Training | IMA Webinar Broadcast: November 30 @ 9:00 am – 12:00 pm PST
Suspicious Activity Reporting (SAR)
InfraGard Los Angeles and CTWatch present the following class, eligible for 3 CPE credits from ASIS. This class will begin with a briefing from an FBI Bomb Tech on "Bomb Threats and Suspicious Package Indicators." The objective of this course is to instruct and advise attendees on how and when to submit Suspicious Activity Reports (SAR). Instruction will work through the Nationwide SAR Cycle to assist with a description of the trained attendee’s role in suspicious activity reporting. Training will examine available resources, tools, and methods for submitting SARs, examine the observable behaviors that should be reported as SARs, identify the essential information to include in a SAR, and examine the privacy, civil rights, and civil liberty guidelines for SAR reporting. Furthermore, some examples and testing of attendees' knowledge on what is considered a SAR reportable incident vs an immediate emergent situation that requires calling emergency services (911). A section on how to write an appropriate SAR (key elements such as who, what, where, when and photographic and or video documentation guidelines) will also be covered.
Training | IMA Webinar Broadcast December 15 @ 9:25 am - 11:30 am EST
Protecting Municipal Government Through Public-Private Partnerships
In this talk, The Atom Group and Primex will guide participants through an interactive overview of concepts developed through the first years of a public private partnership in defense of NH municipal organizations. They will cover an innovated approach to cooperating including cyber incident response with state and federal law enforcement agencies. We will focus together on understanding the leadership techniques used to build partnerships that help identify and mitigate cybersecurity risk and build resilient organizations, not just meet the latest in an ever-evolving landscape of threats. Leaders at all levels of the organization will gain an understanding how to analyze organizational readiness, prepare for next generation attacks, and build a network of professional relationships ready to meet the challenge of protecting the trust placed in you.
The opinions or conclusions of the authors reflected in the open source articles and resources is not endorsed and/or does not necessarily reflect the opinion of the Virginia Fusion Center. The sources have been selected to provide you with event information to highlight available resources designed to improve public safety and reduce the probability of becoming a victim of a crime.
------------
You have received this message because has subscribed to the "FirstAware" mailing list. Should you wish to unsubscribe please click the link below.