BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//DIB SCC CyberAssist - ECPv6.2.4//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:DIB SCC CyberAssist
X-ORIGINAL-URL:https://ndisac.org/dibscc
X-WR-CALDESC:Events for DIB SCC CyberAssist
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260325T130000
DTEND;TZID=America/New_York:20260325T150000
DTSTAMP:20260416T022301
CREATED:20260203T180117Z
LAST-MODIFIED:20260203T180117Z
UID:17412-1774443600-1774450800@ndisac.org
SUMMARY:DIB SCC Supply Chain Cyber Academy
DESCRIPTION:The Defense Industrial Base Sector Coordinating Council (DIBSCC) is hosting the Supply Chain Cyber Academy webinar series\, with a 2-hour training webinar series being held through calendar year 2026.  Note that these webinars will all contain the same information\, so there is no need to register for more than one session. \nThe intent of this training is to build awareness for Defense Industrial Base (DIB) suppliers of the likely requirements of the Cybersecurity Maturity Model Certification (CMMC) and their obligation to meet FAR 52.204-21 (basic cyber hygiene) and DFARS 252.204-7012 (specialized data handling and protection requirements). \nLink to training materials:  https://ndisac.org/dibscc/cyberassist/cybersecurity-maturity-model-certification/cmmc-training/# \nUse the link below to register for this session. \nDate: March 25\nTime:1:00 – 3:00 PM\nRegistration Link \n  \n 
URL:https://ndisac.org/dibscc/events/dib-scc-supply-chain-cyber-academy-3/
LOCATION:Virtual Conference
CATEGORIES:CMMC,Cybersecurity,NIST SP 800-171,NIST SP 800-172
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260223T130000
DTEND;TZID=America/New_York:20260223T150000
DTSTAMP:20260416T022301
CREATED:20260203T175901Z
LAST-MODIFIED:20260203T175929Z
UID:17409-1771851600-1771858800@ndisac.org
SUMMARY:DIB SCC Supply Chain Cyber Academy
DESCRIPTION:The Defense Industrial Base Sector Coordinating Council (DIBSCC) is hosting the Supply Chain Cyber Academy webinar series\, with a 2-hour training webinar series being held through calendar year 2026.  Note that these webinars will all contain the same information\, so there is no need to register for more than one session. \nThe intent of this training is to build awareness for Defense Industrial Base (DIB) suppliers of the likely requirements of the Cybersecurity Maturity Model Certification (CMMC) and their obligation to meet FAR 52.204-21 (basic cyber hygiene) and DFARS 252.204-7012 (specialized data handling and protection requirements). \nLink to training materials:  https://ndisac.org/dibscc/cyberassist/cybersecurity-maturity-model-certification/cmmc-training/# \nUse the link below to register for this session. \nDate: February 23\nTime:1:00 – 3:00 PM\nRegistration Link \n  \n 
URL:https://ndisac.org/dibscc/events/dib-scc-supply-chain-cyber-academy-2/
LOCATION:Virtual Conference
CATEGORIES:CMMC,Cybersecurity,NIST SP 800-171,NIST SP 800-172
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211021T140000
DTEND;TZID=America/New_York:20211021T150000
DTSTAMP:20260416T022301
CREATED:20211007T191543Z
LAST-MODIFIED:20211007T191543Z
UID:11444-1634824800-1634828400@ndisac.org
SUMMARY:[Webinar] CMMC Level 3 & NIST 800-171: Meeting Two Requirements with One Solution
DESCRIPTION:As the future of CMMC remains unclear\, NIST 800-171 is still the law of the land.  As the DoD works to clarify the requirements and deadlines of CMMC\, organizations can still take prudent steps to achieve compliance for NIST 800-171 today while also progressing toward CMMC Level 3. \n  \nYou can progress toward both CMMC L3 and NIST 800-171 compliance without double the work.\n  \nThere is an easy and affordable way to take those critical steps NOW.  You can avoid spending tons of money\, rushing toward deadlines\, and hours of duplicate work by integrating these priorities into your day-to-day operations. \n  \nThere will be a 30 minute moderated Q&A portion following the presentations\, so make sure to get your questions in when you register!
