BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//InfraGard National Members Alliance - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.infragardnational.org
X-WR-CALDESC:Events for InfraGard National Members Alliance
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20230312T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20231105T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20240310T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20241103T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20250309T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20251102T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Denver
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20230312T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20231105T080000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20240310T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20241103T080000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20250309T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20251102T080000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20230312T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20231105T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20240310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20241103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240313T100000
DTEND;TZID=America/Los_Angeles:20240313T110000
DTSTAMP:20260403T093742
CREATED:20240208T230926Z
LAST-MODIFIED:20240208T230926Z
UID:5079-1710324000-1710327600@www.infragardnational.org
SUMMARY:Top Predictions on Global Cybersecurity Risks for 2024
DESCRIPTION:During this session\, we will highlight our top predictions regarding the most critical cybersecurity issues businesses face today as innovation continues to drive technology advances\, making it a pivotal year ahead for businesses navigating global cybersecurity risks. We will provide actionable tips and guidance to ensure your readiness\, resilience and compliance efforts are well positioned in 2024 and beyond\, with a focus on key cyber regulations in the US and globally. \nSpeakers: \nJustine Phillips (30 min.)\nJustine Phillips is a partner in our Firm’s North America Intellectual Property & Technology Practice Group. Justine focuses her practice on both proactive and reactive cybersecurity and data privacy services\, representing clients in matters related to information governance\, diligence in acquisitions and investments\, incident preparedness and response\, the California Consumer Privacy Act\, privacy litigation\, and cyber litigation. She provides actionable and practical guidance to help businesses manage data\, technology\, cyber threats\, privacy\, security and digital assets. As businesses navigate complex and far-reaching laws and regulations\, Justine proactively creates compliance programs customized to client needs and budgets\, including data mapping\, vendor management\, privacy and security by design\, cyber risk management and mitigation\, eWorkforce policies\, data retention and destruction policies and implementation\, consumer request workflows\, cyber-awareness policies and trainings\, and CCPA/CPRA readiness audits. She also provides reactive cyber services\, including incident response\, crisis management\, privileged forensic investigations into business email compromises\, data breaches and ransomware attacks\, compliance with notice obligations to individuals and regulators\, regulatory inquiries and investigations\, and cyber litigation. Justine also handles employment litigation and counseling\, as well as commercial litigation. \nCyrus Vance (30 min.)\nCyrus Vance Jr. has earned a well-deserved international reputation as a trial attorney with a proven track record in high-stake litigation and global investigations. As a partner in Baker McKenzie’s North America Litigation and Government Enforcement Practice and Global Investigations\, Compliance & Ethics Practice\, Cyrus is well-known for his expertise in white collar criminal investigations\, complex civil and criminal litigation\, sanctions enforcement\, compliance and cybersecurity. With over three decades of experience in both public and private sector\, Cyrus provides invaluable guidance to clients navigating cross-border investigations\, enforcement matters\, and cybersecurity incidents. Prior to joining the Firm\, Cyrus served three consecutive four-year terms as Manhattan District Attorney\, overseeing a team of over 600 prosecutors. He handled landmark criminal prosecutions\, including the successful litigation before the U.S. Supreme Court in Trump v. Vance and the conviction of Harvey Weinstein on two felony sex crimes. He also managed more than 100\,000 cases annually\, including complex white collar and business crimes both domestically and internationally. Cyrus regularly collaborated with regulatory and crime-fighting partners such as the City of London Police\, Paris Prosecutors’ Office\, Singapore Attorney General\, Europol and Interpol\, and is known for his ability to build and manage teams collaboratively across borders and agencies. \nWho Can Attend:\nOpen only to vetted InfraGard members.
URL:https://www.infragardnational.org/event/top-predictions-on-global-cybersecurity-risks-for-2024/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240322T083000
DTEND;TZID=America/Los_Angeles:20240322T123000
DTSTAMP:20260403T093742
CREATED:20240112T192632Z
LAST-MODIFIED:20240203T023150Z
UID:5053-1711096200-1711110600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Introduction to Global Espionage & Intelligence Services – Part 3: Israeli Intelligence
DESCRIPTION:Note: You will receive a Certificate in Intelligence Studies upon completion of all 6 classes.\nYou must be an Infragard member or Active Law Enforcement/Military to attend. \nThe “Certificate in Intelligence Studies” program offers a comprehensive and immersive exploration into the world of international espionage and intelligence. This certificate program\, led by a seasoned retired CIA (SIS) Senior Operations Officer who was the Chief of Station at the CIA’s iconic training facility\, provides participants with an in-depth understanding of the structures\, strategies\, methodologies\, and capabilities of the world’s leading intelligence agencies as well as adversarial agencies. \nEach class in the series is dedicated to examining the intelligence models of a specific country\, offering a unique perspective on how different nations approach espionage and security. We start with the structure of US Intelligence agencies in Part 1. Then from the historical evolution of British and Russian intelligence services to the modern-day tactics of Israeli\, Iranian\, Chinese\, and North Korean agencies\, this program covers a wide range of topics. Participants will gain insights into key concepts and terminologies in espionage\, such as HUMINT\, SIGINT\, and OSINT\, and explore the historical context and evolution of modern-day intelligence. \nCourse Outline:\nIntroduction to Israeli Intelligence\n• Historical evolution (British Mandate to Present)\n• Notable operations and methodologies\n• Espionage capabilities\n• Comparisons: Aman=DIA; Mossad=CIA; Shabak=FBI; Unit 8200=NSA\n• Aman (Military Intelligence Directorate)\n• Intelligence Corps: Unit 8200.\n• Shabak (Shin Bet)\n• The intelligence branch of the Israeli Police\n• Mossad (Institute for Intelligence and Special Tasks)\n• The Centre for Political Research \nWho Can Attend:\nOpen only to vetted InfraGard members. \nRegistration:\nSee weekly events email.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-introduction-to-global-espionage-intelligence-services-part-3-israeli-intelligence/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20240326T100000
DTEND;TZID=America/Denver:20240326T230000
DTSTAMP:20260403T093742
CREATED:20240307T155401Z
LAST-MODIFIED:20240307T155834Z
UID:5101-1711447200-1711494000@www.infragardnational.org
SUMMARY:IMA Webinar: Evolving Thread Landscape with William Largent
DESCRIPTION:March 26\, 2024\, 10:00 a.m. – 11:00 a.m. MST\nIMA Webinar: Evolving Thread Landscape with William Largent\nPresented by InfraGard Arizona \nCisco’s Talos team specializes in early-warning intelligence and threat analysis necessary for defending networks against the ever-changing threat landscape. In this talk\, we will cover how our team is built\, look at some interesting threats and exploits from —both cybercriminals and nation-state actors — take a look at the methods and techniques that both the attackers and defenders use to exploit or mitigate these attacks. We’ll take a dive into finding vulnerabilities and discuss how it helps every day defense\, and we will focus on the effects of big game hunting and the proliferation of dual-use tools and how to find anomalies and track threat actors. We’ll even save some time to field questions. \nPresenter:\nWilliam Largent\, VP-Cisco Talos \nWho Can Attend: \nOpen only to InfraGard members and their guests. \nRegistration:\nSee weekly email.
