BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//InfraGard National Members Alliance - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:InfraGard National Members Alliance
X-ORIGINAL-URL:https://www.infragardnational.org
X-WR-CALDESC:Events for InfraGard National Members Alliance
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20190310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20191103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20200308T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20201101T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20210314T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20211107T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20220313T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20221106T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20200308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20201101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20210314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20211107T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20220313T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20221106T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210223T130000
DTEND;TZID=America/New_York:20210223T143000
DTSTAMP:20260404T005725
CREATED:20210219T161022Z
LAST-MODIFIED:20210219T161022Z
UID:3912-1614085200-1614090600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Case Study - Swindling Seductress
DESCRIPTION:SA Mark Hastbacka\, New Hampshire Resident Agency will provide a fascinating case presentation on Serial Con Artist Dana Lawrence\, a career con woman with 15 aliases accused of dozens of scams across 16 states. The story of Dana Lawrence has been featured on the Today Show and the FBI Declassified show \n  \nPresenters:  \nSA Mark Hastbacka\, Special Agent\, FBI \nSpecial Agent Mark Hastbacka has been with the FBI for 24 years\, with assignments in Miami (twice)\, FBIHQ\, Baghdad (Iraq) and currently in the Boston Division (Bedford NH Resident Agency). Special Agent Hastbacka has worked on the Violent \n  \nWho should attend: Open only to InfraGard members. \n  \nRegistration: https://attendee.gotowebinar.com/register/8556867192764616462 \nAfter registering\, you will receive a confirmation email containing information about joining the webinar.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-case-study-swindling-seductress/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210218T140000
DTEND;TZID=America/New_York:20210218T150000
DTSTAMP:20260404T005725
CREATED:20210212T150623Z
LAST-MODIFIED:20210212T150623Z
UID:3880-1613656800-1613660400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Detecting Agro-Terrorism with Agricultural & Environmental Analytics
DESCRIPTION:Many naturally occurring factors may contribute significantly to crop shortfalls such as epidemics of disease and pests and weather. In this talk\, we discuss how modeling of historical epidemiological\, weather\, and soil data may be used to discern between regular seasonal variability and potential external shocks such as deliberate agro-terrorism. Early detection of these events requires the synthesis of all of these heterogeneous data streams to eliminate alternative explanations. We propose a Bayesian learning framework for learning the relationships between these factors\, which we trained on a decade’s worth of historical observations. We demonstrate how this modeling methodology may then be used to identify earlier spatiotemporal anomalies in surveillance which are indicative of coordinated and preternatural dissemination of disease. \nObjectives:  \n-Identification of novel data elements for monitoring food security\n-Statistical & machine learning techniques to synthesize these disparate data streams for forecasting/prediction\n-Discussion of metrics for detection for potential adverse events in food security \nPresenter:  \nAndrew Hong\, MITRE Corporation\, Operations Research Analyst \nDr. Andrew E. Hong is an operations research analyst in the Modeling and Simulation department at the MITRE Corporation. He has supported several federal agencies such as DHS\, IRS\, and CMS in data-driven modeling for detecting fraud and waste. \nWho can attend: \nInfraGard members interested in the topic of detecting agro-terrorism with environmental analytics. Open only to InfraGard members and their guests. \nRegistration: \nhttps://register.gotowebinar.com/register/3474253746888476687
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-detecting-agro-terrorism-with-agricultural-environmental-analytics/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210217T130000
DTEND;TZID=America/New_York:20210217T140000
DTSTAMP:20260404T005725
CREATED:20210129T181857Z
LAST-MODIFIED:20210129T231642Z
UID:3852-1613566800-1613570400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Infragard Series - Cryptocurrency Typologies and Trends
DESCRIPTION:Join cryptocurrency forensic experts Chainalysis and New York Metro Infragard in this session\, where we will: \n-Identify the services that transact with cryptocurrencies today\, including criminal enterprises\, mining pools\, exchanges\, cryptocurrency ATMs\, darknet marketplaces\, and more. \n-Analyze original data on crypto crime trends in 2020 and investigating how these entities interact with each other. \n-Study case studies and examples for each typology\, with an emphasis on risk and compliance. \nThis event is one three webinars in a series on cryptocurrency in cybercrime including ransomware and terrorist activity — feel free to register for all three webinars! \nObjectives: \n-Understand cryptocurrency services that support cyber crime including mining pools\, exchanges\, ATMs\, darknet marketplaces\, and more. \n-Learn current trends in the use of cryptocurrency in cybercrime. \n-Reinforce learning with case study examples. \n  \nPresenter:  Kevin Poorman\, Training Manager\, Chainalysis \nKevin Poorman is an experienced lecturer\, trainer\, and investigator. Prior to Chainalysis\, he worked at the University of Alabama as a part-time instructor\, teaching topics related to cybercriminology. \nWho should attend: Open to anyone. Particularly aimed toward cybersecurity professionals\, financial services professionals\, cryptocurrency investors and enthusiasts\, and students of advanced technology. \nRegistration: https://events.chainalysis.com/infragard-virtual-event-series \nContact POC: Molly Saint\, molly@chainalysis.com
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-infragard-series-cryptocurrency-typologies-and-trends/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210211T130000
DTEND;TZID=America/New_York:20210211T140000
DTSTAMP:20260404T005725
CREATED:20210122T211551Z
LAST-MODIFIED:20210122T212055Z
UID:3837-1613048400-1613052000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: How Cybersecurity and HR Leaders Can Hire and Retain a Diverse Workforce
