BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ICT Pulse – The leading technology blog in the Caribbean - ECPv6.15.17.1//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:ICT Pulse – The leading technology blog in the Caribbean
X-ORIGINAL-URL:https://ict-pulse.com
X-WR-CALDESC:Events for ICT Pulse – The leading technology blog in the Caribbean
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Jamaica
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20130101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Jamaica:20140512T083000
DTEND;TZID=America/Jamaica:20140513T163000
DTSTAMP:20260407T163058
CREATED:20140421T131722Z
LAST-MODIFIED:20140421T132355Z
UID:54294-1399883400-1399998600@ict-pulse.com
SUMMARY:Saint Lucia - Security Convergence: Principles of Information Security and Digital Forensics
DESCRIPTION:Cross-training equates to improved cost-control and productivity. \nA cross-trained organization is more cohesive\, with different divisions pursuing similar goals. All personnel working together will reduce an organization’s overall risk profile and streamline some redundant security processes. A cross training plan that would help physical security professionals understand what information security threats are and how to spot them\, with some technical training would go a long way towards team building and improved skill sets. \nKeep pace updating your skills with new training. \nIn addition to learning information security and networking principles\, students will be introduced to digital forensics investigations and learn the “right-way” to collect digital evidence that could be used internally or in civil/criminal litigation. \nAs a primer for getting started in computer forensics\, this course covers basic principles of digital forensics and cloud computing forensics. This is the core pre-requsiste for the “Advanced Computer Forensic Investigation” three day “hands-on” course. \nTopics Include: \n\nInformation Security Principles\nCryptography\nPublic Key Infrastructure\nNetworking Principles\nNetwork Security\nApplication Security\nDigital Forensics – Key Technical Concepts\nIntroduction to “Cloud Computing” Forensics
URL:https://ict-pulse.com/events/st-lucia-may-2014-security-convergence-principles-information-security-digital-forensics-2/
LOCATION:Bay Gardens Resorts\, Rodney Bay Beach\, Rodney Bay\, Saint Lucia
CATEGORIES:Cybercrime/cybersecurity,ICT/Tech,Seminar,St. Lucia
ORGANIZER;CN="Mindshare Resources LLC":MAILTO:gaby@mindshareresources.com 
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Jamaica:20140514T083000
DTEND;TZID=America/Jamaica:20140514T163000
DTSTAMP:20260407T163058
CREATED:20140421T131959Z
LAST-MODIFIED:20140421T132341Z
UID:54297-1400056200-1400085000@ict-pulse.com
SUMMARY:Saint Lucia - Core Level: Physical Security Vulnerability Assessments
DESCRIPTION:A Systematic and Measureable Approach to Physical Security. \nThis One (1) day seminar will provide valuable information to all those involved in planning\, designing\, managing\, maintaining\, analyzing and testing physical security systems. \n\nExplore the various components of an integrated physical security system.\nLearn about protection techniques used against traditional and non-traditional threats.\nLearn step-by-step how to conduct a vulnerability assessment\, spot weaknesses and make no-cost improvements.\n\nThis is a pre-requisite course for “Advanced Level: Security Risk Analysis and Budgeting Tools”.
URL:https://ict-pulse.com/events/st-lucia-may-2014-core-level-physical-security-vulnerability-assessments/
LOCATION:Bay Gardens Resorts\, Rodney Bay Beach\, Rodney Bay\, Saint Lucia
CATEGORIES:Cybercrime/cybersecurity,ICT/Tech,Seminar,St. Lucia
ORGANIZER;CN="Mindshare Resources LLC":MAILTO:gaby@mindshareresources.com 
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Jamaica:20140514T083000
DTEND;TZID=America/Jamaica:20140516T163000
DTSTAMP:20260407T163058
CREATED:20140421T132324Z
LAST-MODIFIED:20140421T132324Z
UID:54298-1400056200-1400257800@ict-pulse.com
SUMMARY:Saint Lucia - Concentrated: Physical Security Risk Analysis and Vulnerability Assessments
DESCRIPTION:For this special event in Curacao\, Mindshare Resources combined its Core Level and Advanced Level physical security risk analysis and vulnerability assessments seminar into a three-day concentrated seminar. \nThis 3 day concentrated seminar will provide valuable information to all those involved in planning\, designing\, managing\, maintaining\, analyzing and testing physical security systems. \n\nStep 1: Explore the components a physical security system.\nStep 2: Fine tune your risk analysis skills.\nStep 3: Gather\, analyze and process the data.\nStep 4: Develop findings\, protection goals and reports for stakeholders.