URL:https://www.infragardnational.org/event/5101/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240326T130000
DTEND;TZID=America/New_York:20240326T140000
DTSTAMP:20260403T093742
CREATED:20240222T161220Z
LAST-MODIFIED:20240222T161220Z
UID:5085-1711458000-1711461600@www.infragardnational.org
SUMMARY:Threat Assessment: An Overview of the Behavior-Based Approach to Preventing Targeted Violence
DESCRIPTION:For over 20 years\, the U.S. Secret Service National Threat Assessment Center (NTAC) has conducted research on the thinking and behaviors of those who commit acts of targeted violence in an effort to prevent future tragedies. This presentation will highlight relevant findings and recommendations from NTAC’s latest research\, Mass Attacks in Public Spaces: 2016-2020\, which indicates that targeted violence is preventable. Ensuring the safety of our communities is a responsibility that belongs to everyone. This presentation will also discuss how communities can use a multidisciplinary approach to identify\, assess\, and intervene with individuals exhibiting concerning or threatening behaviors. \nPresentation Agenda (Times and Speakers):\n1:00-1:10p – History and Mission of the U.S. Secret Service National Threat Assessment Center (NTAC)\n1:10-1:20p – NTAC research findings\, key implications\, and considerations from the analysis of targeted violence\n1:20-1:40p – The U.S. Secret Service threat assessment model\n1:40-1:50p – Available resources to facilitate targeted violence prevention initiatives\n1:50-2:00p – Questions and answers \nLearning Outcomes/Objectives: Upon completion of this webinar\, the attendee/student will be able to: \n\nDescribe targeted violence and the principles of behavioral threat assessment\nUnderstand the components of the U.S. Secret Service’s behavioral threat assessment model\nIdentify potential concerning behaviors and individuals who may pose a risk of engaging in targeted attacks\n\n\nRecognize behavioral indicators\, circumstances\, and situational factors of perpetrators of targeted violence\nBecome familiar with multidisciplinary risk management strategies and interventions used to mitigate the risk of harmful outcomes\n\nPresenter Information: \nKatie Lord\, Supervisory Domestic Security Strategist\, U.S. Secret Service\nKatie currently serves as a Supervisory Domestic Security Strategist (SvDSS) with the U.S. Secret Service National Threat Assessment Center (NTAC) where she oversees global outreach efforts\, and interfaces with community safety leaders to facilitate access to NTAC resources in furtherance of preventing targeted violence. In addition\, Ms. Lord conducts presentations and participates on consultations to support threat assessment programs\, as well as to offer guidance on individual complex threat cases. Ms. Lord has 20 years of experience with the Secret Service\, which includes supporting financial crime\, background\, protective intelligence\, and insider threat investigations. Prior to joining the U.S. Secret Service\, Ms. Lord developed management simulations and trained assessors at an international human resources company. \nWorkshop Accessibility:\nOpen only to vetted InfraGard members \nRegistration:\nPlease see weekly email.
URL:https://www.infragardnational.org/event/threat-assessment-an-overview-of-the-behavior-based-approach-to-preventing-targeted-violence/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240327T140000
DTEND;TZID=America/New_York:20240327T150000
DTSTAMP:20260403T093742
CREATED:20240301T154332Z
LAST-MODIFIED:20240301T154356Z
UID:5091-1711548000-1711551600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Changed Forever – Threats\, Consequences and Engineering-Grade Defenses
DESCRIPTION:March 27\, 2024\, 2:00 p.m. – 3:00 p.m. EST\nIMA Webinar Broadcast: Changed Forever – Threats\, Consequences and Engineering-Grade Defenses\nPresented by InfraGard National Capital Region \nA new threat report published by Waterfall Security Solutions shows that cyber-attacks with physical consequences went from a theoretical problem last decade to a very real problem this decade\, with attacks more than doubling annually for the last four years. In this webinar\, we review the attacks\, numbers\, and trends – that’s the bad news. And we look at a new development on the defensive side – the US DOE’s Cyber-Informed Engineering initiative\, bringing engineering-grade defenses to the table systematically for the first time. \nPresenter:\nAndrew Ginter\, VP Industrial Security\, Waterfall Security Solutions \nWho Can Attend: \nOpen to anyone. \nRegistration:\nClick to register
URL:https://www.infragardnational.org/event/5091/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240328T090000
DTEND;TZID=America/Los_Angeles:20240328T113000
DTSTAMP:20260403T093742
CREATED:20240321T145917Z
LAST-MODIFIED:20240321T145917Z
UID:5109-1711616400-1711625400@www.infragardnational.org
SUMMARY:IMA Webinar: Global Threat Update- A World of Wars
DESCRIPTION:The Israel-Hamas conflict intensifies in Rafah\, Gaza\, causing unexpected humanitarian crises. Houthis\, backed by Iran\, escalate tensions in the Red Sea\, impacting global trade and resulting in more casualties. Israel-Hezbollah war potentially threatens Lebanon. Ukraine awaits US aid; Europe increases support to prevent a larger Russia-NATO conflict. Sweden joins European alliance. South China Sea tensions rise. Sudan civil war worsens\, Haiti faces gang rule. Ecuador battles cartels\, Venezuela eyes Guyana invasion. The US faces growing terrorism threat and espionage. Global instability affects trade\, supply chains\, and finance. Hal Kempfer will discuss these issues’ implications for business\, infrastructure\, and national security. \nPresenter: \nGRIP \nWho Can Attend: \nOpen to anyone. \nRegistration: \nClick to register
URL:https://www.infragardnational.org/event/ima-webinar-global-threat-update-a-world-of-wars/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240329T130000
DTEND;TZID=America/New_York:20240329T140000
DTSTAMP:20260403T093742
CREATED:20240301T153425Z
LAST-MODIFIED:20240301T153425Z
UID:5090-1711717200-1711720800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: We Met Through InfraGard – Hacker and The Fed
DESCRIPTION:Former FBI Special Agent Chris Tarbell and former black hat hacker\, now security researcher\, Hector Monsegur met through InfraGard. However\, it was not the normal relationship formed at a local InfraGard meeting. Hector and Chris will tell their story of how they met and began a fruitful working relationship that has grown into a respecting friendship. From their opposing backgrounds\, they will talk about trends in cyber security\, events happening today\, and some solutions we all can use to strengthen our defenses against cybercriminals trying to victimize us. Hector and Chris will answer your questions about their story or cybersecurity matters. \nPresenters: \n\nPaul Szawranskyj\, Special Agent – Private Sector Coordinator\, FBI\nChris Tarbell\, Founding Partner at NAXO\nHector Monsegur\, Security Researcher\n\nWho Can Attend: Open only to vetted InfraGard members. \nRegistration: See weekly email.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-we-met-through-infragard-hacker-and-the-fed/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240409T080000
