BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//UMSA - ECPv6.15.15//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:UMSA
X-ORIGINAL-URL:https://umsafoundation.org
X-WR-CALDESC:Events for UMSA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20190310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20191103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20200308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20201101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20210314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20211107T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20220313T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20221106T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210513T120000
DTEND;TZID=America/Chicago:20210513T130000
DTSTAMP:20260404T170056
CREATED:20210505T153546Z
LAST-MODIFIED:20210505T153832Z
UID:3459-1620907200-1620910800@umsafoundation.org
SUMMARY:ASIS Chapter Meeting: The Security Industry’s Response to COVID-19 1 Year Later
DESCRIPTION:The ASIS Board will be hosting a virtual chapter meeting Thursday May 13\, 2021 from 12-1pm. We’ve invited back the panelists from last year’s discussion to answer questions on how the pandemic has changed the landscape of their security program and technology as we look at retuning to work. \nPanelists:\nNate Pearson; Sr Manager\, Physical Security\, General Mills\nMatt Blake\, Director Corporate Security\, Target\nScott Brownell\, Global Security Manager\, 3M
URL:https://umsafoundation.org/event/asis-chapter-meeting-the-security-industrys-response-to-covid-19-1-year-later/
LOCATION:Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210430T133000
DTEND;TZID=America/Chicago:20210430T163000
DTSTAMP:20260404T170056
CREATED:20210329T200918Z
LAST-MODIFIED:20210329T200918Z
UID:3450-1619789400-1619800200@umsafoundation.org
SUMMARY:WiCysMN - Golf Clinic & Networking Reception "Links & Drinks"
DESCRIPTION:Joins us for a short game clinic and networking reception at Hazeltine National Golf Club in Chaska\, Minnesota \nFriday\, April 30th\, from 1:30—4:30pm \nFree for WiCyS Members | $99 for Non-Members
URL:https://umsafoundation.org/event/wicysmn-golf-clinic-networking-reception-links-drinks/
LOCATION:Hazeltine National Golf Club\, 1900 Hazeltine Blvd\,\, Chaska\, MN\, 55318\, United States
CATEGORIES:General
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20210422
DTEND;VALUE=DATE:20210424
DTSTAMP:20260404T170056
CREATED:20210318T201123Z
LAST-MODIFIED:20210318T201331Z
UID:3445-1619049600-1619222399@umsafoundation.org
SUMMARY:HIPAA COW 2021 Spring Virtual Conference
DESCRIPTION:Thursday\, April 22 \n\nKeynote: Security Risk Analyses and Risk Management\nPanel Discussion: Telehealth\nPatients & Patience – Healthcare Delivery After a Cyber Attack\n\nFriday\, April 23 \n\nKeynote – What’s Next? Information Blocking: Compliance and Enforcement\nPanel Discussion: Information Blocking – Security Perspective\nPanel Discussion: Information Blocking – Privacy Perspective
URL:https://umsafoundation.org/event/hipaa-cow-2021-spring-virtual-conference/
LOCATION:Webinar
CATEGORIES:General
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210415T153000
DTEND;TZID=America/Chicago:20210415T170000
DTSTAMP:20260404T170056
CREATED:20210329T194014Z
LAST-MODIFIED:20210329T194014Z
UID:3448-1618500600-1618506000@umsafoundation.org
SUMMARY:ISACA - April Roundtable: Career Branding - What's your Image?