DESCRIPTION:For decades\, business leaders have trumpeted the importance of hiring a diverse workforce\, but many –especially in the IT industry – are still struggling with this. Creating a team of talented and diverse employees starts with the right hiring practices. Keeping them requires an inclusive environment. Join this Cybersecurity Collaborative Virtual Briefing to learn how senior cybersecurity and HR leaders are affecting change and creating more diverse and inclusive teams. This webcast will cover: why diversity among IT security teams has been so challenging for organizations; how to create hiring practices that promote diversity; and what’s needed to foster an inclusive environment that bolsters employee retention. \nObjectives:  \nThis webcast will cover:\n• why diversity among IT security teams has been so challenging for organizations;\n• how to create hiring practices that promote diversity; and\n• what’s needed to foster an inclusive environment that bolsters employee retention. \nPresenters:  \nMeredith Harper\, VP\, Chief Security Officer\, Eli Lilly and Company \nSydney Klein\, Chief Information Security Officer\, Bristol Myers Squibb \nChristopher Zell\, Vice President\, Head of Information Security\, The Wendy’s Company \nTodd Fitzgerald\, Author CISO Compass\, former CISO Manpower \n  \nWho can attend: Open to anyone. \nRegistration: https://us02web.zoom.us/webinar/register/2416113460551/WN_R0fvECRmRImhrJiMsuG7FQ
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-how-cybersecurity-and-hr-leaders-can-hire-and-retain-a-diverse-workforce/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210211T100000
DTEND;TZID=America/New_York:20210211T140000
DTSTAMP:20260404T005725
CREATED:20210122T210617Z
LAST-MODIFIED:20210125T162243Z
UID:3836-1613037600-1613052000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Supply Chain Cybersecurity Summit
DESCRIPTION:This webinar will focus on challenges facing supply chain cyber risk across sectors including energy\, financial services\, and big pharma. Industry panelists will discuss key controls and lessons learned in each sector. Participants will be welcomed to ask questions of the experts. This webinar is for InfraGard members and anyone interested in supply chain cybersecurity. \nObjectives: \nLearn the critical differentiators in supply chains and cyber exposure across industries. Learn about the most predominant cyber threats in supply chain and what leaders in each industry are doing to mitigate risk. \nPresenters: \nPeter Prunty\, Senior Director Security Compliance\, NYPA \nPeter has over 30 years of IT experience. Peter previously led NYPA’s IT Infrastructure Teams. In this role\, Peter oversaw the engineering and operational support functions for key services such as networks and communications. \nMichael Harrison\, Associate Director\, Business Information Risk\, Merck \nMichael has over 20 years of experience with Third-Party and Supply Chain Risk Management for Fortune 500 Companies. He focuses on critical supply chain risk management at Merck. \nJohn Checco\, former Presdident\, NYM InfraGard \nJohn Checco has held leadership roles in cybersecurity at a major financial institution. John will moderate a panel discussion with experts from Bank of America\, ING\, Mizuho Group\, and the Columbia University Digital Financial Services Observatory (DFSO). \nWho should attend: Open to anyone. Anyone interested in learning about supply chain risk and cybersecurity across industries should attend. Those interested in energy\, pharma\, and financials services IT risk management and supplier risk management will be especially interested. \nRegistration: \nhttps://bit.ly/39a26qQ
URL:https://www.infragardnational.org/event/ma-webinar-broadcast-supply-chain-cybersecurity-summit/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20210210T090000
DTEND;TZID=America/Los_Angeles:20210210T130000
DTSTAMP:20260404T005725
CREATED:20210115T185624Z
LAST-MODIFIED:20210115T191050Z
UID:3817-1612947600-1612962000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Open Source Intelligence (OSINT) Level 2 – Direction of OSINT Research/SOCMINT
DESCRIPTION:*Please note:  This class is eligible for 4 CPE credits from ASIS \n\n\nLEVEL 2 – DIRECTION OF OSINT RESEARCH / SOCMINT \n\n\nWelcome to Level 2 – Direction of OSINT research/SOCMINT of our new “6 Levels of OSINT”. Completion of all six levels will ensure that each attendee receives a comprehensive understanding of the core fundamentals of open-source intelligence (OSINT). \n\n\n  \n\n\nObjectives: \n\n\nBuilding upon the LEVEL 1 OSINT Fundamentals course\, this course seeks to further strengthen attendees’ comprehension of Open-Source Intelligence. This course starts with some Social Media Intelligence (SOCMINT) then forays into more thorough examinations of looking at current events using mapping\, geofencing\, and hashtags. Next up is Business OSINT\, specifically using DNS(Domain Name Service)\, career postings\, public filings and more! This course has technical elements but will be presented in a manner that anyone can benefit from and learn to use. Entry-level intelligence analysts and investigators can enhance their toolkit while the seasoned veterans will still earn valuable techniques as well. \n\n\n  \nTopics:  \n\n\n1. Introduction to SOCMINT \n\n\na. SOCMINT vs OSINT vs GEOINT \n\n\nb. Generic techniques \n\n\nc. Considerations \n\n\n2. Live Events \n\n\na. Social Media Maps \n\n\nb. Geofencing \n\n\nc. Hashtag analysis \n\n\nd. Google Dorking \n\n\n3. Examining Businesses \n\n\na. DNS \n\n\n4. More Business OSINT \n\n\na. Job Postings \n\n\nb. Public Filings \n\n\n  \n\n\nWho can attend: InfraGard Members\, Public Safety (Law/Health/Fire)\, Terrorism Liaison Officers (TLO’s)\, Infrastructure Liaison Officers (ILO’s)\, Private Sector Security\, Area Stakeholders\, all Critical Infrastructure Sectors\, Intelligence Analysts\, Intelligence Officers and Private Investigators. \n\n\n  \n\n\nPresenter:  \nSUBJECT MATTER EXPERT\, CT Watch Inc. \nA native of Eastern Tennessee\, SME is an Open-Source Intelligence (OSINT) and investigations expert specializing in assessing public information for evaluating external risks\, finding missing persons\, threat modeling\, and operations security. The SME possess several cybersecurity industry certifications including Certified Information Systems Security Professional (CISSP®) and GIAC Certified Incident Handler (GCIH®). SME is a former Navy Submarine Navigation Electronics Technician and transitioned into the private sector offering collaborative attitude and expertise to support a variety of organizations\, both public and private in implementing better cybersecurity. \n\n\nRegistration: https://attendee.gotowebinar.com/register/7306124336864817164 \n\n\nFor additional information or training questions\, please contact IGLATraining@infragardlosangeles.org. \n\n\n 
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-open-source-intelligence-osint-level-2-direction-of-osint-research-socmint/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210209T113000
DTEND;TZID=America/Chicago:20210209T130000
DTSTAMP:20260404T005725
CREATED:20210129T231236Z
LAST-MODIFIED:20210129T231614Z
UID:3855-1612870200-1612875600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Counter Threat Group Briefing on Domestic Terror\, Spontaneous Violence\, and IED Threats
