BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//InfraGard National Members Alliance - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:InfraGard National Members Alliance
X-ORIGINAL-URL:https://www.infragardnational.org
X-WR-CALDESC:Events for InfraGard National Members Alliance
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Denver
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20200308T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20201101T080000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20210314T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20211107T080000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20220313T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20221106T080000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20200308T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20201101T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20210314T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20211107T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20220313T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20221106T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20200308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20201101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20210314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20211107T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20220313T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20221106T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210604T093000
DTEND;TZID=America/New_York:20210604T120000
DTSTAMP:20260403T154010
CREATED:20210514T152200Z
LAST-MODIFIED:20210514T152200Z
UID:4056-1622799000-1622808000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Autonomously Changing the Driving World
DESCRIPTION:This is going to be a truly exciting and special event. Sponsored by Google Cloud Security and in conjunction with DriveOhio: \nAutonomously Changing the Driving World:\nOur Roads and Transportation Reimagined & Secured – Autonomous\, Connected\, & Electric Vehicle Technology: To register and learn more about the event please visit: https://lnkd.in/eraZhPH \nObjectives: \n1. Next generation cybersecurity for autonomous vehicles and transportation\n2. Overview of CISA Transportation Sector\n3. Deploying Transportation Security Practices in State DOTs Research Project\n4. Public Transportation (PT)\, Over the Road Bus (OTRB)\, and Surface Transportation (ST) security \nPresenters: \nFaye Francy\, Executive Director at Automotive ISAC (Auto-ISAC)\nFaye serves the global automotive industry through the analysis and sharing of trusted and timely cyber threat information about existing or potential cyber-related threats and vulnerabilities for on-road vehicle electronics. \nBrian Kelley\, CTO\, Ohio Turnpike\nBrian Kelley is the Chief Technology Officer for the Ohio Turnpike & Infrastructure Commission. Under his leadership\, Portage County received international\, national\, state\, and regional recognition for highly successful enterprise-wide IT. \nChelsea Treboniak\, Owner\, Critical Ops\nCritical Ops focuses on workplace modernization for a smarter\, more secure company. We make tech do your work so you can enjoy life. Service Disabled Veteran Owned Small Business (SDVOSB)\, Woman Owned Small Business (WOSB)\, Female Business Enterprise (FBE)\, Local Producer Enterprise (LPE) and Disadvantaged Business Enterprise (DBE). \nHoward Wood\, Executive Director\, DriveOhio\nWith more than 30 years of experience in the surface transportation industry\, having held leadership positions in the Ohio Department of Transportation and a private sector planning and engineering firm. Specific areas of expertise include transportation policy and planning | transportation finance | P3 advisory | asset management | ITS and operations management | strategic planning | civil engineering project development | business development | talent recruiting and development | and communications. \nWho Can Attend:\nOpen only to InfraGard members and their guests. CIOs\, CISOs\, IT\, CEO’s\, CFOs and public sector encouraged to attend. \nRegistration:\nhttps://info.agileblue.com/infragard-meeting
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-autonomously-changing-the-driving-world/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20210604T083000
DTEND;TZID=America/Denver:20210604T113000
DTSTAMP:20260403T154010
CREATED:20210524T121533Z
LAST-MODIFIED:20210524T121711Z
UID:4067-1622795400-1622806200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Drug Trafficking and Cyber Crimes: Criminal Enterprises Do It All
DESCRIPTION:We have brought together some top experts to present on and demonstrate the broad range of threats orchestrated by criminal enterprises in 2021. The agenda for this event is as follows: \n1.) Presentation on active cyber-criminal threat groups by Mandiant\n2.) Panel discussion on cyber-criminal threats facing companies/organizations\n3.) Overview of Western Hemisphere Transnational Organized Crime Threats by the FBI \nObjectives: \nUpon completion of this webinar\, the attendee will be familiar with the cyber-criminal threat intelligence including active groups as well as threats facing companies and organizations along with Western Hemisphere Transnational Organized Crime threats\, a top FBI priority in Colorado and Wyoming. \n  \nPresenters:\nGreg Kapourellos\, Senior Mandiant Intelligence Advisor @ Mandiant\nPeter Mitchener\, Senior National Intelligence Officer for Cyber @ FBI\nPhil Kealy\, Director @ Mandiant\nChris Calarco\, Denver FBI\, PSC/InfraGard \nWho Should Attend:\nAll members are welcome to join this event\, however\, pre-registration is mandatory using the below link. Space is limited to 1000 people\, and this is an unclassified webinar open to InfraGard members and non-members so please feel free to invite your colleagues. \nRegistration:\nhttps://attendee.gotowebinar.com/register/8608756447151352331
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-drug-trafficking-and-cyber-crimes-criminal-enterprises-do-it-all/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20210603T090000
DTEND;TZID=America/Los_Angeles:20210603T133000
DTSTAMP:20260403T154010
CREATED:20210430T152111Z
LAST-MODIFIED:20210430T152111Z
UID:4029-1622710800-1622727000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Violent Extremism Awareness and Prevention (VEAP)
DESCRIPTION:InfraGard Los Angeles and GRIPSA present Violent Extremism Awareness and Prevention (VEAP). This course is designed to provide the knowledge and tools to recognize and understand the indicators and warning of violent extremist beliefs\, groups\, communications and activities\, with an aim for providing proactive reporting to the proper authorities in order to thwart dangerous plots and attacks. It examines international\, transnational\, domestic and single-issue extremism\, and both the politically far right and far left violent extremes. VEAP participants or students include private security and other concerned private sector partners\, public safety and government officials\, non-profit entities and anyone else concerned about the threat of terrorism and violent extremism in our society.\n***There are 4.5 ASIS credits available for this course \nObjectives:\nDomestic\, International\, Transnational\, Single-issue and Far Left/Right Violent Extremism\nKey Concepts and Issues Involving Terrorism\, Counterterrorism and Terrorism Prevention\nSuspicious Activity Recognition and Reporting \n  \nPresenters: \nHal Kempfer\, GRIP\, Inc.\nA retired Marine intelligence officer with 24 years of service\, with much of it in the civil-military realm. Consulting and training firms focused on strategic risk\, terrorism\, intelligence\, planning and all-hazards/all threats security\, \nWho Can Attend:\nOpen to anyone. Particularly suited to InfraGard Members\, Security and Risk Management Professionals\, Public Safety (Law/Health/Fire)\, Area Stakeholders\, all Critical Infrastructure Sectors\, Intelligence Analysts/Officers/Managers\, and anyone else concerned about the threat of violent extremism. \nRegistration: \nhttps://attendee.gotowebinar.com/register/607711486417089552
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-violent-extremism-awareness-and-prevention-veap/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210527T130000
DTEND;TZID=America/New_York:20210527T143000
DTSTAMP:20260403T154010
CREATED:20210508T232854Z
LAST-MODIFIED:20210508T232854Z
UID:4045-1622120400-1622125800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Who You Going to Call?
