BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//InfraGard National Members Alliance - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.infragardnational.org
X-WR-CALDESC:Events for InfraGard National Members Alliance
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20200308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20201101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20210314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20211107T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20220313T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20221106T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20230312T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20231105T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20200308T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20201101T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20210314T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20211107T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20220313T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20221106T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20230312T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20231105T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20211202T120000
DTEND;TZID=America/Chicago:20211202T131500
DTSTAMP:20260403T141437
CREATED:20211119T152515Z
LAST-MODIFIED:20211119T152515Z
UID:4250-1638446400-1638450900@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Old Meets New: the 1st\, 4th\, and 5th Amendments Face the Digital World
DESCRIPTION:The webinar will discuss how judicial decisions address new technology in light of the Bill of Rights. The examples discussed include drone cases\, license plate readers\, among others. \nPresenters:\nPierre Grosdidier\, Attorney\nPierre Grosdidier belongs to the first group of attorneys board certified in construction law by the Texas Board of Legal Specialization in 2017. His practice also includes data privacy & unauthorized computer access issues & litigation. \nWho Can Attend:\nOpen to anyone. \nRegistration:\nhttps://attendee.gotowebinar.com/register/3635608184147972364
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-old-meets-new-the-1st-4th-and-5th-amendments-face-the-digital-world/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211203T130000
DTEND;TZID=America/New_York:20211203T140000
DTSTAMP:20260403T141437
CREATED:20211111T235534Z
LAST-MODIFIED:20211111T235534Z
UID:4245-1638536400-1638540000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: The Evolving Cyber Threat
DESCRIPTION:This webinar will highlight some evolving tactics of malicious cyber actors observed by the FBI over the last several years. This presentation will focus on the issues and/or vulnerabilities that adversaries are most consistently exploiting\, why and/or how they are exploiting those vulnerabilities\, and provide some recommendations suggestions on how to mitigate those tactics. Case studies\, best practices and other lessons learned will be covered. \nPresenters:\nKristen Lane\, Intelligence Analyst\, FBI\nKristen Lane is an Intelligence Analyst assigned to the FBI’s Cyber Division. \nWho Can Attend:\nOpen to anyone. \nRegistration:\nhttps://attendee.gotowebinar.com/register/1574050269991217678
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-the-evolving-cyber-threat/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211206T140000
DTEND;TZID=America/New_York:20211206T150000
DTSTAMP:20260403T141437
CREATED:20211129T141657Z
LAST-MODIFIED:20211129T141657Z
UID:4259-1638799200-1638802800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: MSTIC Threat Brief - Decoding NOBELIUM's Recent Supply Chain Intrusions
DESCRIPTION:Following disclosures of supply chain attacks in December of 2020\, the Microsoft Threat Intelligence Center (MSTIC) continues to track and disrupt NOBELIUM activity impacting organizations worldwide. A hallmark characteristic of NOBELIUM intrusions is their abuse of trust to gain and maintain access to their ultimate victims\, allowing them to disguise their activity in legitimate business operations. In May of 2021\, MSTIC identified a new sustained effort by NOBELIUM targeting IT services providers with the intent of leveraging access to those providers for access to downstream victims. This presentation will provide a strategic overview of the NOBELIUM threat actor\, detail technical methods used by the actor to compromise victim cloud and on-premise environments\, and summarize recent campaigns against IT service providers. \nPresenter:\nJustin Warner\, Analyst\, Microsoft Threat Intelligence Center\nJustin has served in both highly technical and senior leadership roles within counterintelligence\, threat research\, and red team operations. Justin is also a graduate of the US Air Force Academy and an Air Force veteran. \nWho Can Attend:\nOpen only to vetted InfraGard members. \nRegistration:\nhttps://register.gotowebinar.com/register/4944066603616873227
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-mstic-threat-brief-decoding-nobeliums-recent-supply-chain-intrusions/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20211214T090000
DTEND;TZID=America/Los_Angeles:20211214T130000
DTSTAMP:20260403T141437
CREATED:20211119T152034Z
LAST-MODIFIED:20211119T152034Z
UID:4249-1639472400-1639486800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: OSINT Level 6 -- SAFETY / LEGALITIES RELATED TO OSINT
DESCRIPTION:*This course is eligible for 4 ASIS CPE credits\nLEVEL 6 – SAFETY / LEGALITIES RELATED TO OSINT\nCOURSE OVERVIEW:\nInfraGard Los Angeles and CT Watch\, Inc. present Open Source Intelligence (OSINT) LEVEL 6 – SAFETY / LEGALITIES RELATED TO OSINT. This course ends the curriculum series and seeks to leverage technologies and standards used by the Internet at large to allow investigators to collect information about the technologies used\, personnel associated with an organization\, and proliferation of web presence for a target domain or organization. Additionally\, this course will address Google Dorking and survey a technique for identifying fraud and brand impersonation using Google Dorking. *This course is eligible for 4 ASIS CPE credits \nObjectives:\n1. Leveraging Domain Name System (DNS) to collect information about an organization\na. Introduction to DNS\nb. Querying DNS in the command-line\nc. Querying DNS from the browser\ni. Various sites with pros and cons\n2. Google Dorking\n3. Fraud and brand impersonation case study\n4. Personal safety online\n5. Legalities of OSINT in the modern age \nPresenters:\nJoe Gray\, VP\, CT Watch\nA native of Eastern Tennessee\, SME is an Open-Source Intelligence (OSINT) and investigations expert specializing in assessing public information for evaluating external risks\, finding missing persons\, threat modeling\, and operations security. The SME possess several cybersecurity industry certifications including Certified Information Systems Security Professional (CISSP®) and GIAC Certified Incident Handler (GCIH®). SME is a former Navy Submarine Navigation Electronics Technician and transitioned into the private sector offering collaborative attitude and expertise to support a variety of organizations\, both public and private in implementing better cybersecurity. \nWho Can Attend:\nOpen to anyone. \nRegistration:\nhttps://attendee.gotowebinar.com/register/752103755755014159
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-osint-level-6-safety-legalities-related-to-osint/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20211214T113000
DTEND;TZID=America/Chicago:20211214T130000
