BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//CharityNZ - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:CharityNZ
X-ORIGINAL-URL:https://charitynz.org
X-WR-CALDESC:Events for CharityNZ
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20200101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:Pacific/Auckland
BEGIN:STANDARD
TZOFFSETFROM:+1300
TZOFFSETTO:+1200
TZNAME:NZST
DTSTART:20200404T140000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+1200
TZOFFSETTO:+1300
TZNAME:NZDT
DTSTART:20200926T140000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+1300
TZOFFSETTO:+1200
TZNAME:NZST
DTSTART:20210403T140000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+1200
TZOFFSETTO:+1300
TZNAME:NZDT
DTSTART:20210925T140000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+1300
TZOFFSETTO:+1200
TZNAME:NZST
DTSTART:20220402T140000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+1200
TZOFFSETTO:+1300
TZNAME:NZDT
DTSTART:20220924T140000
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=UTC:20230408T150000
DTEND;TZID=UTC:20230408T170000
DTSTAMP:20260430T143614
CREATED:20230227T231652Z
LAST-MODIFIED:20230305T050929Z
UID:17759-1680966000-1680973200@charitynz.org
SUMMARY:Graphic Designing Session - School Holidays Program
DESCRIPTION:Graphic Designing included but not limited to Adobe Photo Shop. \nBasics of Adobe Photoshop \nBasics of Adobe Illustrator \nFor ages 7-15 \nRegister yourself – https://forms.gle/zYW4kL7PiZtFq7PKA \n 
URL:https://charitynz.org/event/graphic-designing-session/
ATTACH;FMTTYPE=image/jpeg:https://charitynz.org/wp-content/uploads/2023/02/Graphic-Designing-April-08-Aisha.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20230211T160000
DTEND;TZID=UTC:20230211T180000
DTSTAMP:20260430T143614
CREATED:20230118T053332Z
LAST-MODIFIED:20230118T053332Z
UID:17752-1676131200-1676138400@charitynz.org
SUMMARY:Future of AI and Machine Learning - Learn ChatGPT
DESCRIPTION:In this Session\, we will discuss what ChatGPT is and how it helps everyone \nChatGPT\, also known as the GPT-3 (Generative Pre-trained Transformer 3)\, is a state-of-the-art language generation model developed by OpenAI. It has a wide range of use cases\, some of the most popular are: \n\nNatural Language Processing (NLP) tasks: ChatGPT can be used to perform various NLP tasks such as text summarization\, question answering\, language translation\, and sentiment analysis.\nDialogue systems: ChatGPT can be used to build intelligent chatbots and virtual assistants that can understand and respond to natural language input.\nContent creation: ChatGPT can be used to generate text\, such as articles\, stories\, and poetry\, and it can also be used to complete text prompts or provide suggestions for creative writing.\nLanguage understanding: ChatGPT can be used to process and understand large amounts of text\, such as social media posts\, news articles\, and customer feedback\, and it can be used to extract insights and trends from this data.\nText-to-speech and speech-to-text: ChatGPT can be used to generate speech from text and generate text from speech.\nText completion: With a small amount of context\, ChatGPT can complete text\, for example\, it can complete a sentence\, a paragraph\, or even a full-length article.\nLanguage model fine-tuning: ChatGPT can be fine-tuned to perform specific tasks\, such as sentiment analysis or named entity recognition\, by fine-tuning the model with a small dataset of labeled examples.\n\nRegister yourself – https://forms.gle/D2bu8Y8U64nDrw5k6
URL:https://charitynz.org/event/future-of-ai-and-machine-learning-learn-chatgpt/
ATTACH;FMTTYPE=image/png:https://charitynz.org/wp-content/uploads/2023/01/Learn-ChatGPT-Session.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20221219T090000
DTEND;TZID=UTC:20230105T160000
DTSTAMP:20260430T143614
CREATED:20220527T230612Z
LAST-MODIFIED:20221209T224907Z
UID:17696-1671440400-1672934400@charitynz.org
SUMMARY:School Holidays STEM Workshop