DESCRIPTION:Besides the FBI – Who can you call? We have presenters from the MA State Police\, NH CISA and the Secret Service. Please join us to meet some other agencies – what they do and how they protect us. \nSgt. Brian Gavioli from the Massachusetts State Police Commonwealth Fusion Center will provide an overview of the Commonwealth Fusion Center’s Massachusetts Cybersecurity Program. The Massachusetts Cybersecurity Program (MCP) was established in 2016 in response to the growing concerns and threats to cybersecurity in the Commonwealth. The MCP is a program within the Commonwealth Fusion Center focused on cybersecurity threat reporting\, training\, education\, and awareness. \nJason Climer\, Protective Security Advisor from CISA (Cybersecurity and Infrastructure Security Agency) out of New Hampshire will provide an overview of the Cybersecurity and Infrastructure Security Agency. CISA-101 presentation will provide an overview of who CISA is and the various resources they provide to the public and private sector and inform how PSAs and CISA interact with the FBI. \nPresenters: \nSgt. Brian Gavioli\, Massachusetts State Police Commonwealth Fusion Center\nHe is currently assigned to the Commonwealth Fusion Center’s Massachusetts Cybersecurity Program since September 2019 where he coordinates Cyber Threat Intelligence\, Information sharing\, and Cyber Incident Response. \nJason Climer\, Protective Security Advisor – New Hampshire Cybersecurity and Infrastructure Security Agency\nJason has been the Protective Security Advisor for New Hampshire since May 2017. Prior to that he spent six years with the Federal Protective Service. While there\, he managed the Facility Security Assessment Program for FPS Region 1. \nWho can attend:\nOpen only to vetted InfraGard members. \nRegistration:\nhttps://attendee.gotowebinar.com/register/2119388241823177739
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-who-you-going-to-call/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210527T130000
DTEND;TZID=America/New_York:20210527T140000
DTSTAMP:20260403T154010
CREATED:20210514T151639Z
LAST-MODIFIED:20210514T151639Z
UID:4055-1622120400-1622124000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: The FBI's Internet Crime Complaint Center (IC3)
DESCRIPTION:Over the years\, the Internet crime landscape has broadened from non-delivery schemes and credit card fraud to ransomware and data breaches costing both individuals and businesses millions of dollars each year. The Internet Crime Complaint Center (IC3) is the FBI’s reporting mechanism for suspected Internet facilitated criminal activity. Agents and Analysts pour through hundreds thousands of complaints each day to build investigative referrals for law enforcement agencies throughout the country. \nIn this webinar\, you will learn about reported Internet crime trends\, the complaint process\, the FBI’s Recovery Asset Team and the IC3’s annual report. \nPresenters:\nRachel Yurkovich\, FBI Analyst at IC3 \nWho can attend:\nOpen to anyone. \nRegistration:\nhttps://attendee.gotowebinar.com/register/8203499550742954766
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-the-fbis-internet-crime-complaint-center-ic3/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210527T130000
DTEND;TZID=America/New_York:20210527T140000
DTSTAMP:20260403T154010
CREATED:20210514T151010Z
LAST-MODIFIED:20210514T151010Z
UID:4053-1622120400-1622124000@www.infragardnational.org
SUMMARY:A CISO Developed Third Party Risk Management Framework
DESCRIPTION:Over a dozen CISOs recently contributed to developing a framework designed to be a powerful tool to build\, manage\, and scale a third-party risk management program. The foundation of this framework consists of a set of guiding principles identified by members\, which are critical to a successful third-party risk management program. The tool presents these disciplines in a sequential order which cybersecurity leaders can follow as a guide to developing their program\, and include: \n1. Contract Management & Process Intake\n2. Assessment\, Evaluating\, and Tiering of Business Partner Risk\n3. Engagement with Business Partners\n4. Monitoring the Health of Business Partners\n5. Third-Party Risk Solutions \nPlease join members of the Task Force\, which developed this framework as they present this tool\, review each key discipline\, and share best practices around developing and managing a third-party risk management program. \n• Benjamin Corll\, VP\, Cybersecurity and Data Protection at Coats\n• Matthew Stiak Director\, Cyber Risk Management at Delta Dental Insurance of California\,\n• Andy Fiumefreddo\, Enterprise IT Third-Party Cyber Risk Manager at American Family Insurance\n• Jerry Davis\, Senior Cybersecurity Advisor at Cybersecurity Collaborative and former Global CISO NASA and CSO Lam Research\n• Todd Fitzgerald\, V.P. of Cybersecurity Strategy\, Cybersecurity Collaborative – facilitator\nLearning Outcomes/Objectives \nUpon completion of this webinar\, the attendee will be able to understand: \n1. Contract Management & Process Intake\n2. Assessment\, Evaluating\, and Tiering of Business Partner Risk\n3. Engagement with Business Partners\n4. Monitoring the Health of Business Partners\n5. Third-Party Risk Solutions \nFrom the perspective of experienced cybersecurity leaders who are leading the transformation and development of their own third-party risk management programs. \nRegistration:\nhttps://us02web.zoom.us/webinar/register/3016206742067/WN_AjX3CRhoRCeK5A3oaCrLIg
URL:https://www.infragardnational.org/event/a-ciso-developed-third-party-risk-management-framework/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210526T130000
DTEND;TZID=America/New_York:20210526T143000
DTSTAMP:20260403T154010
CREATED:20210508T232357Z
LAST-MODIFIED:20210508T232357Z
UID:4044-1622034000-1622039400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Risk Management and What Do Security Researchers Do?
