BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//DIB SCC CyberAssist - ECPv6.2.4//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://ndisac.org/dibscc
X-WR-CALDESC:Events for DIB SCC CyberAssist
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210624T140000
DTEND;TZID=America/New_York:20210624T150000
DTSTAMP:20260416T040305
CREATED:20210610T153317Z
LAST-MODIFIED:20210610T153317Z
UID:11257-1624543200-1624546800@ndisac.org
SUMMARY:Cybersecurity Executive Order: What It Means For Government Contractors and Suppliers (Exostar)
DESCRIPTION:We hope you’ll join us on Thursday\, June 24th as we help you understand President Biden’s recent Cybersecurity Executive Order and what it means for government contractors and suppliers. Hear directly from industry experts: \n\nMichael Baker\, CISO\, General Dynamics IT\nTom Tollerton\, Managing Director\, Dixon Hughes Goodman LLP\n\nWe’ll cover: \n\nWhat the Executive Order means\nPreparing while the goalposts keep moving\nWhat your Primes expect NOW\nAnd most importantly\, we’ll answer your most burning questions\, so make sure to submit them when you register! 
URL:https://ndisac.org/dibscc/events/cybersecurity-executive-order-what-it-means-for-government-contractors-and-suppliers-exostar/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210426T160000
DTEND;TZID=America/New_York:20210426T163000
DTSTAMP:20260416T040305
CREATED:20210426T145045Z
LAST-MODIFIED:20210426T145045Z
UID:11159-1619452800-1619454600@ndisac.org
SUMMARY:Cybersecurity Fundamentals for SMEs
DESCRIPTION:Join this webinar\, in partnership with ITC and ecomConnect\, delivered by the Cyber Readiness Institute\, to dive into cybersecurity fundamentals. We will cover four core areas that have the greatest impact on your organization’s cybersecurity: \n✅Authentication \n✅Phishing \n✅Software Updates \n✅Removable Me
URL:https://ndisac.org/dibscc/events/cybersecurity-fundamentals-for-smes/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210413T160000
DTEND;TZID=America/New_York:20210413T170000
DTSTAMP:20260416T040305
CREATED:20210330T171122Z
LAST-MODIFIED:20210330T171122Z
UID:10984-1618329600-1618333200@ndisac.org
SUMMARY:Enabling Cybersecurity Accountability for the Enterprise
DESCRIPTION:Establishing a security-forward culture is your first line of defense against cyber-threats. Layered security strategies are only as strong as their weakest layer. Fostering a risk-aware workforce enables CISOs teams to institute enterprise-wide ownership and to enforce accountability at every layer of their cybersecurity program. \nJoin ISACA and ProcessUnity for practical advice on “Cybersecurity Accountability”\, – assigning risk ownership to individuals that have the authority to do something about those risks.
URL:https://ndisac.org/dibscc/events/enabling-cybersecurity-accountability-for-the-enterprise/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210330T160000
DTEND;TZID=America/New_York:20210330T170000
DTSTAMP:20260416T040305
CREATED:20210330T174440Z
LAST-MODIFIED:20210330T174440Z
UID:10986-1617120000-1617123600@ndisac.org
SUMMARY:2021 Cyber Threats\, Trends & Mitigation
DESCRIPTION:The cybersecurity threat landscape is constantly changing and growing. How can companies identify what’s important and find points of improvement in their cyber programs? \nIn this webinar\, Dustin Brewer\, Sr. Director\, Emerging Technologies and Innovation\, and popular speaker\, will address the current cyber threat landscape\, and provide practical advice to identify what cyber efforts are important to your enterprise and how to improve practices. \nKey discussion points in this webinar include the following: \n\nCurrent cybersecurity trends and threats\nDetermining importance of cyber threats to your organization\nWhat products and services help mitigate and identify cybersecurity threats within enterprise organizations?\nLive Q&A\nWho should attend? CISOs\, CSOs\, CIOs\, CTOs\, Cyber teams\, GRC and IT Risk Professionals\n\nDustin Brewer\nSr. Director\, Emerging Technologies and Innovation\nISACA \nDustin Brewer has 20 years of experience in the IT field beginning with networks\, programming\, and hardware specialization. He completed a bachelor’s degree in Cybersecurity and Information Assurance at Western Governor’s University\, and while serving in the U.S. Military\, he excelled in the Cybersecurity field with Computer Incident Response Teams and as a Senior Test Engineer while stationed at Fort Meade. Working as an independent contractor and lead developer for defense contract agencies\, he specialized in computer networking security\, penetration testing\, and training for various DoD and commercial entities. \nAs the Sr. Director\, Emerging Technologies and Innovation with ISACA\, he currently develops innovative training programs to best prepare cybersecurity specialists for the future of this dynamic field.