DESCRIPTION:Detailed outlines for the workshop \nMorning Session (Coding\,3D Modelling) \n\nStarting with Tinkercad\nRecap on basic modeling techniques and to refresh memory\nKahoot for a refresher of the beginner course\nNew subject: 1:1 scale modeling (more realistic size)\nExplaining the measurement & units system\n1st task: Finger casing\n\n1:1 measurements of finger and casing\nDrawing hand on a piece of paper to measure perimeters\n\n\nScratch recap/Kahoot\nStudents need to make any game within 10 mins to see what they remember\nFirst task: Clicker game (following class)\n\nUsing variables & math nodes\nCostume changes\, control and events\n\n\n\nAfternoon (robotics) \n\nIntro slides to sphero robots\n\nExplaining how they move\nExplaining and showing how to code\nDemonstration on how to ‘aim’ the robot\n\n\nRunning the code\n1st exercise square (challenge cards) – 2 robots\n\nCoding the robot to move in a square\n\n\nIntroduction to micro bits\n\nExplaining what micro bits are\nShowing students the inner workings of a computer\nInput and outputs\, what they are and how they work\ncomponents of a micro bit board\nGround rules for micro bits\n\n\nGoing to the micro bit website and working on the projects at their own pace\n\nDay 1 \n\n\nIntro to tinkercad 3D modeling \n\n\nLearning how to use the software \n\n\nExploring different models and shapes in tinkercad \n\n\nFirst assignment: designing your own avatar while only using the basic shapes category \n\n\nScratch coding website\, registration \n\n\nIntro to drag and drop coding \n\n\nWarm-up exercise\, explaining how to code your character to move \n\n\nCreate your own maze game (following what the teacher is doing on the board) \n\n\nDay 2 \n\n\nRecap from yesterday\, to refresh minds and recall basic modeling concepts \n\n\nNew assignment for today: designing your own car. \n\n\nTeacher shows example model & model from past students \n\n\nScratch continues from yesterday \n\n\nAdding extra levels to the maze game \n\n\nAdding collectibles and possible timer \n\n\nDay 3 \n\n\nRecap on basic modeling techniques in tinkercad \n\n\nExample model on board for display \n\n\nNew task: designing your dream house \n\n\nExample model from past students \n\n\nBest designed model\, reward \n\n\nFinishing off the maze game\, if not already \n\n\nStarting new game design: asteroid invasion \n\n\nCore variable concepts involved \n\n\nTimer and gradually ringing speed code \n\n\nGame design and professional-looking game art \n\n\nDay 4 \n\n\nNo memory refresh\, students should have learnt all basic skills \n\n\nNew task: building a city \n\n\nExample model on board \n\n\nFinishing off the asteroid invasion game if not already \n\n\nPresenting best game designs of students\, possible rewards \n\n\nNew game designing: shoot’em up game \n\n\nConcepts of variable positioning & character coordination \n\n\nCross interactions with different entities of the game \n\n\nDay 5 \n\n\nKahoot\, to start off with to test student’s memories \n\n\nChallenge task: designing a renewable airport \n\n\nExample displayed on board \n\n\nAdding final touches to all games developed \n\n\nAdding ‘life’ systems to games \n\n\nPolishing final game designs \n\n\nPresenting the best-developed student game \n\n\nAnnouncing student successes and which students get accelerated to blender \n\n\nKahoot to finish off \n\n\nFor Registration – https://forms.gle/BCsMadP21PYj6UFy5 \n  \n 
URL:https://charitynz.org/event/stem-workshop-school-holidays/
CATEGORIES:Children STEM Education
ATTACH;FMTTYPE=image/png:https://charitynz.org/wp-content/uploads/2022/05/Al-Ameen-CharityNZ-poster2.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20221113T060000
DTEND;TZID=UTC:20221113T200000
DTSTAMP:20260430T143614
CREATED:20221005T202736Z
LAST-MODIFIED:20221102T044214Z
UID:17726-1668319200-1668369600@charitynz.org
SUMMARY:Iqbal Day - A tribute to the great thinker and philosopher\, the poet of all the times and generations
DESCRIPTION:An exciting evening to tribute the work of Iqbal – Dr Allama Muhammad Iqbal\, was a great poet\, philosopher and politician\, as well as an academic\, barrister and scholar in British India who is widely regarded as having inspired the Pakistan Movement. He is called the “Spiritual Father of Pakistan.” \nHigh level tentative agenda \n+ Community teens to exhibit posters/drawing and famous saying of Iqbal\n+ Spot prizes during the event for Q/A\n+ Kids staged performance for Dua -Yaa Rab!! Dil-e-Muslim koo Woo Zinda Tamana Dayy\n+ 5 minutes address from community Elders on Iqbal’s poetry\n+ Address by Consul Gen of Pakistan\n+ Dinner with Kalam-E-Iqbal videos \nSunday\, November 13\, 6-8 PM Moera Hall\, Lower Hutt \nFree event but registration is must for catering – \nhttps://forms.gle/ndR2xJQpwQAMPhg97