DESCRIPTION:Tyler Reguly\, Manager Security R&D\, VERT will discuss risk and prioritization in the environment including the value of CVSS and other metrics. Craig Young\, Principal Security Researcher : Will give us a glimpse into the tools and techniques utilized by security researchers when investigating new vulnerabilities. \nPresenters: \nTyler Reguly\, Manager of Security Research with Tripwire\nA key member of VERT (Vulnerability and Exposure Research Team)\, where he focuses on web application security\, protocol specifications (like SSH and DNS) and vulnerability detection. \nCraig Young\, Principal security researcher with Tripwire’s Vulnerability and Exposure Research Team (VERT)\nCraig has been active in numerous areas of computer security research over several years with nearly 200 CVEs to show for it. In 2014\, Craig won both tracks of the first ever SOHOpelessly Broken contest at DEF CON \nWho can attend:\nOpen only to vetted InfraGard members. Aimed toward security team members that want to learn more about risk and prioritization in the environment including the value of CVSS and other metrics. \nRegistration:\nhttps://attendee.gotowebinar.com/register/2881295924199747855\nWebinar ID 624-175-723
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-risk-management-and-what-do-security-researchers-do/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20210525T083000
DTEND;TZID=America/Los_Angeles:20210525T130000
DTSTAMP:20260403T154010
CREATED:20210430T150547Z
LAST-MODIFIED:20210430T150629Z
UID:4027-1621931400-1621947600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Supervisory Control & Data Acquisition (SCADA) & Industrial Control Systems (ICS) Vulnerabilities
DESCRIPTION:InfraGard Los Angeles and CT Watch\, Inc. present Supervisory Control & Data Acquisition (SCADA) & Industrial Control Systems (ICS) Vulnerabilities Webinar.\n***There are 4.5 ASIS credits available for this course\nCOURSE OVERVIEW:\nAccording to the Cybersecurity and Infrastructure Security Agency (CISA)\, there are 16 critical infrastructure sectors whose assets\, systems\, and networks\, whether physical or virtual\, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security\, national economic security\, national public health or safety\, or any combination thereof. In this course we will examine the unique threats and vulnerabilities in these sectors\, specifically taking an in-depth look at Insider Threat and all that it encompasses. \n*We will have an opening brief from the FBI Headquarters Cyber Division on Cyber Threats and the Water Sector. \nObjectives: \n1. What are Industrial Control Systems (ICS); Supervisory Control And Data Acquisition Systems (SCADA); and Operational Technology (OT)\n2. Definition of terms – why the terminology is important\n3. Overview of OT systems and how they work in the various sectors\n4. Overview of the differences between IT security and OT security\n5. Why are these systems vulnerable\n6. Discussion around various threat actors interested in OT systems and specific open source case studies of known incidents\n7. State of remediation technology – how do we fix these problems\n8. Case studies related to insider threats and impacts of organizational change and how they can affect personal predispositions to commit malicious acts. \n  \nPresenters: \nShawnee Delaney\, CT Watch\, Inc.\nDelaney is a decorated Intelligence Officer & an Insider Threat SME. At the Department of Homeland Security\, she coordinated & managed intelligence community relationships in the protection of U.S. critical infrastructure & ICS. \nMarty Edwards\, CT Watch\, Inc.\nEdwards was the longest-serving Director of the U.S. Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) and is currently co-chair of the DHS Control Systems Working Group. \nWho can attend:\nOpen to anyone. Particularly aimed toward InfraGard Members\, Public Safety (Law/Health/Fire)\, Terrorism Liaison Officers (TLO’s)\, Infrastructure Liaison Officers (ILO’s)\, Private Sector Security\, Area Stakeholders\, all Critical Infrastructure Sectors\, Intelligence Analysts\, Intelligence Officers and Private Investigators. \nRegistration:\nhttps://attendee.gotowebinar.com/register/4563913752140450829
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-supervisory-control-data-acquisition-scada-industrial-control-systems-ics-vulnerabilities/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210521T100000
DTEND;TZID=America/New_York:20210521T120000
DTSTAMP:20260403T154010
CREATED:20210514T144632Z
LAST-MODIFIED:20210514T144632Z
UID:4049-1621591200-1621598400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: 2021 Hazardous Weather Briefing
DESCRIPTION:This Webinar will cover Severe Storm Developments\, 2021 Hurricane Season\, Droughts\, Fire Weather Season\, Flooding Impacts\, Tornadic Activity\, Watches/Warnings/Advisory guidance\, and applications available to the general public and emergency response officials. Our presenter\, Ms. Wescott is not affiliated with the National Weather Service\, National Oceanic and Atmospheric Administration\, or the National Hurricane Center but is providing this briefing from her 12 years of expertise in atmospheric studies and operational weather forecasting for emergency management and public safety planning. \nPresenters: \nSunny Wescott\, Lead Meteorologist\, DHS-CISA\nConsidered a Subject Matter Expert on tropical\, fire\, polar\, arctic\, and severe storm events for CISA Communications and CISA Central Ms. Wescott produces briefings and outlook data for leadership and private sector executives. \nWho can attend:\nOpen only to InfraGard members and their guests. \nRegistration:\nhttps://www.eventbrite.com/x/infragard-maryland-hazardous-weather-briefing-tickets-151993052311
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-2021-hazardous-weather-briefing/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210519T130000
DTEND;TZID=America/Chicago:20210519T143000
DTSTAMP:20260403T154010
CREATED:20210430T151448Z
LAST-MODIFIED:20210430T151448Z
UID:4028-1621429200-1621434600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Emerging Trends and Threats Against the U.S. Defense Industrial Base
DESCRIPTION:Emerging trends and threats against the U.S. Defense Industrial Base: How small-to-medium size enterprises (SMEs) can protect themselves. \nThe SolarWinds supply chain attack is just one in a string of threats against the U.S. and its critical infrastructures. The U.S. DIB and its supply chain are prime targets for criminals and securing the supply-chain is critical to our national security. SMEs must not only have defensive skills\, but just as important\, the offensive skills to prevent such attacks. \nJoin us for a panel discussion on how several U.S. agencies are addressing these threats and other economic threats\, along with recommendations and resources you can take away and apply to your own business. \nPresenters:  \nKiesha Downs\, Chief\, Trade Regulations Branch – U.S. Census Bureau\nGerard (Gerry) Horner\, Supervisor Trade Regulations Branch\, U.S. Census\nLaszlo Gonc\, Founder/ECO Next Era Transformation Group\, LLC\nSarah Bauer\, Senior Intelligence Officer\, NCIS \nWho Should Attend:\nDefense Industrial Base Sector or those individuals interesting in securing both offensive and defensive threats to your company’s supply chain. Open to anyone. \n\nRegistration:\nhttps://attendee.gotowebinar.com/register/1847815466730264843 \n 
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-emerging-trends-and-threats-against-the-u-s-defense-industrial-base/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210519T130000
DTEND;TZID=America/New_York:20210519T140000
DTSTAMP:20260403T154010
CREATED:20210517T220133Z
LAST-MODIFIED:20210517T220133Z