URL:https://ndisac.org/dibscc/events/webinar-cmmc-level-3-nist-800-171-meeting-two-requirements-with-one-solution/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211021T110000
DTEND;TZID=America/New_York:20211021T120000
DTSTAMP:20260416T022301
CREATED:20211007T190636Z
LAST-MODIFIED:20211007T190636Z
UID:11442-1634814000-1634817600@ndisac.org
SUMMARY:Cloud Security or Lack of It: Threat Vector #1
DESCRIPTION:What explains frequent cloud data breaches? Who is ‘actually’ responsible for Cloud Security? What can you do to fortify your cloud?\n\n\n\n\nThis webinar explains cloud security\, division of responsibility between Cloud Providers and Cloud Users\, and outlines different approaches\, tools\, and service models available. WATI’s cybersecurity experts will provide insights on how cloud exploits typically happen and cover critical protection points in your cloud attack surface. \n\n\n\n\nAgenda & Key Takeaways\n\nHow simple and innocent misconfigurations on cloud services cause catastrophic data breaches?\nFor some cloud services\, default configurations can actually create serious security vulnerabilities.\nNative cloud security controls may be good\, but are they always good enough?\nWhy it’s almost impossible for most organisations to keep up with cloud security demands?\nTools and approaches available for cloud security\nWhere to begin in cloud security?
URL:https://ndisac.org/dibscc/events/cloud-security-or-lack-of-it-threat-vector-1/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211014T140000
DTEND;TZID=America/New_York:20211014T150000
DTSTAMP:20260416T022301
CREATED:20211007T163017Z
LAST-MODIFIED:20211007T163017Z
UID:11440-1634220000-1634223600@ndisac.org
SUMMARY:Cybersecurity in A Flash! Ransomware: Response and Recovery
DESCRIPTION:CyberSecure my Business presents Ransomware: Response and Recovery. The 2021 Cybersecurity in a Flash event is a 1-hour virtual mini-symposium showcasing information and resources that small & medium-sized businesses can put into action to prevent\, recover from\, and respond to Ransomware attacks. All attendees will also receive a Ransomware prevention tip-sheet! \nWhat makes it flashy? All sessions last 5 minutes. The speaker has a short amount of time to deliver as high-value information as possible\, and to do it in a way that someone with any level of cybersecurity knowledge could understand and apply their advice. \nCan it be done? Yes\, we are up to the challenge of making cybersecurity both fast and easy to understand for businesspeople who have a limited amount of time in their day. Join us to see how!\n \nFee: There is no cost to attend this workshop thanks to sponsor generosity.
URL:https://ndisac.org/dibscc/events/cybersecurity-in-a-flash-ransomware-response-and-recovery/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211014T123000
DTEND;TZID=America/New_York:20211014T140000
DTSTAMP:20260416T022301
CREATED:20211007T162207Z
LAST-MODIFIED:20211007T162207Z
UID:11438-1634214600-1634220000@ndisac.org
SUMMARY:Hacked: Security and Safety in an Age of Cyber Threats
DESCRIPTION:In our digitally interconnected world\, cybercrimes increasingly threaten our day-to-day lives. Ransomware attacks and data breaches have become persistent and pervasive risks for anyone and anything connected to the internet with our critical infrastructure and consumers primary targets. While many have embraced the ubiquity of digital technologies\, public policy has been much slower to respond. In this panel we explore the risks and vulnerabilities of this digital policy gap and discuss what solutions might be explored to protect the public from cybercrimes. We will be joined by Leonard Bailey (Department of Justice)\, Victoria E. Beckman (Microsoft)\, Aunshul Rege (Temple University Department of Criminal Justice)\, and moderator Daniel Eliot (National Cybersecurity Center of Excellence).