URL:https://ndisac.org/dibscc/events/2021-cyber-threats-trends-mitigation/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210217T093000
DTEND;TZID=America/New_York:20210217T103000
DTSTAMP:20260416T040305
CREATED:20210127T140924Z
LAST-MODIFIED:20210127T140924Z
UID:10466-1613554200-1613557800@ndisac.org
SUMMARY:Security Fundamentals for Windows Virtual Desktop Environments
DESCRIPTION:Watch this free webinar to learn about built-in security capabilities of Windows Virtual Desktop. You’ll also find out how to improve your security posture by integrating your desktop environment with other Azure and Microsoft offerings. \nGet technical guidance to help you: \n\nUnderstand the security controls available in Windows Virtual Desktop.\nUse multifactor authentication and conditional access to help keep your users safe.\nConfigure security tools such as Azure Security Center and Microsoft Endpoint Manager to help protect your infrastructure.
URL:https://ndisac.org/dibscc/events/security-fundamentals-for-windows-virtual-desktop-environments/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210210T110000
DTEND;TZID=America/New_York:20210210T120000
DTSTAMP:20260416T040305
CREATED:20210127T140425Z
LAST-MODIFIED:20210127T140425Z
UID:10463-1612954800-1612958400@ndisac.org
SUMMARY:SolarWinds Hack: Fallout\, Recovery\, and Prevention
DESCRIPTION:Summary\nThe recent SolarWinds incident demonstrated the challenges of securing systems when they are the product of complex supply chains. \nAgenda\n\nThe recent SolarWinds incident demonstrated the challenges of securing systems when they are the product of complex supply chains. Responding effectively to breaches and hacks requires a cross-section of technical skills and process insights. In this webcast\, we will explore the lifecycle of the SolarWinds activity and discuss both technical and risk assessment to prepare organizations to defend against this type of incident. \nWhat attendees will learn: \n\nTechnical details regarding the SolarWinds vulnerabilities and exploits\nSupply chain risk management principles required to reduce the risk of future incidents\nAdvice on the core operational capabilities required to respond to and recover from the SolarWinds hack\n\nWho should attend? \n\nChief Information Security Officer\nDirector of Information Security\nNetwork Security Operations Manager\nNetwork Security Analyst\nThird-Party Risk Manager
URL:https://ndisac.org/dibscc/events/solarwinds-hack-fallout-recovery-and-prevention/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210120T160000
DTEND;TZID=America/New_York:20210120T170000
DTSTAMP:20260416T040305
CREATED:20210111T131853Z
LAST-MODIFIED:20210111T131853Z
UID:10344-1611158400-1611162000@ndisac.org
SUMMARY:COMPLYING WITH THE DOD ASSESSMENT METHODOLOGY AND DIBCAC ASSESSMENT PROCESS"\, FEATURING JOHN ELLIS\, DCMA
DESCRIPTION:New DFARS Interim Rules went into effect in December 2020\, forcing defense contractors to adhere to new processes and requirements\, and placing greater emphasis on compliance with cybersecurity regulations. Contractors who handle Controlled Unclassified Information (CUI) must now conduct self-assessments of NIST 800-171 compliance status in accordance with NIST 800-171A assessment guidance; score themselves on a subtractive\, weighted formula as prescribed by the DoD Assessment Methodology scoring system; and report their scores and expected POAM completion dates to the government through the Supplier Performance Rating System (SPRS) in order to remain eligible to win new contract awards that involve handling CUI. In addition\, the DCMA’s Defense Industrial Base Cybersecurity Assessment Center (DIBCAC) is now able to mandate more detailed analysis of contractor compliance through Medium and High confidence assessments at the government’s discretion. For Medium and High assessments\, DIBCAC personnel may perform detailed reviews of contractor SSPs\, or conduct full NIST 800-171A evidence-based assessments of contractor compliance.\nIn this webinar\, John A. Ellis\, Director of the DCMA’s Technical Directorate\, will provide key information that all defense contractors should understand about what is required\, what to expect\, and how to prepare for the DoD Assessment Methodology and DIBCAC assessment process; and cybersecurity compliance experts from eResilience will share best practices for prime contractors and subcontractors to assist in navigating compliance challenges.
