1st: Lessons Learned from the Sandy Hook School mass murder. How the 911 system was overburdened with calls and prone to failure. Communications directly affecting the ability for first responders to be effective in their approach to a crisis. FirstNet, a nationwide broadcasting public safety network that was created in response to the 911 Commission […]
Events
Calendar of Events
|
Sunday
|
Monday
|
Tuesday
|
Wednesday
|
Thursday
|
Friday
|
Saturday
|
|---|---|---|---|---|---|---|
|
0 events,
|
1 event,
-
|
1 event,
-
We invite you to attend our 2021 Cyber Summit, bringing together cyber professionals from around the country for two days of engaging content plus a capture the flag event. This year's summit is virtual, via the Whova app, with 4 keynote speakers and 40 presenters covering topics across 5 educational tracks. Most speakers will be […] |
2 events,
-
Business Email Compromise (BEC) continues to be a persistent threat to individuals and organizations. Throughout the years, malicious campaigns evolve into sophisticated business operations. Understanding the mindset of the threat actor, the use of the unique domain registrations, and a reliance on social engineering will provide the necessary knowledge to avoid falling for scams. […]
-
This briefing will specifically provide an overview on the ransomware threat, including recent trends and statistics on infections in the FBI Boston region. The briefing will conclude with an overview on how the FBI investigates ransomware infections and recent successes. Successful cyberattacks on healthcare entities are steadily increasing. Sophisticated criminals and nation states are focusing […] |
1 event,
-
What does modern mean to a CIO or CDO or SysAdmin? Does it mean the same thing? What about prioritizing technical debt or transformational projects-- how does one both define the problem and justify a modern solution to a variety of characters? At Okta, we exist architecturally at the center of several perspectives of "modern". […] |
0 events,
|
0 events,
|
|
0 events,
|
0 events,
|
0 events,
|
2 events,
-
Cyber risk assessments form the foundation of an organization’s risk mitigation strategy by not only developing organizational cybersecurity awareness, but also by identifying an organization’s unique vulnerabilities. The presenter will provide a brief overview of sources of risk (third parties, IoT, hacking, phishing) and sobering data regarding the average impact of a cyber attack. Companies […]
-
You’ve decided you want to be a CISO or a CIO. Now what? What certifications will you need, and where can you obtain them? What does a CISO, or CIO actually do all day? If you wish to one day become a technology leader, this is the session you will need to begin designing your […] |
1 event,
-
InfraGard Los Angeles and CTWatch, Inc. present Advanced IED Recognition Course. IED’s have evolved over the past 15 years from crude pipe bombs to increasingly sophisticated devices. Both private and public entities need to keep up with the evolution of IED’s, responses and protocols. The briefing objectives are: 1). Raise awareness to new tactics currently […] |
0 events,
|
0 events,
|
|
0 events,
|
0 events,
|
2 events,
-
InfraGard Los Angeles and CTWatch, Inc. present Open Source Intelligence (OSINT) LEVEL 5 - OSINT Dissemination. Building on Levels 1 to 4, this course is the capstone to the 6 Levels of OSINT series. During this course, we will examine Intelligence collection and capture techniques then transition into the OSINT Lifecycle. The course is topped […]
-
Join us to learn more about this new Security Architecture and how your company can take advantage of it. The presenters will cover both technical concepts and practical advice on Zero Trust Architecture. Presenters: Andy Crocker, Manager, Technical Partner Managers, Fortinet Andy Crocker has spent nearly 4 decades in the IT world and experienced […] |
1 event,
-
Building a resilient organization that can withstand a cyber intrusion goes beyond compliance and notification requirements. Cyber criminals can bring an organization’s operations to a halt with a single ransomware virus, leaving it without the financial means to meet payroll, deliver client services, or even pay for the necessary breach response services to revert its […] |
1 event,
-
Hamilton County Sheriffs Office Regional Electronics and Computer Investigations (RECI) Unit Product Security Incident Response, Vulnerability Handling, and the CVD Challenge. Objectives: Sergeant Dave Ausdenmoore of the HCSO will introduce some of the resources and assets the RECI uses, including tracking or other types of electronic surveillance and analysis for law enforcement agencies in southwest […] |
0 events,
|
0 events,
|
|
0 events,
|
0 events,
|
0 events,
|
4 events,
-