DESCRIPTION:Session Title: Career Branding – What’s your Image? \nSession Description: Do you know your brand? What’s your unique promise of value to your co-workers\, leaders\, and organization? In this session\, Cindy Edwards (Find Your Fit\, LLC) will break down the concept of professional branding and help you look at who you are\, your identity\, and how you show up\, your integrity. Come away with ideas for how to brand yourself professionally in and out of the workplace.\n \nSpeaker Name: Cindy Edwards
URL:https://umsafoundation.org/event/isaca-april-roundtable-career-branding-whats-your-image/
LOCATION:Webinar
CATEGORIES:General
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210415T130000
DTEND;TZID=America/Chicago:20210415T163000
DTSTAMP:20260404T170056
CREATED:20210329T200209Z
LAST-MODIFIED:20210329T201331Z
UID:3449-1618491600-1618504200@umsafoundation.org
SUMMARY:MN ISSA - Vectra Red Team Workshop
DESCRIPTION:PLEASE NOTE: This is for Registered MN ISSA Members Only \nImprove and sharpen your threat hunting skills and earn 3.5 CPE credits at this upcoming free\, hands-on Red Team training. \nJoin your security peers to learn the skills and tactics attackers use to work their way into enterprises and gain insight into threat hunting techniques. Then put your new knowledge to the test in an interactive open play as a Red Team attacker. \nNo special tools needed! Workshops fill up quickly\, so register today to secure your spot. \nPLEASE NOTE: The registration link will take you to the Vectra registration site. \nAgenda: \n1:00 – 1:30 PM ET Introduction & Instructor-led training \n1:30 – 3:30 PM ET Open\, free-play will instructor available \n3:30 – 4:30 PM ET Red Team insights / Q&A \n 
URL:https://umsafoundation.org/event/mn-issa-vectra-red-team-workshop/
LOCATION:MN
CATEGORIES:General
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210408T133000
DTEND;TZID=America/Chicago:20210408T150000
DTSTAMP:20260404T170056
CREATED:20210329T191837Z
LAST-MODIFIED:20210329T191924Z
UID:3447-1617888600-1617894000@umsafoundation.org
SUMMARY:BCPA - April Meeting: Applying Telework for Fiscal and Operational Performance
DESCRIPTION:How Does a Strategic Business Continuity / Disaster Recovery program benefit from a Strategic Telework Program? \nContinuity planning is one of the fundamental keys to an organization’s Strategic Deployment Plans.  In order to remotely support a total facility disaster\, every role must be identified and analyzed to determine how that role is fulfilled.  To ensure that all of these roles are sustained remotely\, a significant staff deployment is required.  The level of continuity-assigned remote workers\, defines the facility right-sizing process\, the greater the number of staff deployed\, the greater the demand for space is reduced.  This facility reduction requires a plan.  In addition\, the products and services that employees would need to accomplish their COOP assignments modifies the configurations provided to other remote employees in the same occupation.  This also provides another set of training modules.  The Continuity Plan consists of different deployment levels based upon the levels and types of disaster deployment. \nJohn Sanger’s career has evolved in response to his ever-increasing concern about the viability of “Community”; two principles have remained constant\, his project outcomes must first of all be economically sustainable and secondly\, the benefits must be applied to all stakeholders. \nBefore forming Tele-Commuter Resources (TCR) he supported city planning efforts and performed the largest EIS at the time for Cedar Riverside and Jonathon; the experience defined the benefits of strategic integration.  Developing several MIS projects defined the challenge of strategic vs. transactional system development. \nIn 1991\, John convened a group of colleagues to determine how to best apply information age technology to address rural degeneration. They formed Tele-Commuter Resources in 1992 as a non-profit\, dedicated to “Building Stronger Communities through Telecommuting”.  Over the years\, reports to the legislature included a Checklist for Action that focused on 27 suggestions about how to prepare the state for the Information Age.  This led to passing two laws\, one establishing the state’s telework program and the other applying strategic telework to the bonding process to “right-size” state office facilities.  TCR’s first 2 years conducted extensive research which concluded that corporate telework was the fundamental application to achieve TCR’s mission and that the dominant ad hoc approach was woefully inadequate to fulfill it. The magnitude of the telework potential was demonstrated by the 25 telework assessments TCR conducted; they found an average of 60% deplorability and that no organization knew how to achieve it. \nIn 2020\, TCR received a patent for its Workforce Virtualization Program\, an integrated software/consultant process that: \n\ndevelops a deployment plan based upon business continuity\, facility right-sizing and a comprehensive staff deployment process\nsupports the creation of the Regional Monitor which:\n\n\na)establishes the first national database for telework policy and best practice research\, and\nb)generates a data collection and analysis process to support community decision-making\n\n\nprovides for an urban partnership to support transportation and infrastructure forecasting\, emergency management planning\, and which offers a significant climate change impact\, while laying the groundwork for\nimplementing the Smart Region Concept (patent pending) which rebalances the demographic profile in our rural communities\, integrates the urban-rural economies\, establishes the first state-wide comprehensive plan\, establishes a powerful political role for “community”\n\n 
