BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//DIB SCC CyberAssist - ECPv6.2.4//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:DIB SCC CyberAssist
X-ORIGINAL-URL:https://ndisac.org/dibscc
X-WR-CALDESC:Events for DIB SCC CyberAssist
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201014T140000
DTEND;TZID=America/New_York:20201014T150000
DTSTAMP:20260406T120051
CREATED:20201008T151032Z
LAST-MODIFIED:20201008T151032Z
UID:9630-1602684000-1602687600@ndisac.org
SUMMARY:How to Unlock the Security Benefits of the CIS Benchmarks
DESCRIPTION:Adopted globally by governments\, private sector enterprises and academia\, the CIS Benchmarks are critically important for establishing and maintaining a strong\, effective foundation for all of your cyber efforts. \nBy attending this webinar\, you will gain insight into how the CIS Benchmarks are developed\, why they matter\, and effective strategies and approaches for using the Benchmarks to strengthen your own security program. \nLed by experts from the Center for Internet Security and Tenable\, topics covered will include: \n• Identifying and overcoming common challenges of implementing CIS Benchmarks\n• Reducing complexity by strengthening conformance\n• Eliminating audit challenges and compliance headaches\n• How you can join the CIS community to develop and enhance the benchmarks\n• And\, answers to your questions during live Q&A \nWho should attend?\nAll infosec and IT professionals who need to understand\, employ and optimize the use of CIS Benchmarks are encouraged to attend.
URL:https://ndisac.org/dibscc/events/how-to-unlock-the-security-benefits-of-the-cis-benchmarks/
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201013T140000
DTEND;TZID=America/New_York:20201013T150000
DTSTAMP:20260406T120051
CREATED:20201008T130809Z
LAST-MODIFIED:20201008T130809Z
UID:9624-1602597600-1602601200@ndisac.org
SUMMARY:Firewall Chat: Best Practices to Block Ransomware
DESCRIPTION:Ransomware attacks have come back with a vengeance. More than half of organizations admitted to being hit by ransomware in the last year at an eye-watering average remediation cost of $761\,106 per attack. \nOne of the most effective methods for protecting against ransomware attacks like Ryuk\, Sodinokibi\, Maze\, and Ragnar Locker is to fortify your defenses with a properly configured firewall. \nIn this chat\, we’ll discuss how you can incorporate protections into your organization’s IT security strategy to avoid being held hostage by ransomware.
URL:https://ndisac.org/dibscc/events/firewall-chat-best-practices-to-block-ransomware/
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201008T120000
DTEND;TZID=America/New_York:20201008T130000
DTSTAMP:20260406T120051
CREATED:20200915T161118Z
LAST-MODIFIED:20200915T161118Z
UID:9591-1602158400-1602162000@ndisac.org
SUMMARY:The Top 3 Areas Where Today’s CISO Need to Focus
DESCRIPTION:The Covid-19 pandemic has had a profound effect on almost every aspect of our life: how we work\, how we travel\, how we shop and how we interact with our friends and families. Even more jarring is that this change happened in a matter of weeks or months\, and we still face a great deal of uncertainty. \nDuring this time the CISO is witnessing their career evolving before their very eyes\, with two words dominating their new career paths: resiliency and agility. Although there has already been a seismic shift in the way many businesses operate the tectonic plates have not finished moving.  Quite how or even when the ground will settle for the long-term is not entirely clear. What is clear\, however\, is that the CISO needs to both keep the business safe and be prepared and flexible enough to support the new reality. \nToday’s CISO needs to be empowered to deal with their historical technical and process debt\, the reality of the situation today\, and the business of the future. Register for this webinar and join us to discuss the top 3 areas today’s CISO needs to be focusing on.
URL:https://ndisac.org/dibscc/events/the-top-3-areas-where-todays-ciso-need-to-focus/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201006
DTEND;VALUE=DATE:20201010
DTSTAMP:20260406T120051
CREATED:20200804T002829Z
LAST-MODIFIED:20200804T103750Z
UID:9529-1601942400-1602287999@ndisac.org
SUMMARY:PCI - 2020 North America Community Meeting
DESCRIPTION:Don’t miss THE data security event of the year for the payment card industry.\nAlthough we will not be together face-to-face\, we will still gather virtually to hear important Council updates\, regional insights\, startling industry reports and are creating an engaging agenda for this multiday virtual event. The North America Community Meeting continues to be an opportunity to bring the PCI SSC community together to network with colleagues\, ask questions\, share information and collaborate
URL:https://ndisac.org/dibscc/events/pci/
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201001T120000
DTEND;TZID=America/New_York:20201001T130000
DTSTAMP:20260406T120051
CREATED:20200915T154125Z
LAST-MODIFIED:20200915T154146Z
UID:9585-1601553600-1601557200@ndisac.org
SUMMARY:Lessons From Election Security Challenges
DESCRIPTION:2020 is poised to be the most critical security landscape for elections – locally\, nationally\, and globally – and this issue will continue to grow and become more complex. Voter data is at risk of compromise\, misinformation is rampant\, and security issues – real or perceived – will remain regardless of regulation. What data analytics\, governance\, audit\, security\, and information management lessons can we learn from the challenges of election security?
