BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//InfraGard National Members Alliance - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:InfraGard National Members Alliance
X-ORIGINAL-URL:https://www.infragardnational.org
X-WR-CALDESC:Events for InfraGard National Members Alliance
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20220313T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20221106T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20230312T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20231105T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20240310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20241103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20220313T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20221106T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20230312T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20231105T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20240310T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20241103T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20250309T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20251102T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Denver
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20230312T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20231105T080000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20240310T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20241103T080000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20250309T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20251102T080000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20231213T110000
DTEND;TZID=America/Chicago:20231213T120000
DTSTAMP:20260403T172718
CREATED:20231208T153313Z
LAST-MODIFIED:20231208T153313Z
UID:5034-1702465200-1702468800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: HAMAS IN THE U.S.: NETWORKS\, ACTIVITES\, and JIHAD
DESCRIPTION:Hamas supporters have long operated in the United States. Internal Hamas documents and FBI wiretaps introduced as evidence in various federal criminal cases clearly show the existence of a nationwide Hamas network engaged in fundraising\, lobbying\, education and propaganda dissemination dating back to the 1980s. Join InfraGard Birmingham Members Alliance December 13\, 2023 at 11:00 CST for a unique webinar presentation on the history and activities of Hamas within the United States. Following Dr. Vidino’s presentation\, we will invite attendees to submit questions for our speaker. \nPresenter:\nDr. Lorenzo Vidino\, Director of the Program on Extremism at The George Washington University.\nAn expert on Islamism in Europe and North America\, his research over the past 20 years has focused on the mobilization dynamics of jihadist networks in the West; governmental counter-radicalization policies; and the activities of Muslim Brotherhood-inspired organizations in the West. Dr. Vidino has testified before the U.S. Congress and other parliaments; advised law enforcement officials globally \nWho Can Attend:\nOpen to anyone. \nRegistration:\nhttps://www.eventbrite.com/e/hamas-in-the-us-networks-activites-and-jihad-tickets-771246417797?aff=oddtdtcreator
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-hamas-in-the-u-s-networks-activites-and-jihad/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20231219T083000
DTEND;TZID=America/Los_Angeles:20231219T123000
DTSTAMP:20260403T172718
CREATED:20231201T162520Z
LAST-MODIFIED:20231204T173518Z
UID:5033-1702974600-1702989000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Introduction to Global Espionage & Intelligence Services- Part 1: US Intelligence
DESCRIPTION:Note: You will receive a Certificate in Intelligence Studies upon completion of all 6 classes.\nYou must be an Infragard member or Active Law Enforcement/Military to attend. \nThe “Certificate in Intelligence Studies” program offers a comprehensive and immersive exploration into the world of international espionage and intelligence. This certificate program\, led by a seasoned retired CIA (SIS) Senior Operations Officer who was the Chief of Station at the CIA’s iconic training facility\, provides participants with an in-depth understanding of the structures\, strategies\, methodologies\, and capabilities of the world’s leading intelligence agencies as well as adversarial agencies. \nEach class in the series is dedicated to examining the intelligence models of a specific country\, offering a unique perspective on how different nations approach espionage and security. We start with the structure of US Intelligence agencies in Part 1. Then from the historical evolution of British and Russian intelligence services to the modern-day tactics of Israeli\, Iranian\, Chinese\, and North Korean agencies\, this program covers a wide range of topics. Participants will gain insights into key concepts and terminologies in espionage\, such as HUMINT\, SIGINT\, and OSINT\, and explore the historical context and evolution of modern-day intelligence. \nThis course is an introductory overview of the U.S. Intelligence Community (USIC) from World War II to the Present. The USIC is comprised of 18 members operating under the titular guidance of the Office of the Director of National Intelligence (ODNI) created in response to the events of 9/11. \nLed by a seasoned retired CIA (SIS) Senior Operations Officer who was the Chief of Station at the CIA’s iconic training facility\, this course is the first in a series of classes designed to provide a deep dive into the clandestine world of global espionage\, exploring the structures\, strategies\, methodologies\, and capabilities of various countries’ intelligence agencies. Each session in the series will spotlight a different nation\, dissecting its intelligence apparatus\, historical and contemporary espionage activities\, and drawing comparisons and contrasts with U.S. intelligence. \nPresenter:\nLed by a seasoned retired CIA (SIS) Senior Operations Officer who was the Chief of Station at the CIA’s iconic training facility\, this course is the first in a series of classes designed to provide a deep dive into the clandestine world of global espionage \nWho Can Attend:\nOpen only to vetted InfraGard members. \nRegister here:\nSee weekly events email for registration.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-introduction-to-global-espionage-intelligence-services-part-1-us-intelligence/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240110T090000
DTEND;TZID=America/Los_Angeles:20240110T120000
DTSTAMP:20260403T172718
CREATED:20231229T155324Z
LAST-MODIFIED:20231229T155324Z
UID:5045-1704877200-1704888000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Emergency Preparedness and Planning for Organizations and Business
