Wondering why this page looks different? You caught us in the middle of a redesign! This page is coming soon.
Time Zone
Time Zone
(GMT-05:00) Eastern Time (US & Canada)
No records
Learner on LiL
6 Completed Sessions
Last Session:
Thu May 1 2014 at 12:00 pm EDT
Last Log-in:
Thu May 1 2014 at 02:31 pm EDT
On Learn It Live Since:
Monday Jan 3, 2011
Classes & Events (6)
Sort by:
Discount code (to be used by TAG members only): CKVWAMQZ On February 25th over three dozen C-level executives, senior managers and a wide variety of practitioners ranging from security analysts to forensics investigators, network technicians, risk managers and training directors joined the FBI, GBI, 911 and police to role play their response to seven well planned and executed attacks: five were cyber and one was physical. The final attack, a social engineering attack, wasn’t even detected yet as the Simulation ended. On Thursday, May 1st, comes the exclamation mark at the end of the sentence: what is known to security and emergency management personnel as the After Action Report or to the rest of us as lessons learned. This one hour webinar will feature Keith Butler of La Crosse County, Wi, Emergency Management who will summarize the official Department of Homeland Security After Action Report that will be released on May 1st, of which Keith is primary author. Keith will point out the take-aways from the 2014 Simulation as well as identify areas for improvement for 2015 from a DHS-perspective. There will be ample time allowed for discussion and questions. Roy Hadley and Ed Pascua, the co-chairs of the TAG InfoSec Society will be available to add their comments as will the president of the fictional target of the attacks, for two hours, The Logistics Company, Patrick Gaul who is also Chairperson of the Board of TAG. Exercise designer and moderator Jim Cavanagh, of Cyber Exercises, will provide some background information as well as announce the subject of the 2015 Cybersecurity Simulation. If you attended the actual Simulation, or not, there is a lot to be learned from this webinar that you can apply to increase the cybersecurity of your organization.
Are your lifestyle and eating style aging you? In this information-packed workshop, you'll learn Margaret Marshall's "Top 10 Lifestyle Secrets" to aging gracefully. You'll also understand the difference between anti-aging and age-defying. Learn how to make positive changes and take control of your life and your health.
Almost 50 C-Level Executives, Senior Managers, Security, Disaster Recovery and Business Continuity Practitioners, the FBI, GBI, Atlanta Police and 9-1-1 role played positions with the fictional Global News Network and began rebroadcasting their video content within 1 hour and 12 minutes of a devastating attack by terrorists. How did they do it? What did we learn from the simulation? What can you learn that can be applied to your own organization? The first 15 minutes of this webinar will include a high level summary of the official Department of Homeland Security After Action Report for this simulation followed by up to 45 minutes of question and answer with the primary author of the report, a county-level emergency management professional with deep and wide exercise and actual emergency management experience. The complete After Action Report will be available in advance to all who register for the webinar as will be the ability to submit questions in advance. There is something to be learned for all business sectors. Register now for this unique knowledge-exchange opportunity.
TAG Discount (QG9WA5VZ) The 2013 Cyber Attack & Business Continuity Simulation is the world’s first open simulation with role players in their actual jobs, onstage, responding to a business impacting outage. The role play portion of the exercise is unscripted with the assembled Dream Team of almost 3 dozen C-level executives, senior managers and security practitioners working against the clock to bring their business back on the air. Other exercises require security clearances and organizational affiliation. Ours is a knowledge sharing event with an emphasis on two of the scariest current threats – homemade Electro Magnetic Pulse (EMP) weapons and the Advanced Persistent Threat (APT) - preparedness, recovery and the inevitably of some type of attack on every organization whether the attack comes from terrorists, black hat hackers, disgruntled employees, former employees or other attackers. This information rich, audience participation event will be the subject of this one hour webinar. A worthy investment of your time if you have already paid for your seat and are watching this webinar to prep yourself for the event or if you are a vendor, sponsor or attendee who has not yet made up your mind. Presenters: Roy Hadley, Partner with Barnes & Thornburg and Co-Chairman of TAG InfoSec society and Jim Cavanagh, Exercise Moderator, Cyber Exercises
Social Media Strategies & Technologies by Dorothéa Bozicolona-Volpe
The technological foundation on which today's media landscape is built is so massive, so dynamic that today's CMO is tasked with deploying and refining currently approaches while simultaneously keeping an eye to the future for solutions that will provide a competitive edge. For almost every company, this means adapting and implementing digital media tools and techniques, such as Facebook applications, twitter feeds and other initiatives. The results, for many, have been mixed. Some companies are experiencing huge wins with social media. Other campaigns are falling flat. The most successful campaigns are those that are built on an understanding that digital media is not a replacement or competition for current media and marketing campaigns.