URL:https://ndisac.org/dibscc/events/hacked-security-and-safety-in-an-age-of-cyber-threats/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211013T110000
DTEND;TZID=America/New_York:20211013T120000
DTSTAMP:20260416T022301
CREATED:20211007T161845Z
LAST-MODIFIED:20211007T161845Z
UID:11436-1634122800-1634126400@ndisac.org
SUMMARY:FREE CYBERSECURITY AWARENESS TRAINING
DESCRIPTION:Solis Security will present an “Annual Security Awareness Training”. This webinar is first come on space and should meet requirements for most organizations basic employee cybersecurity end-user training. \nThis is normally a paid-for training that we are presenting FOR FREE. \nTopics Include: \n\nSensitive data identification\nEmail Insecurity\nSocial Media\n\n\nBYOD and Corporate devices\nSocial Engineering\nPasswords and Authentication\nPhysical\n\nPresented by Senior Security Consultant\, Mark Spears and Executive Vice President and CTO\, Chris Loehr let you know how you can keep yourself – and your organization – safe.
URL:https://ndisac.org/dibscc/events/free-cybersecurity-awareness-training/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211012T140000
DTEND;TZID=America/New_York:20211012T150000
DTSTAMP:20260416T022301
CREATED:20211007T161630Z
LAST-MODIFIED:20211007T161630Z
UID:11434-1634047200-1634050800@ndisac.org
SUMMARY:Fraud Prevention Education: Protecting Customers From Identity Fraud & Scams is Good for Business
DESCRIPTION:In 2020 alone\, total combined fraud climbed to $56 billion\, with identity fraud scams accounting for $43 billion of that cost\, according to Javelin’s 2021 Identity Fraud Study. Due to the shift to remote working and the rise in digital purchases\, consumers became prime targets for scammers. Moreover\, when fraud occurs – no matter the cause – consumers turn to trusted institutions to help resolve the issue and make things right. But when consumers feel neglected during the resolution process\, customer attrition tends to be the result. \n  \nIn this webinar\, Iris Global Identity & Cyber Protection powered by Generali\, Javelin\, and a panel of expert thought leaders will provide the audience with an in-depth analysis of the shifting landscape of identity fraud. The seasoned panel will also offer guidance to help businesses strengthen customer loyalty as well as tips and resources they can share with their customers to help mitigate their risk. \n  \nParticipants in this webinar will learn: \n  \n– How consumer education is key to curbing identity fraud \n– Scams targeting both financial and non-financial accounts \n– How fraud resolution services and/or support help positively impact customer loyalty and retention \n– Resources/tools businesses can put in place to help their customers avoid data compromise
URL:https://ndisac.org/dibscc/events/fraud-prevention-education-protecting-customers-from-identity-fraud-scams-is-good-for-business/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211012T130000
DTEND;TZID=America/New_York:20211012T150000
DTSTAMP:20260416T022301
CREATED:20211007T161313Z
LAST-MODIFIED:20211007T161313Z
UID:11432-1634043600-1634050800@ndisac.org
SUMMARY:Plan Sponsor Cybersecurity Webinar
DESCRIPTION:Sponsored by Charles Schwab and Principal Financial Group\, our Plan Sponsor Cybersecurity Webinar\, co-hosted by the National Cybersecurity Alliance will take place on October 12. \nEmployers and employees face threats every day from cyber-criminals using ransomware and direct attempts at fraud to steal or disrupt employee benefit plans. The Department of Labor recently issued guidance and tips for employers on what they and their vendors should do to protect against such threats. \nThis webinar will help employers understand what tools and services are available and how to better evaluate vendors who administer their employee benefits.
URL:https://ndisac.org/dibscc/events/plan-sponsor-cybersecurity-webinar/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211008T140000
DTEND;TZID=America/New_York:20211008T150000
DTSTAMP:20260416T022301
CREATED:20211007T161107Z
LAST-MODIFIED:20211007T161107Z
UID:11429-1633701600-1633705200@ndisac.org
SUMMARY:Behind the Scenes of a Breach
DESCRIPTION:Ransomware is everywhere these days – but what actually happens to organizations following a cyber attack? Tiago Henriques\, Director of Engineering – Security at Coalition\, the leading provider of cyber insurance\, will discuss the reality of what we’re up against.