URL:https://umsafoundation.org/event/april-bcpa-meeting-applying-telework-for-fiscal-and-operational-performance/
LOCATION:Webinar
CATEGORIES:General
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210325T083000
DTEND;TZID=America/Chicago:20210325T163000
DTSTAMP:20260404T170056
CREATED:20210226T201915Z
LAST-MODIFIED:20210308T152845Z
UID:3439-1616661000-1616689800@umsafoundation.org
SUMMARY:Impact of COVID-19 on Enterprise Security Controls
DESCRIPTION:When:  Mar 25\, 2021 from 8:30 AM to 4:30 PM (CT)\n\n\n\n\n\n\nTime:  8:30 AM – 4:30 PM \nLocation Name:  Virtual – Zoom Link to be provided by MISTI \nCredits: 8.0 \nFee: $50 for members\, $100 for non-members \nInstructor: Fred C. Roth \n\n\n\n\nThe COVID-19 pandemic has resulted in many employees working from home.  The transition from working in the office to working at home was abrupt with minimal time to establish a strategy for a secure telecommuting environment.  As a result\, there is solid evidence of a significant increase in cyberattacks focused on employees working from home. \nAudit’s charter is to assess risk and provide an independent opinion to Management and Board of Directors.  Enterprise information security risks have significantly increased due to COVID-19.  Should Audit address this new information security risk environment? \nDuring this one-day seminar we will review the short-term and long-term security and control challenges resulting from the COVID-19 pandemic. \nCourse Agenda: \n\nCOVID-19 Risk Assessment and Audit Planning\n\n\nCOVID-19 related security threats\, risks\, and exposures\nIdentifying short-term and long-term information security risks\nReview of recent security incidents including increased phishing\, ransomware\, and attacks on working from home environments.\n\n\nAddressing Working from Home (WFH) Risks\n\n\nRisks and advantages of working remotely\nDetermining appropriate WFH controls\nWFH ideal security & control scenarios\nMalware / ransomware protection\nEnd Point Security / Zero Trust Model\n\n\nAssessing long term risks and controls\n\n\nDefining what the “New World” will look like\nDetermining long term risks & controls including:\n\nMulti-factor authentication\nPrivileged access monitoring\nVulnerability assessments\nLog management / threat detection\nPatch management\nWeb application / server risks\n\n\nRecommended control and security resources to include:\n\nCenter for Internet Security 20 Controls\nNIST Cybersecurity Framework\nOWASP – Top Ten Web Application Security Risks\n\n\n\nRegistration Links: \nSummary: https://www.cvent.com/d/sjq199 \nStraight to Registration: https://www.cvent.com/d/sjq199/4W
URL:https://umsafoundation.org/event/impact-of-covid-19-on-enterprise-security-controls/
LOCATION:Webinar
CATEGORIES:General
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210323T130000
DTEND;TZID=America/Chicago:20210323T141500
DTSTAMP:20260404T170056
CREATED:20210226T171610Z
LAST-MODIFIED:20210308T152910Z
UID:3438-1616504400-1616508900@umsafoundation.org
SUMMARY:MN ISSA – March Chapter Meeting
DESCRIPTION:Meeting Agenda \n\n1:00 -1:10 Announcements\n1:10-1:55 Presentation\n1:55-2:15 Special Guest and Wrap-up\n\nSpeaker: \nShannon Garcia \nShannon is responsible for Kudelski’s Offensive Security Services and Security Integration Consulting. Shannon began her career at AMD in Product Engineering as a Quality & Reliability Engineer. She held various roles during her tenure including 3rd party platform validation\, CPU analysis\, system-level debug\, Quality Account Management\, Business Process Improvement (Lean/Six Sigma) Consulting\, and Program/Project Management. She then transitioned into cybersecurity working for Trustwave leading their Application Security Analyst team. She then moved on to build the Application Security Testing practice at Secureworks under the Adversary Group to then built capabilities for Defensive Consulting. Shannon then took on the position of Associate Partner for Application Security at IBM leading the NA practice building service offerings for Secure SDLC and DevSecOps for large enterprise clients. Shannon holds a Bachelor of Science in Electrical Engineering from Texas A&M University. \nAbstract:\n \nIn this “move fast” world we live in\, we expect a lot from our applications and their security is no longer a luxury\, but rather a necessity. With the increase in online traffic\, you’re having to contend with increased risk associated with automation (BOTs)\, exploitations\, credential stuffing and even fraud. Join us for a fun\, virtual ice cream social on March 23rd to learn about the major classes of threats and what proactive measures you can take to shift the frontline of defense before it starts – we’ll also be sending you two pints of Izzy’s Ice Cream and one of their experts will join us to walk through how to make a delicious Affogato!