UID:4060-1621429200-1621432800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: It's Not About You: 3rd Party & Supply Chain Risk for Financial Services in a Post-SolarWinds World
DESCRIPTION:InfraGardNCR\, the American Bar Association\, and the Financial Services Information Sharing and Analysis Center (FS-ISAC) have partnered to bring you this webinar. \nFinancial institutions spend time and money to strengthen their internal cyber defenses\, but there are limitations when dealing with third party suppliers and providers of services. Recent high-profile incidents have highlighted the potential risks and threats posed by the compromise of a third party. FS-ISAC’s financial services members regularly deal with these considerations and will review how the sector responded (and learned) from these third party incidents. \nObjectives: \nThe webinar will provide awareness of how your footprint can be affected by other companies’ incidents\, recommendations on how to adjust your defensive posture\, and ideas on how to work with your peers who are affected by the same third party compromise. \nAfter the webinar\, attendees should know more about how communities of trust can provide perspective on major incidents\, best practices to help mitigate against impact\, and lean on each other for support. \nPresenters: \nDenyette DePierro\, Vice President & Senior Counsel\, ABA\nAs regulatory counsel in ABA’s Office of Operational Risk and Cybersecurity\, I focus on the question “How will banking and technology evolve in a changing digital infrastructure?”\nhttps://www.linkedin.com/in/depierro/ \nSteven Silberstein\, CEO\, FS-ISAC\nhttps://www.linkedin.com/in/silberstein/ \nTeresa Walsh\, Global Head of Intelligence\nExperienced Intelligence Officer with a demonstrated history of working in the financial services industry. Skilled in Strategic Development\, People Management\, Intelligence Analysis\, Analytical Skills\, Government\, Intelligence\, and Operational Intelligence. Strong military and protective services professional graduated from University of Missouri. https://www.linkedin.com/in/teresa-w-9b068130/ \n  \nWho Should Attend:  \nOpen to anyone. Particularly aimed toward professionals who are responsible for 3rd party and supply chain risk in their companies/organizations\, especially those in the financial services sector. \nRegistration: \nhttps://fsisac.zoom.us/webinar/register/WN_8Ze3EGBpTQOo-JdFOeezsw \n 
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-its-not-about-you-3rd-party-supply-chain-risk-for-financial-services-in-a-post-solarwinds-world/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210519T130000
DTEND;TZID=America/New_York:20210519T140000
DTSTAMP:20260403T154010
CREATED:20210507T180140Z
LAST-MODIFIED:20210507T180140Z
UID:4042-1621429200-1621432800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: All About Intellectual Property Rights and Theft of Trade Secrets
DESCRIPTION:Join us and learn about the differences in Intellectual Property crimes\, the elements of Trade Secrets and the relationship between investigators and rights holders in IP cases. A case example will be included! \nPresenters: \nJennifer French\, Supervisory Special Agent FBI\nFBI Supervisory Special Agent Jennifer French is assigned to the National Intellectual Property Rights Coordination Center. \nWho can attend:\nOpen to anyone. \nRegistration:\nhttps://attendee.gotowebinar.com/register/8562791363205145871
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-all-about-intellectual-property-rights-and-theft-of-trade-secrets/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210519T100000
DTEND;TZID=America/Chicago:20210519T110000
DTSTAMP:20260403T154010
CREATED:20210514T145451Z
LAST-MODIFIED:20210514T145451Z
UID:4050-1621418400-1621422000@www.infragardnational.org
SUMMARY:SolarWinds Breach- Is It Over Yet? IOC / Tactics\, Techniques\, & Procedures
DESCRIPTION:In early 2020\, hackers secretly broke into Texas-based SolarWind’s systems and added malicious code into the company’s software system. The system\, called “Orion\,” is widely used by companies to manage IT resources and has 33\,000 customers that use Orion\, according to SEC documents. \nMost software providers regularly send out updates to their systems\, whether it’s fixing a bug or adding new features. SolarWinds is no exception. Beginning as early as March of 2020\, SolarWinds unwittingly sent out software updates to its customers that included the hacked code. \nThe code created a backdoor to customer’s information technology systems\, which hackers then used to install even more malware that helped them spy on companies and organizations. \nTo keep you on top of the evolving cyber challenges and ways to ensure your organization is more cyber resilient\, we offer our latest opportunity engage in a vendor agnostic setting by bringing forward the industry leaders to share their insights & advice. \nDiscussion Topics That We Will Cover: \n• SolarWinds Breach Overview- Who\, What\, When\, Where \,Why \,& How\n• IOC / Tactics\, Techniques & Procedures (TTP)\n• Actionable Steps To Improve Online Safety and Security\nSpeaker\nCharles J. George CISSP – First Maridian \nModerator:\nRachel Arnold – SecureNation \nPresenters: \nCharles George CISSP\, President / First Maridian\nCharles is the founder of First Maridian LLC\, with Headquarters in Covington\, LA. He is very active in the local cybersecurity community and is a Certified Information Systems Security Professional (CISSP).\n\nWho can attend:\nOpen to anyone. \nRegistration:\nhttps://attendee.gotowebinar.com/register/6508750810447087116
URL:https://www.infragardnational.org/event/solarwinds-breach-is-it-over-yet-ioc-tactics-techniques-procedures/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210513T123000
DTEND;TZID=America/New_York:20210513T143000
DTSTAMP:20260403T154010
CREATED:20210511T003439Z
LAST-MODIFIED:20210511T003439Z
UID:4047-1620909000-1620916200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Product Security Incident Response & Vulnerability Handling - Electronics & Computer Investigations
DESCRIPTION:Hamilton County Sheriffs Office Regional Electronics and Computer Investigations (RECI) Unit Product Security Incident Response\, Vulnerability Handling\, and the CVD Challenge. \nObjectives: \nSergeant Dave Ausdenmoore of the HCSO will introduce some of the resources and assets the RECI uses\, including tracking or other types of electronic surveillance and analysis for law enforcement agencies in southwest Ohio\, as well as their forensic and investigative assistance. Background information about RECI can be found at https://www.hcso.org/enforcement/ \nFour speakers from Intel Corp. will lead a discussion about product security incident response\, vulnerability handling\, and the CVD challenge. \nPresenters: \nDr. Amit Elazari\, Director\, Global Cybersecurity Policy\nLecturer at UC Berkeley’s School of Information Master in Information and Cybersecurity and the External Advisory Committee for the Center of Long Term Cybersecurity. She holds a Doctoral Degree in the Law (J.S.D.) from UC Berkley. \nKatie Noble\, Director of PSIRT and Bug Bounty\nLeads the cybersecurity vulnerability Bug Bounty program\, researcher outreach\, and strategic planning efforts. Prior to joining Intel\, Katie served as the Section Chief of Vulnerability Management and Coordination at the DHS and CISA. \nAlexander Romero\, Director at Intel PSIRT\nDefense Digital Service where he helped to champion the first ever “Hack the Pentagon” bug bounty program in the Federal Government along with expanding the first ever Vulnerability Disclosure Program for the DOD. \nJosh Dembling\, Senior Director of the Intel Product Security Incident Response Team (PSIRT) and Bug Bounty Program\nOver a span of three decades he has led organization transformations while at Intel\, IBM and Motorola. Josh specializes in product security\, vulnerability response management\, Bug Bounty programs and security researcher outreach. \nWho should attend:\nInfraGard members and their guests involved with all sectors will benefit from these presentations\, but especially those in InfraGard sectors such as Critical Manufacturing\, Energy\, Financial Services\, Healthcare & Public Health\, Information Technology\, and Transportation Systems. \nRegistration:\nSee events email.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-product-security-incident-response-vulnerability-handling-electronics-computer-investigations/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210512T090000