DESCRIPTION:From the civil unrest that led to widespread rioting and casualties though most of 2020 to the recent bombings in Nashville and El Monte\, California\, spontaneous violence and organized attacks by anarchist and other extremist groups against law enforcement and public facilities remain a real and present danger to our Nation and local communities. Improvised Explosive Devices (IEDs) remain a weapon of choice because of the relative ease of obtaining and assembling the necessary components. \nJoin us for our February 9th meeting as we welcome Rodney Andreasen\, Threat Assessment / Training Specialist at Counter Threat Group\, LLC\, and Lt. Col. Doug Wilson (Ret)\, Assistant Vice President of Advancement at Samford University and Co-founded Counter Threat Group. \nObjectives: \nUpon completion of this webinar the attendee will: understand how EIDs/VBIEDs have been used in notable domestic terrorist attacks; learn about current threats and the impact of civil unrest\, anarchists/extremists groups\, and spontaneous violence; learn best practices to help their organization prevent attacks\, detect potential threats\, and respond during and after an incident; and learn about resources available for more information and support. \nPresenters: \nRodney Andreasen\, Threat Assessment / Training Specialist at Counter Threat Group\, LLC \n21 yrs in USAF as Law Enforcement & Security Specialist then Professional Military Education instructor. Became EMA Director\, Jackson Co.\, FL\, in 2001. Developed & managed preparedness & response programs. Responded to numerous incidents. \nLt. Col. Doug Wilson (Ret)\, Assistant Vice President of Advancement at Samford University and Co-founded Counter Threat Group \n28 years with the USAF & Air National Guard. Participated in numerous contingencies in Bosnia\, Kosovo\, Iraq\, & others. As Mission Commander for DGS Unit supporting MQ-1 Predator Drone completed 230 missions for Op. Iraqi Freedom. \nWho should attend: \nThis is an open meeting and the briefing is intended for private sector stakeholders responsible for protecting and securing any commercial\, religious\, municipal\, or critical sector facility. \nRegistration:  \nhttps://us02web.zoom.us/webinar/register/WN_wLyi3X9ITkGqQKQiqJ3FvA \nContact POC:  \npresident@infragardbirmingham.org
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-counter-threat-group-briefing-on-domestic-terror-spontaneous-violence-and-ied-threats/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20210209T090000
DTEND;TZID=America/Los_Angeles:20210209T130000
DTSTAMP:20260404T005725
CREATED:20210115T184706Z
LAST-MODIFIED:20210115T191106Z
UID:3815-1612861200-1612875600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Open-Source Intelligence (OSINT) Level 1 – Fundamentals of OSINT
DESCRIPTION:*Please note:  This class is eligible for 4 CPE credits from ASIS \n\n\nBuilding on the Open-Source Intelligence (OSINT) Courses held in the past two years\, InfraGard Los Angeles Members Alliance (IGLA) and C-T Watch\, Inc. have collaborated on building a much more robust and comprehensive course curriculum to address the knowledge gaps and recommendations made by our private and public partners in security\, law enforcement\, critical infrastructure protection and fusion centers. We are proud to introduce the “6 Levels of OSINT” which will address the core fundamentals behind open-source information (OSIF) and open-source intelligence (OSINT). This OSINT curriculum will take you through an organized learning journey designed for every level of experience starting with the core foundations of open–source information and intelligence to the direction of research\, SOCMINT\, tradecraft\, collection\, sources\, tools\, report writing all the way to the legalities and operational safety of the attendees. Completion of all six levels will ensure that each attendee receives a comprehensive understanding of the core fundamentals of open-source intelligence (OSINT). \n\n\n  \n\n\nLEVEL 1 FUNDAMENTALS OF OSINT \n\n\nOverview:  \n\n\nThis course is the absolute foundation to beginning an Open-Source Intelligence investigation. While geared towards those just starting to explore the discipline\, this course will have information and techniques for both the seasoned and entry-level alike. The course begins with a survey of OSINT\, what it is\, what it is not\, and how it enables other disciplines\, then moves to collection considerations as it relates to collection\, storage\, and destruction of data. The course then examines OSINT techniques to gather intelligence from images and is finalized with a discussion of usernames and further enumeration techniques. These sources can also be used to conduct thorough background checks on potential employees. All resources can be applied to domestic and international investigations. \n\n\n  \nObjectives: \n\n\n1. What is OSINT? \n\n\na. Enablement of Adjacent disciplines \n\n\nb. Example use-case scenarios \n\n\n2. Understanding Chain of Custody/Evidence \n\n\na. Collection and Preservation \n\n\nb. Storage \n\n\nc. Retention \n\n\nd. Destruction \n\n\n3. Image OSINT \n\n\na. Metadata \n\n\nb. Reverse Searching \n\n\n4. Usernames and Further enumeration \n\n\na. Pivoting \n\n\nb. Other accounts \n\n\nc. Analysis \n\n\n  \n\n\nWho can attend: InfraGard Members\, Public Safety (Law/Health/Fire)\, Terrorism Liaison Officers (TLO’s)\, Infrastructure Liaison Officers (ILO’s)\, Private Sector Security\, Area Stakeholders\, all Critical Infrastructure Sectors\, Intelligence Analysts\, Intelligence Officers and Private Investigators. \n\n\n  \n\n\nPresenter: SUBJECT MATTER EXPERT\, CT Watch Inc. \nA native of Eastern Tennessee\, SME is an Open-Source Intelligence (OSINT) and investigations expert specializing in assessing public information for evaluating external risks\, finding missing persons\, threat modeling\, and operations security. The SME possess several cybersecurity industry certifications including Certified Information Systems Security Professional (CISSP®) and GIAC Certified Incident Handler (GCIH®). SME is a former Navy Submarine Navigation Electronics Technician and transitioned into the private sector offering collaborative attitude and expertise to support a variety of organizations\, both public and private in implementing better cybersecurity \n\n\nRegistration: https://attendee.gotowebinar.com/register/7995839184874017808 \n\n\nFor additional information or training questions\, please contact IGLATraining@infragardlosangeles.org.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-open-source-intelligence-osint-level-1-fundamentals-of-osint/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210205T080000
DTEND;TZID=America/New_York:20210205T170000
DTSTAMP:20260404T005725
CREATED:20230831T235115Z
LAST-MODIFIED:20230831T235115Z
UID:3869-1612512000-1612544400@www.infragardnational.org
SUMMARY:MA Webinar Broadcast: Supply Chain Cybersecurity - Law Enforcement Briefing (by invitation only)