URL:https://umsafoundation.org/event/mn-issa-march-chapter-meeting/
LOCATION:Webinar
CATEGORIES:General
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210311T133000
DTEND;TZID=America/Chicago:20210311T153000
DTSTAMP:20260404T170056
CREATED:20210226T202223Z
LAST-MODIFIED:20210308T152852Z
UID:3440-1615469400-1615476600@umsafoundation.org
SUMMARY:Certified Cyber Resilience Professional Panel Discussion
DESCRIPTION:Webinar Only\n \nPlease register for BCPA Monthly Meeting by March 11\, 2021 1:30 PM CT.  Registered members and guests will receive an email before the start of the meeting containing information about joining the webinar. \nPresentation Description- Details will be posted soon
URL:https://umsafoundation.org/event/certified-cyber-resilience-professional-panel-discussion/
LOCATION:Webinar
CATEGORIES:General
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210218T090000
DTEND;TZID=America/Chicago:20210218T170000
DTSTAMP:20260404T170056
CREATED:20210129T152742Z
LAST-MODIFIED:20210204T164455Z
UID:3430-1613638800-1613667600@umsafoundation.org
SUMMARY:ISACA - COBIT 2019
DESCRIPTION:Presenter: John Jasinski\nDescription: TBD\nTime: TBD
URL:https://umsafoundation.org/event/isaca-cobit-2019/
LOCATION:Webinar
CATEGORIES:General
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210216T130000
DTEND;TZID=America/Chicago:20210216T153000
DTSTAMP:20260404T170056
CREATED:20210129T152959Z
LAST-MODIFIED:20210204T164501Z
UID:3431-1613480400-1613489400@umsafoundation.org
SUMMARY:MN ISSA - February Chapter Meeting
DESCRIPTION:From Governance to Execution \nA look at the entire incident management competency. Understand how incident management governance correlates to your overall company strategy.\, risk and vendor strategies – while – being a significant component of your daily operations tactically. \nUnderstand some best practice recommendations that apply across all industries\, maturity levels\, and selected frameworks. \nSpeakers: \nKarina Klever\, Klever Compliance \nMeeting Agenda \n\n1:00 -1:15 Announcements\n1:15-2:05 Karina Klever\n2:05-2:25 Break/Cofense and Kudelski Security Sponsor Spotlight\n2:25-3:15  Tony Asher\n3:15-3:30 Wrap Up\n\n 
URL:https://umsafoundation.org/event/mn-issa-february-chapter-meeting/
LOCATION:Webinar
CATEGORIES:General
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210211T190000
DTEND;TZID=America/Chicago:20210211T210000
DTSTAMP:20260404T170056
CREATED:20210129T153206Z
LAST-MODIFIED:20210204T164507Z
UID:3432-1613070000-1613077200@umsafoundation.org
SUMMARY:OWASP - February meeting: The State of IoT security
DESCRIPTION:Details TBD
URL:https://umsafoundation.org/event/owasp-february-meeting-the-state-of-iot-security/
LOCATION:Webinar
CATEGORIES:General
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210211T133000
DTEND;TZID=America/Chicago:20210211T153000
DTSTAMP:20260404T170056
CREATED:20210205T182506Z
LAST-MODIFIED:20210205T182506Z
UID:3433-1613050200-1613057400@umsafoundation.org
SUMMARY:BCPA - Town Hall Event
DESCRIPTION:Come meet your fellow BCPA members and give your feedback on what is valuable in BCPA and how to improve our group. We will divide into breakout groups during this session. \nQuestions include: \nAfter we can meet in person again\, should BCPA meetings continue to include a call-in option? \nWhat are your favorite networking activities? \nWho would you like to hear speak at a BCPA meeting? \nWhat membership benefits do you value most? What other benefits would you like to gain? \nHosted by the BCPA Board of Directors
URL:https://umsafoundation.org/event/bcpa-town-hall-event/
LOCATION:Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210128T130000
DTEND;TZID=America/Chicago:20210128T150000
DTSTAMP:20260404T170056
CREATED:20210108T192431Z
LAST-MODIFIED:20210204T164512Z
UID:3425-1611838800-1611846000@umsafoundation.org
SUMMARY:CSA MN -- Data Rights and the Cloud
DESCRIPTION:About The Event\n\n\n\nEvent Objectives: \n1. Lack of individuals rights to asset value of their personal data \n2. Lack of cyber security and data protection standards \n3. Privacy and data protections laws in their infancy \n4. Existing data laws require better technology solutions \n5. Rising movement of data ownership paving way for new technologies \n 
URL:https://umsafoundation.org/event/csa-mn-data-rights-and-the-cloud/
LOCATION:Webinar
CATEGORIES:General
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210121T153000
DTEND;TZID=America/Chicago:20210121T170000
DTSTAMP:20260404T170056
CREATED:20210115T210655Z
LAST-MODIFIED:20210115T210655Z
UID:3427-1611243000-1611248400@umsafoundation.org
SUMMARY:ISACA - Maintaining Auditability with a Cloud Service or Data Center Provider
DESCRIPTION:Join Mark A. Houptfor this informative session that will explore how to work with a cloud service provider and maintain auditing standards. As the CISO of a Cloud Service Provider\, Mark will be transparent and describe what you should expect and not expect out of your provider and how to draw boundaries and expectations from the very beginning. The discussion will go even deeper and help you understand the “why” of what you should and should not expect when it comes to auditing from a Cloud Service Provider and how a provider should address specific compliance regimens (PCI-DSS\, HIPAA\, SOX etc). There will be plenty of time for questions and answers where you can pick Mark’s brain and experience with specific scenarios you have within your environment. This session will be designed for both those that conduct audits and internal compliance teams as well as those seeking new providers.