URL:https://charitynz.org/event/iqbal-day-a-tribute-to-the-great-thinker-and-philosopher-the-poet-of-all-the-times-and-generations/
CATEGORIES:Conference,Language Preservation,Urdu
ATTACH;FMTTYPE=image/jpeg:https://charitynz.org/wp-content/uploads/2022/10/Iqbal-Day-2022-updated-Poster.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20221001T100000
DTEND;TZID=UTC:20221001T233000
DTSTAMP:20260430T143614
CREATED:20220912T103646Z
LAST-MODIFIED:20220912T103646Z
UID:17720-1664618400-1664667000@charitynz.org
SUMMARY:Power BI Workshop
DESCRIPTION:High Level Agenda \n\nIntroduction\n\nPower BI environment\nExplanation of resources for demo\n\n\n Querying and Transforming Data\n\n\nData Transformation\nTable Creation\n\n\n Data Modelling\n\n\nStar Schema\n\n\n DAX Calculations\n\n\nWhat is DAX?\nSimple Measures\nMeasure Branching\nAdvanced DAX\n\n\n\nSession Pre-request is to install Power BI\, Its freely available. \n  \nFor registration – https://forms.gle/bbDHmQw977MAsgw8A
URL:https://charitynz.org/event/power-bi-workshop/
CATEGORIES:Power BI
ATTACH;FMTTYPE=image/jpeg:https://charitynz.org/wp-content/uploads/2022/09/Power-BI-Workshop.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20220917T100000
DTEND;TZID=UTC:20220917T120000
DTSTAMP:20260430T143614
CREATED:20220602T104330Z
LAST-MODIFIED:20220812T101101Z
UID:17700-1663408800-1663416000@charitynz.org
SUMMARY:Communities Cyber Awareness Program
DESCRIPTION:  \nCharity New Zealand’s initiative Cyber Security Communities Awareness Program \nSome of the highlights of the program are below \n\nHow to protect yourself from Cyber attacks\nPhishing\, fake messages\, fake emails\nHow to protect from Identity theft\nHow to maintain your privacy\nHow to protect yourself while using social media\nCyber Security for Kids\nPractical demonstration of few of attack techniques\n\nThis program will be delivered fortnightly on several Wellington locations. Detailed locations with date and time coming soon \nRegister yourself – https://forms.gle/98MXRTDyke8YCJGC7 \n 
URL:https://charitynz.org/event/communities-cyber-awareness-program/
CATEGORIES:Cyber Awarenes among Communities
ATTACH;FMTTYPE=image/jpeg:https://charitynz.org/wp-content/uploads/2022/06/Cyber-Awareness-for-communities-scaled.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20220827T180000
DTEND;TZID=UTC:20220827T200000
DTSTAMP:20260430T143614
CREATED:20220729T100440Z
LAST-MODIFIED:20220730T203130Z
UID:17711-1661623200-1661630400@charitynz.org
SUMMARY:Basics of cloud computing and Microsoft Azure Fundamentals leading to AZ900 Certification
DESCRIPTION:Charity New Zealand Offered training program for \nBasics of cloud computing and Microsoft Azure Fundamentals\nleading towards AZ900 certification \nWhen: Saturday August 27\, 2022\nWhere: Physical at Wellington and online through remote link \nAgenda: Describe cloud concepts\nDescribe core Azure services\nDescribe core solutions and management tools on Azure\nDescribe general security and network security features \nGet register yourself – https://forms.gle/yPDBhyXDf56g6sH19
URL:https://charitynz.org/event/basics-of-cloud-computing-and-microsoft-azure-fundamentals-leading-to-az900-certification/
CATEGORIES:Cloud Technology Fundamentals & Microsoft Azure Core Services
ATTACH;FMTTYPE=image/jpeg:https://charitynz.org/wp-content/uploads/2022/07/MS-Azure-Fundamentals.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20220722T190000
DTEND;TZID=UTC:20220722T210000
DTSTAMP:20260430T143614
CREATED:20220311T235516Z
LAST-MODIFIED:20220628T061303Z
UID:17680-1658516400-1658523600@charitynz.org
SUMMARY:Terraform in Action with Azure
DESCRIPTION:Introduction to Infrastructure as a code\nIntroduction of Terraform\nIntroduction of Repository\nTerraform stages\nTerraform state\nDeploying Azure Resources through Terraform\nLAB Exercise\n\n \nRegister – https://forms.gle/RUKFzv6xMdhoJoMr8
URL:https://charitynz.org/event/terraform-in-action-with-azure/