DESCRIPTION:This private webinar will follow the series of supply chain cybersecurity webinars earlier in the day. There is a confidential registration link for this briefing. Participants are reminded not to record the briefing. Time permitting\, the FBI expert will be available to answer questions. The Supervisory Special Agent Pete Casson will provide a briefing on supply chain cybersecurity from the FBI’s perspective. \nThis webinar is for InfraGard members and supply chain professionals by invitation only.\nPlease do not forward this information or share it outside your organization. \nObjectives: \nUnderstand cybersecurity threats to supply chains.\nLearn FBI case study experience from investigations of supply chain crime. \n\n\n\n\n\nRefer to the weekly InfraGard events newsletter for registration information
URL:https://www.infragardnational.org/event/ma-webinar-broadcast-supply-chain-cybersecurity-law-enforcement-briefing-by-invitation-only/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20210204T093000
DTEND;TZID=America/Los_Angeles:20210204T110000
DTSTAMP:20260404T005725
CREATED:20210104T191120Z
LAST-MODIFIED:20210202T013837Z
UID:3781-1612431000-1612436400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Procurement Fraud and Collusion- From Red Flags to Prosecution
DESCRIPTION:This course is designed for any company\, private or public\, that purchases from outside vendors and is concerned about fraud in the purchasing process. The Federal Bureau of Investigation\, along with the Office of Inspector General for many other government agencies\, investigates procurement fraud and corruption in partnership with the Department of Justice – Antitrust Division. Nearly $20 billion is spent annually in Southern California\, and over $550 billion federally\, on government contracts for goods and services alone. Additionally\, there will be a discussion about how procurement fraud is tied directly to corruption of government officials\, both domestic and foreign\, at the local\, state\, and federal levels. This is an important topic as procurement fraud and collusion create an imbalanced and unfair marketplace that directly impacts corporations and the end consumer in price\, availability\, and overall quality of a product. \nObjectives: \n1. Procurement Fraud Red Flags – Learn background and trends in procurement fraud\, as well as how to identify potential red flags in the purchasing process for your company.\n2. Procurement Collusion Strike Force – Ask questions to and gain inside knowledge from OIG investigators and DOJ attorneys during a roundtable discussion about the Strike Force.\n3. Leniency Program—Learn how the DOJ Antitrust Division’s Leniency Program is successfully applied to those companies who identify and self-disclose collusion and fraud.\n4. Case Examples – The FBI will present case studies which show the effectiveness of Law Enforcement partnerships and their impact on contracting officials and subject companies. \nPresenters: Federal Bureau of Investigation\, Department of Justice\, Antitrust Division\, Procurement Collusion Strike Force \nWho should attend: This course is designed for any company\, private or public\, that purchases from outside vendors and is concerned about fraud in the purchasing process. \nRegister: https://attendee.gotowebinar.com/register/749183445710618894
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-procurement-fraud-and-collusion-from-red-flags-to-prosecution/
CATEGORIES:InfraGard National Events
ORGANIZER;CN="IGLA Training":MAILTO:IGLATraining@infragardlosangeles.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20210129T100000
DTEND;TZID=America/Los_Angeles:20210129T113000
DTSTAMP:20260404T005725
CREATED:20210108T183409Z
LAST-MODIFIED:20210108T183628Z
UID:3805-1611914400-1611919800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: The SolarWinds Cyber Attack - Supply Chain Threats & Private Sector Impacts
DESCRIPTION:Join InfraGard San Diego to receive a timely update directly from law enforcement and private sector experts regarding the SolarWinds Orion cyber attack\, which has affected approximately 18\,000 public and private sector customers. According to a joint statement from the FBI\, NSA\, ODNI and CISA\, an advanced persistent threat actor\, likely Russian in origin\, is responsible for most or all of the ongoing cyber compromises of both government and non-governmental networks. Speakers will discuss critically important information about the SolarWinds Orion supply chain attack – one of the most significant in history – and what businesses can do in response. Following the one-hour briefing\, InfraGard members will have an opportunity for a 30-minute live Q&A. \nPresenters:  \n\n\n\nSupervisory Special Agent Nick Arico\, National Security Cyber Division\, FBI San Diego\nJustine Phillips\, Partner and Cyber Attorney\, Data Privacy & Security Practice\, Sheppard Mullin and Vice President\, InfraGard San Diego\n\nJustine is one of the nation’s top cyber attorneys\, whose representations involve every aspect of cybersecurity\, from information governance\, incident preparedness and response to defending companies in litigation related to cyber events.\n\n\n\n\n\n  \nWho Can Attend: Vetted InfraGard members only. \nRegistration: https://attendee.gotowebinar.com/register/5840520417007557390 \nContact: Rusty Sailors\, rusty.sailors@protectingtomorrow.org
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-the-solarwinds-cyber-attack-supply-chain-threats-private-sector-impacts/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210128T173000
DTEND;TZID=America/New_York:20210128T190000
DTSTAMP:20260404T005725
CREATED:20210122T204046Z
LAST-MODIFIED:20210122T204229Z
UID:3832-1611855000-1611860400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: The Ransomware Threat Landscape
DESCRIPTION:Join the leadership of the Infragard Maryland Members Alliance as we present our first webinar of 2021 on the ransomware threat landscape. This event will feature a panel of cybersecurity experts and will include discussion of new families of ransomware\, trends such as naming and shaming\, and legal implications of dealing with threat actors. \nPresenters: \nNikki Robinson\, Senior Cyber Engineer\, XLA \nDr. Nikki Robinson\, the IMMA Vice-President\, is a Senior Cyber Engineer at XLA. She will use her expertise to lead a moderated panel discussion about the Ransomware threat landscape. \nMarcelle Lee\, Senior Security Researcher and Emerging Threats Lead\, Secureworks \nMarcelle Lee will be provide her expertise as one of our panelists. \nDevon Bowers\, Chief Information Officer\, Jai Medical Systems MCO \nDevon Bowers will provide insight into the Ransomware threat as a panel member. \nBob Olsen\, Global Head – Cybersecurity and Privacy\, Ankura Consulting Group \nBob Olsen will round out our panel and share his experience with the Ransomware threat landscape. \n  \nWho Can Attend: \nOpen only to InfraGard members and their guests \n  \nRegistration: \nhttps://www.eventbrite.com/e/imma-january-webinar-the-ransomware-threat-landscape-tickets-136516830515
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-the-ransomware-threat-landscape/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210128T120000
DTEND;TZID=America/Chicago:20210128T133000
DTSTAMP:20260404T005725
CREATED:20210122T205447Z
LAST-MODIFIED:20210122T205447Z
UID:3834-1611835200-1611840600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: The Anubis Clock: We are all on borrowed time against the attackers.