URL:https://umsafoundation.org/event/isaca-maintaining-auditability-with-a-cloud-service-or-data-center-provider/
LOCATION:Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210119T130000
DTEND;TZID=America/Chicago:20210119T143000
DTSTAMP:20260404T170056
CREATED:20210115T210816Z
LAST-MODIFIED:20210115T210816Z
UID:3428-1611061200-1611066600@umsafoundation.org
SUMMARY:MN InfraGard - Fixing Cybersecurity
DESCRIPTION:The January InfraGard General Membership meeting will feature Evan Francen\, C Co-founder and CEO of FRSecure LLC/Co-founder and CEO of SecurityStudio \nJanuary is also the annual InfraGard MN Board Elections!  If you are interested in getting involved please contact VicePresident@Infragardmn.org or any board member. \nPlease also consider taking advantage of the new year timing to pay your annual InfraGard dues.  Annual tax-deductible chapter dues are $25.00 and can be paid through our website. Funds collected are used for expenses including speaker and volunteer recognition\, training\, and other administrative and meeting costs.
URL:https://umsafoundation.org/event/mn-infragard-fixing-cybersecurity/
LOCATION:Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20210114T133000
DTEND;TZID=America/Chicago:20210114T153000
DTSTAMP:20260404T170056
CREATED:20210108T192237Z
LAST-MODIFIED:20210108T192237Z
UID:3423-1610631000-1610638200@umsafoundation.org
SUMMARY:BCPA -- Community & Workplace Violence - Lt. Brian Tholen
DESCRIPTION:How can you\, your family\, employees\, and your business become more aware of\, deter criminal acts of violence and prepare for civil unrest? \nWe will discuss trends of criminal activity within our community and provide strategies to better prepare you for any threats targeting your business and employees.  I will focus on how your business can effectively deter/prevent crime internally and externally. \n\nYou will learn strategies on how to mentally prepare yourself\, your business\, and your employees for acts of violence that may occur.\nLessons learned from the civil unrest in 2020 and how to prepare for any unrest in 2021\nWhat to do and how to survive an active shooter in public or at your business. \n\nPresented by Lt. Brian Tholen – Edina Police Department
URL:https://umsafoundation.org/event/bcpa-community-workplace-violence-lt-brian-tholen/
LOCATION:Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20201217T130000
DTEND;TZID=America/Chicago:20201217T140000
DTSTAMP:20260404T170056
CREATED:20201209T173309Z
LAST-MODIFIED:20201209T173309Z
UID:3421-1608210000-1608213600@umsafoundation.org
SUMMARY:MN IT CoE -- How Does Your G Factor Help or Hurt You?
DESCRIPTION:Join Jeannette Grace\, owner of Expressive! Communication Consulting & Training\, as she explores the topic on impacting others.\nTopic: How Does Your G Factor Help or Hurt You? \nEach of us has the power to draw people to us or repel them. Which do YOU do? \nYour “G Factor” is your gravitational pull – your ability to draw people to you. People who want to work with you or for you\, seek your advice\, and trust you. G Factor impacts your success. \nOver 800 working people across the United States were surveyed and they weighed in on who they preferred working with and why. With their input\, eight different G Factors were unlocked that everyone needs to increase their gravitational pull. \nLearn two of the eight G Factors and take action to increase your G Factor as faculty\, students\, employee\, job candidate\, and more.
URL:https://umsafoundation.org/event/mn-it-coe-how-does-your-g-factor-help-or-hurt-you/
LOCATION:Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20201215T130000
DTEND;TZID=America/Chicago:20201215T153000
DTSTAMP:20260404T170056
CREATED:20201209T173145Z
LAST-MODIFIED:20201209T173145Z
UID:3420-1608037200-1608046200@umsafoundation.org
SUMMARY:ISSA - December Chapter Meeting
DESCRIPTION:Speakers: Vanessa Grose and Kevin Hakanson\n \nVanessa Grose is the Head of Customer Engineering\, Pacific Northwest – Google Cloud. Vanessa has over 15 years of technology experience managing teams\, leading projects\, and delighting clients. She is a passionate coach who believes in building teams of great people\, enabling them to be successful\, and empowering them to do great things. \nKevin Hakanson is a veteran cloud architect having worked for one of the world’s largest news and information companies.  Kevin has a passion for technology and loves helping people come to trust the cloud by understanding how the hyperscale cloud platforms operate. Working directly with his customers affords him the opportunity to identify gaps in technology and processes to help build a more trustworthy cloud. When not thinking about cloud security\, Kevin is focused on his two daughters career paths in STEM and success in college.