URL:https://ict-pulse.com/events/st-lucia-may-2014-concentrated-physical-security-risk-analysis-vulnerability-assessments/
LOCATION:Bay Gardens Resorts\, Rodney Bay Beach\, Rodney Bay\, Saint Lucia
CATEGORIES:Cybercrime/cybersecurity,ICT/Tech,Seminar,St. Lucia
ORGANIZER;CN="Mindshare Resources LLC":MAILTO:gaby@mindshareresources.com 
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Jamaica:20140515T083000
DTEND;TZID=America/Jamaica:20140516T163000
DTSTAMP:20260407T163058
CREATED:20140421T132840Z
LAST-MODIFIED:20140421T132840Z
UID:54299-1400142600-1400257800@ict-pulse.com
SUMMARY:Saint Lucia - Advanced Level: Security Risk Analysis and Budgeting Tools
DESCRIPTION:About the Advanced Level – Two day seminar: \nThis ADVANCED-level “follow-on” course dives into the security risk analysis process in greater detail with emphasis on gathering and analyzing the information and developing the report for stakeholders. Students will learn how to prepare detailed reports that highlight top risks\, vulnerabilities\, and project roll-out upgrade costs. They will be able to provide a quality report with convincing arguments and findings\, and with countermeasures selections that are reasonable and cost-effective. \n\nStep 1: Fine tune your risk analysis skills. Plan the security risk and vulnerability assessment.\nStep 2: Gather and analyze the information. Look at the Big Picture.\nStep 3: Develop countermeasure strategies and submit a report to stakeholders.\n\n  \n* Course Pre-requisite \nIt is highly recommended that students first attend the pre-requisite seminar\, “Core Level: Physical Security & Vulnerability Assessments”\, OR have a thorough understanding of physical security components\, countermeasures\, and basic SANDIA National Laboratories E.A.S.I. model methodolog
URL:https://ict-pulse.com/events/saint-lucia-may-2014-advanced-level-security-risk-analysis-budgeting-tools/
LOCATION:Bay Gardens Resorts\, Rodney Bay Beach\, Rodney Bay\, Saint Lucia
CATEGORIES:Cybercrime/cybersecurity,ICT/Tech,Seminar,St. Lucia
ORGANIZER;CN="Mindshare Resources LLC":MAILTO:gaby@mindshareresources.com 
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Jamaica:20140515T083000
DTEND;TZID=America/Jamaica:20140516T163000
DTSTAMP:20260407T163058
CREATED:20140421T133822Z
LAST-MODIFIED:20140421T133822Z
UID:54301-1400142600-1400257800@ict-pulse.com
SUMMARY:Trinidad & Tobago – Security Convergence: Principles of Information Security and Digital Forensics
DESCRIPTION:Cross-training equates to improved cost-control and productivity. \nA cross-trained organization is more cohesive\, with different divisions pursuing similar goals. All personnel working together will reduce an organization’s overall risk profile and streamline some redundant security processes. A cross training plan that would help physical security professionals understand what information security threats are and how to spot them\, with some technical training would go a long way towards team building and improved skill sets. \nKeep pace updating your skills with new training. \nIn addition to learning information security and networking principles\, students will be introduced to digital forensics investigations and learn the “right-way” to collect digital evidence