DTSTAMP:20260403T141437
CREATED:20211126T134625Z
LAST-MODIFIED:20211126T134625Z
UID:4257-1639481400-1639486800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: December Meeting - Gary Warner Cyber Year In Review
DESCRIPTION:Gary Warner\, Director of Research in Computer Forensics at UAB\, will present his annual review of the year’s cyber security wins\, losses\, heroes\, and villains. This informative and always candid presentation will highlight the most important breaches as well as law enforcement take downs. \nObjectives:\nAttendees will learn about the current trends in cyber attacks\, international law enforcement actions\, and the efforts of public and private sector cyber security professionals to detect\, prevent\, and defeat the criminals. \nPresenters:\nGary Warner\, UAB / Dark Tower\nGary is the Dir. of Research in Computer Forensics at UAB. He teaches Cybercrime\, Computer Forensics\, and malware analysis courses\, and directs a 90+ analyst lab providing investigative and intelligence services Fortune 500 companies. \nWho Should Attend:\nOpen only to InfraGard members and their guests. Aimed toward cyber security professionals\, law enforcement\, security and compliance officers\, etc. \nRegistration:\nhttps://www.eventbrite.com/e/central-alabama-issa-chapter-meeting-december-2021-tickets-214699862067
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-december-meeting-gary-warner-cyber-year-in-review/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211215T080000
DTEND;TZID=America/New_York:20211215T110000
DTSTAMP:20260403T141437
CREATED:20211210T150210Z
LAST-MODIFIED:20211210T150210Z
UID:4264-1639555200-1639566000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: NY Metro IMA Annual Healthcare Security Summit
DESCRIPTION:Join Leaders from the New York Metropolitan Area to learn about the most pressing issues facing the healthcare sector today! \nPresenters include…\nDr. Mark Jarrett\, Sr. VP Northwell Health & InfraGard National Sector Chief\nKathy Hughes\, CISO Northwell\nS.A. George Rusuloj\, FBI-NYO Healthcare Fraud Squad \nWho Can Attend:\nOpen to anyone. \nRegistration:\nhttps://bit.ly/3riSXa3)
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-ny-metro-ima-annual-healthcare-security-summit/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211215T092500
DTEND;TZID=America/New_York:20211215T113000
DTSTAMP:20260403T141437
CREATED:20211105T145207Z
LAST-MODIFIED:20211105T145207Z
UID:4240-1639560300-1639567800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Protecting Municipal Government Through Public-Private Partnerships
DESCRIPTION:In this talk\, The Atom Group and Primex will guide participants through an interactive overview of concepts developed through the first years of a public private partnership in defense of NH municipal organizations. They will cover an innovated approach to cooperating including cyber incident response with state and federal law enforcement agencies. We will focus together on understanding the leadership techniques used to build partnerships that help identify and mitigate cybersecurity risk and build resilient organizations\, not just meet the latest in an ever-evolving landscape of threats. Leaders at all levels of the organization will gain an understanding how to analyze organizational readiness\, prepare for next generation attacks\, and build a network of professional relationships ready to meet the challenge of protecting the trust placed in you. \nPresenters:\nJason Sgro\, Sr. Partner\, The Atom Group\nJason serves as Sr. Partner and Head of Cybersecurity & Human Privacy at The ATOM Group as Director of the NH Office for Cooperation in Cybersecurity and leads its Emergency Cyber Incident Response and Cyber Counterintelligence functions. \nTy Gagne\, CEO\, Primex\nChief Executive Officer of Primex\, Ty has held executive positions in the municipal\, non-profit\, and healthcare sectors\, and was a two-term school board member. Ty holds a Master of Public Administration from the University of NH. \nWho Can Attend:\nOpen to anyone. \nRegistration:\nhttps://us02web.zoom.us/j/89263584424?pwd=Um9lUmx2c1c2K1pRam5ycEgzTWVxQT09\nPass Code: 262185
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-protecting-municipal-government-through-public-private-partnerships/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211216T150000
DTEND;TZID=America/New_York:20211216T160000
DTSTAMP:20260403T141437
CREATED:20211203T150129Z
LAST-MODIFIED:20211203T150129Z
UID:4261-1639666800-1639670400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: A CISO Developed Ransomware Threat Guide and Toolkit
DESCRIPTION:This briefing shares the findings of a cross-sector task force of CISOs and staff who developed a comprehensive guide and toolkit for preventing\, detecting\, and responding to the ransomware threat. The Best Practices Guide: (1) prioritizes controls and strategies based on effectiveness\, cost\, and implementation difficulty; (2) provides insights on incident response and business continuity; (3) shares approaches for presenting the threat to the Board; and (4) offers perspectives on making the “pay or not pay” decision. \nSupporting tools that will be shown during the briefing are: \n• Ransomware Preparedness Questionnaire (preparedness measures and strategy options)\n• Incident Response Reference Architecture (IR process and technology references)\n• Boardroom Education and Presentations (communications to the Board)\n• Pay-No-Pay Decision Criteria (discussion criteria for determining whether to pay the ransom) \nPlease join members of the Task Force as they share key insights and tools to help organizations effectively address the ransomware threat. \nPresenters:\nArlan McMillan\, Chief Security Officer\, Kirkland & Ellis LLP\nArlan McMillan is the Chief Security Officer (CSO) for Kirkland & Ellis LLP. Kirkland is an international law firm that serves a broad range of clients around the world in private equity\, M&A and other corporate transactions and litigation. \nTom Scurrah\, V.P. Cybersecurity Programs and Content\, Cybersecurity Collaborative\nFor over 20 years\, Tom has practiced as a cyber security professional in the following capacities: (1) an executive director of information security for a Fortune 20 company; (2) a consultant in two cyber security consulting firms. \nWho Should Attend:\nOpen to anyone. CISO’s\, CIO’s and all cybersecurity practitioners from both the private and public sector. \nRegistration:\nhttps://us02web.zoom.us/webinar/register/8516382094272/WN_zBXA4RAWRe-Als3A6PlKsQ
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-a-ciso-developed-ransomware-threat-guide-and-toolkit/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20211220T090000
DTEND;TZID=America/Los_Angeles:20211220T113000
DTSTAMP:20260403T141437
CREATED:20211122T154614Z
LAST-MODIFIED:20211122T154634Z
UID:4253-1639990800-1639999800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Counterterrorism in the Modern Age - with "First Casualty" author Toby Harnden