DESCRIPTION:This seminar is for stakeholders in the success and survival of your business\, enterprise\, corporation\, organization\, or agency. While all will benefit\, this is most useful for those who have supervisorial\, managerial\, ownership\, investment\, planning or executive roles with the aforementioned. It’s for those who lead\, manage and prepare. This is going beyond individual emergency preparedness to addressing the challenges that face organizations and businesses in dealing with all hazards and threats\, whether natural disasters or manmade catastrophes\, and ensuring continuity of your operations. It is about understanding what risks you should focus your time and attention (and resources) to addressing\, then how they impact your company\, business model\, workforce and/or office/location. It’s about mitigation and management\, and preparedness of your organization and developing resiliency. It will address the real-world challenges in terms of how to manage\, plan and even communicate in a crisis. While this is not about cybersecurity\, it will also address some of the unique challenges posed by AI and the feared day where Quantum computing may suddenly reveal all encryption (messages\, files\, etc.) ever made. If you have only one online seminar to attend this year\, this will likely be the one. \nSome of the key points to be discussed: \n• Organizational and Enterprise Emergency Preparedness\n• Concepts of Continuity of Operations Planning (COOP)\n• Synchronizing Individual and Office Emergency Preparedness with Business\, Corporate and/or Organizational COOP\n• Being Prepared: A Step-by-Step Approach (…the prepared mind)\n• Disaster Mitigation and Emergency Preparedness: A Wholistic Understanding\n• Leading Before the Crisis\, During the Crisis and After Crisis\n• Crisis and Emergency Communications \nIf you are concerned about disasters\, wars and the onslaught of advanced technology\, and have only one online seminar to attend this year\, this will likely be the one. \nPresenter:\nHal Kempfer\, CEO GRIP\nHal Kempfer is a longstanding expert in strategic risk supporting a variety of major government\, military and private sector entities\, worldwide\, and is regularly seen “on air” analyzing national and homeland security issues for various television news networks. Hal is a retired Marine Intelligence Officer and former military Emergency Preparedness Liason Officer to FEMA Region IX. \nWho Can Attend:\nOpen to anyone. \nRegistration: \nhttps://attendee.gotowebinar.com/register/7647000453148771416
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-emergency-preparedness-and-planning-for-organizations-and-business/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240117T083000
DTEND;TZID=America/Los_Angeles:20240117T110000
DTSTAMP:20260403T172718
CREATED:20231229T160934Z
LAST-MODIFIED:20231229T160934Z
UID:5046-1705480200-1705489200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Active Shooter: Making Prevention a Reality
DESCRIPTION:Mass shootings seem to be more and more prevalent nowadays. As the world focuses all its attention on the “why”\, we must focus our attention on how we can better prepare ourselves to not only respond to but also learn and understand key concepts that are critical in potentially preventing these tragedies within our critical infrastructure sectors and our communities alike.\nThis training session will cover the latest statistics and insights on active shooters as well as best practices related to prevention and mitigation of an active assailant at facilities such as educational campuses\, offices\, manufacturing facilities\, warehouses and multi-structure campuses such as shopping centers/malls.\nThe second half of the presentation will be focused on the “the power of hello” de-escalation tactics by DHS PSA Brian Keith. immediately pre-attack and during an attack.\nPlease note that this is NOT a “Run\, Hide\, Fight” presentation\nTopics:\n1. Active shooter statistics.\n2. Best practices for critical infrastructure\n3. Power of Hello (DHS PSA)\n4. Expert panel discussion on “Best Practices” and active shooter/active assailant mitigation strategies \nPresenters:\nSubject Matter Expert (SME) is a retired school Police Captain who successfully confronted and neutralized an active shooter on a California school campus and subsequently was awarded the Medal of Valor for Public Safety by the President of the United States. \nBrian Keith\,  DHS/CISA PSA \nWho Can Attend:\nOpen to anyone. \nRegistration:\nhttps://attendee.gotowebinar.com/register/1161980817036906333
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-active-shooter-making-prevention-a-reality-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240118T122000
DTEND;TZID=America/New_York:20240118T133000
DTSTAMP:20260403T172718
CREATED:20240105T143934Z
LAST-MODIFIED:20240105T143934Z
UID:5049-1705580400-1705584600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: 2024 Cyber Trends
DESCRIPTION:As another year comes to a close\, Ryan Spelman\, Managing Director\, Cyber Risk\, K logix will reflect on trends to look out for in 2024. We’ll share the five top trends we predict\, based on what our CISO and security expert community is telling us. These include the persistent hot topic of artificial intelligence\, along with changes in threats\, how to address changing regulations\, the increase of cyber representation in the boardroom\, and the importance of strong threat detection. \nTrends to look out for in 2024.\n– Artificial intelligence\,\n– Along with changes in threats\,\n– How to address changing regulations\,\n– The increase of cyber representation in the boardroom\,\n– The importance of strong threat detection. \nPresenter:\nRyan Spelman\, Managing Director\, Cyber Risk\, K logix\nRyan Spelman has over 16 years of experience in homeland security and cybersecurity. He is currently K logix’s Managing Director of Cyber Risk Consulting\, focused on helping organizations navigate complex cyber risks. Ryan previously held leadership positions at Kroll\, Center for Internet Security (CIS)\, and New York State Senate. \nWho Can Attend:\nOpen to anyone \nTarget Audience:\nAnyone involved in Cybersecurity\, \nRegistration:\nhttps://attendee.gotowebinar.com/register/2669204550700575580
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-2024-cyber-trends/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240124T083000
DTEND;TZID=America/Los_Angeles:20240124T123000
DTSTAMP:20260403T172718
CREATED:20240112T194946Z
LAST-MODIFIED:20240112T195232Z
UID:5056-1706085000-1706099400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Introduction to Global Espionage & Intelligence Services- Part 2: British and Russian Intelligence
DESCRIPTION:Note: You will receive a Certificate in Intelligence Studies upon completion of all 6 classes.\nYou must be an Infragard member or Active Law Enforcement/Military to attend. \nThe “Certificate in Intelligence Studies” program offers a comprehensive and immersive exploration into the world of international espionage and intelligence. This certificate program\, led by a seasoned retired CIA (SIS) Senior Operations Officer who was the Chief of Station at the CIA’s iconic training facility\, provides participants with an in-depth understanding of the structures\, strategies\, methodologies\, and capabilities of the world’s leading intelligence agencies as well as adversarial agencies. \nEach class in the series is dedicated to examining the intelligence models of a specific country\, offering a unique perspective on how different nations approach espionage and security. We start with the structure of US Intelligence agencies in Part 1. Then from the historical evolution of British and Russian intelligence services to the modern-day tactics of Israeli\, Iranian\, Chinese\, and North Korean agencies\, this program covers a wide range of topics. Participants will gain insights into key concepts and terminologies in espionage\, such as HUMINT\, SIGINT\, and OSINT\, and explore the historical context and evolution of modern-day intelligence.\nCourse Description: This course is an introductory overview of the British and Russian intelligence and security models and its impact and influence on foreign intelligence services across the globe from World War I to the present.\nPart 2: Introduction to British and Russian-Soviet models\n● British military intelligence\n● Russian-Soviet model from Cheka to SVR \nPresenter:\nSME\, CTWatch \nWho Can Attend:\nOpen only to InfraGard members and their guests. \nTarget Audience:\nYou must be an Infragard member or Active Law Enforcement/Military to attend. \nRegistration:\nPlease see weekly events email.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-introduction-to-global-espionage-intelligence-services-part-2-british-and-russian-intelligence/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240124T130000
