BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//DIB SCC CyberAssist - ECPv6.2.4//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://ndisac.org/dibscc
X-WR-CALDESC:Events for DIB SCC CyberAssist
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20251217T130000
DTEND;TZID=America/New_York:20251217T150000
DTSTAMP:20260404T145814
CREATED:20251015T173444Z
LAST-MODIFIED:20251015T173521Z
UID:17199-1765976400-1765983600@ndisac.org
SUMMARY:DIB SCC Supply Chain Cyber Academy
DESCRIPTION:The DIB SCC is conducting its Supply Chain Cyber Academy\, with a 2-hour training webinar being held once per month through the end of calendar year 2025. \nThe intent of this training is to build awareness for Defense Industrial Base (DIB) suppliers of the Cybersecurity Maturity Model Certification (CMMC) and their obligation to meet FAR 52.204-21 (basic cyber hygiene) and DFARS 252.204-7012 (specialized data handling and protection requirements). \nLink to training materials: https://ndisac.org/dibscc/cyberassist/cybersecurity-maturity-model-certification/cmmc-training/# \nUse the link below to register for this session. \nDate: December 17\nTime: 1:00 – 3:00 PM\nRegistration Link \n  \n 
URL:https://ndisac.org/dibscc/events/dib-scc-supply-chain-cyber-academy/
LOCATION:Virtual Conference
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260210T130000
DTEND;TZID=America/New_York:20260210T143000
DTSTAMP:20260404T145814
CREATED:20260203T151131Z
LAST-MODIFIED:20260203T151131Z
UID:17404-1770728400-1770733800@ndisac.org
SUMMARY:FISSEA Winter Forum - Increasing Cybersecurity Awareness: The Human Firewall
DESCRIPTION:FISSEA Forums are designed to provide opportunities for policy and programmatic updates\, the exchange of best practices\, and discussion and engagement among members of the Federal Information Security Educators (FISSEA) community. \nThe theme for the 2026 FISSEA Forums\, Increasing Cybersecurity Awareness: The Human Firewall\, highlights that human behavior is key to developing cybersecurity awareness and training programs. The theme focuses on humans at the center of education and training\, including how humans can leverage emerging technologies to strengthen their efforts.
URL:https://ndisac.org/dibscc/events/fissea-winter-forum-increasing-cybersecurity-awareness-the-human-firewall/
LOCATION:Virtual Conference
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260217T150000
DTEND;TZID=America/New_York:20260217T160000
DTSTAMP:20260404T145814
CREATED:20260203T151541Z
LAST-MODIFIED:20260203T151541Z
UID:17406-1771340400-1771344000@ndisac.org
SUMMARY:Convene Chats - 2026 Cybersecurity Predictions and Impact on Human Risk
DESCRIPTION:In 2026\, cybersecurity predictions point to AI driving a major shift in human risk: threat actors will use AI to scale highly believable social engineering and accelerate exploitation\, while rapid AI adoption inside organizations expands the attack surface through new integrations\, porous access\, weak governance\, and limited visibility. This session focuses on how to respond by treating AI as part of the defense and part of the risk surface\, using it to continuously understand why risky actions happen\, reduce friction that leads to mistakes\, and deliver personalized\, in-the-moment guidance that helps people make safer decisions without slowing work. We’ll also cover how to monitor and govern human and AI agents together\, because when agents are connected to business systems they can replicate access and decision patterns at scale\, making visibility\, behavioral context\, and tighter access controls essential to reducing total workforce risk.
