass Destruction (WMD) programs. They will discuss their roles\, responsibilities\, and efforts to mitigate threats\, provide education\, and coordinate UAS and WMD efforts across the FBI\, as well as the private sector. The presentation will include examples of illicit UAS use\, and how the government responded. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nRegistration:\nhttps://attendee.gotowebinar.com/register/9015326176264720987
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-fbi-quarterly-unmanned-aircraft-systems-and-wmd/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20230601T120000
DTEND;TZID=America/Chicago:20230601T131500
DTSTAMP:20260403T185021
CREATED:20230526T150353Z
LAST-MODIFIED:20230526T150353Z
UID:4902-1685620800-1685625300@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Due Diligence in M&A
DESCRIPTION:Join the Legal CSC for a virtual webinar about digital due diligence in mergers and acquisitions. \nPresenter:\nShawn Tuma\, Attorney & Co-Chair\, Data Privacy & Cybersecurity Practice\, Spencer Fane\, LLP.\nShawn Tuma represents clients across the globe in dealing with cybersecurity\, data privacy\, data breach and incident response\, regulatory compliance\, computer fraud related legal issues\, and cyber-related litigation. Having practiced in this area of law since 1999\, Shawn is widely recognized in cybersecurity and data privacy law. \nWho Can Attend:\nOpen only to InfraGard members and their guests. \nTarget Audience:\nLawyers & legal community \nRegistration:\nhttps://attendee.gotowebinar.com/register/7733352792986927446
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-due-diligence-in-ma/
END:VEVENT
END:VCALENDAR