BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//InfraGard National Members Alliance - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.infragardnational.org
X-WR-CALDESC:Events for InfraGard National Members Alliance
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20200308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20201101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20210314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20211107T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20220313T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20221106T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20200308T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20201101T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20210314T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20211107T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20220313T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20221106T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210505T090000
DTEND;TZID=America/New_York:20210505T100000
DTSTAMP:20260407T121056
CREATED:20210426T150829Z
LAST-MODIFIED:20210426T150829Z
UID:4025-1620205200-1620208800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Exposing & Mitigating Cyber Vulnerabilities
DESCRIPTION:Cyber risk assessments form the foundation of an organization’s risk mitigation strategy by not only developing organizational cybersecurity awareness\, but also by identifying an organization’s unique vulnerabilities. The presenter will provide a brief overview of sources of risk (third parties\, IoT\, hacking\, phishing) and sobering data regarding the average impact of a cyber attack. Companies must leverage every resource available to establish a layered and proactive defense. The biggest cyber threat to an organization often lies between the chair and the keyboard\, hence the human element is an important part of the cyber equation.\nEducating staff via cyber hygiene training can turn employees from “cyber liabilities” to “vigilant proactive deterrents” against cyber-attacks. Coupled with technology solutions\, an organization that employs a holistic enterprise-wide cybersecurity framework is best positioned to withstand the evolving range of cyber threats. \n  \nObjectives: \nIdentify sources of risks\nRisk strategy\nCyber hygiene training\nTechnology solutions \n  \nPresenters: \nAndres Franzetti\, CEO Risk Cooperative\nMr. Franzetti leads the firm’s overall strategy execution and business operations. He works closely with industry partners\, and leaders to ensure that Risk Cooperative remains at the cutting edge of the risk and insurance industry. \nJennifer Rothstein\, Director NY Metro Infragard/Business Development Head\, Cyber Insurance & Legal at BlueVoyant\nJennifer is the Business Development Head\, Cyber Insurance & Legal\, for BlueVoyant\, a cybersecurity investigation company headquartered in New York City. She also founded and serves as the President of Women in Cyber Leadership Corp. \nWho can attend:\nOpen to anyone. Particularly suited to Business and I.T. professionals seeking to improve their Risk Mitigation Strategies\, knowledge of sources of risk\, and cyber hygiene training across all sectors. The session will include practical tips as well as the opportunity to take a survey to identify any gaps in your organization or even your own understanding. \n  \nRegistration: \nhttps://us02web.zoom.us/webinar/register/WN_3MF1kJMtQ0SQVgt6LjEjUw
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-exposing-mitigating-cyber-vulnerabilities/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210505T113000
DTEND;TZID=America/Chicago:20210505T130000
DTSTAMP:20260407T121056
CREATED:20210503T174704Z
LAST-MODIFIED:20210503T174704Z
UID:4031-1620214200-1620219600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Career Designs for CISOs and CIOs
DESCRIPTION:You’ve decided you want to be a CISO or a CIO. Now what? What certifications will you need\, and where can you obtain them? What does a CISO\, or CIO actually do all day? If you wish to one day become a technology leader\, this is the session you will need to begin designing your own career as a member of a C-Suite. To prepare you for the role we will cover the following. \nPresenters: \nGordon Rudd\, CEO\, Stone Creek Coaching\nGordon has coached CISOs & CIOs for the last 15 years. Gordon’s career includes IT\, cybersecurity\, building high-performance teams and coaching CISOs and the organizations they serve. \nWho should attend:\nOpen to anyone. If you are a CISO or someone aspiring to be a CISO\, this must-attend deep dive. Background in information security or cybersecurity helpful but not required \nRegistration: \nhttps://onenet.zoom.us/meeting/register/tJIsf-2gqT4rGNBaVF8jZzW-kg7TzTH0tRUf
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-career-designs-for-cisos-and-cios/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20210506T090000