DTEND;TZID=America/New_York:20240124T140000
DTSTAMP:20260403T172718
CREATED:20240105T145044Z
LAST-MODIFIED:20240105T145044Z
UID:5050-1706101200-1706104800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: What Do the SEC’s New Regulations and Its Pursuit of SolarWinds Mean for Internal Security Pros
DESCRIPTION:SEC Adopts Cybersecurity Regulations – On July 26\, 2023\, the Securities and Exchange Commission (SEC) adopted rules requiring disclosure of material cybersecurity incidents as well as periodic disclosure of cybersecurity risk management\, strategy\, and governance in annual reports for public companies that are subject to the reporting requirements of the Securities Exchange Act of 1934. \nObjectives:\n• Public companies will be required to disclose “any cybersecurity incident they determine to be material” under new Item 1.05 of Form 8-K.\n• Public companies will need to describe their processes for assessing\, identifying\, and managing material risks from cybersecurity threats and disclose whether any previous cybersecurity incidents have materially affected (or are likely to materially affect) the company under new Item 106 of Regulation S-K.\n• These new regulations also impact how corporate boards are informed of cyber risks and incidents\, and how they integrate cyber risk and incident response into an overall risk management framework for the corporation.\n• Your may be the one talking to the Board (or at the very least\, talking to the person who will be talking to the Board)\n• All of this is colored by the indictment of SolarWinds’ CISO being indicted for fraud and internal control failures related to that company’s cybersecurity practices that preceded the 2020 cyberattack on SolarWinds. \nPresenter: \nColin Zick\, Partner\, Foley Hoag LLP\nColin J. Zick is a partner with the law firm\, Foley Hoag LLP\, where he serves as Co-Chair of its Privacy and Data Security practice group. He counsels clients ranging from the Fortune 1000 to start-ups on issues involving information privacy and security\, including compliance with state\, federal and international data privacy and security laws and government enforcement actions. \nChris Hart\, Partner\, Foley Hoag LLP\nChris Hart is an experienced civil litigator and human rights lawyer with a focus on cybersecurity and global data protection. As co-chair of Foley Hoag’s Privacy and Data Security practice\, Chris counsels clients—on data privacy and cybersecurity compliance\, incident response\, government investigations\, and litigation stemming from an organization’s data management and governance practices. \nWho Can Attend:\nOpen to anyone \nTarget Audience:\nEnterprise cybersecurity professionals \nRegistration:\nhttps://attendee.gotowebinar.com/register/7096146227405932374
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-what-do-the-secs-new-regulations-and-its-pursuit-of-solarwinds-mean-for-internal-security-pros/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240130T080000
DTEND;TZID=America/New_York:20240130T170000
DTSTAMP:20260403T172718
CREATED:20240130T191147Z
LAST-MODIFIED:20240130T191147Z
UID:5074-1706601600-1706634000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Behavioral Detection in Public Events & Spaces
DESCRIPTION:In today’s rapidly evolving security landscape\, understanding and effectively addressing security threats is of paramount importance\, especially when dealing with high-profile individuals such as royalty or VIPs\, or high-profile organizations within the critical infrastructure and key resources sectors. This course\, designed and delivered by a panel of seasoned security experts\, delves into critical areas of concern: fixation and its unique threat to dignitaries\, behavior detection in a security setting\, and the proactive management of workplace violence and insider threats. \nModules:\n1. Fixation and Its Threat to VIP’s\n– Early warning signs and risk assessment\n– Psychology of fixation and its triggers\n2. Behavior Detection in a Security Setting\n– Behavioral analysis techniques and methodologies\n– Recognizing suspicious behavior in crowds and individuals\n3. Managing Work-Based Violence and Insider Threats\n– Identifying the red flags of insider threats\n– Implementing a robust insider threat detection program \nBy the end of this course\, participants will have gained a deep understanding of fixation and its threat to VIP’s\, enhanced their skills in behavior detection within security settings\, and learned effective strategies for managing work-based violence and insider threats. \nPresenter:\nSME\, CTWatch \nWho Can Attend:\nOpen only to InfraGard members and their guests. \nRegistration:\nSee weekly email.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-behavioral-detection-in-public-events-spaces/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240130T090000
DTEND;TZID=America/Los_Angeles:20240130T113000
DTSTAMP:20260403T172718
CREATED:20240112T155928Z
LAST-MODIFIED:20240112T155928Z
UID:5051-1706605200-1706614200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Global Threat Update: Israel\, Ukraine and a World of Wars
DESCRIPTION:This is another in our FREE series of Global Threat Updates. \nWith wars raging in Ukraine (Europe) and Israel/Gaza (the Middle East)\, and with ongoing attacks in the Red Sea threatening one of the world’s busiest waterways and critical maritime chokepoints\, the world has become a very uncertain and dangerous place. Terrorism has also begun to surge\, and in some unexpected ways and places. On top of that\, wars in East Africa have left tens of thousands of people dead\, millions displaced and more than that suffering\, to include the growing threat from war induced famines. Meanwhile\, in our own Western Hemisphere\, paramilitary gangs have taken on the government of Ecuador\, and Venezuela has threatened to invade Guyana and initiate military action against the British Navy in a possible conflict that sounds like a Hollywood screenplay. To the east\, China continues to threaten Taiwan and confront the Philippines at sea\, and this in an area where most international trade flows. Global supply chains have become more and more unsure\, and all of this as our attention is diverted to another contentious U.S. Presidential election season. At times\, it can seem like too much to fully assess\, but Hal Kempfer will try to unpack this “world of wars” and confluence of conflicts to make sense of what is happening and what it means to our markets\, economy\, society and how we continue to do business in the age of globalization. \nPresenters:\nJohn Wood\, Intelligence Analyst\, FBI\nHal Kempfer\, GRIP \nWho Can Attend:\nOpen to anyone. \nRegistration:\nhttps://attendee.gotowebinar.com/register/2691551025209102171