URL:https://ndisac.org/dibscc/events/behind-the-scenes-of-a-breach/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210722T110000
DTEND;TZID=America/New_York:20210722T120000
DTSTAMP:20260416T022301
CREATED:20210709T173537Z
LAST-MODIFIED:20210709T173537Z
UID:11291-1626951600-1626955200@ndisac.org
SUMMARY:Cover Your Assets: Securing Critical and High-Value Assets
DESCRIPTION:CISA invites you to join the awareness webinar\, “Cover Your Assets: Securing Critical and High-Value Assets (July)” on Thursday\, July 22\, 2021. We are excited to share this information with staff from across Federal\, state\, and local government\, critical infrastructure stakeholders\, and more.\nThink about your organization’s most critical functions: what do others depend on you to provide? Your high-value assets (HVAs)\, also known as critical assets across many industries\, are the information or information systems that have serious impact to your organization’s ability to conduct its mission or business operations if lost\, corrupted\, or inaccessible. Across sectors and industries\, data and information systems that underpin core business and operational functions- or those systems that connect to core functionalities- make highly tempting targets for sophisticated criminal\, politically motivated\, or state-sponsored actors to exploit directly or compromise to undermine public trust.\nThe HVA program was established by CISA to help organizations gain a comprehensive understanding of the risks that dynamic threat actors pose\, and identify the high-value information and systems that are likely targets.\nThis webinar provides an overview of the following key information and more:\n•	HVA and critical asset overview: Define high-value assets\, and how to assess and prioritize risks.\n•	Common threats: Understand the most likely threats to HVAs and how to mitigate associated vulnerabilities.\n•	CISA guidance: Learn the steps and parameters to identify\, categorize\, prioritize\, and secure your HVAs or critical assets.\n•	Case studies: Explore the impacts of documented critical or high-value asset cyberattacks\, and the success of resulting response and recovery efforts.\nThis course is accessible to a non-technical audience including managers and business leaders\, and provides an organizational perspective useful to technical specialists. Participants can request 1 CPE credit for this course.
URL:https://ndisac.org/dibscc/events/cover-your-assets-securing-critical-and-high-value-assets/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210721T140000
DTEND;TZID=America/New_York:20210721T150000
DTSTAMP:20260416T022301
CREATED:20210709T174424Z
LAST-MODIFIED:20210709T174424Z
UID:11295-1626876000-1626879600@ndisac.org
SUMMARY:Securing Operational Technologies and Control Systems with a Skilled Workforce
DESCRIPTION:The security of operational technologies (OT)\, including control systems such as supervisory control and data acquisition (SCADA) systems\, is increasingly recognized as a risk management priority for enterprises.  The education\, training\, and workforce needed to develop and maintain competencies for OT security is as important as security for information technology (IT).  Consequently\, the NICE Framework is evolving to address the cybersecurity education and workforce needs of all technologies.  This webinar will describes efforts to update NIST’s Guide to Industrial Control System and will explore the competencies or work roles that are needed to secure operational technologies.
URL:https://ndisac.org/dibscc/events/securing-operational-technologies-and-control-systems-with-a-skilled-workforce/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210624T140000
DTEND;TZID=America/New_York:20210624T150000
DTSTAMP:20260416T022301
CREATED:20210610T153317Z
LAST-MODIFIED:20210610T153317Z
UID:11257-1624543200-1624546800@ndisac.org
SUMMARY:Cybersecurity Executive Order: What It Means For Government Contractors and Suppliers (Exostar)
DESCRIPTION:We hope you’ll join us on Thursday\, June 24th as we help you understand President Biden’s recent Cybersecurity Executive Order and what it means for government contractors and suppliers. Hear directly from industry experts: \n\nMichael Baker\, CISO\, General Dynamics IT\nTom Tollerton\, Managing Director\, Dixon Hughes Goodman LLP\n\nWe’ll cover: \n\nWhat the Executive Order means\nPreparing while the goalposts keep moving\nWhat your Primes expect NOW\nAnd most importantly\, we’ll answer your most burning questions\, so make sure to submit them when you register! 