DESCRIPTION:The threat landscape has completely changed. In the last twelve months we have seen supply chain attacks\, an increase in ransomware (with an explosion of cryptocurrency value)\, and a dedication from attackers against industrial control and IoT systems. Attackers are financially and politically motivated. Additionally\, globally\, we are engaging in the largest remote workforce experiment in history. \nWe are working\, communicating\, and interacting in ways that are different than ever before – taking advantage of remote applications and connectivity technologies that are new to many companies or are being used on a larger scale than ever expected. Attackers know this. They are targeting VPNs\, remote desktop systems\, home-based IoT systems\, remote conferencing applications\, and gaming applications with ever more advanced phishing attacks. All of these\, as well as corporate assets\, are expected to continue to be prime attack targets in 2021. \nObjectives: \nJoin Aamir Lakhani\, Manager\, FortiGuard Labs\, to get a real-world introduction to “the bad guys” in 2021. Aamir will explore and reveal some of the top hacker tools\, techniques\, Darknet markets\, and DeepWeb exploits that attackers are currently using to attack\, exploit\, and breach organizations around the globe. Learn how we are all on borrowed time against the attackers and tips for how you can take control of the race against the Anubis Clock. \nPresenters: \nAamir Lakhani\, Senior Manager\, Fortiguard Labs \nAamir is a cyber-security researcher and practitioner with Fortinet & FortiGuard Labs with over 15 years of experience in the security industry responsible for providing IT security solutions to major commercial and federal customers. \n  \nWho can attend: \nThis webinar is open to all InfraGard members and guests. The session will be useful for IT and Security professionals who are interested in learning more about the current and developing threat landscape\, and the top hacker tools\, techniques\, Darknet markets\, and DeepWeb exploits that attackers are currently using to attack\, exploit\, and breach organizations around the globe. \nRegistration:  \nhttps://attendee.gotowebinar.com/register/290749769750521103 \n  \nThe webinar will be recorded with details for obtaining a copy of the session given at the end of the webinar. CPE’s will not be provided\, but a Confirmation of Attendance will be sent to attendees.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-the-anubis-clock-we-are-all-on-borrowed-time-against-the-attackers/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210128T090000
DTEND;TZID=America/New_York:20210128T113000
DTSTAMP:20260404T005725
CREATED:20210115T183535Z
LAST-MODIFIED:20210119T174225Z
UID:3814-1611824400-1611833400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: 2021 Maritime Security Issues
DESCRIPTION:InfraGard New Hampshire and InfraGard National presents a webinar on 2021 Maritime Security Issues. The webinar will cover various aspects of Maritime Shipping challenges\, to include a United Nations IMO overview of maritime security issues\, vessel and crew security matters (piracy/kidnapping)\, negative effects to the transportation supply chain and end point port security concerns. \nObjectives: \n1) Intro\, Agenda and Webinar ground rules\n2) 2021 International Maritime Issues – From the UN/IMO Perspective\n3) Vessel & Crew Security – Dryad Global\n4) Port Security – Port & Supply Chain issues as seen from a Major Port Perspective\n5) Port Security – Port & Supply Chain issues as seen from a Small Port Perspective\n6) USCG COTP – CAPT B. Lefebvre\, Captain of the Port authorizes\n7) Q&A \nPresenters:  \nFred Kenny\, Director\, Legal and External Affairs at International Maritime Organization \nFred is a highly decorated retired US Coast Guard Rear Admiral who was formally the Judge Advocate General of the USCG. He was responsible for over 180 uniformed and 90 civilian lawyers. \nMike Edgerton\, Chief Security Officer\, Port of NY/NJ\nMike served in the US Coast Guard and US Navy as a commissioned officer specializing in security and intelligence. After military service\, he enter private security. \nPhil Diacon\, CEO Dryad Global\nPhil started as a fighter pilot in the RAF and has specialized in both aviation and maritime intelligence and risk assessments. Phil has over 25 years in building teams and providing actionable intelligence to both public and private partners\, specifically providing this expertise as the CEO of Dryad Global. \nGrant Nichols\, NH Port Authority\, Office of the Chief Harbor Master\nGrant currently serves as the Deputy Chief law enforcement officer for the New Hampshire Division of Ports and Harbors (Port Authority). He served as the Detective Supervisor of the Alton New Hampshire police department where he conducted investigations\, supervised the department’s prosecutor\, was responsible for all community outreach activities and was a team leader on the Belknap County Regional SWAT Team. Grant served 12 years in the US Air Force. \n  \nWho can attend: Open to anyone. \nRegistration: https://attendee.gotowebinar.com/register/6888991615520494094 \n  \nFor questions about this webinar\, please contact Bill Schenkelberg at bschenkelberg@wapacklabs.com
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-2021-maritime-security-issues/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20210121T083000
DTEND;TZID=America/Los_Angeles:20210121T123000
DTSTAMP:20260404T005725
CREATED:20210104T192339Z
LAST-MODIFIED:20210104T194020Z
UID:3786-1611217800-1611232200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Fraud & Financial Crimes in the New Age