DTEND;TZID=America/New_York:20240412T170000
DTSTAMP:20260403T093742
CREATED:20240220T153643Z
LAST-MODIFIED:20240222T155200Z
UID:5083-1712649600-1712941200@www.infragardnational.org
SUMMARY:ISC West 2024
DESCRIPTION:ISC West is the leading comprehensive and converged security trade event in the U.S taking place April 9-12 (SIA Education@ISC: April 9-11 | Exhibit Hall: April 10-12) at the Venetian Expo in Las Vegas. \nAt ISC West\, network and connect with thousands of security and public safety professionals\, learn from the SIA Education@ISC Passport Program\, plus explore the latest technologies in Access Control\, Alarms & Monitoring\, and Video Surveillance\, while discovering emerging trends in Drones & Robotics\, Cybersecurity & Connected IoT\, Smart Home\, and more. InfraGard members can register for free using the link!\nRegister now: http://iscwest24.com/InfraGard
URL:https://www.infragardnational.org/event/isc-west-2024/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240409T113000
DTEND;TZID=America/Chicago:20240409T123000
DTSTAMP:20260403T093742
CREATED:20240404T190132Z
LAST-MODIFIED:20240404T190132Z
UID:5116-1712662200-1712665800@www.infragardnational.org
SUMMARY:IMA Webinar: Don't Be Outsmarted By Your Smart Car
DESCRIPTION:Next-generation vehicular communications have provided great advances in vehicle safety and passenger accessibility but have also introduced complex cybersecurity challenges. In this presentation\, we’ll explore advances brought about by next-generation vehicular platforms and highlight the need for a cybersecurity testing framework that quickly identifies vulnerabilities in advanced vehicular systems. \nSince modern vehicles rely heavily on radio frequency (RF) technologies\, we’ll examine several RF attack vectors including over the air updates and remote vehicle entry and understand the difficulty that these attacks represent. Finally\, we will discuss ongoing efforts within companies\, universities\, and government agencies to develop standards and regulations that will help to improve vehicular security in the future. \nPresenter: \n\nJason Cuneo\, Chief Technologist McCrary Center\, Auburn University\nBen McGee\, CEO Cyber Protex\n\nWho Can Attend:\nOpen to anyone. \nRegistration:\nClick to register.
URL:https://www.infragardnational.org/event/ima-webinar-dont-be-outsmarted-by-your-smart-car/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240410T140000
DTEND;TZID=America/New_York:20240410T153000
DTSTAMP:20260403T093742
CREATED:20240321T151551Z
LAST-MODIFIED:20240321T151835Z
UID:5110-1712757600-1712763000@www.infragardnational.org
SUMMARY:IMA Webinar: Managing Risk and Increasing Reliance for with AI-enabled Systems
DESCRIPTION:The accelerating adoption of AI-enabled systems by both organizations and their suppliers is increasing our threat surface in unprecedented ways. In this session\, we will: \n\nExamine real and regulatory risks associated with adopting AI-enabled systems.\nProvide an update on related regulatory and governance frameworks.\nProvide pragmatic recommendations for realizing the benefits of AI while managing to your risk posture.\n\nLearning Outcomes/Objectives:\nEducate participants on the unique and evolving vulnerabilities in cloud and on-prem AI-enabled systems. Provide experienced\, pragmatic recommendations for how to manage risks. \nPresenter: \n\nJodi Daniels\, Founder & CEO\, Red Clover\nChristina Liaghati\, PhD\, AI Strategy Execution & Operations Manager\, AI & Autonomy Innovation Center\, MITRE\nBenjamin Harbin\, Senior Manager\, DevSecOps\, Aflac\nTera Ladner\, VP\, Information Risk Management and Governance\, Aflac\n\nWho Can Attend:\nOpen to anyone. \nTarget Audience:\nSenior cyber defenders. \nRegistration: \nClick to register
URL:https://www.infragardnational.org/event/ima-webinar-managing-risk-and-increasing-reliance-for-with-ai-enabled-systems/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240411T083000
DTEND;TZID=America/Los_Angeles:20240411T110000
DTSTAMP:20260403T093742
CREATED:20240328T144233Z
LAST-MODIFIED:20240328T144346Z
UID:5111-1712824200-1712833200@www.infragardnational.org
SUMMARY:Persistent Mobile Device Threats and Propagation via Artificial Intelligence
DESCRIPTION:The objective of this course is to instruct and advise attendees on what types of persistent threats are out there targeting their mobile devices in order to 1). Take over financial accounts\, 2). Breach personal and/or business emails\, 3). Target the individual for a scam\, 4). Inject ransomware or conduct a full system takeover of their device to achieve all 4 objectives. Many of these techniques are now facilitated and aided by Artificial Intelligence. Attendees will learn about modern day scams facing businesses and individuals as well as mitigation strategies\, social engineering attacks and will finish off with several case studies. \nTopics: \n\nWhat is a mobile device threat and how does it affect me?\nBreakdown of different types of mobile device scams:\n\nSim swapping/hijacking\nPhishing texts and emails\nVhishing and Smishing\nMan-in-the-middle attack\nBluetooth and WiFi attacks\nDevice spoofing\nRansomware\n\n\nBest practices on securing your mobile device and its contents\nCurrent scams facing business and individuals and mitigation strategies\nSocial engineering attacks and defenses\nCase studies\n\nPresenter: \nSUBJECT MATTER EXPERT: A native of Eastern Tennessee\, SME is a Certified Information Systems Security Professional (CISSP®) and an Open Source Intelligence (OSINT) and investigations expert who specializes in SME is a former Navy Submarine Navigation Electronics Technician and transitioned into the private sector offering collaborative attitude and expertise to support a variety of organizations\, both public and private in implementing better cybersecurity. \nWho Can Attend:\nOpen to anyone. \nRegistration: \nClick to register \n 
URL:https://www.infragardnational.org/event/persistent-mobile-device-threats-and-propagation-via-artificial-intelligence/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240416T140000
DTEND;TZID=America/New_York:20240416T153000
DTSTAMP:20260403T093742
CREATED:20240222T163105Z
LAST-MODIFIED:20240222T163210Z
UID:5087-1713276000-1713281400@www.infragardnational.org
SUMMARY:FBI's Weapons of Mass Destruction Directorate's Community Medical Program
DESCRIPTION:The Medical Community Program was developed in response to the observed lack of understanding and recognition of a weapon of mass destruction (WMD) threat and/or incident\, to include chemical\, biological\, radiological\, nuclear\, and explosives (CBRNE). If a CBRNE attack occurs\, the first cases of illnesses/injuries may be initially diagnosed by medical community professionals. U.S. hospital workers and first responders are on the front lines for recognizing and detecting patient exposure to dangerous pathogens\, toxins\, chemicals\, or radiological materials. This program allows the FBI to partner with health care workers to plan for\, detect\, mitigate\, and respond to potential CBRNE threats or incidents within their community. \nWorkshop Accessibility:\nOpen only to vetted InfraGard members \nRegistration:\nSee weekly email.