URL:https://ndisac.org/dibscc/events/convene-chats-2026-cybersecurity-predictions-and-impact-on-human-risk/
LOCATION:Virtual Conference
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260223T130000
DTEND;TZID=America/New_York:20260223T150000
DTSTAMP:20260404T145814
CREATED:20260203T175901Z
LAST-MODIFIED:20260203T175929Z
UID:17409-1771851600-1771858800@ndisac.org
SUMMARY:DIB SCC Supply Chain Cyber Academy
DESCRIPTION:The Defense Industrial Base Sector Coordinating Council (DIBSCC) is hosting the Supply Chain Cyber Academy webinar series\, with a 2-hour training webinar series being held through calendar year 2026.  Note that these webinars will all contain the same information\, so there is no need to register for more than one session. \nThe intent of this training is to build awareness for Defense Industrial Base (DIB) suppliers of the likely requirements of the Cybersecurity Maturity Model Certification (CMMC) and their obligation to meet FAR 52.204-21 (basic cyber hygiene) and DFARS 252.204-7012 (specialized data handling and protection requirements). \nLink to training materials:  https://ndisac.org/dibscc/cyberassist/cybersecurity-maturity-model-certification/cmmc-training/# \nUse the link below to register for this session. \nDate: February 23\nTime:1:00 – 3:00 PM\nRegistration Link \n  \n 
URL:https://ndisac.org/dibscc/events/dib-scc-supply-chain-cyber-academy-2/
LOCATION:Virtual Conference
CATEGORIES:CMMC,Cybersecurity,NIST SP 800-171,NIST SP 800-172
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260224
DTEND;VALUE=DATE:20260225
DTSTAMP:20260404T145814
CREATED:20260203T150559Z
LAST-MODIFIED:20260203T150650Z
UID:17397-1771891200-1771977599@ndisac.org
SUMMARY:CMMC AB February 2026 Town Hall
DESCRIPTION:Subscribe for Updates or to get invites here: https://cyberab.org/Get-Updates
URL:https://ndisac.org/dibscc/events/cmmc-ab-february-2026-town-hall/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260303T140000
DTEND;TZID=America/New_York:20260303T150000
DTSTAMP:20260404T145814
CREATED:20260226T144726Z
LAST-MODIFIED:20260226T144726Z
UID:17439-1772546400-1772550000@ndisac.org
SUMMARY:SANS - Trust Your Vendors\, Do You?
DESCRIPTION:Organizations increasingly depend on vast ecosystems of thirdparty vendors\, expanding their operational capacity—but also their attack surface and risk exposure. This talk challenges trustby-default approaches to vendor relationships and makes the case for a modern\, thirdparty risk management (TPRM) program. We begin by framing why vendor risk matters\, examine realworld breach case studies to illustrate how upstream dependencies and fourthparty links can amplify impact. The session will highlight regulatory drivers—NIS2\, DORA\, and GDPR—and translates them into practical expectations for supplychain security\, continuous oversight\, and incident reporting. We analyze limitations of traditional questionnaires (SIG/CAIQ)\, which are static\, selfreported\, and often out of date\, and propose a continuous TPRM lifecycle: riskbased vendor tiering\, due diligence proportional to criticality\, automated external posture monitoring\, corrective action tracking\, and secure offboarding.
URL:https://ndisac.org/dibscc/events/sans-trust-your-vendors-do-you/
LOCATION:Virtual Conference
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260306T120000
DTEND;TZID=America/New_York:20260306T130000
DTSTAMP:20260404T145814
CREATED:20260226T144409Z
LAST-MODIFIED:20260226T144409Z
UID:17437-1772798400-1772802000@ndisac.org
SUMMARY:NIST Information Technology Laboratory AI Webinar Series: The International AI Standards Landscape and ITL’s Role\, Priorities\, and Progress
DESCRIPTION:NIST’s Information Technology Laboratory (ITL) AI Program invites you to join an interactive webinar on the international AI standards landscape and ITL’s role\, priorities\, and progress. \nThe webinar will include an overview on the current state of the international AI standards ecosystem\, and ITL’s progress in accelerating and broadening participation in the standardization process. The session also will identify specific opportunities for the community to get more involved in ITL’s AI standards-related efforts and the standards ecosystem more broadly. \nThis webinar is the first in a series hosted by ITL which will offer overviews and updates on ITL’s AI Program.
URL:https://ndisac.org/dibscc/events/nist-information-technology-laboratory-ai-webinar-series-the-international-ai-standards-landscape-and-itls-role-priorities-and-progress/
LOCATION:Virtual Conference
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260309T120000
DTEND;TZID=America/New_York:20260309T130000
DTSTAMP:20260404T145814
CREATED:20260226T145350Z
LAST-MODIFIED:20260226T145350Z
UID:17449-1773057600-1773061200@ndisac.org
SUMMARY:Gartner - Top Trends in Cybersecurity for 2026
DESCRIPTION:Accelerating AI and agentic AI adoption\, an increasingly volatile threat landscape\, and mounting regulatory pressures are stretching cybersecurity programs to their limits — and redefining the role of the CISO. In 2026\, cybersecurity leaders must balance business innovation with proactive resilience\, making informed decisions about where to invest\, where to automate\, and where to elevate human judgment.
