Note: This is an Intermediate Level course This course introduces participants to the art of “effective prompting” with the ChatGPT AI model. Attendees will learn to shape outputs, construct prompts, and adjust system level controls to suit their needs. In this 2 hour workshop, we will examine the art of prompting ChatGPT effectively. This course […]
Events
Calendar of Events
|
Sunday
|
Monday
|
Tuesday
|
Wednesday
|
Thursday
|
Friday
|
Saturday
|
|---|---|---|---|---|---|---|
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
2 events,
-
-
Join the Legal CSC for a virtual webinar about digital due diligence in mergers and acquisitions. Presenter: Shawn Tuma, Attorney & Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane, LLP. Shawn Tuma represents clients across the globe in dealing with cybersecurity, data privacy, data breach and incident response, regulatory compliance, computer fraud related legal issues, […] |
0 events,
|
0 events,
|
|
0 events,
|
0 events,
|
1 event,
-
Unmanned Aircraft System (UAS) technology is becoming cheaper, easier to use, more durable, and more available to the general public. With criminals and extremists, both overseas and domestically, wanting to develop UAS technology for illicit means, what does that mean for you? James Peaco, FBI Special Agent and WMD Coordinator and Krista Lam, FBI SA […] |
0 events,
|
1 event,
-
With the high prevalence of bring-your-own-device (BYOD) in today’s hybrid-first world, there is a significantly higher likelihood that personal apps pose serious risk to your data and overall security posture. Without visibility into the risk posed by personal apps and devices, it’s impossible to fully understand your organization’s potential data exposure risk. This webinar will […] |
0 events,
|
0 events,
|
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
2 events,
-
This is another in our FREE series of Global Threat & Ukraine updates. Global Threat Overview and Ukraine Update is a slight variation on the well-received webinars (with unprecedented registration/participation) that have become an InfraGard staple over the last 16 months. This begins by providing a worldwide threat overview looking at actual or potential flashpoints, […]
-
The Cybersecurity and Infrastructure Security Agency (CISA) will be conducting a presentation on several topics including their organization’s mission and regional structure and operations. Other topics covered will focus on CISA Cybersecurity Advisor roles and responsibilities, CISA Cyber services, tools, training and exercises available to critical infrastructure entities. The cybersecurity advisor will also discuss CISA's […] |
0 events,
|
0 events,
|
|
0 events,
|
0 events,
|
1 event,
-
Security Awareness is well known for being the “best bang for the buck” out of all the risk mitigation techniques, but is it really? For Security Awareness to be effective it must change the behaviors of employees and ideally lead to a mature security culture in your organization. Many programs that do not use adult […] |
2 events,
-
Impact of Artificial Intelligence (AI) on threats, defenses, chatGPT technology, and HODL (Hold On For Dear Life). Malicious cyber actors threaten public safety and our national and economics security. The schemes and techniques of cyber criminals are constantly evolving, and their threats are becoming more complex. The FBI is committed to working with our federal […]
-
Maine’s InfraGard Member Alliance invites you to attend a presentation with the Anti-Human Trafficking Intelligence Initiative. Sponsored by Deer Brook Consulting, Kennebunk Maine The AHTII processes open-source and other intelligence to detect links between online human trafficking and local businesses. This service can greatly enhance BSA, AML, KYC, and fraud prevention. They provide financial institutions […] |
2 events,
-
Step into the world of crime prevention with our immersive course on "Recognizing Hostile Surveillance". This three-hour training is designed to provide you with the knowledge and skills to detect and report effectively on hostile surveillance activities. Hostile surveillance is a process by which individuals or groups systematically observe and gather information about a person, […]
-
This briefing is based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing boardroom metrics and KPI metrics to support their cybersecurity programs. Topics discussed will include: (1) designing and implementing a metrics program using the Cybersecurity Collaborative (CSC) Metrics Three-Tiered Framework (operational […] |
0 events,
|
0 events,
|