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-global-threat-update-israel-ukraine-and-a-world-of-wars/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240201T110000
DTEND;TZID=America/New_York:20240201T120000
DTSTAMP:20260403T172718
CREATED:20240126T153506Z
LAST-MODIFIED:20240126T153506Z
UID:5066-1706785200-1706788800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Zero Trust Architecture - Getting Started
DESCRIPTION:Traditional network security does not keep pace with modern threats. In this session about Zero Trust Architecture (ZTA)\, we will discuss the basics of Zero Trust Architecture (ZTA) and how it is designed to keep pace with today’s threats. We’ll explore the key characteristics\, origin\, and justification of ZTA\, along with a few use cases. \nPresenter:\nLyron Andrews\, CEO Profabula\, LLC \nWho Can Attend:\nOpen to anyone. \nTarget Audience:\nCybersecurity professionals\, executives\, management leadership\, and IT professionals are generally curious. \nRegistration:\nhttps://us02web.zoom.us/meeting/register/tZItc-2qqzsrH90bmwtzz6EmxUpYWBpczhRu
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-zero-trust-architecture-getting-started/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240202T083000
DTEND;TZID=America/Los_Angeles:20240202T110000
DTSTAMP:20260403T172718
CREATED:20240112T194442Z
LAST-MODIFIED:20240112T194442Z
UID:5055-1706862600-1706871600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Synthetic Drug Trafficking and Trans-National Organized Crime
DESCRIPTION:Synthetic Drug Trafficking and Trans-National Organized Crime is a course during which we will explore several of the issues behind the explosion in synthetic drug production and trafficking\, and the corresponding record harm it has inflicted upon our communities. We will study why the two main producers of fentanyl and methamphetamine\, the Sinaloa Cartel and Jalisco New Generation Cartel\, made the transition to synthetic drug production and we will deepen our understanding of the\neconomics and logistics of synthetic drug production and trafficking versus that of traditional plant based drugs. We will discuss the three major factors driving fentanyl caused deaths and gain a better understanding of who fentanyl is harming and why there has been a dramatic shift in the demographics of drug caused death victims in recent years. We will contrast the differences in those harmed by methamphetamine and those harmed by fentanyl. \nLEARNING OBJECTIVES:\n– Understand the four major factors that caused the shift from more traditional\, organic drug trafficking to synthetic drug trafficking.\n– Know who produces synthetic drugs\, where the precursor chemicals are sourced\, where\nsynthetics are produced and how they are smuggled into the United States.\n– Know where fentanyl is present within the illicit drug supply chain.\n– Be able to explain how availability\, accessibility and deception are the driving forces behind the increase in drug caused deaths.\n– Be able to identify the three fentanyl risk groups and what the specific risk to each group is.\n– Understand what age group is most susceptible to a fentanyl caused death vs a\nmethamphetamine caused death. \nWHY TAKE THIS COURSE?\nWhether it is a teenage child lost to a drug caused death or an adult battling with methamphetamine addiction\, the damage caused by synthetic drugs is present everywhere we look. Almost everyone\nknows someone who has been impacted by fentanyl or methamphetamine. Empower yourself to be part of the solution by better understanding the drug\, the trafficker\, who is harmed\, and why. \nPresenter:\nPSC Brian Keith\, DHS\nSME\, CTWatch \nWho Can Attend:\nOpen only to InfraGard members and their guests \nRegistration:\nPlease see weekly events email.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-synthetic-drug-trafficking-and-trans-national-organized-crime/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240206T090000
DTEND;TZID=America/Los_Angeles:20240206T103000
DTSTAMP:20260403T172718
CREATED:20240112T162136Z
LAST-MODIFIED:20240112T162507Z
UID:5052-1707210000-1707215400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: FBI Quarterly: Cryptocurrency Confidence Scams – Are you a victim?
DESCRIPTION:Many cryptocurrency confidence scams start “by accident” when scammers send realistic text messages. The message seems intended for somebody else but after you tell the sender they have the wrong number\, the person continues the conversation. \nThis contact is no mistake\, and they didn’t accidentally text you. You’re being targeted by an international criminal enterprise. The message is bait\, and the scammer is trying to lure you into a conversation to eventually convince you to invest in a digital trading platform by representing that the investments are with trusted firms and cryptocurrency exchanges. They promise returns beyond any stock portfolio and may even show screenshots or offer a free “demo.” In reality\, the purported firms and exchanges are non-existent trading platforms. You’ll see an incredible balance gr sow in your account. You now wish to withdraw your earnings\, with plans to share your new wealth with family and friends and pursue a life of financial independence… only to realize every penny is gone. It was stolen the moment you transferred it. Billions of dollars are lost every year through these sophisticated scams. \nFBI Special Agents working these crimes first-hand\, will be presenting. This specialized training is designed to familiarize you with the red flags of digital investment scams\, how the scheme works\, why these scams are so rampant\, and hear victims’ stories. Before you invest in any new cryptocurrency platforms or take trading advice from an online friend or love interest\, get familiar with the red flags of cryptocurrency confidence scams\, so that you\, your family\, and friends know how to avoid joining the tens of thousands of victims nationwide. \nSpeakers:\n• FBI Special Agent Daniel Clift – complex financial crimes program\n• FBI Supervisory Special Agent Brett Chabot – complex financial crimes program \nWho Can Attend:\nOpen only to InfraGard members and their guests. \nRegistration:\nPlease see weekly email.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-fbi-quarterly-cryptocurrency-confidence-scams-are-you-a-victim/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240222T123000
DTEND;TZID=America/New_York:20240222T133000
DTSTAMP:20260403T172718
CREATED:20240119T153502Z
LAST-MODIFIED:20240130T202616Z
UID:5062-1708605000-1708608600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: FBI’s Response to Cybercrime
DESCRIPTION:FBI Unit Chief Alan McHugh will speak about the FBI’s response to cyber crime. Organizations reaching out to the FBI for help shouldn’t fear loss of control. As the FBI is looking to support victims\, not dominate the situation. \nThe FBI’s Cyber Crime Tactical Intelligence Unit resources are focused on analyzing and investigating cybercriminal incidents\, threat actors\, groups of individuals\, ransomware gangs\, or variants\, in addition to building an information data resource that lends awareness to a defensive posture. Incident information informs network defense strategies. This Unit supports operations and raises awareness of criminal threats to many different audiences. \nPresenters:\nAlan McHugh\, Chief\, FBI Cyber Division\, Cyber Crime Tactical Intelligence Unit. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nTarget Audience:\nCybersecurity professionals\, to learn about the FBI Cyber Division\, Cyber Crime Tactical Intelligence Unit and what they do. Build relationships with FBI now. \nRegistration:\nPlease see weekly email for private link.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-fbis-response-to-cybercrime/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240229T083000