that could be used internally or in civil/criminal litigation. \nAs a primer for getting started in computer forensics\, this course covers basic principles of digital forensics and cloud computing forensics. This is the core pre-requsiste for the “Advanced Computer Forensic Investigation” three day “hands-on” course. \nTopics Include: \n\nInformation Security Principles\nCryptography\nPublic Key Infrastructure\nNetworking Principles\nNetwork Security\nApplication Security\nDigital Forensics – Key Technical Concepts\nIntroduction to “Cloud Computing” Forensics
URL:https://ict-pulse.com/events/trinidad-tobago-may-2014-security-convergence-principles-information-security-digital-forensics/
LOCATION:Hilton Trinidad & Tobago Conference Centre\, Lady Young Road\, Port of Spain\, Trinidad And Tobago
CATEGORIES:Cybercrime/cybersecurity,ICT/Tech,Seminar,Trinidad & Tobago
ORGANIZER;CN="Mindshare Resources LLC":MAILTO:gaby@mindshareresources.com 
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Jamaica:20140519T083000
DTEND;TZID=America/Jamaica:20140519T163000
DTSTAMP:20260407T163058
CREATED:20140421T134234Z
LAST-MODIFIED:20140421T134234Z
UID:54303-1400488200-1400517000@ict-pulse.com
SUMMARY:Trinidad & Tobago - Core Level: Physical Security Vulnerability Assessments
DESCRIPTION:A Systematic and Measureable Approach to Physical Security. \nThis One (1) day seminar will provide valuable information to all those involved in planning\, designing\, managing\, maintaining\, analyzing and testing physical security systems. \n\nExplore the various components of an integrated physical security system.\nLearn about protection techniques used against traditional and non-traditional threats.\nLearn step-by-step how to conduct a vulnerability assessment\, spot weaknesses and make no-cost improvements.\n\nThis is a pre-requisite course for “Advanced Level: Security Risk Analysis and Budgeting Tools”.
URL:https://ict-pulse.com/events/trinidad-tobago-core-level-physical-security-vulnerability-assessments/
LOCATION:Hilton Trinidad & Tobago Conference Centre\, Lady Young Road\, Port of Spain\, Trinidad And Tobago
CATEGORIES:Cybercrime/cybersecurity,ICT/Tech,Seminar,Trinidad & Tobago
ORGANIZER;CN="Mindshare Resources LLC":MAILTO:gaby@mindshareresources.com 
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Jamaica:20140519T083000
DTEND;TZID=America/Jamaica:20140521T163000
DTSTAMP:20260407T163058
CREATED:20140421T134129Z
LAST-MODIFIED:20140421T134251Z
UID:54302-1400488200-1400689800@ict-pulse.com
SUMMARY:Trinidad & Tobago - Concentrated: Physical Security Risk Analysis and Vulnerability Assessments
DESCRIPTION:For this special event in Curacao\, Mindshare Resources combined its Core Level and Advanced Level physical security risk analysis and vulnerability assessments seminar into a three-day concentrated seminar. \nThis 3 day concentrated seminar will provide valuable information to all those involved in planning\, designing\, managing\, maintaining\, analyzing and testing physical security systems. \n\nStep 1: Explore the components a physical security system.\nStep 2: Fine tune your risk analysis skills.\nStep 3: Gather\, analyze and process the data.\nStep 4: Develop findings\, protection goals and reports for stakeholders.