URL:https://www.infragardnational.org/event/fbis-weapons-of-mass-destruction-directorates-community-medical-program/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240417T100000
DTEND;TZID=America/New_York:20240417T120000
DTSTAMP:20260403T093742
CREATED:20240216T154429Z
LAST-MODIFIED:20240216T154429Z
UID:5082-1713348000-1713355200@www.infragardnational.org
SUMMARY:Operationalizing a Data Privacy and Governance Program that Inspires Trust
DESCRIPTION:This session will feature an overview of the key components required to build and operationalize a privacy and governance program\, focusing on the following key areas: i) fundamentals of building a risk governance program; ii) understanding and responding to consumer rights under US privacy laws; iii) privacy enforcement and privacy litigation. Presenters will provide insights on best practices from a legal regulatory and compliance framework. \nPresentation Agenda (Times and Speakers): \n\nJustine Phillips (35-40 min.)\nBrian Hengesbaugh (35-40 min.)\nHelena Engfeldt (35-40 min.)\n\nLearning Outcomes/Objectives: Participants in this session will come away with a deeper understanding of how to operationalize a data privacy and governance program that inspires trust. Upon completion of this session\, participants will: \n\nBe able to define key terms related to building a data privacy and governance program\nBe able to outline key components required to implement a data privacy and governance program\nBe able to apply best practices as it relates to legal and information security teams working together within an organization responsible for building a data privacy and governance program\n\nWorkshop Accessibility:\nOpen only to vetted InfraGard members. \nPlease see weekly email for registration.
URL:https://www.infragardnational.org/event/operationalizing-a-data-privacy-and-governance-program-that-inspires-trust/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240425T140000
DTEND;TZID=America/New_York:20240425T150000
DTSTAMP:20260403T093742
CREATED:20240328T150236Z
LAST-MODIFIED:20240328T150541Z
UID:5113-1714053600-1714057200@www.infragardnational.org
SUMMARY:Artificial Intelligence Cross-Sector Council Launch: Bridging AI Innovations and National Security in the Digital Age: A Presentation of InfraGard National Members Alliance
DESCRIPTION:Discover the goals of InfraGard National’s new Artificial Intelligence Cross Sector Council (AI-CSC) in our inaugural webinar. Aligning with related Executive Orders (EOs) and addressing pivotal threats\, such as those outlined in the 2024 Annual Threat Assessment of the U.S. Intelligence Community\, this session delves into AI-CSC’s mission to harness AI for enhancing national security and operational resilience. Learn how we intend to navigate the challenges of digital exhaust data and evolving digital threats\, promoting a secure integration of AI technologies within critical infrastructure. This webinar will illuminate the AI-CSC’s strategy for fostering collaboration\, advancing predictive analytics\, and developing proactive defense mechanisms to safeguard national interests and ensure a secure future. This webinar will be led by Jodi Masters-Gonzales\, Chair of the AI-CSC. \nLearning Objectives: \n\nComprehend AI-CSC’s Mission within a National Security Context\nIdentify Challenges of Ubiquitous Technical Surveillance and Digital Authoritarianism\nStrategize Proactive Defense and Predictive Analysis in AI-CSC Initiatives\nEnhance Collaborative Defense through AI-CSC’s Framework\n\nWho can attend:\nOpen only to InfraGard Members. \nRegistration:\nSee weekly email.
URL:https://www.infragardnational.org/event/artificial-intelligence-cross-sector-council-launch-bridging-ai-innovations-and-national-security-in-the-digital-age/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240430T130000
DTEND;TZID=America/New_York:20240430T140000
DTSTAMP:20260403T093742
CREATED:20240328T150434Z
LAST-MODIFIED:20240328T150434Z
UID:5114-1714482000-1714485600@www.infragardnational.org
SUMMARY:Cyber Threats to the Nuclear Sector and the U.S. Nuclear Power Renaissance - A Presentation of InfraGard National Members Alliance - National Sector Security and Resilience Program
DESCRIPTION:From the power reactors that provide electricity to millions of Americans\, to the medical isotopes used to treat cancer patients\, the Nuclear Reactors\, Materials\, and Waste Sector covers most aspects of America’s civilian nuclear infrastructure. Join us for this insightful webinar as we cover threats to the nuclear sector and the U.S. nuclear power renaissance. Our featured speakers include: \n\nDr. Michael L. Cohen\, National Sector Chief\, Nuclear Sector\, InfraGard National Members Alliance\, and Principal Multi-Disciplinary Systems Engineer\, The MITRE Corporation\nDr. Eric P. Rubenstein\, President and CEO of Image Insight Inc. and a Commander in the U.S. Navy Reserve.\n\nDuring this session\, Dr. Rubenstein will discuss various cyber threat vectors to nuclear and critical infrastructure and methods to assess and mitigate them. Particular emphasis will be given to understanding attack surface and unusual or less visible threats\, and how such attacks can pivot to other systems. Dr. Cohen will then discuss how nuclear power can have a renaissance in the U.S. through the rapid deployment of Small Modular Reactors (SMRs) and Microreactors (MRs)\, which can provide safe\, secure\, reliable\, and carbon-free base load power for industrial and community consumers. \nWho can attend:\nOpen only to InfraGard members. \nRegistration:\nSee weekly email.