DESCRIPTION:This course will give attendees an understanding of complex fraud and financial crimes in the new age. Financial crimes affect not just individuals but also organizations of all sizes\, government entities and all sectors of critical infrastructure. Learn about the various types of fraud and financial crimes\, how identify the indicators early and potentially prevent these types of crimes from disrupting your organization. \nObjectives:\n1). Understanding of Fraud and various financial crimes\n2). Internal and external financial crimes\n3). International and Domestic financial crimes\n4). Indicators of fraud or financial crimes\n5). Case studies\n6). Investigative resources \nPresenter: CT Watch Inc.  \nA retired Detective with 20 years’ experience in white-collar crimes and investigations from a large Southern California Police Department\, 5 years as team leader for US Secret Service International Fraud Task Force. \nWho should attend: Open only to InfraGard members and their guests. Particularly aimed toward InfraGard Members\, Public Safety (Law/Health/Fire)\, Terrorism Liaison Officers (TLO’s)\, Infrastructure Liaison Officers (ILO’s)\, Private Sector Security\, Area Stakeholders\, all Critical Infrastructure Sectors\, Intelligence Analysts\, Intelligence Officers and Private Investigators. \nRegister: https://attendee.gotowebinar.com/register/6671263023832721421
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-fraud-financial-crimes-in-the-new-age-2/
CATEGORIES:InfraGard National Events
ORGANIZER;CN="IGLA Training":MAILTO:IGLATraining@infragardlosangeles.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210119T130000
DTEND;TZID=America/New_York:20210119T140000
DTSTAMP:20260404T005725
CREATED:20210104T191907Z
LAST-MODIFIED:20210104T194036Z
UID:3784-1611061200-1611064800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: InfraGard Atlanta Webinar Series- Trends in Next Gen Threat & Vulnerability Management
DESCRIPTION:Leading organizations are transforming Threat and Vulnerability Management to reduce vulnerability risk in response to growing business complexity and evolving threat landscape. We will discuss concepts such as breach and attack simulation for prioritizing vulnerabilities\, benefits of consolidating vulnerabilities identified through various methods (such as attack and penetration tests\, infrastructure vulnerability scanning\, source code scanning etc.)\, concepts related to security by design\, self-healing machines and other leading practices around organizational integration. \nPresenters: \nRishi Pande:\nRishi is a Managing Director at EY. He leads the National Vulnerability Discovery and Response services including Application security\, Penetration Testing and Vulnerability Management. Rishi helps develop enterprise\, product and customer security strategies and new value propositions to drive growth and competitive advantage\, and to devise strategies to help clients protect the enterprise. Rishi has been part of industry pioneering techniques for deploying Security by Design implementations as part of Digital transformations and developed complex next generation threat and vulnerability management strategies. Rishi has over 15 years of experience at the intersection of security\, business\, product\, customer\, and technology. Rishi is a CISSP\, CSSLP\, CISM. \n  \nGayathri Kunapuli:  \nGayathri is a Senior Manager at EY within the Vulnerability Discovery and Response competency. Gayathri leads delivery of large-scale vulnerability management projects including – implementation of scanning and security configuration monitoring tools to improve vulnerability detection\, design and establishment of operating models to mature vulnerability management programs\, tactical risk reduction efforts to secure enterprises and conception of executive visibility and reporting dashboards to determine risk posture. Gayathri also helps organizations define\, implement and manage security configurations over enterprise technologies to maintain secure state of assets throughout their lifecycle. Gayathri is a CISSP\, CIPP/US. \n  \nWho should attend: Open to anyone. This session will be useful for IT and Security professionals who would like learn new techniques to improve threat and vulnerability management. \nRegister: https://attendee.gotowebinar.com/register/2976105709230895632
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-infragard-atlanta-webinar-series-trends-in-next-gen-threat-vulnerability-management/
CATEGORIES:InfraGard National Events
ORGANIZER;CN="David Nolan":MAILTO:education@infragardatlanta.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210115T110000
DTEND;TZID=America/New_York:20210115T123000
DTSTAMP:20260404T005725
CREATED:20210104T190159Z
LAST-MODIFIED:20210104T193914Z
UID:3779-1610708400-1610713800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: InfraGardNCR Career Workshop
DESCRIPTION:Just finished your degree? Looking for a new job? Interested in making a career transition?\nJoin InfraGardNCR Emergency Services Sector Chief Erik Gaull in a 90-minute career workshop. Topics to be discussed will include preparing for a job search\, networking\, cover letters\, resumes\, interviewing\, and career enhancement techniques. The workshop is open to all\, including those who are not InfraGard members. \nThis webinar is hosted by InfraGardNCR\, the National Capital Region chapter of InfraGard. InfraGardNCR is a partnership between the FBI’s Washington field office and members of the private sector. it coordinates regular meetings on a broad spectrum of infrastructure-related issues and topics to develop the relationships and communication pathways necessary to thwart an attack against our region’s critical infrastructure. \nQuestions? Email events@infragardncr.org. \nWe’ll see you online! \nPresenter: Erik Gaull\, Principal\, The Cadmus Group.  \nErik is the Principal leading the emergency management practice at Cadmus Group. He has interviewed and hired numerous people\, done more than his fair share of job searches\, and run a resume clearinghouse on Capitol Hill. \nWho should attend: Open to anyone. \nRegister: https://register.gotowebinar.com/register/5423382197311816976
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-infragardncr-career-workshop/
CATEGORIES:InfraGard National Events
ORGANIZER;CN="InfraGard NCR":MAILTO:events@infragardncr.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20210113T090000
DTEND;TZID=America/Los_Angeles:20210113T103000
DTSTAMP:20260404T005725
CREATED:20201211T155016Z
LAST-MODIFIED:20210104T193041Z