URL:https://umsafoundation.org/event/issa-december-chapter-meeting/
LOCATION:Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20201210T123000
DTEND;TZID=America/Chicago:20201210T153000
DTSTAMP:20260404T170056
CREATED:20201209T172908Z
LAST-MODIFIED:20201209T172908Z
UID:3419-1607603400-1607614200@umsafoundation.org
SUMMARY:BCPA Member Meeting: Dr Mike Osterholm
DESCRIPTION:Michael Osterholm is the author of the 2017 book\, Deadliest Enemy: Our War Against Killer Germs\, in which he not only details the most pressing infectious disease threats of our day but lays out a nine-point strategy on how to address them\, with preventing a global flu pandemic at the top of the list. \nPlease register for BCPA Monthly Meeting by December 10\, 2020 1:30 PM CT.  Registered members will receive an email before the start of the meeting containing information about joining the webinar. Guests must email INFO@BCPA.ORG to get a code for this event.
URL:https://umsafoundation.org/event/bcpa-member-meeting-dr-mike-osterholm/
LOCATION:Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20201119T153000
DTEND;TZID=America/Chicago:20201119T173000
DTSTAMP:20260404T170056
CREATED:20201105T182157Z
LAST-MODIFIED:20201105T184025Z
UID:3412-1605799800-1605807000@umsafoundation.org
SUMMARY:ISACA -- Roundtable\, 7 Free Ways to Keep Hackers Away
DESCRIPTION:Even though we keep investing thousands of dollars in fancy security tools\, hackers continue to breach our networks and steal sensitive information. The good news is there is a lot of “low-hanging hacker fruit” that can be removed with a minimal investment in time and money. Brian Johnson from 7 Minute Security will demonstrate how to strengthen our networks and keep hackers frustrated by: \n\nStopping users from picking weak and compromised passwords\nDisabling insecure network protocols\nDetecting early signs of compromise\nLimiting who has administrative access to critical systems\nSetting up tempting honeypot traps for hackers to fall into
URL:https://umsafoundation.org/event/isaca-roundtable-7-free-ways-to-keep-hackers-away/
LOCATION:Webinar
CATEGORIES:General
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20201117T130000
DTEND;TZID=America/Chicago:20201117T143000
DTSTAMP:20260404T170056
CREATED:20201105T182437Z
LAST-MODIFIED:20201105T184009Z
UID:3413-1605618000-1605623400@umsafoundation.org
SUMMARY:ISSA -- November Chapter Meeting
DESCRIPTION:Cyber Threat From the Front Lines: A Look at What We’re Up Against \nFrom influence operations to ransomware attacks\, the cyber threat landscape today is more complex and dangerous than it’s ever been before. We will take a look at the emerging cyber threats that we believe are the most pertinent and impactful to defenders in today’s cyber security industry. Our briefing will cover the recent developments in cyber espionage\, including China’s recent focus on IP theft. We will also cover the rise of ransomware and the threats that tactic poses across all industries. \n  \nSpeaker: Sandra Joyce\, EVP Head of Global Intelligence\, Mandient \nAs EVP and Head of Global Intelligence at Mandient\, Sandra Joyce oversees intelligence collection\, research\, analysis and support services for threat intelligence customers and the Mandient security product portfolio. Joyce has held positions in product management\, business development and intelligence research over the course of 21 years in both national security and commercial industry. \nJoyce serves in the US Air Force Reserve and is a faculty member at the National Intelligence University. She is completing her MBA at MIT and holds a bachelor’s degree in German with four master’s degrees in cyber-policy\, international affairs\, science and technology intelligence\, and military operational art and science. Joyce speaks English\, Spanish\, and German and lives in Virginia.