DTEND;TZID=America/New_York:20210512T100000
DTSTAMP:20260403T154010
CREATED:20210426T151314Z
LAST-MODIFIED:20210507T181419Z
UID:4026-1620810000-1620813600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Your Strategy for Recovery
DESCRIPTION:Building a resilient organization that can withstand a cyber intrusion goes beyond compliance and notification requirements. Cyber criminals can bring an organization’s operations to a halt with a single ransomware virus\, leaving it without the financial means to meet payroll\, deliver client services\, or even pay for the necessary breach response services to revert its systems back online. Understanding the financial impact an organization can withstand is crucial to building cyber resilience. Equally as important is understanding the value of its data or potential reputational /revenue implications that often accompany a cyber incident. Companies need a robust cyber mitigation and response strategy to effectively manage a range of cyber crisis scenarios and maintain operational continuity. This session will review insurance coverages\, crisis management strategies\, and the importance of board/leadership oversight. \nPresenters: \nAndres Franzetti\, CEO and Co-founder\nAndres specializes in helping multi-national organizations address complex risks to increase their overall resiliency and mitigate downside exposures. He has extensive expertise in program development and launched a cyber warranty program. \nJennifer Rothstein\, Business Head\, Cyber Insurance & Legal\, BlueVoyant & Founder and President\, Women in Cyber Leadership\nJennifer is the Business Development Head\, Cyber Insurance & Legal\, for BlueVoyant\, a cybersecurity investigation company headquartered in New York City. She also founded and serves as the President of Women in Cyber Leadership Corp. \n  \nWho can attend:\nOpen to anyone. \n  \nRegistration: \nhttps://us02web.zoom.us/webinar/register/WN_dQJUjL1pQCSPpE4KpJi1Zg
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-your-strategy-for-recovery/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210511T113000
DTEND;TZID=America/Chicago:20210511T130000
DTSTAMP:20260403T154010
CREATED:20210416T144526Z
LAST-MODIFIED:20210416T144732Z
UID:4018-1620732600-1620738000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: The Elements of Zero Trust Networks
DESCRIPTION:Join us to learn more about this new Security Architecture and how your company can take advantage of it. The presenters will cover both technical concepts and practical advice on Zero Trust Architecture. \n  \nPresenters:  \nAndy Crocker\, Manager\, Technical Partner Managers\, Fortinet\nAndy Crocker has spent nearly 4 decades in the IT world and experienced major changes and advances in technology and cyber security. Andy has been at Fortinet for almost 6 years. \nAndy Ruz\, Director of Information Security\, NovoPayment \nAndy Ruz is an Executive with over 20 years of Global experience in IT and Information Security. He has an MBA in MIS\, a Bachelor’s in computer science and seven certificates in Information Technology Management and Information Security. \n  \nWho can attend:  \nOpen to anyone. \n  \nRegistration: \nhttps://attendee.gotowebinar.com/register/7803314700993439245 \n 
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-the-elements-of-zero-trust-networks-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20210511T090000
DTEND;TZID=America/Los_Angeles:20210511T130000
DTSTAMP:20260403T154010
CREATED:20210409T143307Z
LAST-MODIFIED:20210409T143307Z
UID:4011-1620723600-1620738000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Open Source Intelligence (OSINT) Level 5 – OSINT Dissemination
DESCRIPTION:InfraGard Los Angeles and CTWatch\, Inc. present Open Source Intelligence (OSINT) LEVEL 5 – OSINT Dissemination. Building on Levels 1 to 4\, this course is the capstone to the 6 Levels of OSINT series. During this course\, we will examine Intelligence collection and capture techniques then transition into the OSINT Lifecycle. The course is topped off with a discussion about report writing for a variety of audiences.*This course is eligible for 4 ASIS CPE credits* \nTOPICS:\n1. Collecting\, Capturing\, and Storing Intelligence\n2. OSINT Lifecycle\n3. Report Writing\na. Government Audience\nb. Managerial Audience\nc. Practitioner Audience \n  \nPresenters: \nCT Watch\, Inc. \nSME is an Open-Source Intelligence (OSINT) and investigations expert specializing in assessing public information for evaluating external risks\, finding missing persons\, threat modeling\, and operations security. \n  \nWho can attend: \nOpen to anyone. Particularly aimed toward InfraGard Members\, Public Safety (Law/Health/Fire)\, Terrorism Liaison Officers (TLO’s)\, Infrastructure Liaison Officers (ILO’s)\, Private Sector Security\, Area Stakeholders\, all Critical Infrastructure Sectors\, Intelligence Analysts\, Intelligence Officers and Private Investigators. \n  \nRegistration: \nhttps://attendee.gotowebinar.com/register/7208360162757814797
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-open-source-intelligence-osint-level-5-osint-dissemination/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20210506T090000
DTEND;TZID=America/Los_Angeles:20210506T130000
DTSTAMP:20260403T154010
CREATED:20210409T145120Z
LAST-MODIFIED:20210409T145120Z
UID:4013-1620291600-1620306000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Advanced Improvised Explosive Device (IED) Recognition Course
DESCRIPTION:InfraGard Los Angeles and CTWatch\, Inc. present Advanced IED Recognition Course. IED’s have evolved over the past 15 years from crude pipe bombs to increasingly sophisticated devices. Both private and public entities need to keep up with the evolution of IED’s\, responses and protocols. The briefing objectives are:\n1). Raise awareness to new tactics currently utilized by terrorists (foreign and domestic) and criminals in the use of various types of IED’s\n2). How Suspicious Activity Reporting (SAR) works\,\n3). Pre-Incident Indicators (PII’s) and identification of a potential device for private and public sector security personnel\n*This course is eligible for 4 ASIS CPE credits \nObjectives:  \n1. History of IED use against civilian targets (soft targets).\n2. Recent case studies (from Aliso Viejo package bomb to the Houston TX serial bomber)\n3. Types of IED’s from large vehicle IEDs\, use of drones to deliver IED’s to personal implanted IED’s .\n4. Recognition of various types of IEDs.\n5. Response protocols (Do’s and Don’ts). \n  \nPresenters: \nKevin Miles\, CT Watch\, Inc. \nMr. Miles retired from the Federal Bureau of Investigation (FBI) after 23 years as a Special Agent Bomb Technician (SABT). For the past 3 years\, he has been teaching pre-and post- blast investigation techniques as a government contractor. \n  \nWho can attend:  \nOpen to anyone. \n  \nRegistration: \nhttps://attendee.gotowebinar.com/register/7674724616772217099
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-advanced-improvised-explosive-device-ied-recognition-course/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210505T113000