DESCRIPTION:As a year-end special treat\, Infragard Los Angeles and CTWatch present this special FREE Guest Speaker event on Counterterrorism. \nThis is a special 2.5 hour Guest Speaker series event focused on best practices in counterterrorism for those charged with the responsibility of protecting our critical infrastructure and key resources. This interactive panel discussion will feature award-winning author Toby Harnden\, who recently released the bestselling book\, “First Casualty” – the untold story of the CIA’s mission to avenge 9/11. This dramatic true story reveals the secret mission of the eight members of the CIA’s Special Operations Team Alpha\, the first Americans to be dropped behind enemy lines in Afghanistan after 9/11. In addition\, retired CIA operations officer Bob Dougherty will provide subject matter expert commentary on how the key takeaways provided by Toby’s riveting story are applicable today and in the future for both the private sector\, local and state law enforcement and the FBI in combatting extremism and ensuring the security of the Homeland’s critical infrastructure. \nTopics:\n1. Counterterrorism strategies in the protection of critical infrastructure\n2. Best practices in counterterrorism and crisis management\n3. Panel discussion and Q & A \nPresenters:\nRobert Dougherty\, VP Intelligence\, CT Watch\nA 25 year veteran of the CIA (Central Intelligence Agency) Mr. Dougherty’s operational background includes Counter-Terrorism Operations\, Counter-Proliferation Operations\, Counter-Intelligence Operations\, Counter-Narcotics Operations. \nToby Harnden\, Guest lecturer\, CT Watch\nToby Harnden is a winner of the Orwell Prize for Books. A former foreign correspondent for the Sunday Times of London and the Daily Telegraph who reported from thirty-three countries\, he specializes in terrorism and war. \nWho Can Attend:\nOpen to anyone. Target audience are Critical Infrastructure Protection and Key Resource (CIKR) Partners\, InfraGard members\, Telecommunication Operators\, Crime Analysts\, Criminal Intelligence Analysts and Fusion Center partners and law enforcement. \nRegistration:\nhttps://attendee.gotowebinar.com/register/5774760832567465995
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-counterterrorism-in-the-modern-age-with-first-casualty-author-toby-harnden/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20211220T090000
DTEND;TZID=America/Los_Angeles:20211220T113000
DTSTAMP:20260403T141437
CREATED:20211126T134203Z
LAST-MODIFIED:20211126T134203Z
UID:4255-1639990800-1639999800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Counterterrorism in the Modern Age - with "First Casualty" author Toby Harnden
DESCRIPTION:As a year-end special treat\, Infragard Los Angeles and CTWatch present this special FREE Guest Speaker event on Counterterrorism. \nThis is a special 2.5 hour Guest Speaker series event focused on best practices in counterterrorism for those charged with the responsibility of protecting our critical infrastructure and key resources. This interactive panel discussion will feature award-winning author Toby Harnden\, who recently released the bestselling book\, “First Casualty” – the untold story of the CIA’s mission to avenge 9/11. This dramatic true story reveals the secret mission of the eight members of the CIA’s Special Operations Team Alpha\, the first Americans to be dropped behind enemy lines in Afghanistan after 9/11. In addition\, retired CIA operations officer Bob Dougherty will provide subject matter expert commentary on how the key takeaways provided by Toby’s riveting story are applicable today and in the future for both the private sector\, local and state law enforcement and the FBI in combatting extremism and ensuring the security of the Homeland’s critical infrastructure. \nObjectives:\n1. Counterterrorism strategies in the protection of critical infrastructure\n2. Best practices in counterterrorism and crisis management\n3. Panel discussion and Q & A \nPresenters:\nRobert Dougherty\, VP Intelligence\, CT Watch\nA 25 year veteran of the CIA (Central Intelligence Agency) Mr. Dougherty’s operational background includes Counter-Terrorism Operations\, Counter-Proliferation Operations\, Counter-Intelligence Operations. \nToby Harnden\, Guest Speaker\nToby Harnden is a winner of the Orwell Prize for Books. A former foreign correspondent for the Sunday Times of London and the Daily Telegraph who reported from thirty-three countries\, he specializes in terrorism and war. \nWho Should Attend:\nOpen to anyone. Target audiences are Critical Infrastructure Protection and Key Resource (CIKR) Partners\, InfraGard members\, Telecommunication Operators\, Crime Analysts\, Criminal Intelligence Analysts and Fusion Center partners and law enforcement. \nRegistration:\nhttps://attendee.gotowebinar.com/register/5774760832567465995
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-counterterrorism-in-the-modern-age-with-first-casualty-author-toby-harnden-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20220119T090000
DTEND;TZID=America/Los_Angeles:20220119T110000
DTSTAMP:20260403T141437
CREATED:20211217T150702Z
LAST-MODIFIED:20211217T150702Z
UID:4362-1642582800-1642590000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: FBI Quarterly Threat Briefing – Human Trafficking – Exploiting the Most Vulnerable
DESCRIPTION:**FREE Event**\n**You must pre-register for this event. After registering\, a link for the webinar will be sent to you with a reminder link sent one hour prior to the start of course. \nBriefing Description: January is National Slavery and Human Trafficking Prevention Month\, but for the FBI\, combatting human trafficking is a priority every day. Please join the FBI and InfraGard Los Angeles for our FBI Quarterly Threat briefing on Human Trafficking with briefings from the FBI Los Angeles Crimes Against Children and Human Trafficking Squad. Under the human trafficking program\, the FBI investigates: Sex trafficking\, Labor trafficking\, and Domestic servitude. The most effective way to investigate human trafficking is through a collaborative\, multi-agency approach with our federal\, state\, local\, tribal and non-governmental organization partners. FBI Los Angeles operates Child Exploitation and Human Trafficking Task Forces which are comprised of FBI and task force officers from local and state agencies. The ultimate goal of these task forces is to recover victims and investigate traffickers at the state and federal level. \nBriefing Overview:\n• Human Trafficking Indicators\n• Human Trafficking Laws & Prosecutions\n• Reporting Trafficking & Victim Assistance\n• Human Trafficking Case Study \nWho Can Attend:\nOpen to anyone. \nRegistration:\n https://attendee.gotowebinar.com/register/1521161562607889677
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-fbi-quarterly-threat-briefing-human-trafficking-exploiting-the-most-vulnerable/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220119T120000
DTEND;TZID=America/New_York:20220119T140000
DTSTAMP:20260403T141437
CREATED:20220112T163808Z
LAST-MODIFIED:20220112T163808Z
UID:4374-1642593600-1642600800@www.infragardnational.org
SUMMARY:NISRU Workshop Wednesdays: Building an Effective Detection and Response Program
DESCRIPTION:Detection of cyber intrusions is one of the most under-appreciated\, and vital\, areas of the cybersecurity field. How do you know when you have been hacked? When ransomware locks up your system it is pretty clear. Is that the only kind of hacking that occurs? How do you know when other types of attacks are ongoing in your system? This presentation will discuss building an effective detection program that meshes with your effective response program. Response involves “and what do we do about it.” Having an incident response plan and exercising it is a critical piece of preparation. We will cover standard IR practice and how to link Threat Intelligence\, Detection\, and Response to provide effective risk reduction for organizations. \nClick to register – InfraGard Members use IG2021WWIGMbrDisc1 discount code; Patriots Circle Members will receive a separate email with the code for an additional 10% discount.