URL:https://ndisac.org/dibscc/events/complying-with-the-dod-assessment-methodology-and-dibcac-assessment-process-featuring-john-ellis-dcma/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210114T120000
DTEND;TZID=America/New_York:20210114T130000
DTSTAMP:20260416T040305
CREATED:20210104T133357Z
LAST-MODIFIED:20210104T133414Z
UID:10020-1610625600-1610629200@ndisac.org
SUMMARY:The Year Ahead: Making Cybersecurity (More) Predictable in 2021
DESCRIPTION:No doubt about it: this year was wildly unpredictable. Every month – heck\, every week seemed to be weirder than the next (murder hornets\, anyone?). \nWe may not know what 2021 has in store for us\, but we do know there are some things security and IT teams can do right now to make the year ahead more predictable. \nJoin us on 14 January at 12 p.m. ET as host Andrew Senko\, CISSP\, CISM discusses: \n\nLeading security experts’ predictions and expectations for 2021\nTips and trends to make the year ahead more manageable for cybersecurity\nPractical\, tactical steps to take to know whether all assets adhere to or deviate from security policies\, regulations\, and configuration expectations
URL:https://ndisac.org/dibscc/events/the-year-ahead-making-cybersecurity-more-predictable-in-2021/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210112T140000
DTEND;TZID=America/New_York:20210112T150000
DTSTAMP:20260416T040305
CREATED:20210107T140705Z
LAST-MODIFIED:20210107T140705Z
UID:10035-1610460000-1610463600@ndisac.org
SUMMARY:Protecting Customer Data
DESCRIPTION:As a small business owner\, it’s your job to protect not only your business’ data\, but also your customers’ data from breaches and theft. In this webinar\, Malcolm Web\, Team Lead for Identity and Cyber Protection Services at Generali Global Assistance\, will discuss the business need of protecting customer data\, the tools you can use to help monitor and protect data\, and how to minimize your risk.
URL:https://ndisac.org/dibscc/events/protecting-customer-data/
LOCATION:Virtual Conference
CATEGORIES:Cybersecurity,Privacy
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201130
DTEND;VALUE=DATE:20201219
DTSTAMP:20260416T040305
CREATED:20200804T003740Z
LAST-MODIFIED:20200804T102741Z
UID:9538-1606694400-1608335999@ndisac.org
SUMMARY:AWS re:Invent
DESCRIPTION:We invite you to join us for keynotes\, launches\, sessions\, and more—presented across 3 weeks from Nov. 30 – Dec. 18.
URL:https://ndisac.org/dibscc/events/aws-reinvent/
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201116
DTEND;VALUE=DATE:20201119
DTSTAMP:20260416T040305
CREATED:20200728T164411Z
LAST-MODIFIED:20200804T102323Z
UID:9409-1605484800-1605743999@ndisac.org
SUMMARY:11th Annual NICE Conference and Expo
DESCRIPTION:The annual National Initiative for Cybersecurity Education (NICE) Conference and Expo brings together thought leaders from industry\, government\, academia\, and non-profit organizations to address the community’s cybersecurity education\, training\, and workforce needs. This event provides an opportunity to share best practices from around the world and across sectors in order to build the workforce we need to confront cybersecurity risks today and in years to come.
URL:https://ndisac.org/dibscc/events/11th-annual-nice-conference-and-expo/
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201110
DTEND;VALUE=DATE:20201112
DTSTAMP:20260416T040305
CREATED:20200804T003526Z
LAST-MODIFIED:20200804T102219Z
UID:9535-1604966400-1605139199@ndisac.org
SUMMARY:TribalNet 2020 Annual Conference
DESCRIPTION:As a way to connect with tribal technology decision makers and business leaders\, the 2020 TribalNet VIRTUAL Conference & Tradeshow offers an unparalleled number of opportunities. For over twenty years\, the event has evolved to become the premier platform for businesses\, governments\, and employees to connect and explore the latest in solutions\, best practices\, and technology in tribal gaming\, government and health.
URL:https://ndisac.org/dibscc/events/tribalnet-2020-annual-conference/
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201027T113000
DTEND;TZID=America/New_York:20201027T123000
DTSTAMP:20260416T040305
CREATED:20201008T130148Z
LAST-MODIFIED:20201008T130148Z
UID:9618-1603798200-1603801800@ndisac.org
SUMMARY:How to Bridge the NetOps/SecOps Divide
DESCRIPTION:In this webinar\, we’ll talk about and illustrate how a common set of data can help both teams work and address cybersecurity requirements together. Join us to learn: \n• Why packet capture and flow analysis are important to cybersecurity response and remediation\n• How to complement existing protection\, detection\, and response tools using packet capture\n• Which data sources can be leveraged to ensure comprehensive performance and threat visibility\n• What is ‘enriched’ flow and the added insight it gives you to reduce dwell time for malicious activity
URL:https://ndisac.org/dibscc/events/how-to-bridge-the-netops-secops-divide/
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201026
DTEND;VALUE=DATE:20201029
DTSTAMP:20260416T040305
CREATED:20200804T003234Z
LAST-MODIFIED:20200804T101622Z
UID:9532-1603670400-1603929599@ndisac.org
SUMMARY:10th Annual Cyber Security Summit
DESCRIPTION:At the Cyber Security Summit\, our mission is to produce a multi-stakeholder consortium that brings together industry\, government and academic interests in an effort to improve the state of cyber security on both a domestic and international level.