DTEND;TZID=America/Chicago:20210505T130000
DTSTAMP:20260403T154010
CREATED:20210503T174704Z
LAST-MODIFIED:20210503T174704Z
UID:4031-1620214200-1620219600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Career Designs for CISOs and CIOs
DESCRIPTION:You’ve decided you want to be a CISO or a CIO. Now what? What certifications will you need\, and where can you obtain them? What does a CISO\, or CIO actually do all day? If you wish to one day become a technology leader\, this is the session you will need to begin designing your own career as a member of a C-Suite. To prepare you for the role we will cover the following. \nPresenters: \nGordon Rudd\, CEO\, Stone Creek Coaching\nGordon has coached CISOs & CIOs for the last 15 years. Gordon’s career includes IT\, cybersecurity\, building high-performance teams and coaching CISOs and the organizations they serve. \nWho should attend:\nOpen to anyone. If you are a CISO or someone aspiring to be a CISO\, this must-attend deep dive. Background in information security or cybersecurity helpful but not required \nRegistration: \nhttps://onenet.zoom.us/meeting/register/tJIsf-2gqT4rGNBaVF8jZzW-kg7TzTH0tRUf
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-career-designs-for-cisos-and-cios/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210505T090000
DTEND;TZID=America/New_York:20210505T100000
DTSTAMP:20260403T154010
CREATED:20210426T150829Z
LAST-MODIFIED:20210426T150829Z
UID:4025-1620205200-1620208800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Exposing & Mitigating Cyber Vulnerabilities
DESCRIPTION:Cyber risk assessments form the foundation of an organization’s risk mitigation strategy by not only developing organizational cybersecurity awareness\, but also by identifying an organization’s unique vulnerabilities. The presenter will provide a brief overview of sources of risk (third parties\, IoT\, hacking\, phishing) and sobering data regarding the average impact of a cyber attack. Companies must leverage every resource available to establish a layered and proactive defense. The biggest cyber threat to an organization often lies between the chair and the keyboard\, hence the human element is an important part of the cyber equation.\nEducating staff via cyber hygiene training can turn employees from “cyber liabilities” to “vigilant proactive deterrents” against cyber-attacks. Coupled with technology solutions\, an organization that employs a holistic enterprise-wide cybersecurity framework is best positioned to withstand the evolving range of cyber threats. \n  \nObjectives: \nIdentify sources of risks\nRisk strategy\nCyber hygiene training\nTechnology solutions \n  \nPresenters: \nAndres Franzetti\, CEO Risk Cooperative\nMr. Franzetti leads the firm’s overall strategy execution and business operations. He works closely with industry partners\, and leaders to ensure that Risk Cooperative remains at the cutting edge of the risk and insurance industry. \nJennifer Rothstein\, Director NY Metro Infragard/Business Development Head\, Cyber Insurance & Legal at BlueVoyant\nJennifer is the Business Development Head\, Cyber Insurance & Legal\, for BlueVoyant\, a cybersecurity investigation company headquartered in New York City. She also founded and serves as the President of Women in Cyber Leadership Corp. \nWho can attend:\nOpen to anyone. Particularly suited to Business and I.T. professionals seeking to improve their Risk Mitigation Strategies\, knowledge of sources of risk\, and cyber hygiene training across all sectors. The session will include practical tips as well as the opportunity to take a survey to identify any gaps in your organization or even your own understanding. \n  \nRegistration: \nhttps://us02web.zoom.us/webinar/register/WN_3MF1kJMtQ0SQVgt6LjEjUw
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-exposing-mitigating-cyber-vulnerabilities/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210429T120000
DTEND;TZID=America/Chicago:20210429T133000
DTSTAMP:20260403T154010
CREATED:20210423T143956Z
LAST-MODIFIED:20210423T145857Z
UID:4020-1619697600-1619703000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Making the Case for Modern
DESCRIPTION:What does modern mean to a CIO or CDO or SysAdmin? Does it mean the same thing? What about prioritizing technical debt or transformational projects– how does one both define the problem and justify a modern solution to a variety of characters? \nAt Okta\, we exist architecturally at the center of several perspectives of “modern”. \nReconciling the expectations of a frictionless authentication experience to the ever-escalating demands of the security landscape is no small task. Technology must be delivered faster to wider audiences and with just the right amount of resources to accomplish the tasks at hand. \nPresenters: \nChris Gustafson\, Sr Solutions Engineer\, Okta \nChris is a Senior manager\, architect\, thought leader\, developer and speaker who has worked in a variety of industries delivering enterprise and SAAS solutions. Chris has nearly three decades of software development and design experience. \n  \nWho Can Attend:\nOpen to anyone. \n  \nRegistration: \nhttps://attendee.gotowebinar.com/register/8656399384835100432
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-making-the-case-for-modern/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210428T130000
DTEND;TZID=America/New_York:20210428T143000
DTSTAMP:20260403T154010
CREATED:20210423T150026Z
LAST-MODIFIED:20210423T150026Z
UID:4023-1619614800-1619620200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Ransomware -- Cybersecurity Stories from the FBI & Frontlines of Healthcare
DESCRIPTION:This briefing will specifically provide an overview on the ransomware threat\, including recent trends and statistics on infections in the FBI Boston region. The briefing will conclude with an overview on how the FBI investigates ransomware infections and recent successes. \nSuccessful cyberattacks on healthcare entities are steadily increasing. Sophisticated criminals and nation states are focusing more attention on healthcare than ever before. The main goals are to steal money\, data and intellectual property\, execute ransomware\, and attack critical infrastructure. How can you and your organization keep pace with the rapid transformation of healthcare while providing an appropriate level of security as risks escalate? \n  \nPresenters:  \nSpecial Agent Robert J. Baker\, (BS) (FBI)\nSpecial Agent Baker is a Boston-area native. In 2019\, he transitioned to Special Agent and is assigned to the Cyber program\, investigating criminally motivated computer intrusions \nJustin Armstrong\nJustin Armstrong recently joined Tausight as Senior Healthcare Information Security Professional\, a security startup dedicated to helping healthcare providers tackle their cybersecurity and regulatory challenges. \nWho Can Attend: \nOpen only to vetted InfraGard members. Anyone interested in learning more about what the FBI is seeing with ransomware\, and details as to what is being seen in the healthcare industry. \n  \nRegistration: \nPlease register for Boston Infragard Presents Ransomware — Cybersecurity Stories from the FBI & the Frontlines of Healthcare on Apr 28\, 2021 1:00 PM EDT at: \nhttps://attendee.gotowebinar.com/register/75136640913453071 \nAfter registering\, you will receive a confirmation email containing information about joining the webinar.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-ransomware-cybersecurity-stories-from-the-fbi-frontlines-of-healthcare/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210428T130000
DTEND;TZID=America/New_York:20210428T140000
DTSTAMP:20260403T154010
CREATED:20210423T144722Z
LAST-MODIFIED:20210423T144722Z