URL:https://www.infragardnational.org/event/nisru-workshop-wednesdays-building-an-effective-detection-and-response-program/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20220122T090000
DTEND;TZID=America/Los_Angeles:20220122T120000
DTSTAMP:20260403T141437
CREATED:20220107T142707Z
LAST-MODIFIED:20220107T143124Z
UID:4372-1642842000-1642852800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Crowd Management Training – Preparing for the Super Bowl and other events
DESCRIPTION:**Please note this class is worth 3 CPE credits from ASIS\nLA Infragard and GRIP present the following virtual training: \nA trained Crowd Manager is a position that is explicitly required in NFPA 1 and referenced in many state and local fire codes for Assembly Occupancies over 50 people. A trained Crowd Manager must know a variety of things\, but their primary purpose is to assist a crowd to more effectively and safely evacuate or move away from harm’s way during an emergency. Large sports venues with the enormous crowds in a relatively confined space are always a management challenge\, and having trained\, prepared staff ready to assist has become a necessity. This has been taught across the county to both public and private sector participants\, for state Homeland Security offices and even working with the DHS sponsored fusion centers. Among the key elements of Crowd Manager instruction are: \n• Understand lessons learned from emergency case studies\n• Understand the movement scenarios of crowds and the crowd manager’s role\n• Understand the crowd manager role in an active shooter scenario\n• Understand the crowd manager role in fire safety\, gas leak\, flood\, power outage\, crowd surge and other scenarios\n• Understand the checklist of key Items to be reviewed in a crowd event\n• Understand the components of the acronym ESCAPE – Exits\, Storage\, Capacity\, Aisles\, Protection\, Emergency \nFollowing the formal Crowd Manager class\, we will feature a dynamic scenario driven panel discussion covering potential events that they may or likely will encounter involving crowd manager roles\, requirements\, tactics\, techniques and procedures. \nPresenters:\nHal Kempfer\, CEO\, GRIP\nHal Kempfer is CEO of Global Risk Intelligence & Planning\, Inc. He is a retired Marine intelligence officer with 24 years of service\, and is a frequent contributor to TV news shows as an international expert on civil-military affairs.\n\nWho Can Attend:\nOpen to anyone\n\nRegistration:\nhttps://attendee.gotowebinar.com/register/1992378161854760717
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-crowd-management-training-preparing-for-the-super-bowl-and-other-events/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20220124T090000
DTEND;TZID=America/Los_Angeles:20220124T113000
DTSTAMP:20260403T141437
CREATED:20211227T160217Z
LAST-MODIFIED:20211227T160407Z
UID:4368-1643014800-1643023800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Persistent Mobile Device Threats and Scams
DESCRIPTION:This class is eligible for 2 CPE credits from ASIS.\nInfragard Los Angeles and CT Watch present: \nThe objective of this course is to instruct and advise attendees on what types of persistent threats are out there targeting their mobile devices in order to 1). Take over financial accounts\, 2). Breach personal and/or business emails\, 3). Target the individual for a scam\, 4). Inject ransomware or conduct a full system takeover of their device to achieve all 4 objectives. Attendees will also learn about modern day scams facing businesses and individuals as well as mitigation strategies\, social engineering attacks and will finish off with several case studies. \nTopics:\n1. What is a mobile device threat and how does it affect me?\n2. Breakdown of different types of mobile device scams:\n• Sim swapping/hijacking\n• Phishing texts and emails\n• Vhishing and Smishing\n• Man-in-the-middle attack\n• Bluetooth and WiFi attacks\n• Device spoofing\n• Ransomware\n3. Best practices on securing your mobile device and its contents\n4. Current scams facing business and individuals and mitigation strategies\n5. Social engineering attacks and defenses\n6. Case studies \nObjectives:\nAttendee will learn:\n1. Best practices on securing your mobile device and its contents\n2. Current scams facing business and individuals and mitigation strategies\n3. Social engineering attacks and defenses \nPresenters:\nLance Larson Ph. D\, Cyber Investigator\nLance Larson is a Cyber Investigator for a Department of Homeland Security designated fusion center and a law enforcement officer for 20+ years. CISSP\, CEH\, GCIH. \nWho Should Attend:\nOpen to anyone. Target audience are Critical Infrastructure Protection and Key Resource (CIKR) Partners\, InfraGard members\, Telecommunication Operators\, Crime Analysts\, Criminal Intelligence Analysts and Fusion Center partners and law enforcement. \nRegistration:\nhttps://attendee.gotowebinar.com/register/1796724465341836558
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-persistent-mobile-device-threats-and-scams/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20220125T103000
DTEND;TZID=America/Los_Angeles:20220125T113000
DTSTAMP:20260403T141437
CREATED:20220103T155752Z
LAST-MODIFIED:20220103T155752Z
UID:4370-1643106600-1643110200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Rare Earth Elements: From San Diego to Afghanistan – Little Rocks\, Geopolitics and Your Smartphone
DESCRIPTION:Rare Earth Elements (REE) aka Rare Earth Minerals are fundamental building blocks of the modern economy\, enabling trillions of dollars in global GDP via a wide range of clean energy\, information technology\, defense\, and industrial applications.  Some rare earth elements include lanthanum\, cerium\, neodymium\, praseodymium – and more familiar elements include aluminum\, gold\, silver\, zinc\, mercury\, and lithium\, etc. REEs are near the front of the supply chain and may be overlooked as critical inputs or sources of supply and touch each of our lives daily and nearly all Critical Infrastructure Sectors. From lithium mining in the Salton Sea to bastnaesite mining in San Bernardino County\, Southern California is in the thick of national security implications and global politics to control REE’s used in the production of electronics\, circuit boards\, military hardware\, electric cars\, etc. Join us as U.S. Department of Homeland Security\, Cybersecurity and Infrastructure Security Agency-Region IX Critical Infrastructure Specialist Ashley McKibbin gives an all-encompassing presentation of the importance of REE and how these items support critical infrastructure. \nWho Can Attend:\nOpen to InfraGard members and government/LE/Fire/Military only. \nRegistration:\nPlease use link provided in weekly email. This is a private event.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-rare-earth-elements-from-san-diego-to-afghanistan-little-rocks-geopolitics-and-your-smartphone/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20220126T100000