DTEND;TZID=America/Los_Angeles:20240229T103000
DTSTAMP:20260403T172718
CREATED:20240112T193931Z
LAST-MODIFIED:20240112T193931Z
UID:5054-1709195400-1709202600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Counter Terrorism Case Studies
DESCRIPTION:Please join us for a two-hour InfraGard online training course focusing on two real-life counter terrorism operations and the essential involvement of the private sector in the success of these actions. Lessons drawn from this training course will emphasize the power of fusion between law enforcement\, the private business sector and the community in identifying\, mitigating and defeating extremist threats to our critical infrastructure and key resources in our country.\n\nObjectives/What will be discussed:\nTwo major counter terrorist successes – one international and one within the U.S. – will be highlighted to demonstrate the formula for keeping our national infrastructure and communities safe and secure into the future. \nPresenter: \nBob Dougherty\, Retired CIA Operations Officer \nWho Can Attend:\nOpen only to InfraGard members and their guests \nRegistration:\nPlease see weekly events email.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-counter-terrorism-case-studies/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240229T140000
DTEND;TZID=America/New_York:20240229T150000
DTSTAMP:20260403T172718
CREATED:20240208T000518Z
LAST-MODIFIED:20240209T170103Z
UID:5078-1709215200-1709218800@www.infragardnational.org
SUMMARY:INMA Partner Broadcast: The SEC Cybersecurity Regulation and CISO Liability
DESCRIPTION:This webinar will explore the recently enacted SEC Cybersecurity Risk Management\, Strategy\, Governance\, and Incident Disclosure Rule\, which mandates publicly traded companies to disclose cybersecurity program information in their annual 10-K reports. Additionally\, companies must report material cybersecurity incidents in 8-K reports. These new requirements\, coupled with uncertainties regarding reporting standards\, have heightened concerns about CISOs’ professional and personal liability. Members of the Collaborative will share their experiences and insights. \nPresenters:\nAjay Gupta\, CISO at Cencora\nJane Domboski\, CISO at OneMain Financial\nDonna Ross\, CISO at Radian \nWho Can Attend:\nOpen to anyone. Target audience includes CISOs\, Cyber Leaders\, Cyber practitioners\, Cyber analysts\, Cyber managers\, and Cyber managers and above. \nRegistration:\nClick to Register
URL:https://www.infragardnational.org/event/inma-partner-broadcast-the-sec-cybersecurity-regulation-and-ciso-liability/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240305T120000
DTEND;TZID=America/Chicago:20240305T131500
DTSTAMP:20260403T172718
CREATED:20240301T155408Z
LAST-MODIFIED:20240301T155907Z
UID:5092-1709640000-1709644500@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: The Reality of Investigating and Prosecuting “Revenge Porn”
DESCRIPTION:Please join us for a discussion about investigating and prosecuting “revenge porn”. \nPresenter:\nSherri Zack\, Assistant U.S. Attorney for Southern District of Texas \nWho Can Attend:\nOpen only to InfraGard members and their guests. \nRegistration:\nSee weekly email. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-the-reality-of-investigating-and-prosecuting-revenge-porn/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240313T100000
DTEND;TZID=America/Los_Angeles:20240313T110000
DTSTAMP:20260403T172718
CREATED:20240208T230926Z
LAST-MODIFIED:20240208T230926Z
UID:5079-1710324000-1710327600@www.infragardnational.org
SUMMARY:Top Predictions on Global Cybersecurity Risks for 2024
DESCRIPTION:During this session\, we will highlight our top predictions regarding the most critical cybersecurity issues businesses face today as innovation continues to drive technology advances\, making it a pivotal year ahead for businesses navigating global cybersecurity risks. We will provide actionable tips and guidance to ensure your readiness\, resilience and compliance efforts are well positioned in 2024 and beyond\, with a focus on key cyber regulations in the US and globally. \nSpeakers: \nJustine Phillips (30 min.)\nJustine Phillips is a partner in our Firm’s North America Intellectual Property & Technology Practice Group. Justine focuses her practice on both proactive and reactive cybersecurity and data privacy services\, representing clients in matters related to information governance\, diligence in acquisitions and investments\, incident preparedness and response\, the California Consumer Privacy Act\, privacy litigation\, and cyber litigation. She provides actionable and practical guidance to help businesses manage data\, technology\, cyber threats\, privacy\, security and digital assets. As businesses navigate complex and far-reaching laws and regulations\, Justine proactively creates compliance programs customized to client needs and budgets\, including data mapping\, vendor management\, privacy and security by design\, cyber risk management and mitigation\, eWorkforce policies\, data retention and destruction policies and implementation\, consumer request workflows\, cyber-awareness policies and trainings\, and CCPA/CPRA readiness audits. She also provides reactive cyber services\, including incident response\, crisis management\, privileged forensic investigations into business email compromises\, data breaches and ransomware attacks\, compliance with notice obligations to individuals and regulators\, regulatory inquiries and investigations\, and cyber litigation. Justine also handles employment litigation and counseling\, as well as commercial litigation. \nCyrus Vance (30 min.)\nCyrus Vance Jr. has earned a well-deserved international reputation as a trial attorney with a proven track record in high-stake litigation and global investigations. As a partner in Baker McKenzie’s North America Litigation and Government Enforcement Practice and Global Investigations\, Compliance & Ethics Practice\, Cyrus is well-known for his expertise in white collar criminal investigations\, complex civil and criminal litigation\, sanctions enforcement\, compliance and cybersecurity. With over three decades of experience in both public and private sector\, Cyrus provides invaluable guidance to clients navigating cross-border investigations\, enforcement matters\, and cybersecurity incidents. Prior to joining the Firm\, Cyrus served three consecutive four-year terms as Manhattan District Attorney\, overseeing a team of over 600 prosecutors. He handled landmark criminal prosecutions\, including the successful litigation before the U.S. Supreme Court in Trump v. Vance and the conviction of Harvey Weinstein on two felony sex crimes. He also managed more than 100\,000 cases annually\, including complex white collar and business crimes both domestically and internationally. Cyrus regularly collaborated with regulatory and crime-fighting partners such as the City of London Police\, Paris Prosecutors’ Office\, Singapore Attorney General\, Europol and Interpol\, and is known for his ability to build and manage teams collaboratively across borders and agencies. \nWho Can Attend:\nOpen only to vetted InfraGard members.