CATEGORIES:Technology Training Adults
ATTACH;FMTTYPE=image/png:https://charitynz.org/wp-content/uploads/2022/03/Untitled-design2.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20220418T090000
DTEND;TZID=UTC:20220428T153000
DTSTAMP:20260430T143614
CREATED:20220308T084923Z
LAST-MODIFIED:20220311T223511Z
UID:17649-1650272400-1651159800@charitynz.org
SUMMARY:Autumn School Holidays STEAM Program APR 2022
DESCRIPTION:Our Holiday STEM program is two weeks\, fun-filled event that will leave your kids inspired and empowered through the power of Coding and Robotics. As we already prepared participants of last school holidays Jan 2022 at foundation level. Now they are ready for intermediate and advanced levels. We have limited spaces of 15 students per session (Morning or Afternoon)\, book your space on a first-come\, first-serve basis.\nThrough our S.T.E.A.M activities\, students will work in teams to figure out creative solutions using their knowledge about coding and Robotics. \nNot only that but our program will also: \n\nTeach children the basics to advance coding using Scratch\, a coding program developed by MIT\nGive students an opportunity to learn to code and program Spheros\, Mbots\, Microbits\, and Mindstorms depending on their level.\nProvide students with a creative and productive atmosphere to thrive and\,\n\nStimulate children’s mental\, physical\, and creative abilities \nClick below form to register your child \nhttps://forms.gle/W6phr8reszUttx7i9
URL:https://charitynz.org/event/autumn-school-holidays-steam-program-apr-2022/
CATEGORIES:Children STEM Education
ATTACH;FMTTYPE=image/jpeg:https://charitynz.org/wp-content/uploads/2022/03/STEM-Delivery-Jan-2022-3.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20220305T180000
DTEND;TZID=UTC:20220305T200000
DTSTAMP:20260430T143614
CREATED:20220219T072825Z
LAST-MODIFIED:20220228T003832Z
UID:17621-1646503200-1646510400@charitynz.org
SUMMARY:Intro to Machine Learning for Beginners
DESCRIPTION:This module will be delivered in one block. The prerequisite for this is some understanding of coding in Python and a reasonable understanding of statistical and mathematical reasoning and the relationship between variables.\nThe module will consist of a project of designing and building a simpler machine learning model to get a taste of practical machine learning knowledge. The project will consist of:\n1. Defining the problem\n2. Preparing the data\n3. Evaluating different algorithms\n4. Improving results\, and\n5. Presenting the results \nRegister yourself – https://forms.gle/mSB1zCxBybswSnfEA \n  \n 
URL:https://charitynz.org/event/intro-to-machine-learning-for-beginners/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20220219T180000
DTEND;TZID=UTC:20220219T200000
DTSTAMP:20260430T143614
CREATED:20220209T221154Z
LAST-MODIFIED:20220209T224814Z
UID:17610-1645293600-1645300800@charitynz.org
SUMMARY:MITRE ATT&CK\, D3FEND Framework
DESCRIPTION:MITRE ATT&CK and D3FEND framework is a globally accessible knowledge base that provides a common language for systematically categorizing adversary’s attack life cycle and countermeasure techniques respectively. \nBelow is the higher level walk-through of the session: \nATT&CK and D3FEND framework overview\nATT&CK tactics and techniques\nD3FEND countermeasures\nATT&CK Navigator overview\nATT&CK Navigator demo \nRegister yourself – https://forms.gle/v9qzLKaBHN5xK9JZ7https://forms.gle/v9qzLKaBHN5xK9JZ7
URL:https://charitynz.org/event/mitre-attck-d3fend-framework/
CATEGORIES:Technology Training Adults
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20220110T090000
DTEND;TZID=UTC:20220114T170000
DTSTAMP:20260430T143614
CREATED:20211112T054145Z
LAST-MODIFIED:20211226T093813Z
UID:13649-1641805200-1642179600@charitynz.org
SUMMARY:Summer Holidays STEM Workshop
DESCRIPTION:Two sessions every day \nSession 1 – 9AM to 12 PM \nSession 2 – 1230 to 0330 PM \nFor registration\, please follow the link \nhttps://forms.gle/xBRJWS9bpKLLarGy7\nor submit information in the form below \n﻿Loading… \n\n			\n				\n			\n				\n				3D Printed Models by Children at STEM Workshop\n				\n			\n				\n			\n				\n				Robotic and Coding by Children at STEM Workshop\n				\n			\n				\n			\n				\n				Coding and Game Development by Children at STEM Workshop
