BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ICT Pulse – The leading technology blog in the Caribbean - ECPv6.15.19//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://ict-pulse.com
X-WR-CALDESC:Events for ICT Pulse – The leading technology blog in the Caribbean
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Jamaica
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20130101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Jamaica:20140512T083000
DTEND;TZID=America/Jamaica:20140513T163000
DTSTAMP:20260409T111756
CREATED:20140421T131722Z
LAST-MODIFIED:20140421T132355Z
UID:54294-1399883400-1399998600@ict-pulse.com
SUMMARY:Saint Lucia - Security Convergence: Principles of Information Security and Digital Forensics
DESCRIPTION:Cross-training equates to improved cost-control and productivity. \nA cross-trained organization is more cohesive\, with different divisions pursuing similar goals. All personnel working together will reduce an organization’s overall risk profile and streamline some redundant security processes. A cross training plan that would help physical security professionals understand what information security threats are and how to spot them\, with some technical training would go a long way towards team building and improved skill sets. \nKeep pace updating your skills with new training. \nIn addition to learning information security and networking principles\, students will be introduced to digital forensics investigations and learn the “right-way” to collect digital evidence that could be used internally or in civil/criminal litigation. \nAs a primer for getting started in computer forensics\, this course covers basic principles of digital forensics and cloud computing forensics. This is the core pre-requsiste for the “Advanced Computer Forensic Investigation” three day “hands-on” course. \nTopics Include: \n\nInformation Security Principles\nCryptography\nPublic Key Infrastructure\nNetworking Principles\nNetwork Security\nApplication Security\nDigital Forensics – Key Technical Concepts\nIntroduction to “Cloud Computing” Forensics
URL:https://ict-pulse.com/events/st-lucia-may-2014-security-convergence-principles-information-security-digital-forensics-2/
LOCATION:Bay Gardens Resorts\, Rodney Bay Beach\, Rodney Bay\, Saint Lucia
CATEGORIES:Cybercrime/cybersecurity,ICT/Tech,Seminar,St. Lucia
ORGANIZER;CN="Mindshare Resources LLC":MAILTO:gaby@mindshareresources.com 
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Jamaica:20140514T083000
DTEND;TZID=America/Jamaica:20140514T163000
DTSTAMP:20260409T111756
CREATED:20140421T131959Z
LAST-MODIFIED:20140421T132341Z
UID:54297-1400056200-1400085000@ict-pulse.com
SUMMARY:Saint Lucia - Core Level: Physical Security Vulnerability Assessments
DESCRIPTION:A Systematic and Measureable Approach to Physical Security. \nThis One (1) day seminar will provide valuable information to all those involved in planning\, designing\, managing\, maintaining\, analyzing and testing physical security systems. \n\nExplore the various components of an integrated physical security system.\nLearn about protection techniques used against traditional and non-traditional threats.\nLearn step-by-step how to conduct a vulnerability assessment\, spot weaknesses and make no-cost improvements.\n\nThis is a pre-requisite course for “Advanced Level: Security Risk Analysis and Budgeting Tools”.
URL:https://ict-pulse.com/events/st-lucia-may-2014-core-level-physical-security-vulnerability-assessments/
LOCATION:Bay Gardens Resorts\, Rodney Bay Beach\, Rodney Bay\, Saint Lucia
CATEGORIES:Cybercrime/cybersecurity,ICT/Tech,Seminar,St. Lucia
ORGANIZER;CN="Mindshare Resources LLC":MAILTO:gaby@mindshareresources.com 
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Jamaica:20140514T083000
DTEND;TZID=America/Jamaica:20140516T163000
DTSTAMP:20260409T111756
CREATED:20140421T132324Z
LAST-MODIFIED:20140421T132324Z
UID:54298-1400056200-1400257800@ict-pulse.com
SUMMARY:Saint Lucia - Concentrated: Physical Security Risk Analysis and Vulnerability Assessments
DESCRIPTION:For this special event in Curacao\, Mindshare Resources combined its Core Level and Advanced Level physical security risk analysis and vulnerability assessments seminar into a three-day concentrated seminar. \nThis 3 day concentrated seminar will provide valuable information to all those involved in planning\, designing\, managing\, maintaining\, analyzing and testing physical security systems. \n\nStep 1: Explore the components a physical security system.\nStep 2: Fine tune your risk analysis skills.\nStep 3: Gather\, analyze and process the data.\nStep 4: Develop findings\, protection goals and reports for stakeholders.
URL:https://ict-pulse.com/events/st-lucia-may-2014-concentrated-physical-security-risk-analysis-vulnerability-assessments/
LOCATION:Bay Gardens Resorts\, Rodney Bay Beach\, Rodney Bay\, Saint Lucia
CATEGORIES:Cybercrime/cybersecurity,ICT/Tech,Seminar,St. Lucia
ORGANIZER;CN="Mindshare Resources LLC":MAILTO:gaby@mindshareresources.com 
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Jamaica:20140515T083000
DTEND;TZID=America/Jamaica:20140516T163000
DTSTAMP:20260409T111756
CREATED:20140421T132840Z
LAST-MODIFIED:20140421T132840Z
UID:54299-1400142600-1400257800@ict-pulse.com
SUMMARY:Saint Lucia - Advanced Level: Security Risk Analysis and Budgeting Tools
DESCRIPTION:About the Advanced Level – Two day seminar: \nThis ADVANCED-level “follow-on” course dives into the security risk analysis process in greater detail with emphasis on gathering and analyzing the information and developing the report for stakeholders. Students will learn how to prepare detailed reports that highlight top risks\, vulnerabilities\, and project roll-out upgrade costs. They will be able to provide a quality report with convincing arguments and findings\, and with countermeasures selections that are reasonable and cost-effective. \n\nStep 1: Fine tune your risk analysis skills. Plan the security risk and vulnerability assessment.\nStep 2: Gather and analyze the information. Look at the Big Picture.\nStep 3: Develop countermeasure strategies and submit a report to stakeholders.\n\n  \n* Course Pre-requisite \nIt is highly recommended that students first attend the pre-requisite seminar\, “Core Level: Physical Security & Vulnerability Assessments”\, OR have a thorough understanding of physical security components\, countermeasures\, and basic SANDIA National Laboratories E.A.S.I. model methodolog
URL:https://ict-pulse.com/events/saint-lucia-may-2014-advanced-level-security-risk-analysis-budgeting-tools/
LOCATION:Bay Gardens Resorts\, Rodney Bay Beach\, Rodney Bay\, Saint Lucia
CATEGORIES:Cybercrime/cybersecurity,ICT/Tech,Seminar,St. Lucia
ORGANIZER;CN="Mindshare Resources LLC":MAILTO:gaby@mindshareresources.com 
END:VEVENT
END:VCALENDAR