DTEND;TZID=America/Chicago:20220126T120000
DTSTAMP:20260403T141437
CREATED:20220114T151241Z
LAST-MODIFIED:20220114T151241Z
UID:4380-1643191200-1643198400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: A Left of Boom Approach to Comprehensive Phishing Protection
DESCRIPTION:Indicators of Compromise and Recommended Protective Measures in regards to Current Phishing Threats \nPresenters:\nTerry S. McCorkle\, CEO of PhishCloud Inc.\nTerry is the Founder and CEO of PhishCloud Inc. He is an ethical hacker with over twenty\nyears of experience in the cybersecurity industry and has served in a broad range of technical\,\nanalytical\, and leadership roles. \nMark Jaster\, CEO of 418 Intelligence Corp.\nMark Jaster\, an entrepreneur and technology strategy expert with over 30 years of deep\nexpertise in developing technology for complex problems that drive growth\, is the Founder\n& CEO of 418 Intelligence Corp. \nSSA Stephen Fessel\, FBI New Orleans Cyber Squad 6 \nJeffery Mckee\, DHS CISA PSA Baton Rouge \nWho Can Attend:\nOpen to anyone \nRegistration:\nhttps://register.gotowebinar.com/register/1275817637974208781
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-a-left-of-boom-approach-to-comprehensive-phishing-protection/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220126T120000
DTEND;TZID=America/New_York:20220126T140000
DTSTAMP:20260403T141437
CREATED:20220112T164035Z
LAST-MODIFIED:20220112T164035Z
UID:4376-1643198400-1643205600@www.infragardnational.org
SUMMARY:NISRU Workshop Wednesdays: Certified Cyber Security Architect (CCSA) Certification Training
DESCRIPTION:This is a FOUR-HOUR workshop conducted over two days – January 26th and 27th\, 2022. \nDistinguish yourself with the CCSA credential\, the gold standard in cybersecurity space. Learn about the updates in the DoD CMMC 2.0 and the alignment with NIST standards. Examine security incident management\, essential cyber policies\, encryption techniques and more. Explore best practices to establish a credible\, evidence-based cyber defense program. The CCSA program provides knowledge to develop your skills in cybersecurity with focus on the NIST Cybersecurity Framework\, and the U.S. DoD cybersecurity mandate\, CMMC. Upon completion of the workshop\, students will have the option to sit the CCSA certification examination and achieve the CCSA accreditation for the discounted price of $199; a nearly 70% discount off the regular $695 price. Students will learn more about achieving the certification during the workshop. \nClick to register – InfraGard Members use IG2021WWIGMbrDisc1 discount code; Patriots Circle Members will receive a separate email with the code for an additional 10% discount.
URL:https://www.infragardnational.org/event/nisru-workshop-wednesdays-certified-cyber-security-architect-ccsa-certification-training/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20220202T113000
DTEND;TZID=America/Chicago:20220202T130000
DTSTAMP:20260403T141437
CREATED:20220128T154929Z
LAST-MODIFIED:20220128T154929Z
UID:4387-1643801400-1643806800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: CMMC 2.0 Update
DESCRIPTION:Update on the DoD Cybersecurity Compliance framework CMMC 2.0. We will discuss the CMMC requirements and what they likely mean for individual businesses. The discussion will include a brief background on CMMC\, the changes that took place in CMMC 2.0\, and then focus on the implications of the scoping guides which have added new requirements and opportunities to the framework. \nAt the end of this presentation attendees should be able to:\na) Explain the current status of CMMC implementation.\nb) Understand the planned regulatory update\nc) Understand what companies should be doing now to prepare\nd) Understand the impact of the scoping guide and its additional requirements for compliance under CMMC 2.0 \nPresenter:\nVince Scott\, CEO of Defense Cybersecurity Group\nVince is a retired US Navy Cryptologist and serial entrepreneur who has started two companies\, two not for profits\, and has more on the way. He currently serves as the CEO of Defense Cybersecurity Group\, a cyber consulting company focused \nWho Can Attend:\nOpen only to InfraGard members and their guests. Aimed toward anyone responsible for risk management and/or government contracts. \nRegistration:\nhttps://onenet.zoom.us/meeting/register/tJYpfuGuqjkvGNMtI29r_7Gb_RZQFzBNnVnx
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-cmmc-2-0-update/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220202T120000
DTEND;TZID=America/New_York:20220202T140000
DTSTAMP:20260403T141437
CREATED:20220112T164202Z
LAST-MODIFIED:20220112T164202Z
UID:4377-1643803200-1643810400@www.infragardnational.org
SUMMARY:NISRU Workshop Wednesdays: Tipping Point: Keys to Developing/Implementing a Comprehensive Violence Prevention
DESCRIPTION:Even as other types of crime drop\, violence is soaring. FBI data for 2020 show a 30 percent increase in murder\, the highest year-over-year increase ever. Aggravated assault is up 12 percent. Because of this\, it is critical\, now more than ever\, that all organizations develop and implement comprehensive violence prevention programs for their employees\, contractors\, and volunteers. This workshop will provide participants with: \n• An understanding of the key components of the updated ASIS/ANSI Standard on Workplace Violence and Active Assailant – Prevention\, Intervention and Response \n• Background on how COVID\, working from home\, returning to work\, social divisions\, and other factors have triggered record violence \n• An understanding of potential liability exposure to an organization that does not have a Violence Prevention Program in place \n• Strategies for developing effective WPV training programs at 4 different levels\, and for a virtual workforce \n  \nClick to register – InfraGard Members use IG2021WWIGMbrDisc1 discount code; Patriots Circle Members will receive a separate email with the code for an additional 10% discount.