URL:https://www.infragardnational.org/event/top-predictions-on-global-cybersecurity-risks-for-2024/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240322T083000
DTEND;TZID=America/Los_Angeles:20240322T123000
DTSTAMP:20260403T172718
CREATED:20240112T192632Z
LAST-MODIFIED:20240203T023150Z
UID:5053-1711096200-1711110600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Introduction to Global Espionage & Intelligence Services – Part 3: Israeli Intelligence
DESCRIPTION:Note: You will receive a Certificate in Intelligence Studies upon completion of all 6 classes.\nYou must be an Infragard member or Active Law Enforcement/Military to attend. \nThe “Certificate in Intelligence Studies” program offers a comprehensive and immersive exploration into the world of international espionage and intelligence. This certificate program\, led by a seasoned retired CIA (SIS) Senior Operations Officer who was the Chief of Station at the CIA’s iconic training facility\, provides participants with an in-depth understanding of the structures\, strategies\, methodologies\, and capabilities of the world’s leading intelligence agencies as well as adversarial agencies. \nEach class in the series is dedicated to examining the intelligence models of a specific country\, offering a unique perspective on how different nations approach espionage and security. We start with the structure of US Intelligence agencies in Part 1. Then from the historical evolution of British and Russian intelligence services to the modern-day tactics of Israeli\, Iranian\, Chinese\, and North Korean agencies\, this program covers a wide range of topics. Participants will gain insights into key concepts and terminologies in espionage\, such as HUMINT\, SIGINT\, and OSINT\, and explore the historical context and evolution of modern-day intelligence. \nCourse Outline:\nIntroduction to Israeli Intelligence\n• Historical evolution (British Mandate to Present)\n• Notable operations and methodologies\n• Espionage capabilities\n• Comparisons: Aman=DIA; Mossad=CIA; Shabak=FBI; Unit 8200=NSA\n• Aman (Military Intelligence Directorate)\n• Intelligence Corps: Unit 8200.\n• Shabak (Shin Bet)\n• The intelligence branch of the Israeli Police\n• Mossad (Institute for Intelligence and Special Tasks)\n• The Centre for Political Research \nWho Can Attend:\nOpen only to vetted InfraGard members. \nRegistration:\nSee weekly events email.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-introduction-to-global-espionage-intelligence-services-part-3-israeli-intelligence/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20240326T100000
DTEND;TZID=America/Denver:20240326T230000
DTSTAMP:20260403T172718
CREATED:20240307T155401Z
LAST-MODIFIED:20240307T155834Z
UID:5101-1711447200-1711494000@www.infragardnational.org
SUMMARY:IMA Webinar: Evolving Thread Landscape with William Largent
DESCRIPTION:March 26\, 2024\, 10:00 a.m. – 11:00 a.m. MST\nIMA Webinar: Evolving Thread Landscape with William Largent\nPresented by InfraGard Arizona \nCisco’s Talos team specializes in early-warning intelligence and threat analysis necessary for defending networks against the ever-changing threat landscape. In this talk\, we will cover how our team is built\, look at some interesting threats and exploits from —both cybercriminals and nation-state actors — take a look at the methods and techniques that both the attackers and defenders use to exploit or mitigate these attacks. We’ll take a dive into finding vulnerabilities and discuss how it helps every day defense\, and we will focus on the effects of big game hunting and the proliferation of dual-use tools and how to find anomalies and track threat actors. We’ll even save some time to field questions. \nPresenter:\nWilliam Largent\, VP-Cisco Talos \nWho Can Attend: \nOpen only to InfraGard members and their guests. \nRegistration:\nSee weekly email.
URL:https://www.infragardnational.org/event/5101/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240326T130000
DTEND;TZID=America/New_York:20240326T140000
DTSTAMP:20260403T172718
CREATED:20240222T161220Z
LAST-MODIFIED:20240222T161220Z
UID:5085-1711458000-1711461600@www.infragardnational.org
SUMMARY:Threat Assessment: An Overview of the Behavior-Based Approach to Preventing Targeted Violence
DESCRIPTION:For over 20 years\, the U.S. Secret Service National Threat Assessment Center (NTAC) has conducted research on the thinking and behaviors of those who commit acts of targeted violence in an effort to prevent future tragedies. This presentation will highlight relevant findings and recommendations from NTAC’s latest research\, Mass Attacks in Public Spaces: 2016-2020\, which indicates that targeted violence is preventable. Ensuring the safety of our communities is a responsibility that belongs to everyone. This presentation will also discuss how communities can use a multidisciplinary approach to identify\, assess\, and intervene with individuals exhibiting concerning or threatening behaviors. \nPresentation Agenda (Times and Speakers):\n1:00-1:10p – History and Mission of the U.S. Secret Service National Threat Assessment Center (NTAC)\n1:10-1:20p – NTAC research findings\, key implications\, and considerations from the analysis of targeted violence\n1:20-1:40p – The U.S. Secret Service threat assessment model\n1:40-1:50p – Available resources to facilitate targeted violence prevention initiatives\n1:50-2:00p – Questions and answers \nLearning Outcomes/Objectives: Upon completion of this webinar\, the attendee/student will be able to: \n\nDescribe targeted violence and the principles of behavioral threat assessment\nUnderstand the components of the U.S. Secret Service’s behavioral threat assessment model\nIdentify potential concerning behaviors and individuals who may pose a risk of engaging in targeted attacks\n\n\nRecognize behavioral indicators\, circumstances\, and situational factors of perpetrators of targeted violence\nBecome familiar with multidisciplinary risk management strategies and interventions used to mitigate the risk of harmful outcomes\n\nPresenter Information: \nKatie Lord\, Supervisory Domestic Security Strategist\, U.S. Secret Service\nKatie currently serves as a Supervisory Domestic Security Strategist (SvDSS) with the U.S. Secret Service National Threat Assessment Center (NTAC) where she oversees global outreach efforts\, and interfaces with community safety leaders to facilitate access to NTAC resources in furtherance of preventing targeted violence. In addition\, Ms. Lord conducts presentations and participates on consultations to support threat assessment programs\, as well as to offer guidance on individual complex threat cases. Ms. Lord has 20 years of experience with the Secret Service\, which includes supporting financial crime\, background\, protective intelligence\, and insider threat investigations. Prior to joining the U.S. Secret Service\, Ms. Lord developed management simulations and trained assessors at an international human resources company. \nWorkshop Accessibility:\nOpen only to vetted InfraGard members \nRegistration:\nPlease see weekly email.