URL:https://ndisac.org/dibscc/events/gartner-top-trends-in-cybersecurity-for-2026/
LOCATION:Virtual Conference
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260311T103000
DTEND;TZID=America/New_York:20260311T133000
DTSTAMP:20260404T145814
CREATED:20260226T144839Z
LAST-MODIFIED:20260226T144839Z
UID:17442-1773225000-1773235800@ndisac.org
SUMMARY:2026 SANS State of Identity Threats & Defenses Survey Insights Event: How Identity Became the New Security Perimeter—And What’s Next
DESCRIPTION:Identity has become the new battleground. From SaaS to cloud to legacy Active Directory\, it is now the central control point—and attackers know it. Credential theft\, token hijacking\, and consent abuse are on the rise\, and defenders must adapt quickly. The 2026 SANS Identity Threat & Defenses Survey delivers benchmarks and real-world data to help you strengthen your defenses. Join this exclusive webcast to explore findings that matter for both security leaders and hands-on practitioners.
URL:https://ndisac.org/dibscc/events/2026-sans-state-of-identity-threats-defenses-survey-insights-event-how-identity-became-the-new-security-perimeter-and-whats-next/
LOCATION:Virtual Conference
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260318T140000
DTEND;TZID=America/New_York:20260318T150000
DTSTAMP:20260404T145814
CREATED:20260226T144102Z
LAST-MODIFIED:20260226T144546Z
UID:17432-1773842400-1773846000@ndisac.org
SUMMARY:NICE Webinar - Preparing Tomorrow’s Workforce: Insights into Cyber Workforce Trends
DESCRIPTION:What are the biggest cyber workforce trends that cyber leaders and employers need to be aware of in order to anticipate\, plan for\, and build a workforce ready for what tomorrow brings? In this webinar we will explore research insights that give a glimpse of today’s shifts that are likely to have long-term implications for workforce planning and management. From uncovering details about workforce supply-and-demand gaps and career-entry challenges to strategic planning in light of emerging technologies such as AI\, to skills-focused talent strategies\, you will hear the latest insights on what you need to know to start preparing for tomorrow’s workforce today.
URL:https://ndisac.org/dibscc/events/nice-webinar-preparing-tomorrows-workforce-insights-into-cyber-workforce-trends/
LOCATION:Virtual Conference
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260319T120000
DTEND;TZID=America/New_York:20260319T130000
DTSTAMP:20260404T145814
CREATED:20260226T145456Z
LAST-MODIFIED:20260226T145456Z
UID:17452-1773921600-1773925200@ndisac.org
SUMMARY:Gartner - Cybersecurity’s Top Projects for 2026: What CISOs Must Deliver Next
DESCRIPTION:Cybersecurity leaders are entering 2026 facing unprecedented pressures — from securing AI‑driven environments and defending against deepfakes to preparing for postquantum threats that could undermine today’s cryptography. At the same time\, CISOs must enable innovation and strengthen enterprise resilience. This webinar explores Gartner’s top eight cybersecurity projects for 2026\, outlining where to focus time\, talent and investment over the next 12 months.
URL:https://ndisac.org/dibscc/events/gartner-cybersecuritys-top-projects-for-2026-what-cisos-must-deliver-next/
LOCATION:Virtual Conference
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260319T153000
DTEND;TZID=America/New_York:20260319T163000
DTSTAMP:20260404T145814
CREATED:20260226T145030Z
LAST-MODIFIED:20260226T145030Z
UID:17444-1773934200-1773937800@ndisac.org
SUMMARY:SANS - Using MITRE ATT&CK as an Operational Framework: Prioritizing\, Testing\, and Sustaining Defense
DESCRIPTION:The MITRE ATT&CK framework has become a cornerstone for understanding\, mapping\, and improving cybersecurity defenses\, but turning that knowledge into measurable results is where many teams struggle. \nJoin SANS Instructor Chris Crowley and Tidal Cyber Co-Founder and Chief Innovation Officer Frank Duff on March 19\, 2025\, at 3:30 p.m. ET to explore how to move beyond theory and operationalize MITRE ATT&CK across your environment. You’ll learn how to prioritize threats relevant to your sector\, map defensive coverage to tactics and techniques\, and continuously validate your confidence levels with simulations and real-world testing. Join us to discover how leading organizations are using ATT&CK to transform visibility into action and complexity into confidence.