URL:https://www.infragardnational.org/event/cyber-threats-to-the-nuclear-sector-and-the-u-s-nuclear-power-renaissance-a-presentation-of-infragard-national-members-alliance-national-sector-security-and-resilience-program/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240502T083000
DTEND;TZID=America/Los_Angeles:20240502T113000
DTSTAMP:20260403T093742
CREATED:20240411T162334Z
LAST-MODIFIED:20240411T162334Z
UID:5120-1714638600-1714649400@www.infragardnational.org
SUMMARY:IMA Webinar: Introduction to Global Espionage & Intelligence Services Part 4-Iranian Security & Intelligence Mode
DESCRIPTION:Note: You will receive a Certificate in Intelligence Studies upon completion of all 6 classes. You must be an Infragard member or Active Law Enforcement/Military to attend. \nThe “Certificate in Intelligence Studies” program offers a comprehensive and immersive exploration into the world of international espionage and intelligence. This certificate program\, led by a seasoned retired CIA (SIS) Senior Operations Officer who was the Chief of Station at the CIA’s iconic training facility\, provides participants with an in-depth understanding of the structures\, strategies\, methodologies\, and capabilities of the world’s leading intelligence agencies as well as adversarial agencies. \nEach class in the series is dedicated to examining the intelligence models of a specific country\, offering a unique perspective on how different nations approach espionage and security. We start with the structure of US Intelligence agencies in Part 1. Then from the historical evolution of British and Russian intelligence services to the modern-day tactics of Israeli\, Iranian\, Chinese\, and North Korean agencies\, this program covers a wide range of topics. Participants will gain insights into key concepts and terminologies in espionage\, such as HUMINT\, SIGINT\, and OSINT\, and explore the historical context and evolution of modern-day intelligence. \nCourse Outline: Introduction to Iranian Intelligence \n\nHistorical evolution (British Mandate to Present)\nNotable operations and methodologies\nEspionage capabilities\nComparisons: MOIS=CIA; IRGC=FBI\nMinistry of Intelligence and Security (MOIS)\nIslamic Revolutionary Guard Corps Intelligence Organization (IRGC)\nCase Study: Story of recruitment operation against former Iranian Basij in Morocco\nNational Intelligence and Security Agency (SAVAMA)\nPost-Revolution service modeled on SAVAK\n\nPresenter: CTWatch \nWho Can Attend:\nOpen only to vetted InfraGard members. \nRegistration:\nSee weekly email.
URL:https://www.infragardnational.org/event/ima-webinar-introduction-to-global-espionage-intelligence-services-part-4-iranian-security-intelligence-mode/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240506
DTEND;VALUE=DATE:20240510
DTSTAMP:20260403T093742
CREATED:20231214T232900Z
LAST-MODIFIED:20231214T233714Z
UID:5037-1714953600-1715299199@www.infragardnational.org
SUMMARY:RSA Conference 2024
DESCRIPTION:  \nInfraGard Members: Unlock Exclusive RSAC 2024 Savings! \nJoin us May 6 – 9 at RSAC 2024\, the ultimate cybersecurity destination. Immerse yourself in expert-led sessions\, connect with industry leaders\, and discover the latest trends and best practices. Elevate your cybersecurity game and be a part of shaping the industry’s future. Don’t miss this opportunity to advance your skills and network with the best in the field. Learn more and register! \nhttps://www.rsaconference.com/usa?utm_source=assoc-
URL:https://www.infragardnational.org/event/rsa-conference-2024/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240507T083000
DTEND;TZID=America/Los_Angeles:20240507T173000
DTSTAMP:20260403T093742
CREATED:20240328T145553Z
LAST-MODIFIED:20240328T145553Z
UID:5112-1715070600-1715103000@www.infragardnational.org
SUMMARY:Cyber Defenders: Guardians of Critical Infrastructure @ RSA Conference 2023
DESCRIPTION:May 7\, 2023 @ 8:30 a.m. – 5:30 p.m.Cyber Defenders: Guardians of Critical Infrastructure @ RSA Conference 2023Moscone Center\, San Francisco\, CAA Signature Seminar of InfraGard National Members Alliance and RSA Conference \nInfraGard National Members Alliance and RSA Conference 2024 have partnered for the second year in a row to bring you Cyber Defenders\, an exclusive signature seminar. As declared by Executive Order 14028\, the United States and U.S. businesses face persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector\, the private sector\, and ultimately\, the American people’s security and privacy. \nDuring this free one-day seminar\, attendees will: \n\nReceive briefings from the FBI Cyber and Counterintelligence Divisions;\nExplore the new landscape of emerging cyber laws and regulations;\nLearn how to incorporate reasonable security into a defensible cyber program;\nUnderstand the key risks associated with credential management\, vendor and supply chain risk management\, and vulnerability and patch management;\nLearn how threat actors gain access to networks;\nHear case studies of cyber-attacks on U.S. critical infrastructure;\nParticipate in how-to sessions on building a modern incident response program; and\nParticipate as the jury in an innovative mock trial that places a CISO on the stand following a data breach.\n\n How to Attend: Click here to visit the Cyber Defenders page on the RSA web site. Click “Add to Favorites” to indicate that you plan on attending. Seating is on a first-come\, first-served basis. \nView the Agenda: Click here to view the full agenda and session descriptions. \nCost: Cyber Defenders is free for all RSA badge holders.