URL:https://ndisac.org/dibscc/events/cybersecurity-executive-order-what-it-means-for-government-contractors-and-suppliers-exostar/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210426T160000
DTEND;TZID=America/New_York:20210426T163000
DTSTAMP:20260416T022301
CREATED:20210426T145045Z
LAST-MODIFIED:20210426T145045Z
UID:11159-1619452800-1619454600@ndisac.org
SUMMARY:Cybersecurity Fundamentals for SMEs
DESCRIPTION:Join this webinar\, in partnership with ITC and ecomConnect\, delivered by the Cyber Readiness Institute\, to dive into cybersecurity fundamentals. We will cover four core areas that have the greatest impact on your organization’s cybersecurity: \n✅Authentication \n✅Phishing \n✅Software Updates \n✅Removable Me
URL:https://ndisac.org/dibscc/events/cybersecurity-fundamentals-for-smes/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210413T160000
DTEND;TZID=America/New_York:20210413T170000
DTSTAMP:20260416T022301
CREATED:20210330T171122Z
LAST-MODIFIED:20210330T171122Z
UID:10984-1618329600-1618333200@ndisac.org
SUMMARY:Enabling Cybersecurity Accountability for the Enterprise
DESCRIPTION:Establishing a security-forward culture is your first line of defense against cyber-threats. Layered security strategies are only as strong as their weakest layer. Fostering a risk-aware workforce enables CISOs teams to institute enterprise-wide ownership and to enforce accountability at every layer of their cybersecurity program. \nJoin ISACA and ProcessUnity for practical advice on “Cybersecurity Accountability”\, – assigning risk ownership to individuals that have the authority to do something about those risks.
URL:https://ndisac.org/dibscc/events/enabling-cybersecurity-accountability-for-the-enterprise/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210330T160000
DTEND;TZID=America/New_York:20210330T170000
DTSTAMP:20260416T022301
CREATED:20210330T174440Z
LAST-MODIFIED:20210330T174440Z
UID:10986-1617120000-1617123600@ndisac.org
SUMMARY:2021 Cyber Threats\, Trends & Mitigation
DESCRIPTION:The cybersecurity threat landscape is constantly changing and growing. How can companies identify what’s important and find points of improvement in their cyber programs? \nIn this webinar\, Dustin Brewer\, Sr. Director\, Emerging Technologies and Innovation\, and popular speaker\, will address the current cyber threat landscape\, and provide practical advice to identify what cyber efforts are important to your enterprise and how to improve practices. \nKey discussion points in this webinar include the following: \n\nCurrent cybersecurity trends and threats\nDetermining importance of cyber threats to your organization\nWhat products and services help mitigate and identify cybersecurity threats within enterprise organizations?\nLive Q&A\nWho should attend? CISOs\, CSOs\, CIOs\, CTOs\, Cyber teams\, GRC and IT Risk Professionals\n\nDustin Brewer\nSr. Director\, Emerging Technologies and Innovation\nISACA \nDustin Brewer has 20 years of experience in the IT field beginning with networks\, programming\, and hardware specialization. He completed a bachelor’s degree in Cybersecurity and Information Assurance at Western Governor’s University\, and while serving in the U.S. Military\, he excelled in the Cybersecurity field with Computer Incident Response Teams and as a Senior Test Engineer while stationed at Fort Meade. Working as an independent contractor and lead developer for defense contract agencies\, he specialized in computer networking security\, penetration testing\, and training for various DoD and commercial entities. \nAs the Sr. Director\, Emerging Technologies and Innovation with ISACA\, he currently develops innovative training programs to best prepare cybersecurity specialists for the future of this dynamic field.
URL:https://ndisac.org/dibscc/events/2021-cyber-threats-trends-mitigation/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210217T093000
DTEND;TZID=America/New_York:20210217T103000
DTSTAMP:20260416T022301
CREATED:20210127T140924Z
LAST-MODIFIED:20210127T140924Z
UID:10466-1613554200-1613557800@ndisac.org
SUMMARY:Security Fundamentals for Windows Virtual Desktop Environments
DESCRIPTION:Watch this free webinar to learn about built-in security capabilities of Windows Virtual Desktop. You’ll also find out how to improve your security posture by integrating your desktop environment with other Azure and Microsoft offerings. \nGet technical guidance to help you: \n\nUnderstand the security controls available in Windows Virtual Desktop.\nUse multifactor authentication and conditional access to help keep your users safe.\nConfigure security tools such as Azure Security Center and Microsoft Endpoint Manager to help protect your infrastructure.
