<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
{font-family:Wingdings;
panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
p.Default, li.Default, div.Default
{mso-style-name:Default;
margin:0in;
text-autospace:none;
font-size:12.0pt;
font-family:"Arial",sans-serif;
color:black;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
/* List Definitions */
@list l0
{mso-list-id:472022632;
mso-list-type:hybrid;
mso-list-template-ids:752105712 1120963522 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
{mso-level-start-at:0;
mso-level-number-format:bullet;
mso-level-text:-;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Calibri",sans-serif;
mso-fareast-font-family:Calibri;
color:#2E2E2F;}
@list l0:level2
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l0:level3
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l0:level4
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l0:level5
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l0:level6
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l0:level7
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Symbol;}
@list l0:level8
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:"Courier New";}
@list l0:level9
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Wingdings;}
@list l1
{mso-list-id:1940604011;
mso-list-template-ids:-248478854;}
@list l1:level1
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l1:level2
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:1.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l1:level3
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:1.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l1:level4
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:2.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l1:level5
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:2.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l1:level6
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:3.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l1:level7
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:3.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l1:level8
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:4.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l1:level9
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:4.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
ol
{margin-bottom:0in;}
ul
{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="#0563C1" vlink="#954F72" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal">FYSA<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="Default"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">FEMA’s Emergency Management Institute (EMI) is offering the K8518 Virtual Cybersecurity Symposium. More information is provided below and in the attached document.<o:p></o:p></span></p>
<p class="Default"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><o:p> </o:p></span></b></p>
<p class="Default"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Symposium Description: </span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">This Symposium will bring together Emergency Managers and Cybersecurity
Professionals to focus on the challenges of responding to a cybersecurity incident before, during, and after an event, while advancing awareness and examining the latest technologies/services. Attendees will be able to share best practices and key lessons
learned between government and industry. <o:p></o:p></span></p>
<p class="Default"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><o:p> </o:p></span></b></p>
<p class="Default"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Symposium Events: </span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">The Symposium will include a cybersecurity threat briefing, a cybersecurity fundamentals
discussion, a cybersecurity progress briefing, and cybersecurity resources briefings. In addition, these National Cybersecurity Preparedness Consortium (NCPC) courses will be presented:
<o:p></o:p></span></p>
<ul style="margin-top:0in" type="disc">
<li class="Default" style="mso-list:l0 level1 lfo3"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Community Cybersecurity Information Sharing Integration Discussion (MGT-478)
</span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">This course will assist SLTTs to integrate information sharing into their community cybersecurity programs. It will (1) explain how cybersecurity information sharing can assist to prevent,
detect, respond to, and recover from cyber-attacks; (2) analyze partnerships and trust needed for an effective info-sharing capability; (3) recognize the components of a successful community cybersecurity information-sharing framework; and (4) examine the
steps to integrate cybersecurity information sharing into a community cybersecurity program.
<o:p></o:p></span></li><li class="Default" style="mso-list:l0 level1 lfo3"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Cyber Awareness for Officials and Senior Managers (AWR-383) –
</span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">This workshop provides a forum to discuss strategic and executive-level issues related to cybersecurity preparedness, to share proven strategies and best practices, and to enhance coordination
among officials responsible for cybersecurity response and recovery. It integrates multimedia scenarios and vignettes that highlight key issues and facilitates executive-level discussion of cyber prevention, protection, and recovery. It also applies lessons
learned from past local and national cyber hacks and breaches. <o:p></o:p></span></li></ul>
<p class="Default"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><o:p> </o:p></span></p>
<p class="Default"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Target Audience: </span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Emergency Managers and Cybersecurity Professionals. This offering does not require
an advanced technical background. <o:p></o:p></span></p>
<p class="Default"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><o:p> </o:p></span></p>
<p class="Default"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Dates:
</span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Wednesday, October 19–Thursday, October 20, 2022, and Wednesday, October 26–Thursday, October 27, 2022
<o:p></o:p></span></p>
<p class="Default"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><o:p> </o:p></span></p>
<p class="Default"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Course Length: </span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">This event covers 4 days across a 2-week period from 12 p.m. EST to 5 p.m. EST.
To obtain full credit, you must participate in all 4 days. <o:p></o:p></span></p>
<p class="Default"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><o:p> </o:p></span></p>
<p class="Default"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Location: </span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Virtual via the Zoom platform
<o:p></o:p></span></p>
<p class="Default"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><o:p> </o:p></span></p>
<p class="Default"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Cost:
</span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">There is no cost for attending this virtual symposium.
<o:p></o:p></span></p>
<p class="Default"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><o:p> </o:p></span></b></p>
<p class="MsoNormal"><b>Pre-requisite Course: AWR-418-W – Web-based, Independent Study Course:
</b>An introductory-level course for new and transitioning Information Technology professionals. Learn preferred network topologies and the uses of Intrusion Detection/Prevention systems; the use and maintenance of firewalls and anti-virus software; to recognize
various types of network-based attacks; to recognize social engineering attacks; and the importance of establishing policies, and disaster planning.
<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="Default"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">To Apply: </span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">Submit your application to
</span><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:blue">NETC Online Admissions Application
</span><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">at https://training.fema.gov/netc_online_admissions using course code K8515 and delivery date 10/19/2022. The justification for attendance when you apply online consists of the confirmation
that you meet the target audience criteria based upon your position and experience, along with any other pertinent information. Please attach your resume when applying.
<o:p></o:p></span></p>
<p class="Default"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><o:p> </o:p></span></p>
<p class="MsoNormal"><b>Reasonable Accommodations and Course POC: </b>If you need a reasonable accommodation (sign language interpreters, Braille, CART, etc.), or have questions about the course, please contact Course Manager, Christopher Yambor at Christopher.Yambor@fema.dhs.gov
or 301-447-1649<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><b><span style="color:#1F497D">Theresa A. Masse<o:p></o:p></span></b></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cyber Security Advisor, Region 10 (Oregon)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cybersecurity and Infrastructure Security Agency<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Department of Homeland Security<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Phone: (503) 930-5671
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Email:</span><span style="font-size:10.0pt;color:#777777">
</span><a href="mailto:theresa.masse@cisa.dhs.gov"><span style="font-size:10.0pt">theresa.masse@cisa.dhs.gov</span></a><u><span style="font-size:10.0pt;color:#0760C1"><o:p></o:p></span></u></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><img border="0" width="97" height="97" style="width:1.0138in;height:1.0138in" id="Picture_x0020_1" src="cid:image002.png@01D8C455.56D36B30"><span style="color:#1F497D"><o:p></o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
</body>
</html>