URL:https://umsafoundation.org/event/issa-november-chapter-meeting/
LOCATION:Webinar
CATEGORIES:General
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20201116T130000
DTEND;TZID=America/Chicago:20201116T150000
DTSTAMP:20260404T170056
CREATED:20201112T194858Z
LAST-MODIFIED:20201112T194932Z
UID:3417-1605531600-1605538800@umsafoundation.org
SUMMARY:InfraGardMN - People and Technology: Today's Cyber Risk
DESCRIPTION:People and Technology: Today’s Cyber Risk\nWHO CAN ATTEND: The meeting is open to both members and non-members. \nAGENDA\n1:00-1:05 – Welcome and Chapter Business\n1:05-2:00 – Mark Lanterman: Current State of Phishing and Ransomware\n2:00-2:15 – InfraGard Portal Live Demo\n2:15-3:00 – Karen Andersen: Humans are the Wild Card \nRegistration: You must register in advance at Zoom Registration.  \nSPEAKERS\nMark Lanterman is the Chief Technology Officer of Computer Forensic Services. Before entering the private sector\, Mark was a member of the U. S. Secret Service Electronic Crimes Taskforce. Mark has 28 years of security and forensic experience and has testified in over 2000 cases.  \nMark is faculty for the Federal Judicial Center in Washington\, D.C.\, the National Judicial College in Reno\, Nevada\, the University of Minnesota and the Mitchell Hamline Law School. Mark is also a professor in the cybersecurity program at the St. Thomas School of Law in Minneapolis\, Minnesota. \nMark has provided training in digital evidence\, computer forensics and cyber security to the United States Supreme Court.  He has also presented to the 8th and 11th Circuit Federal Judicial Conferences as well as numerous State Judicial Conferences across the United States. \nMark completed his postgrad studies in cybersecurity at Harvard University and is certified as a Seized Computer Evidence Recovery Specialist (SCERS) by the Department of Homeland Security and is also a member of the Minnesota Lawyers Professional Responsibility Board and serves as Chairman of its Opinion Committee. \nKaren Andersen has over 21 years of technology consulting experience across a wide variety of industries.  She is a Principal Consultant with Optiv’s Identity and Data Management Practice. \nPrevious roles include several years of ESI Consulting experience (electronically stored information)\, working with clients and law firms on discovery matters\, litigation\, data breaches and investigations. \nRegistration: \nYou must register in advance at Zoom Registration.  The meeting is open to both members and non-members. Connection details will be included in your registration confirmation. 
URL:https://umsafoundation.org/event/infragardmn-people-and-technology-todays-cyber-risk/
LOCATION:MN
CATEGORIES:General
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20201112T133000
DTEND;TZID=America/Chicago:20201112T153000
DTSTAMP:20260404T170056
CREATED:20201105T181747Z
LAST-MODIFIED:20201105T184016Z
UID:3410-1605187800-1605195000@umsafoundation.org
SUMMARY:BCPA -- Pandemic Roundtable Discussion
DESCRIPTION:Facilitated by Teri Behling\, BCPA Member and Wipfli Consultant \nThe subject in November will be your personal pandemic story. There will be plenty of time to discuss with your colleagues in small groups and large group about how we faired during the pandemic and hopefully get ideas on how to improve and move forward. We’ll discuss: \n\nWhat was your early response?\nChallenges on work-from-home?\nWhat is the impact of ever-changing government requirements?\nHow have you gotten people to come back to the office?\nWhat’s the future for you?\n\nShare your pandemic expertise with the group and learn from others in your field. Bring examples to share if you like.
URL:https://umsafoundation.org/event/bcpa-pandemic-roundtable-discussion/
LOCATION:Webinar
CATEGORIES:General
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20201112T130000
DTEND;TZID=America/Chicago:20201112T140000
DTSTAMP:20260404T170056
CREATED:20201105T182805Z
LAST-MODIFIED:20201105T184004Z
UID:3415-1605186000-1605189600@umsafoundation.org
SUMMARY:MN IT CoE -- AWS - Ed Design Lab - Moving Education Forward
DESCRIPTION:Join us as Don Fraser of Education Design Lab. At the Lab\, we use a human-centered design process in combination with tools from other industries to help schools\, employers\, government agencies\, foundations\, nonprofits\, and innovators alike design\, test\, and implement new higher education models that improve opportunity for historically underserved learners.\nCome and see the the future of Badging and Career Options!