In early 2020, hackers secretly broke into Texas-based SolarWind's systems and added malicious code into the company's software system. The system, called "Orion," is widely used by companies to manage IT resources and has 33,000 customers that use Orion, according to SEC documents. Most software providers regularly send out updates to their systems, whether it's […]
-
Emerging trends and threats against the U.S. Defense Industrial Base: How small-to-medium size enterprises (SMEs) can protect themselves. The SolarWinds supply chain attack is just one in a string of threats against the U.S. and its critical infrastructures. The U.S. DIB and its supply chain are prime targets for criminals and securing the supply-chain is […]
-
Join us and learn about the differences in Intellectual Property crimes, the elements of Trade Secrets and the relationship between investigators and rights holders in IP cases. A case example will be included! Presenters: Jennifer French, Supervisory Special Agent FBI FBI Supervisory Special Agent Jennifer French is assigned to the National Intellectual Property Rights Coordination […] |
0 events,
|
1 event,
-
This Webinar will cover Severe Storm Developments, 2021 Hurricane Season, Droughts, Fire Weather Season, Flooding Impacts, Tornadic Activity, Watches/Warnings/Advisory guidance, and applications available to the general public and emergency response officials. Our presenter, Ms. Wescott is not affiliated with the National Weather Service, National Oceanic and Atmospheric Administration, or the National Hurricane Center but is […] |
0 events,
|
|
0 events,
|
0 events,
|
1 event,
-
InfraGard Los Angeles and CT Watch, Inc. present Supervisory Control & Data Acquisition (SCADA) & Industrial Control Systems (ICS) Vulnerabilities Webinar. ***There are 4.5 ASIS credits available for this course COURSE OVERVIEW: According to the Cybersecurity and Infrastructure Security Agency (CISA), there are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or […] |
1 event,
-
Tyler Reguly, Manager Security R&D, VERT will discuss risk and prioritization in the environment including the value of CVSS and other metrics. Craig Young, Principal Security Researcher : Will give us a glimpse into the tools and techniques utilized by security researchers when investigating new vulnerabilities. Presenters: Tyler Reguly, Manager of Security Research with Tripwire […] |
3 events,
-
Besides the FBI - Who can you call? We have presenters from the MA State Police, NH CISA and the Secret Service. Please join us to meet some other agencies - what they do and how they protect us. Sgt. Brian Gavioli from the Massachusetts State Police Commonwealth Fusion Center will provide an overview of […]
-
Over a dozen CISOs recently contributed to developing a framework designed to be a powerful tool to build, manage, and scale a third-party risk management program. The foundation of this framework consists of a set of guiding principles identified by members, which are critical to a successful third-party risk management program. The tool presents these […]
-
Over the years, the Internet crime landscape has broadened from non-delivery schemes and credit card fraud to ransomware and data breaches costing both individuals and businesses millions of dollars each year. The Internet Crime Complaint Center (IC3) is the FBI's reporting mechanism for suspected Internet facilitated criminal activity. Agents and Analysts pour through hundreds thousands […] |
0 events,
|
0 events,
|
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
1 event,
-
InfraGard Los Angeles and GRIPSA present Violent Extremism Awareness and Prevention (VEAP). This course is designed to provide the knowledge and tools to recognize and understand the indicators and warning of violent extremist beliefs, groups, communications and activities, with an aim for providing proactive reporting to the proper authorities in order to thwart dangerous plots […] |
3 events,
-
We have brought together some top experts to present on and demonstrate the broad range of threats orchestrated by criminal enterprises in 2021. The agenda for this event is as follows: 1.) Presentation on active cyber-criminal threat groups by Mandiant 2.) Panel discussion on cyber-criminal threats facing companies/organizations 3.) Overview of Western Hemisphere Transnational Organized […]
-
This is going to be a truly exciting and special event. Sponsored by Google Cloud Security and in conjunction with DriveOhio: Autonomously Changing the Driving World: Our Roads and Transportation Reimagined & Secured - Autonomous, Connected, & Electric Vehicle Technology: To register and learn more about the event please visit: https://lnkd.in/eraZhPH Objectives: 1. Next generation […]
-
As part of our June webinar focusing on criminal threat training, we are offering a Financial Services Sector virtual breakout panel discussion on the future of cryptocurrency and associated risks, regulatory issues from recent advanced persistent threat (APT) events, and the shifting of attack channels. Objectives: Upon completion of this webinar, the attendee will be […] |
0 events,
|