URL:https://charitynz.org/event/summer-holidays-stem-workshop/
CATEGORIES:Children STEM Education,Coding,Robotics
ATTACH;FMTTYPE=image/png:https://charitynz.org/wp-content/uploads/2017/07/Children.png
ORGANIZER;CN="CharityNZ":MAILTO:admin@charitynz.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20211218T100000
DTEND;TZID=UTC:20211218T120000
DTSTAMP:20260430T143614
CREATED:20211114T051306Z
LAST-MODIFIED:20211211T104934Z
UID:13659-1639821600-1639828800@charitynz.org
SUMMARY:Advance Cyber Security Part 2
DESCRIPTION:How to ensure the availability \nElements of Cyber Resiliency \nBusiness Continuity Management \nDisaster Recovery Planning \nFive Elements of BCM/DR \nRegister yourself on this link https://forms.gle/aLL36ht7aMevSnCy9 \nor fill up the form below: \n﻿﻿﻿﻿Loading…
URL:https://charitynz.org/event/advance-cyber-security-part-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20211211T100000
DTEND;TZID=UTC:20211211T120000
DTSTAMP:20260430T143614
CREATED:20211114T045404Z
LAST-MODIFIED:20211114T045404Z
UID:13655-1639216800-1639224000@charitynz.org
SUMMARY:Securing Microsoft Azure Cloud
DESCRIPTION:Protecting Azure VM\nJust in time\nAzure Security center\nAzure Defender\nMicrosoft Sentenial \nRegister yourself – https://forms.gle/aLL36ht7aMevSnCy9 \n 
URL:https://charitynz.org/event/securing-microsoft-azure-cloud/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20211127T100000
DTEND;TZID=UTC:20211127T130000
DTSTAMP:20260430T143614
CREATED:20211114T043026Z
LAST-MODIFIED:20211114T043026Z
UID:13652-1638007200-1638018000@charitynz.org
SUMMARY:Vulnerability Scanning and Web Application Testing
DESCRIPTION:Difference between Vulnerability\, Threat\, and Risk\nVulnerability scan\nWeb Application standards\nQ&A\n10-15 mints break\nOWASP top 10\nWeb Application testing\nDVWA – damn vulnerable web app\nQ&A and feedback form submission request\n\nRegister yourself – https://forms.gle/aLL36ht7aMevSnCy9 \n 
URL:https://charitynz.org/event/vulnerability-scanning-and-web-application-testing-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20211106T180000
DTEND;TZID=UTC:20211106T210000
DTSTAMP:20260430T143614
CREATED:20211010T101529Z
LAST-MODIFIED:20211010T101529Z
UID:13600-1636221600-1636232400@charitynz.org
SUMMARY:Vulnerability scanning and Web Application Testing
DESCRIPTION:Difference between Vulnerability\, Threat\, and Risk\nVulnerability scan\nWeb Application standards\nQ&A\n10-15 mints break\nOWASP top 10\nWeb Application testing\nQ&A and feedback form submission request\n\nRegister yourself – https://forms.gle/aLL36ht7aMevSnCy9
URL:https://charitynz.org/event/vulnerability-scanning-and-web-application-testing/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20211031T190000
DTEND;TZID=UTC:20211031T210000
DTSTAMP:20260430T143614
CREATED:20210927T113611Z
LAST-MODIFIED:20210927T113611Z
UID:13584-1635706800-1635714000@charitynz.org
SUMMARY:Cloud SC900 - Microsoft Security\, Compliance and identity Fundamentals
DESCRIPTION:High-Level Agenda of the workshop \n\nThe Zero-Trust methodology\, Shared Responsibility Model\, Threat Detection\, Defence in Depth\, Cloud Adoption Framework\, and Identity Concepts\nMicrosoft Identity\, Authentication\, Access Management\, Identity Protection and Governance Capabilities of Azure AD\nMicrosoft Security Solutions capabilities including Azure NSGs\, DDoS protection\, Firewall\, Bastion\, WAF\, and Encryption\nAzure Security Management capabilities including\, Security Posture Management\, Azure Security Centre\, Azure Secure Score\, Azure Defender\, and Azure Security Baselines\nThreat Protection and Security Management Capabilities of Microsoft 365 and Endpoint Security with Microsoft Intune\nInformation Protection Governance\, Insider Risk\, eDiscovery\, and Audit capabilities of Microsoft 365.\n\nRegister yourself – https://forms.gle/aLL36ht7aMevSnCy9
URL:https://charitynz.org/event/cloud-sc900-microsoft-security-compliance-and-identity-fundamentals/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20211030T173000
DTEND;TZID=UTC:20211030T210000
DTSTAMP:20260430T143614
CREATED:20211010T100533Z
LAST-MODIFIED:20211010T100533Z
UID:13596-1635615000-1635627600@charitynz.org
