• IMA Webinar Broadcast: Open Source Intelligence (OSINT) Level 5 – OSINT Dissemination

    InfraGard Los Angeles and CTWatch, Inc. present Open Source Intelligence (OSINT) LEVEL 5 - OSINT Dissemination. Building on Levels 1 to 4, this course is the capstone to the 6 Levels of OSINT series. During this course, we will examine Intelligence collection and capture techniques then transition into the OSINT Lifecycle. The course is topped […]

  • IMA Webinar Broadcast: The Elements of Zero Trust Networks

    Join us to learn more about this new Security Architecture and how your company can take advantage of it. The presenters will cover both technical concepts and practical advice on Zero Trust Architecture.   Presenters:  Andy Crocker, Manager, Technical Partner Managers, Fortinet Andy Crocker has spent nearly 4 decades in the IT world and experienced […]

  • IMA Webinar Broadcast: Your Strategy for Recovery

    Building a resilient organization that can withstand a cyber intrusion goes beyond compliance and notification requirements. Cyber criminals can bring an organization’s operations to a halt with a single ransomware virus, leaving it without the financial means to meet payroll, deliver client services, or even pay for the necessary breach response services to revert its […]

  • IMA Webinar Broadcast: Product Security Incident Response & Vulnerability Handling – Electronics & Computer Investigations

    Hamilton County Sheriffs Office Regional Electronics and Computer Investigations (RECI) Unit Product Security Incident Response, Vulnerability Handling, and the CVD Challenge. Objectives: Sergeant Dave Ausdenmoore of the HCSO will introduce some of the resources and assets the RECI uses, including tracking or other types of electronic surveillance and analysis for law enforcement agencies in southwest […]

  • SolarWinds Breach- Is It Over Yet? IOC / Tactics, Techniques, & Procedures

    In early 2020, hackers secretly broke into Texas-based SolarWind's systems and added malicious code into the company's software system. The system, called "Orion," is widely used by companies to manage IT resources and has 33,000 customers that use Orion, according to SEC documents. Most software providers regularly send out updates to their systems, whether it's […]

  • IMA Webinar Broadcast: All About Intellectual Property Rights and Theft of Trade Secrets

    Join us and learn about the differences in Intellectual Property crimes, the elements of Trade Secrets and the relationship between investigators and rights holders in IP cases. A case example will be included! Presenters: Jennifer French, Supervisory Special Agent FBI FBI Supervisory Special Agent Jennifer French is assigned to the National Intellectual Property Rights Coordination […]

  • IMA Webinar Broadcast: It’s Not About You: 3rd Party & Supply Chain Risk for Financial Services in a Post-SolarWinds World

    InfraGardNCR, the American Bar Association, and the Financial Services Information Sharing and Analysis Center (FS-ISAC) have partnered to bring you this webinar. Financial institutions spend time and money to strengthen their internal cyber defenses, but there are limitations when dealing with third party suppliers and providers of services. Recent high-profile incidents have highlighted the potential […]

  • IMA Webinar Broadcast: Emerging Trends and Threats Against the U.S. Defense Industrial Base

    Emerging trends and threats against the U.S. Defense Industrial Base: How small-to-medium size enterprises (SMEs) can protect themselves. The SolarWinds supply chain attack is just one in a string of threats against the U.S. and its critical infrastructures. The U.S. DIB and its supply chain are prime targets for criminals and securing the supply-chain is […]

  • IMA Webinar Broadcast: 2021 Hazardous Weather Briefing

    This Webinar will cover Severe Storm Developments, 2021 Hurricane Season, Droughts, Fire Weather Season, Flooding Impacts, Tornadic Activity, Watches/Warnings/Advisory guidance, and applications available to the general public and emergency response officials. Our presenter, Ms. Wescott is not affiliated with the National Weather Service, National Oceanic and Atmospheric Administration, or the National Hurricane Center but is […]

  • IMA Webinar Broadcast: Supervisory Control & Data Acquisition (SCADA) & Industrial Control Systems (ICS) Vulnerabilities

    InfraGard Los Angeles and CT Watch, Inc. present Supervisory Control & Data Acquisition (SCADA) & Industrial Control Systems (ICS) Vulnerabilities Webinar. ***There are 4.5 ASIS credits available for this course COURSE OVERVIEW: According to the Cybersecurity and Infrastructure Security Agency (CISA), there are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or […]

  • IMA Webinar Broadcast: Risk Management and What Do Security Researchers Do?

    Tyler Reguly, Manager Security R&D, VERT will discuss risk and prioritization in the environment including the value of CVSS and other metrics. Craig Young, Principal Security Researcher : Will give us a glimpse into the tools and techniques utilized by security researchers when investigating new vulnerabilities. Presenters: Tyler Reguly, Manager of Security Research with Tripwire […]

  • A CISO Developed Third Party Risk Management Framework

    Over a dozen CISOs recently contributed to developing a framework designed to be a powerful tool to build, manage, and scale a third-party risk management program. The foundation of this framework consists of a set of guiding principles identified by members, which are critical to a successful third-party risk management program. The tool presents these […]