URL:https://ndisac.org/dibscc/events/security-fundamentals-for-windows-virtual-desktop-environments/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210210T110000
DTEND;TZID=America/New_York:20210210T120000
DTSTAMP:20260416T022301
CREATED:20210127T140425Z
LAST-MODIFIED:20210127T140425Z
UID:10463-1612954800-1612958400@ndisac.org
SUMMARY:SolarWinds Hack: Fallout\, Recovery\, and Prevention
DESCRIPTION:Summary\nThe recent SolarWinds incident demonstrated the challenges of securing systems when they are the product of complex supply chains. \nAgenda\n\nThe recent SolarWinds incident demonstrated the challenges of securing systems when they are the product of complex supply chains. Responding effectively to breaches and hacks requires a cross-section of technical skills and process insights. In this webcast\, we will explore the lifecycle of the SolarWinds activity and discuss both technical and risk assessment to prepare organizations to defend against this type of incident. \nWhat attendees will learn: \n\nTechnical details regarding the SolarWinds vulnerabilities and exploits\nSupply chain risk management principles required to reduce the risk of future incidents\nAdvice on the core operational capabilities required to respond to and recover from the SolarWinds hack\n\nWho should attend? \n\nChief Information Security Officer\nDirector of Information Security\nNetwork Security Operations Manager\nNetwork Security Analyst\nThird-Party Risk Manager
URL:https://ndisac.org/dibscc/events/solarwinds-hack-fallout-recovery-and-prevention/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210120T160000
DTEND;TZID=America/New_York:20210120T170000
DTSTAMP:20260416T022301
CREATED:20210111T131853Z
LAST-MODIFIED:20210111T131853Z
UID:10344-1611158400-1611162000@ndisac.org
SUMMARY:COMPLYING WITH THE DOD ASSESSMENT METHODOLOGY AND DIBCAC ASSESSMENT PROCESS"\, FEATURING JOHN ELLIS\, DCMA
DESCRIPTION:New DFARS Interim Rules went into effect in December 2020\, forcing defense contractors to adhere to new processes and requirements\, and placing greater emphasis on compliance with cybersecurity regulations. Contractors who handle Controlled Unclassified Information (CUI) must now conduct self-assessments of NIST 800-171 compliance status in accordance with NIST 800-171A assessment guidance; score themselves on a subtractive\, weighted formula as prescribed by the DoD Assessment Methodology scoring system; and report their scores and expected POAM completion dates to the government through the Supplier Performance Rating System (SPRS) in order to remain eligible to win new contract awards that involve handling CUI. In addition\, the DCMA’s Defense Industrial Base Cybersecurity Assessment Center (DIBCAC) is now able to mandate more detailed analysis of contractor compliance through Medium and High confidence assessments at the government’s discretion. For Medium and High assessments\, DIBCAC personnel may perform detailed reviews of contractor SSPs\, or conduct full NIST 800-171A evidence-based assessments of contractor compliance.\nIn this webinar\, John A. Ellis\, Director of the DCMA’s Technical Directorate\, will provide key information that all defense contractors should understand about what is required\, what to expect\, and how to prepare for the DoD Assessment Methodology and DIBCAC assessment process; and cybersecurity compliance experts from eResilience will share best practices for prime contractors and subcontractors to assist in navigating compliance challenges.