DTEND;TZID=America/Los_Angeles:20210506T130000
DTSTAMP:20260407T121056
CREATED:20210409T145120Z
LAST-MODIFIED:20210409T145120Z
UID:4013-1620291600-1620306000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Advanced Improvised Explosive Device (IED) Recognition Course
DESCRIPTION:InfraGard Los Angeles and CTWatch\, Inc. present Advanced IED Recognition Course. IED’s have evolved over the past 15 years from crude pipe bombs to increasingly sophisticated devices. Both private and public entities need to keep up with the evolution of IED’s\, responses and protocols. The briefing objectives are:\n1). Raise awareness to new tactics currently utilized by terrorists (foreign and domestic) and criminals in the use of various types of IED’s\n2). How Suspicious Activity Reporting (SAR) works\,\n3). Pre-Incident Indicators (PII’s) and identification of a potential device for private and public sector security personnel\n*This course is eligible for 4 ASIS CPE credits \nObjectives:  \n1. History of IED use against civilian targets (soft targets).\n2. Recent case studies (from Aliso Viejo package bomb to the Houston TX serial bomber)\n3. Types of IED’s from large vehicle IEDs\, use of drones to deliver IED’s to personal implanted IED’s .\n4. Recognition of various types of IEDs.\n5. Response protocols (Do’s and Don’ts). \n  \nPresenters: \nKevin Miles\, CT Watch\, Inc. \nMr. Miles retired from the Federal Bureau of Investigation (FBI) after 23 years as a Special Agent Bomb Technician (SABT). For the past 3 years\, he has been teaching pre-and post- blast investigation techniques as a government contractor. \n  \nWho can attend:  \nOpen to anyone. \n  \nRegistration: \nhttps://attendee.gotowebinar.com/register/7674724616772217099
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-advanced-improvised-explosive-device-ied-recognition-course/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20210511T090000
DTEND;TZID=America/Los_Angeles:20210511T130000
DTSTAMP:20260407T121056
CREATED:20210409T143307Z
LAST-MODIFIED:20210409T143307Z
UID:4011-1620723600-1620738000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Open Source Intelligence (OSINT) Level 5 – OSINT Dissemination
DESCRIPTION:InfraGard Los Angeles and CTWatch\, Inc. present Open Source Intelligence (OSINT) LEVEL 5 – OSINT Dissemination. Building on Levels 1 to 4\, this course is the capstone to the 6 Levels of OSINT series. During this course\, we will examine Intelligence collection and capture techniques then transition into the OSINT Lifecycle. The course is topped off with a discussion about report writing for a variety of audiences.*This course is eligible for 4 ASIS CPE credits* \nTOPICS:\n1. Collecting\, Capturing\, and Storing Intelligence\n2. OSINT Lifecycle\n3. Report Writing\na. Government Audience\nb. Managerial Audience\nc. Practitioner Audience \n  \nPresenters: \nCT Watch\, Inc. \nSME is an Open-Source Intelligence (OSINT) and investigations expert specializing in assessing public information for evaluating external risks\, finding missing persons\, threat modeling\, and operations security. \n  \nWho can attend: \nOpen to anyone. Particularly aimed toward InfraGard Members\, Public Safety (Law/Health/Fire)\, Terrorism Liaison Officers (TLO’s)\, Infrastructure Liaison Officers (ILO’s)\, Private Sector Security\, Area Stakeholders\, all Critical Infrastructure Sectors\, Intelligence Analysts\, Intelligence Officers and Private Investigators. \n  \nRegistration: \nhttps://attendee.gotowebinar.com/register/7208360162757814797
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-open-source-intelligence-osint-level-5-osint-dissemination/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210511T113000
DTEND;TZID=America/Chicago:20210511T130000
DTSTAMP:20260407T121056
CREATED:20210416T144526Z
LAST-MODIFIED:20210416T144732Z
UID:4018-1620732600-1620738000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: The Elements of Zero Trust Networks
DESCRIPTION:Join us to learn more about this new Security Architecture and how your company can take advantage of it. The presenters will cover both technical concepts and practical advice on Zero Trust Architecture. \n  \nPresenters:  \nAndy Crocker\, Manager\, Technical Partner Managers\, Fortinet\nAndy Crocker has spent nearly 4 decades in the IT world and experienced major changes and advances in technology and cyber security. Andy has been at Fortinet for almost 6 years. \nAndy Ruz\, Director of Information Security\, NovoPayment \nAndy Ruz is an Executive with over 20 years of Global experience in IT and Information Security. He has an MBA in MIS\, a Bachelor’s in computer science and seven certificates in Information Technology Management and Information Security. \n  \nWho can attend:  \nOpen to anyone. \n  \nRegistration: \nhttps://attendee.gotowebinar.com/register/7803314700993439245 \n 