URL:https://www.infragardnational.org/event/cyber-defenders-guardians-of-critical-infrastructure-rsa-conference-2023/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240507T090000
DTEND;TZID=America/Los_Angeles:20240507T110000
DTSTAMP:20260403T093742
CREATED:20240411T163156Z
LAST-MODIFIED:20240411T163344Z
UID:5121-1715072400-1715079600@www.infragardnational.org
SUMMARY:IMA Webinar: FBI Quarterly: Exposed – FBI Case Studies of COVID-19 Fraud
DESCRIPTION:The unique circumstances created by the COVID-19 pandemic provided fraudsters with ample opportunities to exploit people’s vulnerabilities and led to an increase in fraud schemes. Fraudsters capitalized on people’s fear by offering fake remedies\, exploiting people’s desire for security and protection\, and exploited Government Assistance Programs by submitting fraudulent claims for benefits\, diverting funds intended for those in genuine need. \nTo combat the rise in fraud during the COVID-19 pandemic\, various measures were undertaken including enhanced law enforcement efforts. Law enforcement agencies increased their focus on identifying and prosecuting individuals and groups engaged in COVID-19-related fraud schemes. \nFor this webinar\, two FBI Special Agents will delve into the intricate details of two compelling case studies highlighting instances of COVID-19 fraud. These real-life scenarios will illustrate various forms of fraud that emerged during the pandemic\, the depth of deception\, and the profound impact such schemes have on individuals\, businesses\, and society. As we navigate the deceptions that occurred from COVID-19 fraud\, each case study serves as a poignant reminder to bolster resilience and fortify defenses against those who seek to exploit vulnerabilities for personal gain. \nPresenter:\nFBI \nWho Can Attend:\nOpen only to InfraGard members and their guests. \nRegistration:\nClick to register
URL:https://www.infragardnational.org/event/ima-webinar-fbi-quarterly-exposed-fbi-case-studies-of-covid-19-fraud/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240510T130000
DTEND;TZID=America/New_York:20240510T140000
DTSTAMP:20260403T093742
CREATED:20240411T164834Z
LAST-MODIFIED:20240412T151234Z
UID:5124-1715346000-1715349600@www.infragardnational.org
SUMMARY:InfraGard National Human Trafficking Cross-Sector Council Webinar Series: An Introduction to the Blue Campaign & Blue Lightning Initiative 
DESCRIPTION:A description of the DHS Center for Countering Human Trafficking by introducing attendees to the Blue Campaign and the Blue Lightning Initiative for continuing education purposes. \nLearning Outcomes/Objectives: \n\nBe reminded of the missions of the FBI/INMA Countering Human Trafficking and Forced Labor CSC.\nLearn about the DHS Blue Campaign.\nLearn about the Blue Lightning Initiative.\n\nPresenter Information: \nLisa Caselli\,  US Customs & Border Patrol \nWorkshop Accessibility:\nOpen to anyone \nRegistration:\nClick to register
URL:https://www.infragardnational.org/event/infragard-national-human-trafficking-cross-sector-council-webinar-series-an-introduction-to-the-blue-campaign-blue-lightning-initiative/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240516T090000
DTEND;TZID=America/Los_Angeles:20240516T113000
DTSTAMP:20260403T093742
CREATED:20240419T144117Z
LAST-MODIFIED:20240419T144920Z
UID:5126-1715850000-1715859000@www.infragardnational.org
SUMMARY:IMA Webinar: Global Threat Update-A World of Wars
DESCRIPTION:The world has become increasingly unstable as Iran has now formally attacked Israel\, destabilizing the Middle East in ways not seen in decades. At the same time\, the Israel-Hamas war is ongoing\, while new doubts have arisen over the fate of the Israeli hostages. The Houthis have been diminished but far from curtailed as they continue their attacks on international shipping. Russia maintains its offensive in Ukraine\, but Europe and the World are coalescing support for Kyiv in ways almost unimaginable two years ago. In addition\, the horrific terror attack in Moscow by ISIS-K has reminded everyone that threats from international terrorism are still very much real and present. Sudan’s horrific civil war continues\, while Haiti and Ecuador are facing significant violence and turmoil in the Western Hemisphere. Meanwhile the South China Sea and Far East are becoming increasingly strained as the prospect of a war in the region seems to grow every day\, resulting in our longtime alliances strengthening and new ones being proposed to counter the China threat. India is continuing to deal with border tensions with China as well\, but this is set in the extremely high altitudes of the Himalayas\, part of a longstanding area of conflict between these two nuclear powers. \nPresenter: \nRetired Marine Intelligence Officer and National Security Analyst Hal Kempfer\, regularly seen on both network and local television news\, will “unpack” this dangerous world of war\, conflicts\, terrorism\, espionage\, and a growing array of strategic risks. \nWho Can Attend:\nOpen to anyone \nRegistration:\nClick to register
URL:https://www.infragardnational.org/event/ima-webinar-global-threat-update-a-world-of-wars-presented-by-infragard-los-angeles/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240516T100000
DTEND;TZID=America/Los_Angeles:20240516T113000
DTSTAMP:20260403T093742
CREATED:20240412T154541Z
LAST-MODIFIED:20240412T155007Z
UID:5125-1715853600-1715859000@www.infragardnational.org
SUMMARY:The Black Axe: An Exclusive FBI Case Presentation on a Transnational Organized Crime and Money Laundering Ring
DESCRIPTION:**InfraGard National Members Alliance is an ASIS Preferred CPE Provider.\nThis webinar is eligible for 1.5 CPE credits. A certificate of attendance will be provided to attendees after the webinar.** \nJoin us for this exclusive webinar and get a behind-the-scenes look at how the FBI conducts criminal investigations\, from the initial receipt of a complaint all the way through to trial. Transnational organized crime and money laundering are two of the FBI’s top investigative priorities. With countless victims\, they pose serious threats to the national and economic security of the United States. This FBI case presentation provides an in-depth look at a multi-subject\, international fraud ring that was investigated by the FBI Tampa Division. The presentation will cover the many different schemes the subjects used to defraud victims and how they laundered money\, along with covering the trial of three of the main subjects as well as post-trial conspiracies (including a foiled murder-for-hire plot). Learning Objectives: 1. To understand how criminals launder money\, including how money laundering organizations are set up and how money launderers are recruited. 2. To understand how the FBI conducts a criminal investigation\, from initial receipt of complaint\, through all aspects of the investigation\, and ultimately through trial. 3. To understand the tactics bad actors use to identify potential victims and defraud those victims\, and to provide tips on how to protect yourself from falling victim to a scam. \nPresenter Bio:\nSupervisory Special Agent Andrew Sekela is currently assigned to FBIHQ in the Office of Private Sector where he serves as Program Manager for InfraGard. During his career\, SSA Sekela spent five years at the Washington Field Office (working public corruption and fraud investigations) and three years assigned to the International Corruption Unit at FBIHQ. SA Sekela then spent seven years at FBI Tampa as the supervisor for the white-collar crime squad and three years as the Private Sector Coordinator. \nWho Can Attend:\nInfraGard members only. \nRegistration:\nSee weekly email.
URL:https://www.infragardnational.org/event/the-black-axe-an-exclusive-fbi-case-presentation-on-a-transnational-organized-crime-and-money-laundering-ring/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240516T140000
DTEND;TZID=America/New_York:20240516T150000
DTSTAMP:20260403T093742
CREATED:20240503T152457Z
LAST-MODIFIED:20240503T154145Z
UID:5139-1715868000-1715871600@www.infragardnational.org
SUMMARY:IMA Webinar: Unveiling the Shadows: Understanding and Combating Human Trafficking
DESCRIPTION:Join us for a powerful and insightful webinar as we delve into the serious crime of Human Trafficking and what is being done to combat this crime. This webinar will shed light on the complexities of this crime\, how it is being fought\, and how individuals like yourself can help. We will have members of the Department of Homeland Security\, Truist Bank\, and The Knoble present a real-life case study. Together they will equip you with the knowledge and tools needed to make a difference in the fight against Human Trafficking. \nLearning Outcomes/Objectives: \n\nTo learn the scope of human trafficking activities in the US and its international ties.\nTo learn how to identify human trafficking related financial activity.\nGain knowledge on how to help victims after they have been recovered by law enforcement.\n\nPresenters: \n\nKelly Harrison\, Special Agent – Homeland Security Investigations (SA – HSI)\n\nSpecial Agent for Homeland Security Investigations in Atlanta\, GA. SA Harrison has vast experience working Human Trafficking matters from a federal law enforcement perspective.\n\n\nFreddy Massimi\, Sr. Financial Crimes Investigator – Truist Bank\nIan Mitchell\, Founder & Board Chair\, The Knoble\n\nWho Can Attend:\nOpen only to InfraGard members and their guests \nRegistration:\nSee weekly email.