SUMMARY:Cyber Security Advanced GRC - Focused on Risk\, Privacy and Business continuity Management
DESCRIPTION:Introduction to GRC\nDifference between Privacy and Confidentiality\nHow to maintain your personal privacy consideration\nRisk Management Life cycle\, Risk heat map\nCase study – Producing Risk Management document\nQ&A\n10-15 Minutes break\nPractical – Hands-on using GRC tool\nBusiness Continuity Planning and Disaster Recovery\nHow to maintain your personal Cyber Hygiene\nQ&A\n\nRegister yourself  – https://forms.gle/aLL36ht7aMevSnCy9
URL:https://charitynz.org/event/cyber-security-advanced-grc-focused-on-risk-privacy-and-business-continuity-management/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20211017T190000
DTEND;TZID=UTC:20211017T210000
DTSTAMP:20260430T143614
CREATED:20210924T094229Z
LAST-MODIFIED:20210924T094229Z
UID:13575-1634497200-1634504400@charitynz.org
SUMMARY:DDOS Attacks and its mitigation
DESCRIPTION:DDoS – A cheap service to be so expensive? \nWe will briefly talk about ; \n– Ransomware and Ransome notes\n– Innovative attack techniques\n– Disruption of Stock exchanges\n– Spy agencies\, war rooms\, etc ….sound like a movie !!! \nThis talk will be a focus on A day in the life of a Defender !!\n– Lessons you can learn protecting a range of NZ financial institutions\n– The cost to run a cheap DDoS service\n– Proactive approach to prepare and defend yourself from cyber attacks \nRegister yourself – https://forms.gle/aLL36ht7aMevSnCy9 \n 
URL:https://charitynz.org/event/ddos-attacks-and-its-mitigation/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20211004T090000
DTEND;TZID=UTC:20211013T160000
DTSTAMP:20260430T143614
CREATED:20210929T000942Z
LAST-MODIFIED:20210929T000942Z
UID:13586-1633338000-1634140800@charitynz.org
SUMMARY:School Holidays STEM Workshop
DESCRIPTION:3 Days workshops from 9 AM to 4 PM with a variety of activities \nRobotics \nCoding \n3D Modelling/Printing \nMathematics \nScience \nFill the form to get your child to register for these workshops \nhttps://forms.gle/1sdbU8o7UsH2FQrV9
URL:https://charitynz.org/event/school-holidays-stem-workshop/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20211004T090000
DTEND;TZID=UTC:20211007T180000
DTSTAMP:20260430T143614
CREATED:20210815T063825Z
LAST-MODIFIED:20210815T063825Z
UID:13531-1633338000-1633629600@charitynz.org
SUMMARY:Coding Robotics 3D Modelling and Printing for Youth
DESCRIPTION:We are holding these sessions during term 3 break (October 2021) \nPls\, note that these sessions are for ages 8-15. \nPlease get yourself registered by sending the following details to holidays@charitynz.org \n \n  \nhttps://docs.google.com/forms/d/e/1FAIpQLSciBmlsKi3Ih2yehkVn9CrFHRuIZIyDqznYc_2rUDGSiBud3Q/viewform
URL:https://charitynz.org/event/coding-robotics-3d-modelling-and-printing-for-youth/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20211002T190000
DTEND;TZID=UTC:20211002T213000
DTSTAMP:20260430T143614
CREATED:20210924T094836Z
LAST-MODIFIED:20210924T094836Z
UID:13577-1633201200-1633210200@charitynz.org
SUMMARY:Cyber Security Basics to Advanced
DESCRIPTION:Difference between Privacy and Confidentiality \nDay-to-day use cases for Privacy concerns and how to deal with them – Cost of convenience. \nRisk Management life Cycle \nCyber Governance and Assurance \nAttack vectors and Attack surfaces \n  \n  \n 
URL:https://charitynz.org/event/cyber-security-basics-to-advanced/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20210919T160000
DTEND;TZID=UTC:20210919T180000
DTSTAMP:20260430T143614
CREATED:20210830T092014Z
LAST-MODIFIED:20210830T092014Z
UID:13548-1632067200-1632074400@charitynz.org
SUMMARY:Health and Safety expert Training
DESCRIPTION:Agenda \n\nWhat is a health and safety expert?\nLegislation\, ISO45001\, International Associations\nHealth and Safety Management System\nHow to identify and manage hazards\nHow to audit workplaces\nHow to investigate incidents\nCareer Pathway as a Health and Safety Expert
URL:https://charitynz.org/event/health-and-safety-expert-training/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20210905T160000
DTEND;TZID=UTC:20210905T190000
DTSTAMP:20260430T143614
CREATED:20210830T053602Z
LAST-MODIFIED:20210830T053602Z
UID:13539-1630857600-1630868400@charitynz.org
SUMMARY:Fundamentals of Cyber Security Part2