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-the-elements-of-zero-trust-networks-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210512T090000
DTEND;TZID=America/New_York:20210512T100000
DTSTAMP:20260407T121056
CREATED:20210426T151314Z
LAST-MODIFIED:20210507T181419Z
UID:4026-1620810000-1620813600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Your Strategy for Recovery
DESCRIPTION:Building a resilient organization that can withstand a cyber intrusion goes beyond compliance and notification requirements. Cyber criminals can bring an organization’s operations to a halt with a single ransomware virus\, leaving it without the financial means to meet payroll\, deliver client services\, or even pay for the necessary breach response services to revert its systems back online. Understanding the financial impact an organization can withstand is crucial to building cyber resilience. Equally as important is understanding the value of its data or potential reputational /revenue implications that often accompany a cyber incident. Companies need a robust cyber mitigation and response strategy to effectively manage a range of cyber crisis scenarios and maintain operational continuity. This session will review insurance coverages\, crisis management strategies\, and the importance of board/leadership oversight. \nPresenters: \nAndres Franzetti\, CEO and Co-founder\nAndres specializes in helping multi-national organizations address complex risks to increase their overall resiliency and mitigate downside exposures. He has extensive expertise in program development and launched a cyber warranty program. \nJennifer Rothstein\, Business Head\, Cyber Insurance & Legal\, BlueVoyant & Founder and President\, Women in Cyber Leadership\nJennifer is the Business Development Head\, Cyber Insurance & Legal\, for BlueVoyant\, a cybersecurity investigation company headquartered in New York City. She also founded and serves as the President of Women in Cyber Leadership Corp. \n  \nWho can attend:\nOpen to anyone. \n  \nRegistration: \nhttps://us02web.zoom.us/webinar/register/WN_dQJUjL1pQCSPpE4KpJi1Zg
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-your-strategy-for-recovery/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210513T123000
DTEND;TZID=America/New_York:20210513T143000
DTSTAMP:20260407T121056
CREATED:20210511T003439Z
LAST-MODIFIED:20210511T003439Z
UID:4047-1620909000-1620916200@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Product Security Incident Response & Vulnerability Handling - Electronics & Computer Investigations
DESCRIPTION:Hamilton County Sheriffs Office Regional Electronics and Computer Investigations (RECI) Unit Product Security Incident Response\, Vulnerability Handling\, and the CVD Challenge. \nObjectives: \nSergeant Dave Ausdenmoore of the HCSO will introduce some of the resources and assets the RECI uses\, including tracking or other types of electronic surveillance and analysis for law enforcement agencies in southwest Ohio\, as well as their forensic and investigative assistance. Background information about RECI can be found at https://www.hcso.org/enforcement/ \nFour speakers from Intel Corp. will lead a discussion about product security incident response\, vulnerability handling\, and the CVD challenge. \nPresenters: \nDr. Amit Elazari\, Director\, Global Cybersecurity Policy\nLecturer at UC Berkeley’s School of Information Master in Information and Cybersecurity and the External Advisory Committee for the Center of Long Term Cybersecurity. She holds a Doctoral Degree in the Law (J.S.D.) from UC Berkley. \nKatie Noble\, Director of PSIRT and Bug Bounty\nLeads the cybersecurity vulnerability Bug Bounty program\, researcher outreach\, and strategic planning efforts. Prior to joining Intel\, Katie served as the Section Chief of Vulnerability Management and Coordination at the DHS and CISA. \nAlexander Romero\, Director at Intel PSIRT\nDefense Digital Service where he helped to champion the first ever “Hack the Pentagon” bug bounty program in the Federal Government along with expanding the first ever Vulnerability Disclosure Program for the DOD. \nJosh Dembling\, Senior Director of the Intel Product Security Incident Response Team (PSIRT) and Bug Bounty Program\nOver a span of three decades he has led organization transformations while at Intel\, IBM and Motorola. Josh specializes in product security\, vulnerability response management\, Bug Bounty programs and security researcher outreach. \nWho should attend:\nInfraGard members and their guests involved with all sectors will benefit from these presentations\, but especially those in InfraGard sectors such as Critical Manufacturing\, Energy\, Financial Services\, Healthcare & Public Health\, Information Technology\, and Transportation Systems. \nRegistration:\nSee events email.