URL:https://www.infragardnational.org/event/threat-assessment-an-overview-of-the-behavior-based-approach-to-preventing-targeted-violence/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240327T140000
DTEND;TZID=America/New_York:20240327T150000
DTSTAMP:20260403T172718
CREATED:20240301T154332Z
LAST-MODIFIED:20240301T154356Z
UID:5091-1711548000-1711551600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Changed Forever – Threats\, Consequences and Engineering-Grade Defenses
DESCRIPTION:March 27\, 2024\, 2:00 p.m. – 3:00 p.m. EST\nIMA Webinar Broadcast: Changed Forever – Threats\, Consequences and Engineering-Grade Defenses\nPresented by InfraGard National Capital Region \nA new threat report published by Waterfall Security Solutions shows that cyber-attacks with physical consequences went from a theoretical problem last decade to a very real problem this decade\, with attacks more than doubling annually for the last four years. In this webinar\, we review the attacks\, numbers\, and trends – that’s the bad news. And we look at a new development on the defensive side – the US DOE’s Cyber-Informed Engineering initiative\, bringing engineering-grade defenses to the table systematically for the first time. \nPresenter:\nAndrew Ginter\, VP Industrial Security\, Waterfall Security Solutions \nWho Can Attend: \nOpen to anyone. \nRegistration:\nClick to register
URL:https://www.infragardnational.org/event/5091/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240328T090000
DTEND;TZID=America/Los_Angeles:20240328T113000
DTSTAMP:20260403T172718
CREATED:20240321T145917Z
LAST-MODIFIED:20240321T145917Z
UID:5109-1711616400-1711625400@www.infragardnational.org
SUMMARY:IMA Webinar: Global Threat Update- A World of Wars
DESCRIPTION:The Israel-Hamas conflict intensifies in Rafah\, Gaza\, causing unexpected humanitarian crises. Houthis\, backed by Iran\, escalate tensions in the Red Sea\, impacting global trade and resulting in more casualties. Israel-Hezbollah war potentially threatens Lebanon. Ukraine awaits US aid; Europe increases support to prevent a larger Russia-NATO conflict. Sweden joins European alliance. South China Sea tensions rise. Sudan civil war worsens\, Haiti faces gang rule. Ecuador battles cartels\, Venezuela eyes Guyana invasion. The US faces growing terrorism threat and espionage. Global instability affects trade\, supply chains\, and finance. Hal Kempfer will discuss these issues’ implications for business\, infrastructure\, and national security. \nPresenter: \nGRIP \nWho Can Attend: \nOpen to anyone. \nRegistration: \nClick to register
URL:https://www.infragardnational.org/event/ima-webinar-global-threat-update-a-world-of-wars/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240329T130000
DTEND;TZID=America/New_York:20240329T140000
DTSTAMP:20260403T172718
CREATED:20240301T153425Z
LAST-MODIFIED:20240301T153425Z
UID:5090-1711717200-1711720800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: We Met Through InfraGard – Hacker and The Fed
DESCRIPTION:Former FBI Special Agent Chris Tarbell and former black hat hacker\, now security researcher\, Hector Monsegur met through InfraGard. However\, it was not the normal relationship formed at a local InfraGard meeting. Hector and Chris will tell their story of how they met and began a fruitful working relationship that has grown into a respecting friendship. From their opposing backgrounds\, they will talk about trends in cyber security\, events happening today\, and some solutions we all can use to strengthen our defenses against cybercriminals trying to victimize us. Hector and Chris will answer your questions about their story or cybersecurity matters. \nPresenters: \n\nPaul Szawranskyj\, Special Agent – Private Sector Coordinator\, FBI\nChris Tarbell\, Founding Partner at NAXO\nHector Monsegur\, Security Researcher\n\nWho Can Attend: Open only to vetted InfraGard members. \nRegistration: See weekly email.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-we-met-through-infragard-hacker-and-the-fed/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240409T080000
DTEND;TZID=America/New_York:20240412T170000
DTSTAMP:20260403T172718
CREATED:20240220T153643Z
LAST-MODIFIED:20240222T155200Z
UID:5083-1712649600-1712941200@www.infragardnational.org
SUMMARY:ISC West 2024
DESCRIPTION:ISC West is the leading comprehensive and converged security trade event in the U.S taking place April 9-12 (SIA Education@ISC: April 9-11 | Exhibit Hall: April 10-12) at the Venetian Expo in Las Vegas. \nAt ISC West\, network and connect with thousands of security and public safety professionals\, learn from the SIA Education@ISC Passport Program\, plus explore the latest technologies in Access Control\, Alarms & Monitoring\, and Video Surveillance\, while discovering emerging trends in Drones & Robotics\, Cybersecurity & Connected IoT\, Smart Home\, and more. InfraGard members can register for free using the link!\nRegister now: http://iscwest24.com/InfraGard
URL:https://www.infragardnational.org/event/isc-west-2024/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240409T113000
DTEND;TZID=America/Chicago:20240409T123000
DTSTAMP:20260403T172718
CREATED:20240404T190132Z
LAST-MODIFIED:20240404T190132Z
UID:5116-1712662200-1712665800@www.infragardnational.org
SUMMARY:IMA Webinar: Don't Be Outsmarted By Your Smart Car
DESCRIPTION:Next-generation vehicular communications have provided great advances in vehicle safety and passenger accessibility but have also introduced complex cybersecurity challenges. In this presentation\, we’ll explore advances brought about by next-generation vehicular platforms and highlight the need for a cybersecurity testing framework that quickly identifies vulnerabilities in advanced vehicular systems. \nSince modern vehicles rely heavily on radio frequency (RF) technologies\, we’ll examine several RF attack vectors including over the air updates and remote vehicle entry and understand the difficulty that these attacks represent. Finally\, we will discuss ongoing efforts within companies\, universities\, and government agencies to develop standards and regulations that will help to improve vehicular security in the future. \nPresenter: \n\nJason Cuneo\, Chief Technologist McCrary Center\, Auburn University\nBen McGee\, CEO Cyber Protex\n\nWho Can Attend:\nOpen to anyone. \nRegistration:\nClick to register.