URL:https://umsafoundation.org/event/mn-it-coe-aws-ed-design-lab-moving-education-forward/
LOCATION:Webinar
CATEGORIES:General
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20201110T123000
DTEND;TZID=America/Chicago:20201110T143000
DTSTAMP:20260404T170056
CREATED:20201105T182026Z
LAST-MODIFIED:20201105T183957Z
UID:3411-1605011400-1605018600@umsafoundation.org
SUMMARY:CSA -- Virtual Heads Up Hands On Workshop
DESCRIPTION:Acquiring real-world skills means training with real-world scenarios. In RSA’s “Heads Up\, Hands On 2.0” we’ll discuss the why\, where\, and how of threat hunting with some of RSA’s seasoned hunters. Logs? Packets? Endpoints? We’ll leave no stone unturned as we track the movements of an attacker from cloud to corporate as they use techniques being employed in the wild. \nThis virtual workshop will cut through the nonsense and\, not only give you the knowledge of why threat hunting should be a part of your security program\, but how you can start making changes to make a real impact to your organization\, now. \n\nFirst\, our experts will give you an introduction to threat hunting while walking you through various threat hunting methodologies.  We’ll discuss tactics and techniques used by world class hunters around the globe and give you the building blocks to start your analysts on the road to becoming threat hunters\, regardless of skill level.\nThen\, we’ll let you take things into your own hands with multi-stage “hands on” scenarios that will allow you to apply some of the techniques discussed during the session. Don’t sweat it if you feel overwhelmed.  Our experts will be on hand to help you through the details\, so everyone walks away with a solid grasp of the value of the hunt.\nYour final challenge will be to test your skills with a remote exercise that you’ll have 72 hours to complete.  You’ll be competing against other workshop participants for CPE credits\, the opportunity to win a prize\, and the title of “Threat Hunter”
URL:https://umsafoundation.org/event/csa-virtual-heads-up-hands-on-workshop/
LOCATION:Webinar
CATEGORIES:General
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20201103T070000
DTEND;TZID=America/Chicago:20201103T160000
DTSTAMP:20260404T170056
CREATED:20201021T192904Z
LAST-MODIFIED:20201105T171535Z
UID:3407-1604386800-1604419200@umsafoundation.org
SUMMARY:CTE Works Summit 2020
DESCRIPTION:Learn from teachers\, faculty\, and workforce partners through workshops and provoking presentations. Connect with other professionals in Minnesota\, the Upper Midwest\, and across the world. Take in new perspectives\, and be inspired by your peers.
URL:https://umsafoundation.org/event/cte-works-summit-2020/
LOCATION:Webinar
CATEGORIES:General
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20201029T190000
DTEND;TZID=America/Chicago:20201029T210000
DTSTAMP:20260404T170056
CREATED:20201006T200624Z
LAST-MODIFIED:20201007T161713Z
UID:3404-1603998000-1604005200@umsafoundation.org
SUMMARY:OWASP - Securing Infrastructure as Code
DESCRIPTION:Join us for a lively discussion of Infrastructure as Code (IaC)\, the hot\nnew way to configure the Cloud. We’ll cover:  Best practices\, Testing and Validation for IaC\, Remediation\, Fitting IaC into the App Sec PIpeline\, Immutable infrastructure\, and Is it Security Architecture or Secure Coding? \nSo get your head out of the Cloud for a couple of hours and get ready for some down-to-earth information exchange. \nDue to COVID-19 restrictions\, this will be an online event.
URL:https://umsafoundation.org/event/owasp-securing-infrastructure-as-code/
LOCATION:Webinar
CATEGORIES:General
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20201029T120000
DTEND;TZID=America/Chicago:20201029T170000
DTSTAMP:20260404T170056
CREATED:20201006T195744Z
LAST-MODIFIED:20201007T161719Z
UID:3399-1603972800-1603990800@umsafoundation.org
SUMMARY:ASIS: Women in Security
DESCRIPTION:
URL:https://umsafoundation.org/event/asis-women-in-security/
LOCATION:Surly Brewing Company\, 520 Malcolm Ave SE\, Minneapolis\, MN\, 55414\, United States
CATEGORIES:General
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201026
DTEND;VALUE=DATE:20201029
DTSTAMP:20260404T170056
CREATED:20201006T200848Z
LAST-MODIFIED:20201007T161725Z
UID:3405-1603670400-1603929599@umsafoundation.org
SUMMARY:Cybersecurity Summit
DESCRIPTION:Poor cyber security is increasingly affecting all levels of society\, whether it is national\, local\, or personal. \nWith a few strokes of a keyboard\, nation states\, terrorist groups\, stateless organizations\, and rogue individuals can launch a cyber-attack from anywhere\, at any time\, disrupting and damaging our democracy and way of life. \nTo confront the problem\, we need everyone’s help. \nAt the Cyber Security Summit\, our mission is to produce a multi-stakeholder consortium that brings together industry\, government and academic interests in an effort to improve the state of cyber security on both a domestic and international level.
URL:https://umsafoundation.org/event/cybersecurity-summit/
LOCATION:Webinar
CATEGORIES:General
END:VEVENT
END:VCALENDAR