UID:4021-1619614800-1619618400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: How to Cook Up BEC Fraud: The South African Tender Scam
DESCRIPTION:Business Email Compromise (BEC) continues to be a persistent threat to individuals and organizations. Throughout the years\, malicious campaigns evolve into sophisticated business operations. Understanding the mindset of the threat actor\, the use of the unique domain registrations\, and a reliance on social engineering will provide the necessary knowledge to avoid falling for scams. \n  \nObjectives: \nThis webinar will provide additional points to consider when crafting user awareness training and instill in intelligence analysts the necessary questions to ask themselves when responding to fraud alerts. \nThe learners will be able to: review your organization’s domain portfolio and look for opportunities to proactively protect against name-alike domains that may be used to impersonate your organization’s brand; analyze email traffic to locate instances of this specific scam and apply proper mitigations to prevent financial loss; and build upon existing user awareness training and refine training for team members in targeted roles. \n  \nPresenters:  \nDanielle Alexander\, InfoSec Analyst\, Bechtel \nDanielle is an enthusiastic threat intelligence analyst with a passion for brand protection. Each day brings a new challenge and an exciting opportunity to learn! \n  \nWho Should Attend: \nOpen to anyone. Particularly suited to Organizational net defeners\, InfoSec analysts\, intelligence analysts. \n  \nRegistration: \nhttps://attendee.gotowebinar.com/register/6659922663221542924
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-how-to-cook-up-bec-fraud-the-south-african-tender-scam/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210427T080000
DTEND;TZID=America/Chicago:20210427T170000
DTSTAMP:20260403T154010
CREATED:20210326T153344Z
LAST-MODIFIED:20210326T153344Z
UID:3996-1619510400-1619542800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: 6th Annual CyberNow Summit - FREE!!! April 27\, 28 & 29
DESCRIPTION:We invite you to attend our 2021 Cyber Summit\, bringing together cyber professionals from around the country for two days of engaging content plus a capture the flag event. This year’s summit is virtual\, via the Whova app\, with 4 keynote speakers and 40 presenters covering topics across 5 educational tracks. Most speakers will be live for maximum attendee engagement. Many of the speakers are InfraGard members from around the country who answered our call. Register NOW and have unlimited access to all the presentations on demand after the event. Event is FREE and is open for all cyber professionals. \nObjectives:  \nAttendees will learn about industry trends and best practices from subject matter experts across five educational tracks:\n1) Career Pathways – Hear from CISOs and educators on entering or expanding your career in cyber security;\n2) Compliance\, Risk\, & Governance – Experts discuss the regulatory and legal side of cyber\, including new standards\, supply chain\, paying ransomware;\n3) Cloud Transformation – Sessions on planning\, securing\, migrating and managing your move to the cloud.\n4) Security – Sessions on security culture\, products\, and best practices;\n5) Industry Trends – Sessions on emerging technology. \n  \nPresenters: \nEddie Doyle\, Cyber Security Strategist – CheckPoint Software \nWorking with university think tanks & enterprise organizations to deliver complex messages in an engaging manner has been Eddie’s forté & now he shares decades or success with those needing to find their voice. \nDiana Kelley\, CTO and Founding Partner Security Curve  \nDiana Kelley’s security career spans over 30 years. She is the co-author of “Practical Cybersecurity Architecture” and “Cryptographic Libraries for Developers” and lecturer at Boston College’s Masters program in cybersecurity. \nRobin Pugh\, President/CEO Dark Tower \nDarkTower is an intelligence firm that leverages University partnerships and research to provide managed intelligence services to industry leaders in banking\, insurance\, social media\, and ecommerce. \nMarc Sachs\, Deputy Director of Research Auburn University – McCrary Institute for Cyber and Critical Infrastructure Security \nAfter a 20 year career with the US Army Corp of Engineers\, Mr. Sachs joined the National Cyber Security Division of DHS in 2003 as the departments first Cyber Program Director. He proposed and developed the early design for the US-CERT program launched in 2003. \n  \nWho should attend:  \nCyber security and compliance professionals and those looking to move or expand their cyber career. Those looking to learn more about cloud and emerging technologies. Please share with peers and associates. Open to anyone. \n  \nRegistration: \nhttps://www.cybernowsummit.com/ \n  \nSessions will be live on the 27th and 28th. Early registration entitles attendees to access all sessions on demand for six months. Trend Micro is hosting a free CTF event on the 29th.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-6th-annual-cybernow-summit-free-april-27-28-29/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210426T130000
DTEND;TZID=America/New_York:20210426T160000
DTSTAMP:20260403T154010
CREATED:20210326T190143Z
LAST-MODIFIED:20210330T222300Z
UID:3999-1619442000-1619452800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Tragedy\, a Tremendous Teacher & Not Prepared For Wide Spread PTSD
DESCRIPTION:1st: Lessons Learned from the Sandy Hook School mass murder. How the 911 system was overburdened with calls and prone to failure. Communications directly affecting the ability for first responders to be effective in their approach to a crisis. FirstNet\, a nationwide broadcasting public safety network that was created in response to the 911 Commission Report will be featured in the presentation as it could have made a difference had it been available.\nCaution: Portions of this presentation may be disturbing to some. \n2nd: Emergency responders were not prepared for widespread Post Traumatic Stress inflicted on the men and women who responded to the Sandy Hook Elementary School mass murder. Colonel Stebbins will speak about the tragic events that occurred and caused so many first responders\, investigators\, lab technicians\, evidence examiners\, transcribers\, and their families to suffer Post Traumatic Stress (PTS). This case alone injured many people\, not just because of what occurred and what people had to view\, examine\, photo\, touch\, and smell but what they felt. Deep sorrow\, a sense of having failed\, a realization that emergency plans\, training\, security plans were not effective.\nColonel Stebbins was not only a first responder but also a patient. \nObjectives: \nHow to better prepare for that unforeseen incident and how communications plays such an important role. The need to understand that at some point in your career you will/have likely been involved in a tragic event and to understand how important it is to prepare for\, recognize\, and treat Post Traumatic Stress. Simply offering an Employee Assistance Program (EAP) to your members is not enough! \n  \nPresenters:  \nDan Stebbins\, Colonel\, Connecticut State Police \nDan has 40 years of law enforcement\, 35 years with the Conn State Police (Ret. Colonel). Commanding officer-in charge at the Conn. Lottery shooting (1998) and the Sandy Hook Elem\, School mass murder (2012). A first responder and a patient. \n  \nWho can attend:  \nOpen only to InfraGard members and their guests. \n  \nRegistration:  \n\n\n\nhttps://attendee.gotowebinar.com/register/821492829893917712\n\nAfter registering\, you will receive a confirmation email containing information about joining the webinar.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-tragedy-a-tremendous-teacher-not-prepared-for-wide-spread-ptsd/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210422T100000