URL:https://ndisac.org/dibscc/events/complying-with-the-dod-assessment-methodology-and-dibcac-assessment-process-featuring-john-ellis-dcma/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210114T120000
DTEND;TZID=America/New_York:20210114T130000
DTSTAMP:20260416T022301
CREATED:20210104T133357Z
LAST-MODIFIED:20210104T133414Z
UID:10020-1610625600-1610629200@ndisac.org
SUMMARY:The Year Ahead: Making Cybersecurity (More) Predictable in 2021
DESCRIPTION:No doubt about it: this year was wildly unpredictable. Every month – heck\, every week seemed to be weirder than the next (murder hornets\, anyone?). \nWe may not know what 2021 has in store for us\, but we do know there are some things security and IT teams can do right now to make the year ahead more predictable. \nJoin us on 14 January at 12 p.m. ET as host Andrew Senko\, CISSP\, CISM discusses: \n\nLeading security experts’ predictions and expectations for 2021\nTips and trends to make the year ahead more manageable for cybersecurity\nPractical\, tactical steps to take to know whether all assets adhere to or deviate from security policies\, regulations\, and configuration expectations
URL:https://ndisac.org/dibscc/events/the-year-ahead-making-cybersecurity-more-predictable-in-2021/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210112T140000
DTEND;TZID=America/New_York:20210112T150000
DTSTAMP:20260416T022301
CREATED:20210107T140705Z
LAST-MODIFIED:20210107T140705Z
UID:10035-1610460000-1610463600@ndisac.org
SUMMARY:Protecting Customer Data
DESCRIPTION:As a small business owner\, it’s your job to protect not only your business’ data\, but also your customers’ data from breaches and theft. In this webinar\, Malcolm Web\, Team Lead for Identity and Cyber Protection Services at Generali Global Assistance\, will discuss the business need of protecting customer data\, the tools you can use to help monitor and protect data\, and how to minimize your risk.
URL:https://ndisac.org/dibscc/events/protecting-customer-data/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity,Privacy
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201130
DTEND;VALUE=DATE:20201219
DTSTAMP:20260416T022301
CREATED:20200804T003740Z
LAST-MODIFIED:20200804T102741Z
UID:9538-1606694400-1608335999@ndisac.org
SUMMARY:AWS re:Invent
DESCRIPTION:We invite you to join us for keynotes\, launches\, sessions\, and more—presented across 3 weeks from Nov. 30 – Dec. 18.
URL:https://ndisac.org/dibscc/events/aws-reinvent/
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201116
DTEND;VALUE=DATE:20201119
DTSTAMP:20260416T022301
CREATED:20200728T164411Z
LAST-MODIFIED:20200804T102323Z
UID:9409-1605484800-1605743999@ndisac.org
SUMMARY:11th Annual NICE Conference and Expo
DESCRIPTION:The annual National Initiative for Cybersecurity Education (NICE) Conference and Expo brings together thought leaders from industry\, government\, academia\, and non-profit organizations to address the community’s cybersecurity education\, training\, and workforce needs. This event provides an opportunity to share best practices from around the world and across sectors in order to build the workforce we need to confront cybersecurity risks today and in years to come.
URL:https://ndisac.org/dibscc/events/11th-annual-nice-conference-and-expo/
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201110
DTEND;VALUE=DATE:20201112
DTSTAMP:20260416T022301
CREATED:20200804T003526Z
LAST-MODIFIED:20200804T102219Z
UID:9535-1604966400-1605139199@ndisac.org
SUMMARY:TribalNet 2020 Annual Conference
DESCRIPTION:As a way to connect with tribal technology decision makers and business leaders\, the 2020 TribalNet VIRTUAL Conference & Tradeshow offers an unparalleled number of opportunities. For over twenty years\, the event has evolved to become the premier platform for businesses\, governments\, and employees to connect and explore the latest in solutions\, best practices\, and technology in tribal gaming\, government and health.
URL:https://ndisac.org/dibscc/events/tribalnet-2020-annual-conference/
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201027T113000
DTEND;TZID=America/New_York:20201027T123000
DTSTAMP:20260416T022301
CREATED:20201008T130148Z
LAST-MODIFIED:20201008T130148Z
UID:9618-1603798200-1603801800@ndisac.org
SUMMARY:How to Bridge the NetOps/SecOps Divide
DESCRIPTION:In this webinar\, we’ll talk about and illustrate how a common set of data can help both teams work and address cybersecurity requirements together. Join us to learn: \n• Why packet capture and flow analysis are important to cybersecurity response and remediation\n• How to complement existing protection\, detection\, and response tools using packet capture\n• Which data sources can be leveraged to ensure comprehensive performance and threat visibility\n• What is ‘enriched’ flow and the added insight it gives you to reduce dwell time for malicious activity
URL:https://ndisac.org/dibscc/events/how-to-bridge-the-netops-secops-divide/
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201026
DTEND;VALUE=DATE:20201029
DTSTAMP:20260416T022301
CREATED:20200804T003234Z
LAST-MODIFIED:20200804T101622Z
UID:9532-1603670400-1603929599@ndisac.org
SUMMARY:10th Annual Cyber Security Summit
DESCRIPTION:At the Cyber Security Summit\, our mission is to produce a multi-stakeholder consortium that brings together industry\, government and academic interests in an effort to improve the state of cyber security on both a domestic and international level.