URL:https://ndisac.org/dibscc/events/lessons-from-election-security-challenges/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200929T160000
DTEND;TZID=America/New_York:20200929T170000
DTSTAMP:20260406T120051
CREATED:20200915T155407Z
LAST-MODIFIED:20200915T161541Z
UID:9588-1601395200-1601398800@ndisac.org
SUMMARY:Data Protection in the Cloud
DESCRIPTION:Data protection is a core principle of any security strategy and requires visibility into data-at-rest and data-in-motion for effective data loss protection (DLP) policies and rules. Combine this objective with the overwhelming use of cloud apps freely adopted by business units and users\, as well as the increasing number of remote workers and the end result is that you need a modern DLP solution that can scale. As legacy\, on premises solutions are blind to cloud apps and the majority of data movement\, a new protection approach is needed to extend beyond the traditional corporate perimeter.
URL:https://ndisac.org/dibscc/events/data-protection-in-the-cloud/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200923T130000
DTEND;TZID=America/New_York:20200923T140000
DTSTAMP:20260406T120051
CREATED:20200921T212756Z
LAST-MODIFIED:20200921T212756Z
UID:9594-1600866000-1600869600@ndisac.org
SUMMARY:[CMMC Webinar] Get a Handle on CUI Before It's Too Late
DESCRIPTION:Controlled Unclassified Information (CUI) is an integral component of any DOD contract\, and protecting the security of this information is every DOD contractor’s responsibility. \nCUI is critical to managing and protecting our nation’s Intellectual Property (IP). The DOD estimates over $600 billion are lost every year to data exfiltration\, and that’s why CMMC and the protection of CUI have become top priorities. \nJoin us as Leslie Weinstein\, President of CMMC Consulting\, breaks down and explores CUI\, its lifecycle and impact on the defense industrial base. She’ll answer some of your contractors’ most burning questions about CUI\, such as: \n\nHow do I know if I have CUI?\nWhere can I find it?\nWhat happens when it’s no longer used in a contract?\nHow does it flow from the DoD to a Prime\, and then to me?\n\nThis is a webinar you just can’t miss—our nation’s security might depend on it!
URL:https://ndisac.org/dibscc/events/cmmc-webinar-get-a-handle-on-cui-before-its-too-late/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200910T160000
DTEND;TZID=America/New_York:20200910T170000
DTSTAMP:20260406T120051
CREATED:20200828T153953Z
LAST-MODIFIED:20200828T155558Z
UID:9577-1599753600-1599757200@ndisac.org
SUMMARY:KRIS FOR IT RISK MANAGEMENT IN A POST-PANDEMIC WORLD
DESCRIPTION:The COVID-19 pandemic has forced organizations to adapt to the new realities of remote work\, social distancing\, and alternative working arrangements. The new policies introduced to govern these situations have stretched the limits of existing technology and operating capabilities—creating increasing exposure to existing and new IT risks
URL:https://ndisac.org/dibscc/events/kris-for-it-risk-management-in-a-post-pandemic-world/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200817
DTEND;VALUE=DATE:20200820
DTSTAMP:20260406T120051
CREATED:20200715T161714Z
LAST-MODIFIED:20200715T161807Z
UID:9351-1597622400-1597881599@ndisac.org
SUMMARY:GRC Conference Virtual Event
DESCRIPTION:ISACA and The IIA are pleased to once again collaborate to bring you the 2020 Governance\, Risk\, and Control (GRC) Virtual Conference.
URL:https://ndisac.org/dibscc/events/grc-conference-virtual-event/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200811T120000
DTEND;TZID=America/New_York:20200811T130000
DTSTAMP:20260406T120051
CREATED:20200714T201456Z
LAST-MODIFIED:20200715T113201Z
UID:9349-1597147200-1597150800@ndisac.org
SUMMARY:Mastering Cybersecurity Asset Management - Once and for All
DESCRIPTION:Understanding your assets is the foundation of cybersecurity\, right? So then why is asset management still such a monster of a problem? As IT environments become increasingly complex\, teams are struggling to keep up
URL:https://ndisac.org/dibscc/events/mastering-cybersecurity-asset-management-once-and-for-all/
CATEGORIES:Cybersecurity
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200625T140000
DTEND;TZID=America/New_York:20200625T150000
DTSTAMP:20260406T120051
CREATED:20200625T164218Z
LAST-MODIFIED:20200715T111948Z
UID:9313-1593093600-1593097200@ndisac.org
SUMMARY:What Suppliers Need to be Doing Now: CMMC Roll-Out Update
DESCRIPTION:Nearly half way through 2020\, the roll-out of Cybersecurity Maturity Model Certification (CMMC) is progressing toward DoD’s objective of including CMMC requirements in some RFPs before the end of the year. The CMMC Accreditation Body is launching a Provisional Program that\, for an initial set of contracts\, will require Primes and their suppliers to complete the CMMC certification process. \nCMMC Certification will be a requirement for the over 350\,000 vendors in the supply chain to the DOD. If you’re one of them\, it’s time to understand what you need to do and to start preparing now. \nOur experts will discuss:\n• Key milestone for CMMC’s roll-out\n• How the timeline has been affected by COVID-19\n• What Primes are expecting from suppliers and how they’re preparing to help\n• Where you can find help\n• Steps you should be taking now
URL:https://ndisac.org/dibscc/events/what-suppliers-need-to-be-doing-now-cmmc-roll-out-update/
END:VEVENT
END:VCALENDAR