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-product-security-incident-response-vulnerability-handling-electronics-computer-investigations/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210519T100000
DTEND;TZID=America/Chicago:20210519T110000
DTSTAMP:20260407T121056
CREATED:20210514T145451Z
LAST-MODIFIED:20210514T145451Z
UID:4050-1621418400-1621422000@www.infragardnational.org
SUMMARY:SolarWinds Breach- Is It Over Yet? IOC / Tactics\, Techniques\, & Procedures
DESCRIPTION:In early 2020\, hackers secretly broke into Texas-based SolarWind’s systems and added malicious code into the company’s software system. The system\, called “Orion\,” is widely used by companies to manage IT resources and has 33\,000 customers that use Orion\, according to SEC documents. \nMost software providers regularly send out updates to their systems\, whether it’s fixing a bug or adding new features. SolarWinds is no exception. Beginning as early as March of 2020\, SolarWinds unwittingly sent out software updates to its customers that included the hacked code. \nThe code created a backdoor to customer’s information technology systems\, which hackers then used to install even more malware that helped them spy on companies and organizations. \nTo keep you on top of the evolving cyber challenges and ways to ensure your organization is more cyber resilient\, we offer our latest opportunity engage in a vendor agnostic setting by bringing forward the industry leaders to share their insights & advice. \nDiscussion Topics That We Will Cover: \n• SolarWinds Breach Overview- Who\, What\, When\, Where \,Why \,& How\n• IOC / Tactics\, Techniques & Procedures (TTP)\n• Actionable Steps To Improve Online Safety and Security\nSpeaker\nCharles J. George CISSP – First Maridian \nModerator:\nRachel Arnold – SecureNation \nPresenters: \nCharles George CISSP\, President / First Maridian\nCharles is the founder of First Maridian LLC\, with Headquarters in Covington\, LA. He is very active in the local cybersecurity community and is a Certified Information Systems Security Professional (CISSP).\n\nWho can attend:\nOpen to anyone. \nRegistration:\nhttps://attendee.gotowebinar.com/register/6508750810447087116
URL:https://www.infragardnational.org/event/solarwinds-breach-is-it-over-yet-ioc-tactics-techniques-procedures/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210519T130000
DTEND;TZID=America/New_York:20210519T140000
DTSTAMP:20260407T121056
CREATED:20210507T180140Z
LAST-MODIFIED:20210507T180140Z
UID:4042-1621429200-1621432800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: All About Intellectual Property Rights and Theft of Trade Secrets
DESCRIPTION:Join us and learn about the differences in Intellectual Property crimes\, the elements of Trade Secrets and the relationship between investigators and rights holders in IP cases. A case example will be included! \nPresenters: \nJennifer French\, Supervisory Special Agent FBI\nFBI Supervisory Special Agent Jennifer French is assigned to the National Intellectual Property Rights Coordination Center. \nWho can attend:\nOpen to anyone. \nRegistration:\nhttps://attendee.gotowebinar.com/register/8562791363205145871
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-all-about-intellectual-property-rights-and-theft-of-trade-secrets/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210519T130000
DTEND;TZID=America/New_York:20210519T140000
DTSTAMP:20260407T121056
CREATED:20210517T220133Z
LAST-MODIFIED:20210517T220133Z
UID:4060-1621429200-1621432800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: It's Not About You: 3rd Party & Supply Chain Risk for Financial Services in a Post-SolarWinds World