DESCRIPTION:  \nGet ready for Sunday\, Sep 05\, 2021\, covering the below topics \n– GRC – Cyber Security Governance\n– Risk Management\n– Business Continuity Planning (BCP) and Disaster Recovery\n– Personal Security Hygiene\, do’s and don’t to keep yourself safe \nget in touch for more details\nwww.charitynz.org/events  \nadmin@charitynz.org
URL:https://charitynz.org/event/fundamentals-of-cyber-security-part2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20210904T160000
DTEND;TZID=UTC:20210925T190000
DTSTAMP:20260430T143614
CREATED:20210815T063154Z
LAST-MODIFIED:20210815T063154Z
UID:13527-1630771200-1632596400@charitynz.org
SUMMARY:Basics of Python Programming
DESCRIPTION:This module will cover the basics of Python programming from very basic to advanced which will ultimately lead to Data Processing and Machine learning. We will have 4 weekly sessions each of 3 hours with 15 mins break in between. Wellington Professionals will attend physically in Brooklyn\, Wellington. Rest of the participants through remote video link \nThis module is for all ages ( High School\, College\, Uni students\, and Professionals). Please get yourself registered by sending the following details to Tech_stream@charitynz.org \nYour name \nPhone number \nAddress \nProfession
URL:https://charitynz.org/event/basics-of-python-programming/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20210828T160000
DTEND;TZID=UTC:20210828T190000
DTSTAMP:20260430T143614
CREATED:20210814T220011Z
LAST-MODIFIED:20210814T220011Z
UID:13495-1630166400-1630177200@charitynz.org
SUMMARY:Fundamentals of Cyber Security
DESCRIPTION:This Module is 3 hours workshop with interactive Q&A at the end. Wellington Professionals will attend physically in Brooklyn\, Wellington. Rest of the participants through remote video link \nPlease get yourself registered by sending the following details to Tech_stream@charitynz.org \nYour name \nPhone number \nAddress \nProfession \n  \nThis will cover below topics \nWorkshop contents\n1. Cyber Security Concepts\n\nCyber Security Concepts and Definitions\n– Difference between IT Security\, Information Security\, and Cyber Security\n– Assets\, Threats & Vulnerabilities\n– Likelihood\, Consequence\, and Impact\n– Inherent Risk\, Current Risk\, and Residual Risk\n\n\nCorporate Cyber Security Strategy\n– Supporting Business Goals and Objectives\n– Cyber Security Policy and Framework\n– Cyber Awareness\, Training and Education\nLaws\, Regulations and Industry Standards\nRoles and Responsibilities\nProfessional Organisations and Ethics\nQ&A\n\nExercise – Development of a cyber asset register \n2. Security Architecture\n\nSecurity Architecture Concepts and Definitions\n\n\nSecurity Architecture Frameworks\n– SABSA\n– TOGAF\n– PCI & ISO27K\nSecurity Architecture Design Principles\nService Models\n– Insourcing\n– Outsourcing\n– Managed Services – Single provider\, multiple providers\, prime provider\n– Cloud Services – Cloud service models and cloud deployment models\nQ&A\n\nExercise – Recommendations for service provider models in addressing risks\nExercise – Identification of security architecture design principles \n3. Implementing Security\n\nOSI and TCP/IP and Internet Models\nLow and high communication protocols/ports\n\n\nNetwork Fundamentals\n– Network Security\n– Network Topologies\n– Security Zones\n– Network Security Technologies\n– Virtualisation Benefits and Security Challenges\nVirtualization and VLAN segmentation\nEndpoint Security\n– Servers\, desktops\, laptops\, tablets\, mobile devices\, wearables\n– Endpoint Security Technologies\n– Specialised Endpoint Systems\nNext Generation of Endpoint with EUBA\nApplication Security\n– Software Development Lifecycle\n– OWASP Top 10\n– Web Application Firewall and Database Firewall\nData Security\n– Data owners\, data classification\, labeling\n– Access control\n– Data governance and lifecycle\n– Data remanence\nAustralian Signals Directorate Top 35\, E4 and E8\n– SANS Top 20 mapped to ASD Top 35 and other frameworks\n20 CIS controls of Centre for Internet Security\nQ&A\n\n\nExercise – Establish a data classification scheme\nExercise – Design a secure network topology with network security zones\, overlay the data classification scheme