UID:3554-1610528400-1610533800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Cyber Threats to Third Party Service Providers\, Its Evolution and What We Can Do About It
DESCRIPTION:With the rapid increase in ransomware attacks against the finance industry third party service providers\, FBI Los Angeles partnered with the Los Angeles InfraGard Chapter to engage you in a moderated panel discussion with Banking and Water Chief Information Security Officers\, a Cybersecurity expert\, the U.S. Securities and Exchange Commission\, and FBI Cyber Division. The panelists will discuss underlying driving factors\, cross-sector impacts\, economic and national security implications\, how they see these threats evolving\, and actionable steps we can all take to address this growing issue. We invite you to attend\, pose your questions to the panelists\, and share your insights on this ongoing challenge we are facing together. \nModerator:\nBrian Fricke | City National Bank | Chief Information Security Officer | InfraGard Los Angeles Sector Chief \nPanelists:\nJason Cathey | Bank OZK | Chief Information Security Officer | InfraGard Arkansas President\nJacob Margolis | Metropolitan Water District of Southern California | Chief Information Security Officer| InfraGard Los Angeles Sector Chief\nPaul Perry | Warren Averett\, LLC | Member: Security\, Risk and Controls Group Practice Leader |InfraGard Birmingham Member\nKristina Littman | U.S. Securities and Exchange Commission\, Cyber Unit\, Division of Enforcement | Chief\nAlexander Heiland | FBI Headquarters Cyber Division\, Financial/Commercial Facilities Desk\, Critical Infrastructure Cyber Intelligence Unit | Intelligence Analyst \nWho Should Attend: \nThis event is open to anyone. \nRegister: \nhttps://attendee.gotowebinar.com/register/3079662112210610700
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-cyber-threats-to-third-party-service-providers-its-evolution-and-what-we-can-do-about-it/
CATEGORIES:InfraGard National Events
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20210104T083000
DTEND;TZID=America/Los_Angeles:20210104T123000
DTSTAMP:20260404T005725
CREATED:20210104T191549Z
LAST-MODIFIED:20210104T194115Z
UID:3783-1609749000-1609763400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Fraud & Financial Crimes in the New Age
DESCRIPTION:This course will give attendees an understanding of complex fraud and financial crimes in the new age. Financial crimes affect not just individuals but also organizations of all sizes\, government entities and all sectors of critical infrastructure. Learn about the various types of fraud and financial crimes\, how identify the indicators early and potentially prevent these types of crimes from disrupting your organization. \nObjectives: \n1). Understanding of Fraud and various financial crimes\n2). Internal and external financial crimes\n3). International and Domestic financial crimes\n4). Indicators of fraud or financial crimes\n5). Case studies\n6). Investigative resources \nPresenters: CT Watch Inc. \nA retired Detective with 20 years’ experience in white-collar crimes and investigations from a large Southern California Police Department\, 5 years as team leader for US Secret Service International Fraud Task Force. \nWho should attend: InfraGard Members\, Public Safety (Law/Health/Fire)\, Terrorism Liaison Officers (TLO’s)\, Infrastructure Liaison Officers (ILO’s)\, Private Sector Security\, Area Stakeholders\, all Critical Infrastructure Sectors\, Intelligence Analysts\, Intelligence Officers and Private Investigators. \nRegister: https://attendee.gotowebinar.com/register/6671263023832721421
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-fraud-financial-crimes-in-the-new-age/
LOCATION:GoToWebinar\, 1701 Pennsylvania Avenue\, Suite 200\, Washington\, DC\, United States
CATEGORIES:InfraGard National Events
ORGANIZER;CN="IGLA Training":MAILTO:IGLATraining@infragardlosangeles.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201216T130000
DTEND;TZID=America/New_York:20201216T150000
DTSTAMP:20260404T005725
CREATED:20201125T042800Z
LAST-MODIFIED:20201125T142227Z
UID:3323-1608123600-1608130800@www.infragardnational.org
SUMMARY:InfraGard National Workshop Wednesdays Workshop: Vulnerability and Remediation Tracking Management Program
DESCRIPTION:What happens when the pen testers are done testing your websites? How do you track discovered vulnerabilities and weak controls once the auditors leave? How do you ensure that your organization tracks\, monitors\, and remediates all the discovered findings once the dust settles and things are back to day-to-day operations? For many organizations\, this is a real concern. Tracking five findings may only require the use of a spreadsheet\, but how do you track the weaknesses if your organization has 250\, 1000 or even more identified vulnerabilities?  I will provide the audience with a real-life process example for tracking and documenting mitigation and remediation efforts of identified vulnerabilities. \nWho should attend:\nCISOs\, ISSOs\, Cyber Security Analysts\, Supervisors\, Auditors; anyone who is involved with vulnerability identification/management and is looking for ways to build a efficient\, repeatable and sustainable program to monitor the remediation process of their organization’s identified vulnerabilities. \nLearning Objectives\n\n\n\nAt the end of this session participants should be able to begin building a sustainable\, repeatable\, and effective vulnerability tracking process.\nParticipants will be able to begin setting artifact standards for validation of remediation efforts.\nParticipants will be better prepared to initiate the cyber vulnerability training awareness that needs to accompany an organization’s vulnerability and remediation tracking process.\n\nAbout the Instructor\n\n\n\n\nTerri Reilly\n \nSr Cyber Security Analyst\,  Deputy Program Manager | Department of the Army \n\nTerri is a senior IT Professional with 35 years of experience working for the Department of the Army\, both as a government employee and now as a contractor. She is employed by Exeter Government Services as a Deputy Program Manager/Sr Cybersecurity Analyst. In 2017\, Terri received her Master of Science in Information Assurance and Computer Security from Dakota State University. She holds certifications for EC-Council’s Certified Ethical Hacking\, ISACA’s Certified Information System Auditor and ISC2’s Certified Information Systems Security Professional. In addition to her Deputy PM responsibilities\, Terri leads a team of auditors conducting assessments of the organization’s servers\, workstations\, devices\, applications\, etc.\, found on the network. The team works directly with system\, network and database administrators\, application developers\, and many others to remediate discovered findings. \nRegister: https://attendee.gotowebinar.com/register/8092663275292012300