URL:https://www.infragardnational.org/event/nisru-workshop-wednesdays-tipping-point-keys-to-developing-implementing-a-comprehensive-violence-prevention/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220208T130000
DTEND;TZID=America/New_York:20220208T140000
DTSTAMP:20260403T141437
CREATED:20220117T150909Z
LAST-MODIFIED:20220117T150909Z
UID:4381-1644325200-1644328800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Economic Espionage - A Sophisticated Chinese Government Scheme
DESCRIPTION:China wanted to become a naval power\, and needed syntactic foam to do it. But a Chinese manufacturing firm couldn’t figure out a way to make the foam even with Chinese government funding. So instead\, the Chinese firm hired a university professor to create a front company and gave him $3 million to recruit current and former employees of Trelleborg\, the US Company that developed syntactic foam based on decades of research. The employees stole trade secrets from Trelleborg and gave them to the Chinese firm. \nA four-year FBI investigation uncovered the details of the scheme and culminated charges for seven subjects and two companies. This webinar’s case study will include details of the investigation and prosecution\, including how companies were targeted and what kinds of incentives the Chinese government dangled. Our speaker\, SSA Roman Rozhavsky\, will also offer recommendations for safeguarding research and emerging technologies. We hope you can join us! \nPresenters:\nRoman Rozhavsky\, Supervisory Special Agent\, FBI\n\nWho Can Attend:\nOpen to anyone. \nRegistration:\nhttps://attendee.gotowebinar.com/register/7768209499802726928
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-economic-espionage-a-sophisticated-chinese-government-scheme/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20220210T120000
DTEND;TZID=America/Chicago:20220210T130000
DTSTAMP:20260403T141437
CREATED:20220204T154938Z
LAST-MODIFIED:20220204T154938Z
UID:4401-1644494400-1644498000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: AI for Threat Detection: Getting Beyond the Buzzwords of Artificial Intelligence
DESCRIPTION:In this presentation Kevin will establish a foundation on key concepts surrounding the area of AI\, explain how these main concepts work\, then guide us through some examples and case studies on how AI is proving effective in helping to augment the tools and resources of cyber teams tackling today’s modern and emerging threats. \nPresenters:\nKevin Kennedy\, SVP\, Product Management\, Vectra\nKevin Kennedy is SVP\, Product Mgt at Vectra. Before Vectra\, he was VP\, Product Mgt at Agari Data. Prior to Agari\, Kevin was Senior Dir of Security Product Mgt at Juniper. Kevin earned his BSE in computer engineering at the Univ of Michigan. \nWho Can Attend:\nOpen only to InfraGard members and their guests \nRegistration:\nhttps://attendee.gotowebinar.com/register/9067395738139971852
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-ai-for-threat-detection-getting-beyond-the-buzzwords-of-artificial-intelligence/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20220216T090000
DTEND;TZID=America/Los_Angeles:20220216T120000
DTSTAMP:20260403T141437
CREATED:20220128T154057Z
LAST-MODIFIED:20220128T155502Z
UID:4386-1645002000-1645012800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Digital Exhaust / Digital Footprint Removal 1.0
DESCRIPTION:**This class is eligible for 3 CPE credits from ASIS\nThe Digital Exhaust Removal course is a series of classes designed to instruct InfraGard attendees who work in critical infrastructure and key resources in the planning\, assessment\, and mitigation of their personal and/or organizations digital exhaust/digital footprint.\nThe first class (Digital Exhaust 1.0) will cover: \nTopics:\n1. What is digital exhaust / digital footprint?\n2. How does digital exhaust affect your personal and professional life?\n3. Digital exhaust and the tie-in to critical infrastructure and key resources\n4. Is it too late to deal with my digital exhaust (why now)?\n5. Navigating your digital footprint\n6. Starting your digital exhaust removal process (where to start) \nPresenters:\nCounter Terrorism Watch CTW\, CEO\nSubject Matter Expert (SME) is C-T Watch\, Inc. OSINT investigator and has Subject matter OISNT\, SOCMINT\, and cyber investigations. An active member of ASIS\, Women in Tech (WIT) and Women in Defense (WID)\, is a graduate of the FBI CA. \nWho Should Attend: \nOpen to anyone. Target Audience: Target audience are Critical Infrastructure Protection and Key Resource (CIKR) Partners\, InfraGard members\, Telecommunication Operators\, Crime Analysts\, Criminal Intelligence Analysts and Fusion Center partners and law enforcement. \nRegistration:\nhttps://attendee.gotowebinar.com/register/6361443745711430924
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-digital-exhaust-digital-footprint-removal-1-0/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220216T140000
DTEND;TZID=America/New_York:20220216T150000
DTSTAMP:20260403T141437
CREATED:20220131T002655Z
LAST-MODIFIED:20220131T002900Z
UID:4390-1645020000-1645023600@www.infragardnational.org
SUMMARY:Webinar Broadcast: A CISO Developed DevSecOps Supply Chain Best Practices
DESCRIPTION:This briefing is based on the findings of a cross-sector task force of CISOs\, and staff led by Rockwell Automation\, a leading developer of commercial software. The task force was organized in response to the software supply chain attacks\, like SolarWinds and Kaseya\, which have devastated entire commercial ecosystems. \nObjectives:\nThe task force recommended five practices — managing code integrity and employing non-repudiation methods\, among them – that have the greatest impact on reducing risks the risks of becoming a victim or carrier of malware from software acquired or developed. Task force members also cited commercial tools they used to support these practices\, such as insider threat code review and code signing solutions. \nPresenters:\nAndres Andreu\, CISO\, 2U\nCurrent CISO for 2U\, previously a CTO for a variety of companies and a Cybersecurity expert at the DEA. \nBob Pingel\, Senior Manager\, Technical Security Strategy\, Rockwell Automation \nWho Can Attend:\nOpen to anyone. Aimed toward CISO’s\, Directors\, Managers and other cybersecurity leaders. \nRegistration:\nhttps://us02web.zoom.us/webinar/register/6616432079999/WN_7-j53tonQ9u08qLebe2oJA
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-a-ciso-developed-devsecops-supply-chain-best-practices/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220222T110000
DTEND;TZID=America/New_York:20220222T121000
DTSTAMP:20260403T141437
CREATED:20220218T144212Z
LAST-MODIFIED:20220218T144212Z
UID:4435-1645527600-1645531800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Human Trafficking