URL:https://www.infragardnational.org/event/ima-webinar-unveiling-the-shadows-understanding-and-combating-human-trafficking/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240522T083000
DTEND;TZID=America/Los_Angeles:20240522T113000
DTSTAMP:20260403T093742
CREATED:20240419T144856Z
LAST-MODIFIED:20240419T144856Z
UID:5127-1716366600-1716377400@www.infragardnational.org
SUMMARY:IMA Webinar: Water Threats: Securing the Future of our Water Supply
DESCRIPTION:This dynamic and essential class\, titled “water threats: securing the future of our water supply” delves into the complexities of global water security and the innovative strategies necessary to safeguard our most precious resource. Over the course of 2.5 hours\, participants will engage with a mix of expert insights\, case studies\, and actionable strategies that highlight both the challenges and solutions in protecting water supplies amid growing demands and diminishing resources. This class is designed for critical infrastructure security professionals\, offering them the knowledge and tools needed to anticipate\, mitigate\, and respond to water-related security threats. \nKey topics to cover include: \n\nGlobal Water Crisis Overview: Understanding the scope and impact of water scarcity and pollution on a global scale.\nWater Wars and Geopolitics: Exploration of historical and current conflicts over water resources\, focusing on tensions between nations and within regions.\nSocietal Impacts of Water Scarcity: Discussing potential scenarios and consequences of severe water shortages\, including impacts on health\, economy\, and social stability.\nProtective Measures for Water Supply: Strategies for securing water infrastructure against natural disasters\, pollution\, and sabotage.\nInnovative Water Filtration and Conservation Technologies: An overview of cutting-edge solutions and practices for water purification\, conservation\, and recycling.\nPersonal and Professional Water Safety Tips: Practical advice for ensuring water safety and quality in both personal and professional settings.\nPolicy and Cooperation for Water Security: The role of international and local policies\, agreements\, and cooperation in ensuring sustainable water management and security.\n\nThis comprehensive class is not only an opportunity to learn from a subject matter expert in water filtration but also a platform to discuss and discover multifaceted approaches to water security that can be applied across industries and communities. \nPresenter:\nCTWatch \nWho Can Attend:\nOpen only to InfraGard members and their guests \nRegistration:\nSee weekly email.
URL:https://www.infragardnational.org/event/ima-webinar-water-threats-securing-the-future-of-our-water-supply/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240522T110000
DTEND;TZID=America/New_York:20240522T120000
DTSTAMP:20260403T093742
CREATED:20240509T190616Z
LAST-MODIFIED:20240509T191149Z
UID:5142-1716375600-1716379200@www.infragardnational.org
SUMMARY:IMA Webinar: Guardians of Democracy: Unveiling and Combatting Election Fraud
DESCRIPTION:Open to the public\, this webinar delves into the critical issues surrounding electoral integrity and election fraud\, as well as strategies to protect the cornerstone of our democracy. Learn about the latest challenges and solutions in maintaining free and fair elections. Whether you’re a concerned citizen\, a policy maker\, or an activist\, this discussion is crucial for anyone committed to upholding the sanctity of our electoral system. \nPresenters: \n\nSSA Brian Jacob\, FBI Albany: Brian Jacob is a Supervisory Special Agent at the Albany FBI Field Office.\nDevi Momot\, President\, InfraGard Albany Members Alliance\nGary Hoover\, Vice President\, InfraGard Albany Members Alliance\nJeff Wilson\, Secretary\, InfraGard Albany Members Alliance\nMike Britton\, Treasurer\, InfraGard Albany Members Alliance\n\nWho Can Attend:\nOpen to anyone \nRegistration:\n Register Here
URL:https://www.infragardnational.org/event/ima-webinar-guardians-of-democracy-unveiling-and-combatting-election-fraud/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240606T120000
DTEND;TZID=America/Chicago:20240606T131500
DTSTAMP:20260403T093742
CREATED:20240531T161320Z
LAST-MODIFIED:20240531T161451Z
UID:5147-1717675200-1717679700@www.infragardnational.org
SUMMARY:IMA Webinar: Evolving Security Threats and the 2024 Election
DESCRIPTION:Over the past decade\, threats to the security and integrity of U.S. elections have evolved. While foreign cyberattacks and influence campaigns still present significant risks to election infrastructure\, election workers themselves are now under attack as they face harassment and intimidation\, as well as attempts to interfere in the election process. Derek Tisler (Counsel\, Brennan Center for Justice) will discuss both longstanding and emerging election security threats\, how these threats may impact the 2024 election\, and what we can do to protect free and fair elections. \nPresenter:\nDerek Tisler\, Counsel at the Brennan Center for Justice’s Elections & Government Program \nWho Can Attend: \nOpen only to vetted InfraGard members \nRegistration:\nSee weekly email.
URL:https://www.infragardnational.org/event/5147/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240618T100000
DTEND;TZID=America/Los_Angeles:20240618T113000
DTSTAMP:20260403T093742
CREATED:20240411T155915Z
LAST-MODIFIED:20240411T155915Z
UID:5119-1718704800-1718710200@www.infragardnational.org
SUMMARY:IMA Webinar: Introduction to the North Korea’s Intelligence and Security Services (NKIS)
DESCRIPTION:Introduction to the North Korea’s Intelligence and Security Services (NKIS) and their worldwide support to the Kim Dynasty. This presentation is the third in a series of adversarial intelligence and security services presentations by Doc Morgan (AZ IMA): “Introduction to Russian Intelligence and Security Services” (Sep 2023) and the “Chinese Intelligence\, Security\, and Influence Operations” (Nov and Dec 2023). \nThe presentation provides a brief overview of North Korea’s regional presence\, history\, and the Kim Dynasty to set the stage for the NKIS discussion (missions\, organizations\, functions\, and tradecraft). The primary NKIS organizations included: Ministry of State Security; Ministry of Social Security; Reconnaissance General Bureau (RGB); and the Supreme Guard Command. The NKIS provides unique support on a global scale for NK’s Nuclear\, Missile\, Space\, and Cyber Operations despite massive UN and U.S. sanctions. The presentation discusses each of the operations. The RGB’s reorganization included a large investment in cyber espionage which begs the question; “in the case of NKIS\, are they cyber spies or cyber criminals?”. Join us for an informative and thought-provoking presentation. \nPresenter: \n\nDoc Morgan\, Intelligence\, Retired\n\nWho Can Attend:\nOpen only to vetted InfraGard members. \nTarget Audience:\nIntelligence. \nRegistration:\nSee weekly email.