URL:https://www.infragardnational.org/event/infragard-national-workshop-wednesdays-workshop-vulnerability-and-remediation-tracking-management-program/
CATEGORIES:NISRU
ATTACH;FMTTYPE=image/jpeg:https://www.infragardnational.org/wp-content/uploads/2020/11/terri-reilly.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201209T130000
DTEND;TZID=America/New_York:20201209T150000
DTSTAMP:20260404T005725
CREATED:20201125T041701Z
LAST-MODIFIED:20201125T142105Z
UID:3322-1607518800-1607526000@www.infragardnational.org
SUMMARY:InfraGard National Workshop Wednesdays Workshop: Business Continuity Planning and Pandemics
DESCRIPTION:All businesses should have a plan for emergencies including natural and man-made.  Recently\, the novel coronavirus COVID-19 has heightened organizations awareness for the need of plans.  All attendees will leave with a simple plan for natural and man-made disasters as well as one for a Pandemic. \nWho should attend:\nAll businesses would benefit from this workshop \nLearning Objectives\n\n\n\nAttendees will have an idea of what a Business Continuity Plan is and will have an opportunity to build a simple one.\nAttendees will have an idea of what a Pandemic Plan is and how it differs from a BCP.  They will have an opportunity to build a simple one.\nFor those with a BCP background\, they will have a way of communicating their plans with senior management\n\nAbout the Instructor\n\n\n\n \nMary Lasky\nProgram Manager\, Johns Hopkins University | Applied Physics Laboratory \n\nMary is the Chairman of the InfraGard National Disaster Resilience Council (NDRC).  She is the lead editor and author of “Powering Through: From Fragile Infrastructure to Community Resilience” an action guide on being prepared if there is grid failure.  Mary Lasky is a Certified Business Continuity Professional (CBCP).  She is on the Foundation for Resilient Societies Board of Directors. \n\nJohn Jackson\n \nJohn Jackson | Chair | InfraGard National\, Business Continuity Cross Sector Council \n\nJohn’s business continuity experience spans 40 years. He founded Chi/Cor’s disaster recovery practice in 1980. In 1984\, John joined Comdisco\, leading their recovery center and consulting businesses during his 18 years. Following this\, he held leadership positions with Hewlett-Packard and IBM’s continuity services organizations. John co-founded Fusion in 2005 and retired in 2019. He continues his industry support with DRJ\, CI\, BCI and InfraGard. \nRegister: https://attendee.gotowebinar.com/register/2002495856831346700\n 
URL:https://www.infragardnational.org/event/infragard-national-workshop-wednesdays-workshop-business-continuity-planning-and-pandemics/
ATTACH;FMTTYPE=image/png:https://www.infragardnational.org/wp-content/uploads/2020/11/mary-lasky-john-jackson.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201202T130000
DTEND;TZID=America/New_York:20201202T150000
DTSTAMP:20260404T005725
CREATED:20201124T160321Z
LAST-MODIFIED:20201125T142129Z
UID:3306-1606914000-1606921200@www.infragardnational.org
SUMMARY:InfraGard National Workshop Wednesdays Workshop: Employing Mitre ATT&CK for Critical Infrastructure Protection
DESCRIPTION:Operators of Industrial Control Systems (ICS) like those used in the electric power substations lack the capability for active defense of their systems from cyber adversaries. In this workshop MITRE will present their ATT&CK for ICS model with associated use cases of past and recent incidents. \nLearning Objectives\n\n\n\nLearn how the ATT&CK for ICS framework can be used to tune your log analytics to reduce false positive alerts\nLearn to apply the framework to identify gaps in your event detection schemes\, analytics and data collection.\nGain practical expertise walking thru an incident management scenario to learn what is required to establish consistency in monitoring enterprise security capabilities.\n\nAbout the Instructor\nOtis Alexander\n\nCyber Security Engineer | Mitre Corporation \n\nOtis Alexander joined the Mitre Corporation as a Cyber Security Engineer in 2014. He currently leads the development of the ICS ATT&CK model and focuses on the categorization and emulation of adversary behavior in cyber physical systems. Otis holds a BS and MS in Computer Science from the University of Washington. \nREGISTER: https://attendee.gotowebinar.com/register/4107817631952407056 
URL:https://www.infragardnational.org/event/infragard-national-workshop-wednesdays-workshop-employing-mitre-attck-for-critical-infrastructure-protection/
CATEGORIES:NISRU
ATTACH;FMTTYPE=image/png:https://www.infragardnational.org/wp-content/uploads/2020/11/otis-alexander-2-e1606312444234.png
ORGANIZER;CN="Chuck Georgo":MAILTO:cgeorgo@infragardnational.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200927T130000
DTEND;TZID=America/New_York:20200927T163000
DTSTAMP:20260404T005725
CREATED:20200726T225254Z
LAST-MODIFIED:20200726T225254Z
UID:3012-1601211600-1601224200@www.infragardnational.org
SUMMARY:InfraGard National Annual Congress
DESCRIPTION:This year\, our Annual Congress will be going virtual!  Delegates and guests are invited to join us this year to receive the InfraGard National Report and to hear the State of InfraGard from the National Board. This is also when the InfraGard National Board Elections will be held and winners will be announced. More information will be sent to delegates on how to join this event.
URL:https://www.infragardnational.org/event/infragard-national-annual-congress/
END:VEVENT
END:VCALENDAR