URL:https://ndisac.org/dibscc/events/sans-using-mitre-attck-as-an-operational-framework-prioritizing-testing-and-sustaining-defense/
LOCATION:Virtual Conference
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260325T130000
DTEND;TZID=America/New_York:20260325T150000
DTSTAMP:20260404T145814
CREATED:20260203T180117Z
LAST-MODIFIED:20260203T180117Z
UID:17412-1774443600-1774450800@ndisac.org
SUMMARY:DIB SCC Supply Chain Cyber Academy
DESCRIPTION:The Defense Industrial Base Sector Coordinating Council (DIBSCC) is hosting the Supply Chain Cyber Academy webinar series\, with a 2-hour training webinar series being held through calendar year 2026.  Note that these webinars will all contain the same information\, so there is no need to register for more than one session. \nThe intent of this training is to build awareness for Defense Industrial Base (DIB) suppliers of the likely requirements of the Cybersecurity Maturity Model Certification (CMMC) and their obligation to meet FAR 52.204-21 (basic cyber hygiene) and DFARS 252.204-7012 (specialized data handling and protection requirements). \nLink to training materials:  https://ndisac.org/dibscc/cyberassist/cybersecurity-maturity-model-certification/cmmc-training/# \nUse the link below to register for this session. \nDate: March 25\nTime:1:00 – 3:00 PM\nRegistration Link \n  \n 
URL:https://ndisac.org/dibscc/events/dib-scc-supply-chain-cyber-academy-3/
LOCATION:Virtual Conference
CATEGORIES:CMMC,Cybersecurity,NIST SP 800-171,NIST SP 800-172
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260326T100000
DTEND;TZID=America/New_York:20260326T110000
DTSTAMP:20260404T145814
CREATED:20260226T145213Z
LAST-MODIFIED:20260226T145213Z
UID:17446-1774519200-1774522800@ndisac.org
SUMMARY:CDSE - Understanding Basic Malware
DESCRIPTION:This introductory webinar examines the current malware landscape\, identifying the seven most prevalent threats facing digital environments. Grounded in NIST standards\, the presentation moves beyond basic terminology to cover specific attack mechanisms\, essential defensive controls\, and the official framework for incident response.\n\nAgenda:\nDefining Malware: Official definitions and the "Big 7" threat classifications.\nAttack Vectors: Vulnerabilities\, phishing\, and bundling.\nPrevention: Seven core strategies to harden devices and accounts.\nIncident Response: Applying the NIST CSF 2.0 model (Detect\, Respond\, Recover).
URL:https://ndisac.org/dibscc/events/cdse-understanding-basic-malware/
LOCATION:Virtual Conference
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260326T153000
DTEND;TZID=America/New_York:20260326T173000
DTSTAMP:20260404T145814
CREATED:20260226T145613Z
LAST-MODIFIED:20260226T145613Z
UID:17454-1774539000-1774546200@ndisac.org
SUMMARY:SANS - Cyber42: Make Security Culture Your Secret Weapon
DESCRIPTION:In this workshop\, we’ll address security culture – what it is\, why it’s important\, and most importantly\, how to positively shape your security culture to build resilience. We’ll cover useful models and frameworks to support change\, and we’ll give you a simple and straightforward blueprint for successful change. Next\, you’ll get to put those skills into practice\, using Cyber42. Cyber42 is a fast-paced leadership game that puts you in the hot seat\, making tough calls for a fictitious organization facing mounting cyber risks. Each scenario tests your ability to balance technology\, strategy\, and culture. After each round\, guided group discussions reveal trade-offs\, and the winner is crowned for delivering the greatest security and cultural impact.
URL:https://ndisac.org/dibscc/events/sans-cyber42-make-security-culture-your-secret-weapon/
LOCATION:Virtual Conference
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260331
DTEND;VALUE=DATE:20260401
DTSTAMP:20260404T145814
CREATED:20260203T150745Z
LAST-MODIFIED:20260203T150745Z
UID:17400-1774915200-1775001599@ndisac.org
SUMMARY:CMMC AB March 2026 Town Hall
DESCRIPTION:Subscribe for Updates or to get invites here: https://cyberab.org/Get-Updates
URL:https://ndisac.org/dibscc/events/cmmc-ab-march-2026-town-hall/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260331
DTEND;VALUE=DATE:20260402
DTSTAMP:20260404T145814
CREATED:20260226T144239Z
LAST-MODIFIED:20260226T144509Z
UID:17434-1774915200-1775087999@ndisac.org
SUMMARY:Cybersecurity for IoT Workshop: Future Directions
DESCRIPTION:This workshop will discuss emerging and future trends for IoT technologies and their implications for IoT cybersecurity. As IoT becomes more sophisticated\, automated and ubiquitous\, it becomes increasingly important for IoT cybersecurity considerations to keep pace with emerging risks and threats.