URL:https://ndisac.org/dibscc/events/10th-annual-cyber-security-summit/
LOCATION:Minneapolis\, MN\, United States
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201014T140000
DTEND;TZID=America/New_York:20201014T150000
DTSTAMP:20260416T040305
CREATED:20201008T151032Z
LAST-MODIFIED:20201008T151032Z
UID:9630-1602684000-1602687600@ndisac.org
SUMMARY:How to Unlock the Security Benefits of the CIS Benchmarks
DESCRIPTION:Adopted globally by governments\, private sector enterprises and academia\, the CIS Benchmarks are critically important for establishing and maintaining a strong\, effective foundation for all of your cyber efforts. \nBy attending this webinar\, you will gain insight into how the CIS Benchmarks are developed\, why they matter\, and effective strategies and approaches for using the Benchmarks to strengthen your own security program. \nLed by experts from the Center for Internet Security and Tenable\, topics covered will include: \n• Identifying and overcoming common challenges of implementing CIS Benchmarks\n• Reducing complexity by strengthening conformance\n• Eliminating audit challenges and compliance headaches\n• How you can join the CIS community to develop and enhance the benchmarks\n• And\, answers to your questions during live Q&A \nWho should attend?\nAll infosec and IT professionals who need to understand\, employ and optimize the use of CIS Benchmarks are encouraged to attend.
URL:https://ndisac.org/dibscc/events/how-to-unlock-the-security-benefits-of-the-cis-benchmarks/
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201013T140000
DTEND;TZID=America/New_York:20201013T150000
DTSTAMP:20260416T040305
CREATED:20201008T130809Z
LAST-MODIFIED:20201008T130809Z
UID:9624-1602597600-1602601200@ndisac.org
SUMMARY:Firewall Chat: Best Practices to Block Ransomware
DESCRIPTION:Ransomware attacks have come back with a vengeance. More than half of organizations admitted to being hit by ransomware in the last year at an eye-watering average remediation cost of $761\,106 per attack. \nOne of the most effective methods for protecting against ransomware attacks like Ryuk\, Sodinokibi\, Maze\, and Ragnar Locker is to fortify your defenses with a properly configured firewall. \nIn this chat\, we’ll discuss how you can incorporate protections into your organization’s IT security strategy to avoid being held hostage by ransomware.
URL:https://ndisac.org/dibscc/events/firewall-chat-best-practices-to-block-ransomware/
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201006
DTEND;VALUE=DATE:20201010
DTSTAMP:20260416T040305
CREATED:20200804T002829Z
LAST-MODIFIED:20200804T103750Z
UID:9529-1601942400-1602287999@ndisac.org
SUMMARY:PCI - 2020 North America Community Meeting
DESCRIPTION:Don’t miss THE data security event of the year for the payment card industry.\nAlthough we will not be together face-to-face\, we will still gather virtually to hear important Council updates\, regional insights\, startling industry reports and are creating an engaging agenda for this multiday virtual event. The North America Community Meeting continues to be an opportunity to bring the PCI SSC community together to network with colleagues\, ask questions\, share information and collaborate
URL:https://ndisac.org/dibscc/events/pci/
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200811T120000
DTEND;TZID=America/New_York:20200811T130000
DTSTAMP:20260416T040305
CREATED:20200714T201456Z
LAST-MODIFIED:20200715T113201Z
UID:9349-1597147200-1597150800@ndisac.org
SUMMARY:Mastering Cybersecurity Asset Management - Once and for All
DESCRIPTION:Understanding your assets is the foundation of cybersecurity\, right? So then why is asset management still such a monster of a problem? As IT environments become increasingly complex\, teams are struggling to keep up
URL:https://ndisac.org/dibscc/events/mastering-cybersecurity-asset-management-once-and-for-all/
CATEGORIES:Cybersecurity
END:VEVENT
END:VCALENDAR