and placement of recommended perimeter and layered controls\n\n4. Cryptography\n\nCryptography Key Terms and Concepts\n\n\nSymmetric Algorithms\n– Data Encryption Standard (DES)\n– Triple DES\n– Advanced Encryption Standard (AES)\n– Other symmetric algorithms\nDiffie Helman groups and PFS\nAsymmetric Algorithms\nHashing Algorithms\nNon-Repudiation\nCryptographic Attacks\n– Side-channel\n– Birthday\n– Implementation\n– Other attack methods\nImplementing Cryptography in the Real World\n– Public Key Infrastructure (PKI)\n– Electronic Document Exchange\n– Virtual Private Networks (VPNs)\n– Secure e-mail\n– Steganography\n– Digital Watermarks\n– Wireless Security\n– Secure Shell\n– Key Management\nQ&A\n\n5. Risk Management\n\nRisk Management Concepts and Definitions\n– The stages of risk\n– Systemic and systematic Risk\, Risk Aggregation\n– Risk treatment options Risk Acceptance\, Reduction\, Transfer and Avoidance\n– Risk Appetite and Tolerance\n– What is GRC (Governance\, Risk Management\, and Compliance)\n– Risk Management Process\n– Quantitative\, Semi-quantitative\, and Qualitative Risk\n– Introduction to Critical Security Controls CIS20” under the first few lines of Risk Management Concepts and Definition\,\nThreats and Opportunities\n– Assessing the current threat landscape\n– Developing a threat taxonomy\n– Advanced Persistent Threats (APT)\n– Bring Your Own Device or Technologies\n– The Internet of Things\nBlock chain is a way to save IOT\nControls\, Countermeasures\, and Enablers\nBusiness Impact Analysis\n– Sample Business Impact Analysis Template\n– Sample Business Impact Levels\nQ&A\nExercise – Development of a threat taxonomy and identification of vulnerabilities\nExercise – Evaluate inherent risk\, current controls\, current risk\, recommend controls and residual risk\n\n6. Business Continuity and Disaster Recovery Planning\n\nBusiness Continuity Planning\n– NIST SP800-34 as a framework\n\n\nDisaster Recovery Planning\n– Relationship between the BCP and DRP\n– Events that trigger a BCP/DRP\nDeveloping the BCP and DRP\n– Application of NIST SP800-34\n– Initiation\n– Business Impact Analysis – BIA\n– Identification of preventive controls\n– Recovery strategies\n– Plan design and development and important BCP/DRP frameworks\n– Ongoing maintenance\nQ&A\n\nExercise – Identify and rank the most important business operations \n7. Incident Response\n\nNIST Cyber Security Framework\n– Identify\n– Protect\n– Detect\n– Respond\n– Recover\n\n\n\n\nCyber Forensics\n– General phases of the forensic process\n– Anti-forensics\n– Forensic media analysis\n– Network forensics\n– Forensic analysis of software\, Embedded devices\, and Electronic Discovery\nIncident Response Management\n– Security events and Security incidents\n– Incident Response Methodology using NIST SP800-61\nSecurity Assurance\n– Defining and implementing meaningful metrics\n– Configuration management\n– Minimum Security Baselines\n– Vulnerability Assessments\n– Penetration Testing\n– Security Audits (Internal & External Audits)\n– Security Assessments and their types\n– Log reviews\, retention\, centralization\, and analysis\n– Security Information and Event Management System (SIEM)\nNext-Gen of SIEM and Security Orchestration and Automated Response (SOAR)\nQ&A
URL:https://charitynz.org/event/fundamentals-of-cyber-security/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Auckland:20210821T160000
DTEND;TZID=Pacific/Auckland:20210821T180000
DTSTAMP:20260430T143614
CREATED:20210814T215119Z
LAST-MODIFIED:20210814T215119Z
UID:17326-1629561600-1629568800@charitynz.org
SUMMARY:Microsoft Azure Fundamental and Core Services - AZ900
DESCRIPTION:This Module leading to Azure AZ900 Certification consists of two modules. \nModule1 was already delivered on Saturday\, August 14\, 4-6 pm. \nModule2 will be delivered on Saturday\, August 21\, 2021\, 4-6 pm. \nWellington Professionals will attend physically in Brooklyn\, Wellington. Rest of the participants through remote video link \nPlease get yourself registered by sending the following details to Tech_stream@charitynz.org \nYour name \nPhone number \nAddress \nProfession
URL:https://charitynz.org/event/microsoft-azure-fundamental-and-core-services-az900/
END:VEVENT
END:VCALENDAR