IMA Webinar Broadcast: Human Factor Controls and Behavior Change
Security Awareness is well known for being the “best bang for the buck” out of all the risk mitigation techniques, but is it really? For Security Awareness to be effective […]
Security Awareness is well known for being the “best bang for the buck” out of all the risk mitigation techniques, but is it really? For Security Awareness to be effective […]
Impact of Artificial Intelligence (AI) on threats, defenses, chatGPT technology, and HODL (Hold On For Dear Life). Malicious cyber actors threaten public safety and our national and economics security. The […]
Maine’s InfraGard Member Alliance invites you to attend a presentation with the Anti-Human Trafficking Intelligence Initiative. Sponsored by Deer Brook Consulting, Kennebunk Maine The AHTII processes open-source and other intelligence […]
Step into the world of crime prevention with our immersive course on "Recognizing Hostile Surveillance". This three-hour training is designed to provide you with the knowledge and skills to detect […]
This briefing is based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing boardroom metrics and KPI metrics […]
This is a free briefing by the LA FBI. FBI Los Angeles' Intelligence Division will provide an overview of generative artificial intelligence (AI), with a focus on ChatGPT and a […]
Join us in July as we present a webinar with a different take on cyber threats. We’ve got Joe Marshall from Cisco’s Talos Intelligence Group joining us to share what […]
The InfraGard West Virginia Member Alliance is pleased to present West Virginia's very own Rachelle Barnette, a senior analyst with the Internet Crime Complaint Center for a discussion of the […]
Social Media information gathering (SOCMINT) lab series will cover the basics of conducting social media research. This will be a “how-to” on intermediate and advanced search and location techniques (AST) […]
This briefing is based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing effective cybersecurity policies that address […]
The objective of this course is to instruct and advise attendees on how and when to submit Suspicious Activity Reports (SAR). Instruction will work through the Nationwide SAR Cycle to […]
In today's rapidly evolving technological landscape, the emergence of quantum computers and the unprecedented advancements in artificial intelligence (AI) have introduced new dimensions of complexity and uncertainty to the realm […]