URL:https://www.infragardnational.org/event/ima-webinar-introduction-to-the-north-koreas-intelligence-and-security-services-nkis/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240624T130000
DTEND;TZID=America/Chicago:20240624T143000
DTSTAMP:20260403T093742
CREATED:20240531T155716Z
LAST-MODIFIED:20240531T160405Z
UID:5145-1719234000-1719239400@www.infragardnational.org
SUMMARY:IMA Webinar: Economic Espionage: Behavioral Study on Employee Reporting of Insider Threat Incidents
DESCRIPTION:June 24\, 2024\, 1:00 p.m. – 2:30 p.m. CST\nIMA Webinar: Economic Espionage: Behavioral Study on Employee Reporting of Insider Threat Incidents\nPresented by InfraGard Chicago & MITRE Corporation \nMITRE Corporation\, a FFRDC research and development\, behavioral scientists conducted a sensitive behavioral experiment\, the first of its kind\, to derive a data-driven understanding of why employees do not report insider threat incidents. To accomplish this\, MITRE sent out a series of LinkedIn messages from a recruiter with ties to a foreign adversary to 300 employees at a medium size company. The LinkedIn messages were crafted from actual messages used by foreign adversaries. Followed-up by employee interviews\, MITRE leveraged the data and findings to evaluate assumptions about low reporting rates including perceptions of security reporting mechanisms\, concerns about anonymity\, fears about retaliation for reporting\, and expectations about responses from security after reporting. Based on that analysis\, the MITRE research team made evidence-based recommendations for how security awareness programs\, security reporting programs\, and Insider Threat/Risk Programs can improve employee reporting of insider threats at their organization. \nPresenter Information: \n\nDr. Deanna Caputo\, Chief Scientist for Insider Threat Capabilities\, The MITRE Corporation\nChristos Linardakis\, DIB Sector Chief\, InfraGard Chicago\n\nWho Can Attend: Open to anyone \nRegistration: Click to register
URL:https://www.infragardnational.org/event/ima-webinar-economic-espionage-behavioral-study-on-employee-reporting-of-insider-threat-incidents/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240627T130000
DTEND;TZID=America/New_York:20240627T140000
DTSTAMP:20260403T093742
CREATED:20240609T213956Z
LAST-MODIFIED:20240609T213956Z
UID:5149-1719493200-1719496800@www.infragardnational.org
SUMMARY:
DESCRIPTION:As cyber incidents escalate in number and severity\, so do the stakes for CISOs\, who must navigate the pressures of arguing for resourcing\, implementing robust cybersecurity measures\, and managing the aftermath of breaches. That role now comes with increased regulatory scrutiny and potential personal civil and criminal liability. In light of these heightened risks\, we will discuss why CISOs should insist on additional legal and contractual protections when evaluating positions\, such as indemnification clauses\, liability insurance\, and clear definitions of their roles and reporting responsibilities. We will also discuss emerging statutory and regulatory legal risks faced by CISOs and emphasize the crucial pre- and post-incident support provided by cyber counsel. Cyber counsel plays a vital role by providing the legal and regulatory basis that supports the CISO’s findings and needs in navigating compliance and risk management. Their expertise aids in mitigating legal risks\, ensuring that security measures align with legal standards. We will also discuss aligning statutory with standards-based compliance mapping\, the crucial distinction between “commercially reasonable” and “defensible” – and why CISO’s should be focused on the latter through effective documentation\, third-party audits\, and continuous regulatory adaptation. \nThis presentation will provide guidance for CISOs to better safeguard themselves while enhancing the organization’s overall cybersecurity posture. Join us to gain insights into navigating the increased scrutiny and legal liability that define the modern CISO’s role. \nPresenters:\nSteven Teppler\, Chief Cyber/Legal Officer\, Mandelbaum Barrett\nTom Scurrah\, VP Programs and Content\, CyberRisk Alliance \nWho Can Attend:\nOpen to anyone. Heads of Cyber\, CISOs\, and emerging cyber leaders will benefit most. Other roles that would benefit include cyber practitioners\, risk officers\, and cyber-law professionals. \nRegistration:\nClick to register
URL:https://www.infragardnational.org/event/5149/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20240709T083000
DTEND;TZID=America/Los_Angeles:20240709T123000
DTSTAMP:20260403T093742
CREATED:20240620T183738Z
LAST-MODIFIED:20240620T184127Z
UID:5159-1720513800-1720528200@www.infragardnational.org
SUMMARY:IMA Webinar: Introduction to Global Espionage & Intelligence Services - Chinese Intelligence Model
DESCRIPTION:Note: You will receive a Certificate in Intelligence Studies upon completion of all 6 classes. You must be an InfraGard member or Active Law Enforcement/Military to attend. \nThe “Certificate in Intelligence Studies” program offers a comprehensive and immersive exploration into the world of international espionage and intelligence. This certificate program\, led by a seasoned retired CIA (SIS) Senior Operations Officer who was the Chief of Station at the CIA’s iconic training facility\, provides participants with an in-depth understanding of the structures\, strategies\, methodologies\, and capabilities of the world’s leading intelligence agencies as well as adversarial agencies. \nThis course is an introductory overview of the Chinese intelligence and security services and its impact and influence on the world since rapprochement with the Nixon administration. The Chinese intelligence agencies are believed to operate differently from other espionage organizations by employing primarily academics or students who will be in their host country only a short time\, rather than spending years cultivating a few high-level sources or double agents. The use of non-traditional intelligence assets is codified in Chinese law\, which mandates that Chinese intelligence agencies “may ask relevant institutions\, organizations\, and citizens to provide necessary support\, assistance\, and cooperation”. Honey trapping and kompromat are also common tools of Chinese intelligence services. \nCourse Outline: Introduction of Key concepts and terminologies in espionage \n\nHUMINT; SIGINT; IMINT; MASINT; TELINT; OSINT\nHistorical context and evolution of modern-day intelligence\nDomestic; Foreign; Signals; Joint\n\nPresenter: CTWatch \nWho Can Attend: Open only to vetted InfraGard members. \nRegistration: See weekly email.
URL:https://www.infragardnational.org/event/5159/
END:VEVENT
END:VCALENDAR