DESCRIPTION:InfraGardNCR\, the American Bar Association\, and the Financial Services Information Sharing and Analysis Center (FS-ISAC) have partnered to bring you this webinar. \nFinancial institutions spend time and money to strengthen their internal cyber defenses\, but there are limitations when dealing with third party suppliers and providers of services. Recent high-profile incidents have highlighted the potential risks and threats posed by the compromise of a third party. FS-ISAC’s financial services members regularly deal with these considerations and will review how the sector responded (and learned) from these third party incidents. \nObjectives: \nThe webinar will provide awareness of how your footprint can be affected by other companies’ incidents\, recommendations on how to adjust your defensive posture\, and ideas on how to work with your peers who are affected by the same third party compromise. \nAfter the webinar\, attendees should know more about how communities of trust can provide perspective on major incidents\, best practices to help mitigate against impact\, and lean on each other for support. \nPresenters: \nDenyette DePierro\, Vice President & Senior Counsel\, ABA\nAs regulatory counsel in ABA’s Office of Operational Risk and Cybersecurity\, I focus on the question “How will banking and technology evolve in a changing digital infrastructure?”\nhttps://www.linkedin.com/in/depierro/ \nSteven Silberstein\, CEO\, FS-ISAC\nhttps://www.linkedin.com/in/silberstein/ \nTeresa Walsh\, Global Head of Intelligence\nExperienced Intelligence Officer with a demonstrated history of working in the financial services industry. Skilled in Strategic Development\, People Management\, Intelligence Analysis\, Analytical Skills\, Government\, Intelligence\, and Operational Intelligence. Strong military and protective services professional graduated from University of Missouri. https://www.linkedin.com/in/teresa-w-9b068130/ \n  \nWho Should Attend:  \nOpen to anyone. Particularly aimed toward professionals who are responsible for 3rd party and supply chain risk in their companies/organizations\, especially those in the financial services sector. \nRegistration: \nhttps://fsisac.zoom.us/webinar/register/WN_8Ze3EGBpTQOo-JdFOeezsw \n 
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-its-not-about-you-3rd-party-supply-chain-risk-for-financial-services-in-a-post-solarwinds-world/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210519T130000
DTEND;TZID=America/Chicago:20210519T143000
DTSTAMP:20260407T121056
CREATED:20210430T151448Z
LAST-MODIFIED:20210430T151448Z
UID:4028-1621429200-1621434600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Emerging Trends and Threats Against the U.S. Defense Industrial Base
DESCRIPTION:Emerging trends and threats against the U.S. Defense Industrial Base: How small-to-medium size enterprises (SMEs) can protect themselves. \nThe SolarWinds supply chain attack is just one in a string of threats against the U.S. and its critical infrastructures. The U.S. DIB and its supply chain are prime targets for criminals and securing the supply-chain is critical to our national security. SMEs must not only have defensive skills\, but just as important\, the offensive skills to prevent such attacks. \nJoin us for a panel discussion on how several U.S. agencies are addressing these threats and other economic threats\, along with recommendations and resources you can take away and apply to your own business. \nPresenters:  \nKiesha Downs\, Chief\, Trade Regulations Branch – U.S. Census Bureau\nGerard (Gerry) Horner\, Supervisor Trade Regulations Branch\, U.S. Census\nLaszlo Gonc\, Founder/ECO Next Era Transformation Group\, LLC\nSarah Bauer\, Senior Intelligence Officer\, NCIS \nWho Should Attend:\nDefense Industrial Base Sector or those individuals interesting in securing both offensive and defensive threats to your company’s supply chain. Open to anyone. \n\nRegistration:\nhttps://attendee.gotowebinar.com/register/1847815466730264843 \n 
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-emerging-trends-and-threats-against-the-u-s-defense-industrial-base/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210521T100000
DTEND;TZID=America/New_York:20210521T120000
DTSTAMP:20260407T121056
CREATED:20210514T144632Z
LAST-MODIFIED:20210514T144632Z
UID:4049-1621591200-1621598400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: 2021 Hazardous Weather Briefing