URL:https://www.infragardnational.org/event/ima-webinar-dont-be-outsmarted-by-your-smart-car/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240410T140000
DTEND;TZID=America/New_York:20240410T153000
DTSTAMP:20260403T172718
CREATED:20240321T151551Z
LAST-MODIFIED:20240321T151835Z
UID:5110-1712757600-1712763000@www.infragardnational.org
SUMMARY:IMA Webinar: Managing Risk and Increasing Reliance for with AI-enabled Systems
DESCRIPTION:The accelerating adoption of AI-enabled systems by both organizations and their suppliers is increasing our threat surface in unprecedented ways. In this session\, we will: \n\nExamine real and regulatory risks associated with adopting AI-enabled systems.\nProvide an update on related regulatory and governance frameworks.\nProvide pragmatic recommendations for realizing the benefits of AI while managing to your risk posture.\n\nLearning Outcomes/Objectives:\nEducate participants on the unique and evolving vulnerabilities in cloud and on-prem AI-enabled systems. Provide experienced\, pragmatic recommendations for how to manage risks. \nPresenter: \n\nJodi Daniels\, Founder & CEO\, Red Clover\nChristina Liaghati\, PhD\, AI Strategy Execution & Operations Manager\, AI & Autonomy Innovation Center\, MITRE\nBenjamin Harbin\, Senior Manager\, DevSecOps\, Aflac\nTera Ladner\, VP\, Information Risk Management and Governance\, Aflac\n\nWho Can Attend:\nOpen to anyone. \nTarget Audience:\nSenior cyber defenders. \nRegistration: \nClick to register
URL:https://www.infragardnational.org/event/ima-webinar-managing-risk-and-increasing-reliance-for-with-ai-enabled-systems/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240411T083000
DTEND;TZID=America/Los_Angeles:20240411T110000
DTSTAMP:20260403T172718
CREATED:20240328T144233Z
LAST-MODIFIED:20240328T144346Z
UID:5111-1712824200-1712833200@www.infragardnational.org
SUMMARY:Persistent Mobile Device Threats and Propagation via Artificial Intelligence
DESCRIPTION:The objective of this course is to instruct and advise attendees on what types of persistent threats are out there targeting their mobile devices in order to 1). Take over financial accounts\, 2). Breach personal and/or business emails\, 3). Target the individual for a scam\, 4). Inject ransomware or conduct a full system takeover of their device to achieve all 4 objectives. Many of these techniques are now facilitated and aided by Artificial Intelligence. Attendees will learn about modern day scams facing businesses and individuals as well as mitigation strategies\, social engineering attacks and will finish off with several case studies. \nTopics: \n\nWhat is a mobile device threat and how does it affect me?\nBreakdown of different types of mobile device scams:\n\nSim swapping/hijacking\nPhishing texts and emails\nVhishing and Smishing\nMan-in-the-middle attack\nBluetooth and WiFi attacks\nDevice spoofing\nRansomware\n\n\nBest practices on securing your mobile device and its contents\nCurrent scams facing business and individuals and mitigation strategies\nSocial engineering attacks and defenses\nCase studies\n\nPresenter: \nSUBJECT MATTER EXPERT: A native of Eastern Tennessee\, SME is a Certified Information Systems Security Professional (CISSP®) and an Open Source Intelligence (OSINT) and investigations expert who specializes in SME is a former Navy Submarine Navigation Electronics Technician and transitioned into the private sector offering collaborative attitude and expertise to support a variety of organizations\, both public and private in implementing better cybersecurity. \nWho Can Attend:\nOpen to anyone. \nRegistration: \nClick to register \n 
URL:https://www.infragardnational.org/event/persistent-mobile-device-threats-and-propagation-via-artificial-intelligence/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240416T140000
DTEND;TZID=America/New_York:20240416T153000
DTSTAMP:20260403T172718
CREATED:20240222T163105Z
LAST-MODIFIED:20240222T163210Z
UID:5087-1713276000-1713281400@www.infragardnational.org
SUMMARY:FBI's Weapons of Mass Destruction Directorate's Community Medical Program
DESCRIPTION:The Medical Community Program was developed in response to the observed lack of understanding and recognition of a weapon of mass destruction (WMD) threat and/or incident\, to include chemical\, biological\, radiological\, nuclear\, and explosives (CBRNE). If a CBRNE attack occurs\, the first cases of illnesses/injuries may be initially diagnosed by medical community professionals. U.S. hospital workers and first responders are on the front lines for recognizing and detecting patient exposure to dangerous pathogens\, toxins\, chemicals\, or radiological materials. This program allows the FBI to partner with health care workers to plan for\, detect\, mitigate\, and respond to potential CBRNE threats or incidents within their community. \nWorkshop Accessibility:\nOpen only to vetted InfraGard members \nRegistration:\nSee weekly email.
URL:https://www.infragardnational.org/event/fbis-weapons-of-mass-destruction-directorates-community-medical-program/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240417T100000
DTEND;TZID=America/New_York:20240417T120000
DTSTAMP:20260403T172718
CREATED:20240216T154429Z
LAST-MODIFIED:20240216T154429Z
UID:5082-1713348000-1713355200@www.infragardnational.org
SUMMARY:Operationalizing a Data Privacy and Governance Program that Inspires Trust
DESCRIPTION:This session will feature an overview of the key components required to build and operationalize a privacy and governance program\, focusing on the following key areas: i) fundamentals of building a risk governance program; ii) understanding and responding to consumer rights under US privacy laws; iii) privacy enforcement and privacy litigation. Presenters will provide insights on best practices from a legal regulatory and compliance framework. \nPresentation Agenda (Times and Speakers): \n\nJustine Phillips (35-40 min.)\nBrian Hengesbaugh (35-40 min.)\nHelena Engfeldt (35-40 min.)\n\nLearning Outcomes/Objectives: Participants in this session will come away with a deeper understanding of how to operationalize a data privacy and governance program that inspires trust. Upon completion of this session\, participants will: \n\nBe able to define key terms related to building a data privacy and governance program\nBe able to outline key components required to implement a data privacy and governance program\nBe able to apply best practices as it relates to legal and information security teams working together within an organization responsible for building a data privacy and governance program\n\nWorkshop Accessibility:\nOpen only to vetted InfraGard members. \nPlease see weekly email for registration.
URL:https://www.infragardnational.org/event/operationalizing-a-data-privacy-and-governance-program-that-inspires-trust/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240425T140000
DTEND;TZID=America/New_York:20240425T150000
DTSTAMP:20260403T172718
CREATED:20240328T150236Z
LAST-MODIFIED:20240328T150541Z
UID:5113-1714053600-1714057200@www.infragardnational.org
SUMMARY:Artificial Intelligence Cross-Sector Council Launch: Bridging AI Innovations and National Security in the Digital Age: A Presentation of InfraGard National Members Alliance
DESCRIPTION:Discover the goals of InfraGard National’s new Artificial Intelligence Cross Sector Council (AI-CSC) in our inaugural webinar. Aligning with related Executive Orders (EOs) and addressing pivotal threats\, such as those outlined in the 2024 Annual Threat Assessment of the U.S. Intelligence Community\, this session delves into AI-CSC’s mission to harness AI for enhancing national security and operational resilience. Learn how we intend to navigate the challenges of digital exhaust data and evolving digital threats\, promoting a secure integration of AI technologies within critical infrastructure. This webinar will illuminate the AI-CSC’s strategy for fostering collaboration\, advancing predictive analytics\, and developing proactive defense mechanisms to safeguard national interests and ensure a secure future. This webinar will be led by Jodi Masters-Gonzales\, Chair of the AI-CSC. \nLearning Objectives: \n\nComprehend AI-CSC’s Mission within a National Security Context\nIdentify Challenges of Ubiquitous Technical Surveillance and Digital Authoritarianism\nStrategize Proactive Defense and Predictive Analysis in AI-CSC Initiatives\nEnhance Collaborative Defense through AI-CSC’s Framework\n\nWho can attend:\nOpen only to InfraGard Members. \nRegistration:\nSee weekly email.
URL:https://www.infragardnational.org/event/artificial-intelligence-cross-sector-council-launch-bridging-ai-innovations-and-national-security-in-the-digital-age/
END:VEVENT
END:VCALENDAR