DESCRIPTION:The FBI and MSP will provide a presentation on Human Trafficking in Maryland and the Victim-Centered Approach used with victims of these crimes. Attendees will hear about the recruitment of victims\, their victimization\, signs of trafficking and a summary of several investigations.“ Chris Heid is a Corporal with the Maryland State Police currently assigned to the Child Recovery Unit. The unit investigates missing children\, issues Amber Alerts\, Silver Alerts\, and investigates human trafficking primarily as it relates to juveniles. Corporal Heid has been a member of the Maryland State Police for more than 26 years and has held a variety of assignments including road patrol and other investigative positions. He has been assigned to the Child Recovery Unit for over 10 years. Corporal Heid is also a task force officer with the FBI’s Child Exploitation Task Force. Bio: SA Patrick Winn has been in the FBI since 2013 and started working in the San Diego division working white collar crime and child pornography. In 2009\, he was transferred to FBI HQ in the Asset Forfeiture / Money Laundering Unit. In 2012 he was transferred to the Baltimore Division and was assigned to the Maryland Child Exploitation Task force where he predominately investigates the human trafficking of juveniles. \nObjectives:\nThe attendee will understand how Human Trafficking effects each one of us and our neighbors.\nThe attendee will understand how\, in a matter of minutes a family member can disappear\, perhaps never seen again.\nThe attendee will gain knowledge how to recognize a Human Trafficking occurrence.\nThe attendee will learn how to respond to a Human Trafficking event. \nPresenters:\nPatrick Winn\, SA\, FBI\nSA Patrick Winn has been in the FBI since 2013 and started working in the San Diego division working white collar crime and child pornography. In 2009\, he was transferred to FBI HQ in the Asset Forfeiture / Money Laundering Unit. \nChris Held\, Corporal\, Maryland State Police\nChris Heid is a Corporal with the Maryland State Police currently assigned to the Child Recovery Unit. The unit investigates missing children\, issues Amber Alerts\, Silver Alerts\, and investigates human trafficking – Child Recovery Unit. \nWho Can Attend:\nOpen only to InfraGard members and their guests. This seminar appeals to any person who is concerned about children’s welfare and rights. Also\, anyone who wants to learn how to thwart dark world people looking to take advantage of our children. \nRegistration:\nhttps://www.eventbrite.com/e/delaware-infragard-chapter-human-trafficking-22222-tickets-266866814827
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-human-trafficking/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220223T120000
DTEND;TZID=America/New_York:20220223T140000
DTSTAMP:20260403T141437
CREATED:20220112T164324Z
LAST-MODIFIED:20220112T164324Z
UID:4378-1645617600-1645624800@www.infragardnational.org
SUMMARY:NISRU Workshop Wednesdays - Enhancing Financial Sector Security using Blockchain
DESCRIPTION:This presentation will show the basic mathematics behind Blockchain. The second part will focus on cryptocurrency. The next section will look at a variety of applications of Blockchain. Finally\, we will focus on how to enhance security in the financial sector using Blockchain. \nClick to register – InfraGard Members use IG2021WWIGMbrDisc1 discount code; Patriots Circle Members will receive a separate email with the code for an additional 10% discount.
URL:https://www.infragardnational.org/event/nisru-workshop-wednesdays-enhancing-financial-sector-security-using-blockchain/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20220303T090000
DTEND;TZID=America/Los_Angeles:20220303T120000
DTSTAMP:20260403T141437
CREATED:20220204T152735Z
LAST-MODIFIED:20220204T152735Z
UID:4400-1646298000-1646308800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Active Shooter (PAR) Preparation – Action - Recovery
DESCRIPTION:Mass shootings seem to be more prevalent nowadays. As the world focuses all its attention on the “why”\, we must focus our attention on how we can better prepare ourselves\, our critical infrastructure sectors and our communities alike. Learn about the latest statistics\, the signs and pre-incident indicators (PII’s) of targeted violence\, the OODA loop as well as options for consideration when faced with an active shooter incident. Hear from a retired FBI SWAT operator about what you can do to be better prepared (as an organization and as an individual) should you come face-to-face with an active assailant.\nTopics:\n1. Latest statistics\n2. The attack cycle\n3. Pre-incident indicators (PII’s)\n4. Situational awareness & The OODA loop\n5. Workplace Violence & Prevention\n6. The importance of Threat Management in the Disaster Management Cycle\n7. Options for consideration (Run/Hide/Fight) \nPresenters:\nSubject Matter Expert (SME) #1 of CTWatch is a retired 25-year veteran Operations Officer from the CIA (Central Intelligence Agency. SME’s operational background includes Counter-Terrorism Operations. \nSubject Matter Expert (SME) #2 of CTWatch retired from the FBI and some of his duties at the included working bank robberies\, narcotics and gangs\, surveillance and tactical planning. \nWho Can Attend: \nOpen to anyone. \nRegistration:\nhttps://attendee.gotowebinar.com/register/701016049301253133
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-active-shooter-par-preparation-action-recovery/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20220303T120000
DTEND;TZID=America/Chicago:20220303T131500
DTSTAMP:20260403T141437
CREATED:20220207T145348Z
LAST-MODIFIED:20220207T145348Z
UID:4403-1646308800-1646313300@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Your Duty of Tech Competence: What You Don’t Know CAN Hurt You
DESCRIPTION:This presentation is about lawyers’ duty to maintain technological competence. Lawyers and individuals in the legal industry will especially benefit from attending. \nForget the old saying “What you don’t know can’t hurt you”. With 39 states now requiring lawyers to be technologically competent (including Texas)\, knowing the benefits and risks of relevant technology is now both an ethical obligation and a matter of professional survival. Join John Browning as we learn more about what tech competence entails\, illustrated by real world cautionary tales from cases and disciplinary proceedings. \nPresenters:\nJohn Browning\, Partner at Spencer Fane LLP\nJohn Browning is a former Justice on Texas’ Fifth Court of Appeals. A past Chair of the Computer & Technology Section of the State Bar of Texas\, John authored multiple books and numerous articles on the intersection of law and technology. \nWho Can Attend:\nOpen only to InfraGard members and their guests. Aimed toward lawyers and other legal industry professionals. \nRegistration:\nhttps://attendee.gotowebinar.com/register/6708436421757004043