DESCRIPTION:This Webinar will cover Severe Storm Developments\, 2021 Hurricane Season\, Droughts\, Fire Weather Season\, Flooding Impacts\, Tornadic Activity\, Watches/Warnings/Advisory guidance\, and applications available to the general public and emergency response officials. Our presenter\, Ms. Wescott is not affiliated with the National Weather Service\, National Oceanic and Atmospheric Administration\, or the National Hurricane Center but is providing this briefing from her 12 years of expertise in atmospheric studies and operational weather forecasting for emergency management and public safety planning. \nPresenters: \nSunny Wescott\, Lead Meteorologist\, DHS-CISA\nConsidered a Subject Matter Expert on tropical\, fire\, polar\, arctic\, and severe storm events for CISA Communications and CISA Central Ms. Wescott produces briefings and outlook data for leadership and private sector executives. \nWho can attend:\nOpen only to InfraGard members and their guests. \nRegistration:\nhttps://www.eventbrite.com/x/infragard-maryland-hazardous-weather-briefing-tickets-151993052311
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-2021-hazardous-weather-briefing/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20210525T083000
DTEND;TZID=America/Los_Angeles:20210525T130000
DTSTAMP:20260407T121056
CREATED:20210430T150547Z
LAST-MODIFIED:20210430T150629Z
UID:4027-1621931400-1621947600@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Supervisory Control & Data Acquisition (SCADA) & Industrial Control Systems (ICS) Vulnerabilities
DESCRIPTION:InfraGard Los Angeles and CT Watch\, Inc. present Supervisory Control & Data Acquisition (SCADA) & Industrial Control Systems (ICS) Vulnerabilities Webinar.\n***There are 4.5 ASIS credits available for this course\nCOURSE OVERVIEW:\nAccording to the Cybersecurity and Infrastructure Security Agency (CISA)\, there are 16 critical infrastructure sectors whose assets\, systems\, and networks\, whether physical or virtual\, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security\, national economic security\, national public health or safety\, or any combination thereof. In this course we will examine the unique threats and vulnerabilities in these sectors\, specifically taking an in-depth look at Insider Threat and all that it encompasses. \n*We will have an opening brief from the FBI Headquarters Cyber Division on Cyber Threats and the Water Sector. \nObjectives: \n1. What are Industrial Control Systems (ICS); Supervisory Control And Data Acquisition Systems (SCADA); and Operational Technology (OT)\n2. Definition of terms – why the terminology is important\n3. Overview of OT systems and how they work in the various sectors\n4. Overview of the differences between IT security and OT security\n5. Why are these systems vulnerable\n6. Discussion around various threat actors interested in OT systems and specific open source case studies of known incidents\n7. State of remediation technology – how do we fix these problems\n8. Case studies related to insider threats and impacts of organizational change and how they can affect personal predispositions to commit malicious acts. \n  \nPresenters: \nShawnee Delaney\, CT Watch\, Inc.\nDelaney is a decorated Intelligence Officer & an Insider Threat SME. At the Department of Homeland Security\, she coordinated & managed intelligence community relationships in the protection of U.S. critical infrastructure & ICS. \nMarty Edwards\, CT Watch\, Inc.\nEdwards was the longest-serving Director of the U.S. Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) and is currently co-chair of the DHS Control Systems Working Group. \nWho can attend:\nOpen to anyone. Particularly aimed toward InfraGard Members\, Public Safety (Law/Health/Fire)\, Terrorism Liaison Officers (TLO’s)\, Infrastructure Liaison Officers (ILO’s)\, Private Sector Security\, Area Stakeholders\, all Critical Infrastructure Sectors\, Intelligence Analysts\, Intelligence Officers and Private Investigators. \nRegistration:\nhttps://attendee.gotowebinar.com/register/4563913752140450829
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-supervisory-control-data-acquisition-scada-industrial-control-systems-ics-vulnerabilities/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210526T130000
DTEND;TZID=America/New_York:20210526T143000
DTSTAMP:20260407T121056
CREATED:20210508T232357Z
LAST-MODIFIED:20210508T232357Z
UID:4044-1622034000-1622039400@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Risk Management and What Do Security Researchers Do?