DTEND;TZID=America/New_York:20210422T150000
DTSTAMP:20260403T154010
CREATED:20210326T151149Z
LAST-MODIFIED:20210326T151149Z
UID:3995-1619085600-1619103600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: IMMA Energy Security Briefing
DESCRIPTION:Join Infragard Maryland for a briefing on the current state of energy security. Hear speakers from:\n• The DOE discuss broad-level concerns related to the nation’s power system\n• Security personnel from Exelon discuss their response to the threats they have been facing; and\n• Dragos\, Inc. staff present about various threats and attack vectors they have been seeing for ICS/OT systems \n  \nObjectives:  \nThis presentation will give you an insight to the current concerns in energy security\, as well as information related to current threats\, and the response to those threats. The ICS/OT threats are applicable to a variety of Critical Infrastructure sectors\, as demonstrated by recent water system attacks in Florida. We hope you’ll be able to join us! \n  \nWho can attend:  \nOpen only to InfraGard members and their guests. \n  \nRegistration: \nhttps://www.eventbrite.com/e/infragard-maryland-energy-security-briefing-tickets-147798327777 \n 
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-imma-energy-security-briefing/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20210422T090000
DTEND;TZID=America/Los_Angeles:20210422T110000
DTSTAMP:20260403T154010
CREATED:20210319T143002Z
LAST-MODIFIED:20210319T143002Z
UID:3980-1619082000-1619089200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: A Growing Economic & National Security Threat: China’s Aggregation & Use of Our Biodata Against Us
DESCRIPTION:The Los Angeles InfraGard Chapter and FBI are excited to invite you to attend our moderated panel discussion on the implications behind China’s collection of our genetic and biological data. Our experts will place this activity in the context of the other personal identifying information China has already acquired when they dissect the economic and national security impacts. Our moderator and panelists will also broaden the discussion into how they see this threat evolving in the future and what we can or should collectively do about it. Please join us and pose your questions to our great moderator and panelists. \nModerator: \nAnna Puglisi | Senior Fellow at Georgetown University’s Center for Security and Emerging Technology \nPanelists: \nBrandon Kealiher | FBI Unit Chief for the Foreign Investment Unit Team in the Counterintelligence Division \nEdward You | FBI Supervisory Special Agent for the Weapons of Mass Destruction Directorate detailed to the Department of Health and Human Services\, Office of National Security \nAn Executive Senior Intelligence Officer from the National Counterintelligence and Security Center \n  \nWho can attend: \nOpen to anyone. \n  \nRegistration:  \nhttps://attendee.gotowebinar.com/register/4027250921896901133
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-a-growing-economic-national-security-threat-chinas-aggregation-use-of-our-biodata-against-us/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210420T130000
DTEND;TZID=America/New_York:20210420T141500
DTSTAMP:20260403T154010
CREATED:20210410T014145Z
LAST-MODIFIED:20210414T012107Z
UID:4015-1618923600-1618928100@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Huawei Case Study and the Chinese 5G Threat
DESCRIPTION:SA Bobby Walsh reviews how 5G will do more than give your smart-phone better reception; it will transcend into and potentially control the physical\, and social aspects of our daily lives. This presentation will examine the Chinese threat with Huawei as its ambassador. \nObjectives: \nUpon completion of this webinar\, the attendee/student will be able to:\n-Understand foreign espionage to any internet and phone users.\n-Determine the implications of pervasive and extended threats implied by new technology supply chain threats.\n-Assess techniques used by some nation-state adversaries.\n-Recognize expansive influence and dependence on 5G technology. \nPresenters:  \nBobby Walsh\, Special Agent\, FBI \nSpecial Agent Robert Walsh has been with the FBI for 4 years\, having spent all of that time in Counterintelligence. Among other high-profile cases\, SA Walsh was the primary case agent in the Huawei investigation. \n  \nWho can attend:  \nOpen only to vetted InfraGard members. All persons reliant on technology and communications systems carrying valuable data or items that could threaten privacy exposures. Those interested in strategic and tactical implications of new technology. \n  \nRegistration: \nhttps://thomas.webex.com/thomas/k2/j.php?MTID=t63abd3d3cc9bbae4f4100a82c2507374
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-huawei-case-study-and-the-chinese-5g-threat/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210420T100000
DTEND;TZID=America/New_York:20210420T110000
DTSTAMP:20260403T154010
CREATED:20210409T143907Z
LAST-MODIFIED:20210409T143907Z
UID:4012-1618912800-1618916400@www.infragardnational.org
SUMMARY:Excelsior Presents: Cyber for Non-Cyber Professionals
DESCRIPTION:According to Cybersecurity Ventures\, “there will be 3.5 million unfilled cybersecurity jobs in the next couple of years worldwide”. Additionally\, the U.S. Department of Labor reports that occupations in this field are projected to grow 11% from 2019 to 2029\, adding 531\,200 new jobs in the United States alone. With Cyber threats increasing in volume\, velocity\, and veracity; it is a national imperative to fill cybersecurity jobs with a diverse multi-faceted workforce that possess the requisite experiences\, knowledge\, and training necessary to meet our national security needs. Whether you have a technical background or not\, our goal for this webinar is to help those forge their own cybersecurity career pathway; by learning more about what it entails to be a cyber professional and how a degree from Excelsior could help foster a future position in cybersecurity. \n  \nOpen to anyone. \n  \nRegistration: \nhttps://excelsior.zoom.us/j/91241581663
URL:https://www.infragardnational.org/event/excelsior-presents-cyber-for-non-cyber-professionals/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210414T140000
DTEND;TZID=America/New_York:20210414T153000
DTSTAMP:20260403T154010
CREATED:20210326T175218Z
LAST-MODIFIED:20210326T175218Z
UID:3998-1618408800-1618414200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: USA v Kevin Patrick Mallory
DESCRIPTION:In 2019\, a former CIA officer was sentenced to 20 years in prison after being convicted for conspiracy to transmit national defense information to an agent of the People’s Republic of China. Want to learn more about insider threat vulnerabilities and failures by Chinese intelligence? \nJoin us on April 14\, at 2 p.m. (Eastern) as Supervisory Special Agent (SSA) Ryan Gaynor addresses the importance and success of insider threat training in the Kevin Mallory investigation as well as the threat posed by the Chinese Communist Party intelligence service’s use of professional networking internet-based services to recruit current and former clearance holders. \nWho can attend: \nOpen to all. Please share this invitation broadly with colleagues who may be interested\, including those who are not InfraGard members. The session will not be recorded. You can send any questions to events@infragardncr.org. \nRegistration:  \nhttps://register.gotowebinar.com/register/7680790622280982800 \nConnection details will arrive via email from GoToWebinar / events@infragardncr.org. \n 
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-usa-v-kevin-patrick-mallory/
END:VEVENT
END:VCALENDAR