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-your-duty-of-tech-competence-what-you-dont-know-can-hurt-you/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220309T120000
DTEND;TZID=America/New_York:20220309T140000
DTSTAMP:20260403T141437
CREATED:20220310T153728Z
LAST-MODIFIED:20220310T153728Z
UID:4461-1646827200-1646834400@www.infragardnational.org
SUMMARY:NISRU Workshop Wednesday: Cyber Crisis Management - A framework for incident response maturity
DESCRIPTION:An organization’s ability to remain resilient during a high-severity cyber incident requires much more than world-class cyber security professionals\, it requires a cross-organization and cross-functional integrated cyber crisis management capability. This session highlights an incident response maturity framework that spans from Board-level governance to technical and non-technical cyber crisis management planning\, exercises\, and after-action program management. \nFee: InfraGard Members – $29\, InfraGard Patriots Circle Members – $26\, All others – $39 NOTE: InfraGard Members and InfraGard Patriots Circle Members\, please check your email for your discount/coupon codes \nObjectives: \n1. Attendees will learn an how an integrated approach to incident readiness can help reduce cyber risk and increase organizational resilience. 2. Attendees will learn the core aspects of a cyber crisis management plan. 3. Attendees will learn about a best-practices based approach to building and delivering cyber exercises. 4. Attendees will learn how today’s routine leadership will not serve them well during crises and how to (re)build for non-routine leadership success. \nPresenters:  \n\nJeffrey Crump\, Principal Consultant\, Cyber Security Training and Consulting LLC\n \nMr. Crump is the Principal Consultant at Mesa\, Arizona-based Cyber Security Training and Consulting LLC. The company provides innovative cyber risk solutions through brands and services such as Cyber Crisis Response\, CMMC Training Academy\, and CyberCertify.Me. He also serves as the Executive Director of Phoenix Cyber Academy\, an Arizona non-profit focused on helping disadvantaged\, low-income\, under-served\, veterans\, and former law enforcement gain the knowledge\, skills\, and experiences required to enter the cyber security field at no cost to students. He is a former manager at Deloitte & Touché LLP Cyber Risk Services in the USA\, the former Program Manager\, Compliance & Security for Datashield Monitored Security Service Provider (now ADT Cybersecurity) and a former Symantec Business Critical Services Manager. He is the author of Cyber Crisis Management Planning: How to reduce cyber risk and increase organizational resilience. He is the architect of the Incident Response Maturity framework. He is the author of the Cyber Crisis Management Planning Professional (C2MP2)\, Cyber Crisis Management Exercise Professional (C2MEP)\, and Cyber Crisis Management Leadership Professional (C2MLP) certification courses. \nHis professional credentials include Cybersecurity Maturity Model Certification (CMMC) Provisional Assessor and Provisional Instructor\, PECB Certified Instructor\, Non-Routine Leader Certified\, Certified Information Systems Security Professional (CISSP)\, certified Project Management Professional (PMP)\, certified Scrum Master (CSM)\, and is ITIL Foundations certified. He is a veteran of the US Air Force and US Coast Guard. \nWho Can Attend:\nOpen to anyone. \nRegistration:\nhttps://attendee.gotowebinar.com/register/9074954881179852814
URL:https://www.infragardnational.org/event/nisru-workshop-wednesday-cyber-crisis-management-a-framework-for-incident-response-maturity/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220315T140000
DTEND;TZID=America/New_York:20220315T150000
DTSTAMP:20260403T141437
CREATED:20220311T143821Z
LAST-MODIFIED:20220311T143821Z
UID:4476-1647352800-1647356400@www.infragardnational.org
SUMMARY:A CISO Developed Third & Fourth Party Incident Response Guide and Toolkit
DESCRIPTION:This briefing shares the findings of a cross-sector task force of CISOs and staff who developed a comprehensive guide and toolkit for preventing and responding to third- and fourth-party incidents. The Best Practices Guide addresses: (1) key regulations that require fourth party monitoring; (2) changes to risk classifications\, communications\, inventory\, and incident management testing and processes; (3) commercial tools for discovery of security weaknesses and use of fourth party services; (4) contract enhancements; and (5) continuous monitoring practices. \nPresenters:\nJohn Germain\, CISO\, DuckCreek Technologies\nRobert Wood\, CISO\, Centers for Medicare and Medicaid Services \nWho Can Attend:\nOpen to anyone \nRegistration:\nhttps://us02web.zoom.us/webinar/register/WN__oxfjeNuSF-95vka2XWq_w
URL:https://www.infragardnational.org/event/a-ciso-developed-third-fourth-party-incident-response-guide-and-toolkit/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20220316T090000
DTEND;TZID=America/Los_Angeles:20220316T120000
DTSTAMP:20260403T141437
CREATED:20220214T142421Z
LAST-MODIFIED:20220214T142421Z
UID:4425-1647421200-1647432000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Open-Source Information (OSIF) Lab: Intermediate & Advanced Search Techniques
DESCRIPTION:**This class is eligible for 3 CPE credits from ASIS.\nOpen-source information (OSIF) lab series will cover the basics of conducting online research. This will be a “how-to” on intermediate and advanced search techniques (AST) on various search engines. The series will be structured in a manner where audience participation is encouraged (attendees can shadow the instructor and conduct searches of their own while listening to the SME). Imparting this knowledge and skills to those who work in critical infrastructure and key resources (CIKR) is important\, will save the attendee time and will assist in narrowing the search results to the relevancy of the search conducted. \nTopics:\n1. Why utilize intermediate to advanced techniques in search engines?\n2. How to narrow search criteria\n3. Step-by-step utilization of search techniques and short cuts\n4. Searching for files\, documents or attachments associated with your organization online \nPresenters: \nSubject Matter Expert (SME) is C-T Watch\, Inc. OSINT investigator and has developed their online research skills from the early days of the internet and previous law enforcement career spanning 3 decades. \nWho Can Attend:\nOpen to anyone. Target audience are Critical Infrastructure Protection and Key Resource (CIKR) Partners\, InfraGard members\, Telecommunication Operators\, Crime Analysts\, Criminal Intelligence Analysts and Fusion Center partners and law enforcement. \nRegistration:\nhttps://attendee.gotowebinar.com/register/3864717821780406796
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-open-source-information-osif-lab-intermediate-advanced-search-techniques/
END:VEVENT
END:VCALENDAR