DESCRIPTION:Tyler Reguly\, Manager Security R&D\, VERT will discuss risk and prioritization in the environment including the value of CVSS and other metrics. Craig Young\, Principal Security Researcher : Will give us a glimpse into the tools and techniques utilized by security researchers when investigating new vulnerabilities. \nPresenters: \nTyler Reguly\, Manager of Security Research with Tripwire\nA key member of VERT (Vulnerability and Exposure Research Team)\, where he focuses on web application security\, protocol specifications (like SSH and DNS) and vulnerability detection. \nCraig Young\, Principal security researcher with Tripwire’s Vulnerability and Exposure Research Team (VERT)\nCraig has been active in numerous areas of computer security research over several years with nearly 200 CVEs to show for it. In 2014\, Craig won both tracks of the first ever SOHOpelessly Broken contest at DEF CON \nWho can attend:\nOpen only to vetted InfraGard members. Aimed toward security team members that want to learn more about risk and prioritization in the environment including the value of CVSS and other metrics. \nRegistration:\nhttps://attendee.gotowebinar.com/register/2881295924199747855\nWebinar ID 624-175-723
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-risk-management-and-what-do-security-researchers-do/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210527T130000
DTEND;TZID=America/New_York:20210527T140000
DTSTAMP:20260407T121056
CREATED:20210514T151010Z
LAST-MODIFIED:20210514T151010Z
UID:4053-1622120400-1622124000@www.infragardnational.org
SUMMARY:A CISO Developed Third Party Risk Management Framework
DESCRIPTION:Over a dozen CISOs recently contributed to developing a framework designed to be a powerful tool to build\, manage\, and scale a third-party risk management program. The foundation of this framework consists of a set of guiding principles identified by members\, which are critical to a successful third-party risk management program. The tool presents these disciplines in a sequential order which cybersecurity leaders can follow as a guide to developing their program\, and include: \n1. Contract Management & Process Intake\n2. Assessment\, Evaluating\, and Tiering of Business Partner Risk\n3. Engagement with Business Partners\n4. Monitoring the Health of Business Partners\n5. Third-Party Risk Solutions \nPlease join members of the Task Force\, which developed this framework as they present this tool\, review each key discipline\, and share best practices around developing and managing a third-party risk management program. \n• Benjamin Corll\, VP\, Cybersecurity and Data Protection at Coats\n• Matthew Stiak Director\, Cyber Risk Management at Delta Dental Insurance of California\,\n• Andy Fiumefreddo\, Enterprise IT Third-Party Cyber Risk Manager at American Family Insurance\n• Jerry Davis\, Senior Cybersecurity Advisor at Cybersecurity Collaborative and former Global CISO NASA and CSO Lam Research\n• Todd Fitzgerald\, V.P. of Cybersecurity Strategy\, Cybersecurity Collaborative – facilitator\nLearning Outcomes/Objectives \nUpon completion of this webinar\, the attendee will be able to understand: \n1. Contract Management & Process Intake\n2. Assessment\, Evaluating\, and Tiering of Business Partner Risk\n3. Engagement with Business Partners\n4. Monitoring the Health of Business Partners\n5. Third-Party Risk Solutions \nFrom the perspective of experienced cybersecurity leaders who are leading the transformation and development of their own third-party risk management programs. \nRegistration:\nhttps://us02web.zoom.us/webinar/register/3016206742067/WN_AjX3CRhoRCeK5A3oaCrLIg