URL:https://ict-pulse.com/events/trinidad-tobago-may-2014-concentrated-physical-security-risk-analysis-vulnerability-assessments/
LOCATION:Hilton Trinidad & Tobago Conference Centre\, Lady Young Road\, Port of Spain\, Trinidad And Tobago
CATEGORIES:Cybercrime/cybersecurity,ICT/Tech,Seminar,Trinidad & Tobago
ORGANIZER;CN="Mindshare Resources LLC":MAILTO:gaby@mindshareresources.com 
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Jamaica:20140520T083000
DTEND;TZID=America/Jamaica:20140521T163000
DTSTAMP:20260407T163058
CREATED:20140421T134357Z
LAST-MODIFIED:20140421T134427Z
UID:54304-1400574600-1400689800@ict-pulse.com
SUMMARY:Trinidad & Tobago - Advanced Level: Security Risk Analysis and Budgeting Tools
DESCRIPTION:About the Advanced Level – Two day seminar: \nThis ADVANCED-level “follow-on” course dives into the security risk analysis process in greater detail with emphasis on gathering and analyzing the information and developing the report for stakeholders. Students will learn how to prepare detailed reports that highlight top risks\, vulnerabilities\, and project roll-out upgrade costs. They will be able to provide a quality report with convincing arguments and findings\, and with countermeasures selections that are reasonable and cost-effective. \n\nStep 1: Fine tune your risk analysis skills. Plan the security risk and vulnerability assessment.\nStep 2: Gather and analyze the information. Look at the Big Picture.\nStep 3: Develop countermeasure strategies and submit a report to stakeholders.\n\n  \n* Course Pre-requisite \nIt is highly recommended that students first attend the pre-requisite seminar\, “Core Level: Physical Security & Vulnerability Assessments”\, OR have a thorough understanding of physical security components\, countermeasures\, and basic SANDIA National Laboratories E.A.S.I. model methodolog
URL:https://ict-pulse.com/events/trinidad-tobago-may-2014-advanced-level-security-risk-analysis-budgeting-tools/
LOCATION:Hilton Trinidad & Tobago Conference Centre\, Lady Young Road\, Port of Spain\, Trinidad And Tobago
CATEGORIES:Cybercrime/cybersecurity,ICT/Tech,Seminar,Trinidad & Tobago
ORGANIZER;CN="Mindshare Resources LLC":MAILTO:gaby@mindshareresources.com 
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Jamaica:20140604T083000
DTEND;TZID=America/Jamaica:20140606T163000
DTSTAMP:20260407T163058
CREATED:20140421T134830Z
LAST-MODIFIED:20140421T134830Z
UID:54306-1401870600-1402072200@ict-pulse.com
SUMMARY:Trinidad & Tobago - Advanced Computer Forensic Investigation
DESCRIPTION:This is a hands-on course. Students are required to bring Laptop computer to the class. \nThe “Advanced Computer Forensic Investigation” course\, developed by certified forensic examiners of the International Fraternity of Cybercrime Investigators (IFCI) \, will teach students the computer forensic investigation skills to garner knowledge of what\, how\, when\, and why the incident occurred so you can make an informed decision and respond in a manner that is best for your company. \nLearn step-by-step how to conduct a computer forensic investigation\, from start to finish. Students will learn the IFCI proven methodology for handling computer forensic investigations from the initial notification of an incident\, to evidence identification and forensic acquisition\, to in-depth forensic analysis\, and developing case reports and expert witness testimony; including how to handle network intrusion investigations\, and malware identification and analysis. \n  \nCourse Highlights Include: \n\n17 Hands-on labs – real world scenarios\nWindows forensic artifacts\, file signatures\nVolatile memory analysis\nIntrusion investigation\nInternet activity and email analysis\nNetwork data analysis\, ports\, and TCP/IP\nInternational cyber-criminal profiling\,\nAttack vectors\nDynamic malware analysis
URL:https://ict-pulse.com/events/trinidad-tobago-may-2014-advanced-computer-forensic-investigation/
LOCATION:Hilton Trinidad & Tobago Conference Centre\, Lady Young Road\, Port of Spain\, Trinidad And Tobago
CATEGORIES:Cybercrime/cybersecurity,ICT/Tech,Seminar,Trinidad & Tobago
ORGANIZER;CN="Mindshare Resources LLC":MAILTO:gaby@mindshareresources.com 