URL:https://ndisac.org/dibscc/events/10th-annual-cyber-security-summit/
LOCATION:Minneapolis\, MN\, United States
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201014T140000
DTEND;TZID=America/New_York:20201014T150000
DTSTAMP:20260416T022301
CREATED:20201008T151032Z
LAST-MODIFIED:20201008T151032Z
UID:9630-1602684000-1602687600@ndisac.org
SUMMARY:How to Unlock the Security Benefits of the CIS Benchmarks
DESCRIPTION:Adopted globally by governments\, private sector enterprises and academia\, the CIS Benchmarks are critically important for establishing and maintaining a strong\, effective foundation for all of your cyber efforts. \nBy attending this webinar\, you will gain insight into how the CIS Benchmarks are developed\, why they matter\, and effective strategies and approaches for using the Benchmarks to strengthen your own security program. \nLed by experts from the Center for Internet Security and Tenable\, topics covered will include: \n• Identifying and overcoming common challenges of implementing CIS Benchmarks\n• Reducing complexity by strengthening conformance\n• Eliminating audit challenges and compliance headaches\n• How you can join the CIS community to develop and enhance the benchmarks\n• And\, answers to your questions during live Q&A \nWho should attend?\nAll infosec and IT professionals who need to understand\, employ and optimize the use of CIS Benchmarks are encouraged to attend.
URL:https://ndisac.org/dibscc/events/how-to-unlock-the-security-benefits-of-the-cis-benchmarks/
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201013T140000
DTEND;TZID=America/New_York:20201013T150000
DTSTAMP:20260416T022301
CREATED:20201008T130809Z
LAST-MODIFIED:20201008T130809Z
UID:9624-1602597600-1602601200@ndisac.org
SUMMARY:Firewall Chat: Best Practices to Block Ransomware
DESCRIPTION:Ransomware attacks have come back with a vengeance. More than half of organizations admitted to being hit by ransomware in the last year at an eye-watering average remediation cost of $761\,106 per attack. \nOne of the most effective methods for protecting against ransomware attacks like Ryuk\, Sodinokibi\, Maze\, and Ragnar Locker is to fortify your defenses with a properly configured firewall. \nIn this chat\, we’ll discuss how you can incorporate protections into your organization’s IT security strategy to avoid being held hostage by ransomware.
URL:https://ndisac.org/dibscc/events/firewall-chat-best-practices-to-block-ransomware/
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201006
DTEND;VALUE=DATE:20201010
DTSTAMP:20260416T022301
CREATED:20200804T002829Z
LAST-MODIFIED:20200804T103750Z
UID:9529-1601942400-1602287999@ndisac.org
SUMMARY:PCI - 2020 North America Community Meeting
DESCRIPTION:Don’t miss THE data security event of the year for the payment card industry.\nAlthough we will not be together face-to-face\, we will still gather virtually to hear important Council updates\, regional insights\, startling industry reports and are creating an engaging agenda for this multiday virtual event. The North America Community Meeting continues to be an opportunity to bring the PCI SSC community together to network with colleagues\, ask questions\, share information and collaborate
URL:https://ndisac.org/dibscc/events/pci/
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200811T120000
DTEND;TZID=America/New_York:20200811T130000
DTSTAMP:20260416T022301
CREATED:20200714T201456Z
LAST-MODIFIED:20200715T113201Z
UID:9349-1597147200-1597150800@ndisac.org
SUMMARY:Mastering Cybersecurity Asset Management - Once and for All
DESCRIPTION:Understanding your assets is the foundation of cybersecurity\, right? So then why is asset management still such a monster of a problem? As IT environments become increasingly complex\, teams are struggling to keep up
URL:https://ndisac.org/dibscc/events/mastering-cybersecurity-asset-management-once-and-for-all/
CATEGORIES:Cybersecurity
END:VEVENT
END:VCALENDAR