URL:https://www.infragardnational.org/event/a-ciso-developed-third-party-risk-management-framework/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210527T130000
DTEND;TZID=America/New_York:20210527T140000
DTSTAMP:20260407T121056
CREATED:20210514T151639Z
LAST-MODIFIED:20210514T151639Z
UID:4055-1622120400-1622124000@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: The FBI's Internet Crime Complaint Center (IC3)
DESCRIPTION:Over the years\, the Internet crime landscape has broadened from non-delivery schemes and credit card fraud to ransomware and data breaches costing both individuals and businesses millions of dollars each year. The Internet Crime Complaint Center (IC3) is the FBI’s reporting mechanism for suspected Internet facilitated criminal activity. Agents and Analysts pour through hundreds thousands of complaints each day to build investigative referrals for law enforcement agencies throughout the country. \nIn this webinar\, you will learn about reported Internet crime trends\, the complaint process\, the FBI’s Recovery Asset Team and the IC3’s annual report. \nPresenters:\nRachel Yurkovich\, FBI Analyst at IC3 \nWho can attend:\nOpen to anyone. \nRegistration:\nhttps://attendee.gotowebinar.com/register/8203499550742954766
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-the-fbis-internet-crime-complaint-center-ic3/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210527T130000
DTEND;TZID=America/New_York:20210527T143000
DTSTAMP:20260407T121056
CREATED:20210508T232854Z
LAST-MODIFIED:20210508T232854Z
UID:4045-1622120400-1622125800@www.infragardnational.org
SUMMARY:IMA Webinar Broadcast: Who You Going to Call?
DESCRIPTION:Besides the FBI – Who can you call? We have presenters from the MA State Police\, NH CISA and the Secret Service. Please join us to meet some other agencies – what they do and how they protect us. \nSgt. Brian Gavioli from the Massachusetts State Police Commonwealth Fusion Center will provide an overview of the Commonwealth Fusion Center’s Massachusetts Cybersecurity Program. The Massachusetts Cybersecurity Program (MCP) was established in 2016 in response to the growing concerns and threats to cybersecurity in the Commonwealth. The MCP is a program within the Commonwealth Fusion Center focused on cybersecurity threat reporting\, training\, education\, and awareness. \nJason Climer\, Protective Security Advisor from CISA (Cybersecurity and Infrastructure Security Agency) out of New Hampshire will provide an overview of the Cybersecurity and Infrastructure Security Agency. CISA-101 presentation will provide an overview of who CISA is and the various resources they provide to the public and private sector and inform how PSAs and CISA interact with the FBI. \nPresenters: \nSgt. Brian Gavioli\, Massachusetts State Police Commonwealth Fusion Center\nHe is currently assigned to the Commonwealth Fusion Center’s Massachusetts Cybersecurity Program since September 2019 where he coordinates Cyber Threat Intelligence\, Information sharing\, and Cyber Incident Response. \nJason Climer\, Protective Security Advisor – New Hampshire Cybersecurity and Infrastructure Security Agency\nJason has been the Protective Security Advisor for New Hampshire since May 2017. Prior to that he spent six years with the Federal Protective Service. While there\, he managed the Facility Security Assessment Program for FPS Region 1. \nWho can attend:\nOpen only to vetted InfraGard members. \nRegistration:\nhttps://attendee.gotowebinar.com/register/2119388241823177739
URL:https://www.infragardnational.org/event/ima-webinar-broadcast-who-you-going-to-call/
END:VEVENT
END:VCALENDAR