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Jamaica:20141029T080000
DTEND;TZID=America/Jamaica:20141029T163000
DTSTAMP:20260407T163058
CREATED:20141017T211119Z
LAST-MODIFIED:20141017T211658Z
UID:68617-1414569600-1414600200@ict-pulse.com
SUMMARY:Protecting the Cybersecurity World of Barbadian Business
DESCRIPTION:The Information Systems Security Association – Barbados Chapter hosts a Cybersecurity Workshop in celebration of Cybersecurity Month in association with Trustworth Systems Inc. \nEarn up to 8 Continuing Professional Education Hours (CPEs!) \nDate: October 29th 2014 \nLocation: 1st Floor Warrens Office Complex\, Warrens\, St. Michael \nTime: 8:30 am – 4:30 pm \nWorkshop Topics \n\nThe role of a CSIRT in protecting Barbados\nSecurity Awareness training to build secure organisations\nThe role of business continuity in building our economy\nFighting financial fraud\nProtecting enterprises with ethical hacking\nSecuring our mobile devices\nThe role of Forensics in Information Security\nStrengthening businesses with IT Audit\n\nmore
URL:https://ict-pulse.com/events/october-2014-protecting-cybersecurity-world-barbadian-business/
LOCATION:Warrens Office Complex\, Warrens\, St. Michael\, St. Michael\, Barbados
CATEGORIES:Barbados,Cybercrime/cybersecurity,ICT/Tech,Workshop
ATTACH;FMTTYPE=image/jpeg:https://ict-pulse.com/wp-content/uploads/2014/10/ISSA-Barbados-Chapter-Logo-small4-ISSA.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20150525
DTEND;VALUE=DATE:20150620
DTSTAMP:20260407T163058
CREATED:20150525T132839Z
LAST-MODIFIED:20150525T140257Z
UID:76336-1432512000-1434758399@ict-pulse.com
SUMMARY:Scholarship: Distance-learning course on Data Security and ISO 27001 and 270002 standards
DESCRIPTION:Scholarship!\n\n\n\n\nOffered by: \n\n\n(National Telecommunication Research and Training Institute of Peru [INICTEL-UNI] National University of Engineering of Peru) \n\n\n\n\nType of Course: \n\n\nOn-line \n\n\n\n\nDate(s): \n\n\nJuly 20\, 2015 – August 21\, 2015 \n\n\n\n\nNumber of scholarships: \n\n\n12 Scholarships (Professional Development Scholarship Program and OAS/CITEL) \n\n\n\n\nDeadline for presentation of candidacies: \n\n\nJune 19\, 2015 – Washington\, D.C.\, United States of America \n\n\n\n\n  \nmore \n 
URL:https://ict-pulse.com/events/june-2015-scholarship-distance-learning-data-security-iso-27001-270002-standards/
CATEGORIES:Cybercrime/cybersecurity,ICT/Tech,Online,Training Course
ATTACH;FMTTYPE=image/jpeg:https://ict-pulse.com/wp-content/uploads/2012/12/OAS-logo.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20230619
DTEND;VALUE=DATE:20230624
DTSTAMP:20260407T163058
CREATED:20230611T180427Z
LAST-MODIFIED:20230611T181913Z
UID:168533-1687132800-1687564799@ict-pulse.com
SUMMARY:Cyberdrill for Americas 2023
DESCRIPTION:The ITU Cyber drill is an event of ITU’s Telecommunication Development Sector (ITU-D). The purpose of the Cyberdrill is to enhance the communication and incident response capabilities of the participating teams as well as to ensure a continued collective effort in mitigating cyber threats among the region’s national Computer Incident Response Teams. \nThe Cyberdrill exercise is structured around various scenarios involving the most common types of cyberattacks while the sharing sessions\, and provides a platform for cooperation and discussions on cybersecurity. \nThe 11th Cyberdrill for Americas – Dominican Republic 2023 takes place from 19 to 23 June 2023 at the the kind invitation of the Ministry of the Presidency\, the Dominican Telecommunications Institute (INDOTEL)\, the Vice Ministry of Digital Agenda\, the Executive Directorate of the National Cybersecurity Center (CNCS)\, the Latin American and Caribbean Cyber-Capacity Center (LAC4) and the Executive Directorate of the Government Office of Information and Communication Technologies (OGTIC)\, who will be the hosts and with the co-organization of the Regional Telecommunications Technical Commission (COMTELCA). \n  \nmore 
URL:https://ict-pulse.com/events/cyberdrill-for-americas-2023/
CATEGORIES:Cybercrime/cybersecurity,International,Meeting
ATTACH;FMTTYPE=image/jpeg:https://ict-pulse.com/wp-content/uploads/2023/06/2023-Cyberdrill-for-the-Americas-in-Dom-Rep-ITU.jpeg
END:VEVENT
END:VCALENDAR