URL:https://ndisac.org/dibscc/events/cybersecurity-for-iot-workshop-future-directions/
LOCATION:Gaithersburg\, Maryland
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260428
DTEND;VALUE=DATE:20260429
DTSTAMP:20260404T145814
CREATED:20260203T150850Z
LAST-MODIFIED:20260203T150850Z
UID:17402-1777334400-1777420799@ndisac.org
SUMMARY:CMMC AB April 2026 Town Hall
DESCRIPTION:Subscribe for Updates or to get invites here: https://cyberab.org/Get-Updates
URL:https://ndisac.org/dibscc/events/cmmc-ab-april-2026-town-hall/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260429T130000
DTEND;TZID=America/New_York:20260429T150000
DTSTAMP:20260404T145814
CREATED:20260203T180213Z
LAST-MODIFIED:20260203T180213Z
UID:17413-1777467600-1777474800@ndisac.org
SUMMARY:DIB SCC Supply Chain Cyber Academy
DESCRIPTION:The Defense Industrial Base Sector Coordinating Council (DIBSCC) is hosting the Supply Chain Cyber Academy webinar series\, with a 2-hour training webinar series being held through calendar year 2026.  Note that these webinars will all contain the same information\, so there is no need to register for more than one session. \nThe intent of this training is to build awareness for Defense Industrial Base (DIB) suppliers of the likely requirements of the Cybersecurity Maturity Model Certification (CMMC) and their obligation to meet FAR 52.204-21 (basic cyber hygiene) and DFARS 252.204-7012 (specialized data handling and protection requirements). \nLink to training materials:  https://ndisac.org/dibscc/cyberassist/cybersecurity-maturity-model-certification/cmmc-training/# \nUse the link below to register for this session. \nDate: April 29\nTime:1:00 – 3:00 PM\nRegistration Link \n  \n 
URL:https://ndisac.org/dibscc/events/dib-scc-supply-chain-cyber-academy-4/
LOCATION:Virtual Conference
CATEGORIES:CMMC,Cybersecurity,NIST SP 800-171,NIST SP 800-172
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260514T130000
DTEND;TZID=America/New_York:20260514T150000
DTSTAMP:20260404T145814
CREATED:20260203T180346Z
LAST-MODIFIED:20260203T180417Z
UID:17414-1778763600-1778770800@ndisac.org
SUMMARY:DIB SCC Supply Chain Cyber Academy
DESCRIPTION:The Defense Industrial Base Sector Coordinating Council (DIBSCC) is hosting the Supply Chain Cyber Academy webinar series\, with a 2-hour training webinar series being held through calendar year 2026.  Note that these webinars will all contain the same information\, so there is no need to register for more than one session. \nThe intent of this training is to build awareness for Defense Industrial Base (DIB) suppliers of the likely requirements of the Cybersecurity Maturity Model Certification (CMMC) and their obligation to meet FAR 52.204-21 (basic cyber hygiene) and DFARS 252.204-7012 (specialized data handling and protection requirements). \nLink to training materials:  https://ndisac.org/dibscc/cyberassist/cybersecurity-maturity-model-certification/cmmc-training/# \nUse the link below to register for this session. \nDate: May 14\nTime:1:00 – 3:00 PM\nRegistration Link \n  \n 
URL:https://ndisac.org/dibscc/events/dib-scc-supply-chain-cyber-academy-5/
LOCATION:Virtual Conference
CATEGORIES:CMMC,Cybersecurity,NIST SP 800-171,NIST SP 800-172
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260623T130000
DTEND;TZID=America/New_York:20260623T150000
DTSTAMP:20260404T145814
CREATED:20260203T180524Z
LAST-MODIFIED:20260203T180524Z
UID:17415-1782219600-1782226800@ndisac.org
SUMMARY:DIB SCC Supply Chain Cyber Academy
DESCRIPTION:The Defense Industrial Base Sector Coordinating Council (DIBSCC) is hosting the Supply Chain Cyber Academy webinar series\, with a 2-hour training webinar series being held through calendar year 2026.  Note that these webinars will all contain the same information\, so there is no need to register for more than one session. \nThe intent of this training is to build awareness for Defense Industrial Base (DIB) suppliers of the likely requirements of the Cybersecurity Maturity Model Certification (CMMC) and their obligation to meet FAR 52.204-21 (basic cyber hygiene) and DFARS 252.204-7012 (specialized data handling and protection requirements). \nLink to training materials:  https://ndisac.org/dibscc/cyberassist/cybersecurity-maturity-model-certification/cmmc-training/# \nUse the link below to register for this session. \nDate: June 23\nTime:1:00 – 3:00 PM\nRegistration Link \n  \n 
URL:https://ndisac.org/dibscc/events/dib-scc-supply-chain-cyber-academy-6/
LOCATION:Virtual Conference
CATEGORIES:CMMC,Cybersecurity,NIST SP 800-171,NIST SP 800-172
END:VEVENT
END:VCALENDAR