BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//CharityNZ - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://charitynz.org
X-WR-CALDESC:Events for CharityNZ
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20200101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:Pacific/Auckland
BEGIN:STANDARD
TZOFFSETFROM:+1300
TZOFFSETTO:+1200
TZNAME:NZST
DTSTART:20200404T140000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+1200
TZOFFSETTO:+1300
TZNAME:NZDT
DTSTART:20200926T140000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+1300
TZOFFSETTO:+1200
TZNAME:NZST
DTSTART:20210403T140000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+1200
TZOFFSETTO:+1300
TZNAME:NZDT
DTSTART:20210925T140000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+1300
TZOFFSETTO:+1200
TZNAME:NZST
DTSTART:20220402T140000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+1200
TZOFFSETTO:+1300
TZNAME:NZDT
DTSTART:20220924T140000
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=UTC:20211218T100000
DTEND;TZID=UTC:20211218T120000
DTSTAMP:20260430T153551
CREATED:20211114T051306Z
LAST-MODIFIED:20211211T104934Z
UID:13659-1639821600-1639828800@charitynz.org
SUMMARY:Advance Cyber Security Part 2
DESCRIPTION:How to ensure the availability \nElements of Cyber Resiliency \nBusiness Continuity Management \nDisaster Recovery Planning \nFive Elements of BCM/DR \nRegister yourself on this link https://forms.gle/aLL36ht7aMevSnCy9 \nor fill up the form below: \n﻿﻿﻿﻿Loading…
URL:https://charitynz.org/event/advance-cyber-security-part-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20211211T100000
DTEND;TZID=UTC:20211211T120000
DTSTAMP:20260430T153551
CREATED:20211114T045404Z
LAST-MODIFIED:20211114T045404Z
UID:13655-1639216800-1639224000@charitynz.org
SUMMARY:Securing Microsoft Azure Cloud
DESCRIPTION:Protecting Azure VM\nJust in time\nAzure Security center\nAzure Defender\nMicrosoft Sentenial \nRegister yourself – https://forms.gle/aLL36ht7aMevSnCy9 \n 
URL:https://charitynz.org/event/securing-microsoft-azure-cloud/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20211127T100000
DTEND;TZID=UTC:20211127T130000
DTSTAMP:20260430T153551
CREATED:20211114T043026Z
LAST-MODIFIED:20211114T043026Z
UID:13652-1638007200-1638018000@charitynz.org
SUMMARY:Vulnerability Scanning and Web Application Testing
DESCRIPTION:Difference between Vulnerability\, Threat\, and Risk\nVulnerability scan\nWeb Application standards\nQ&A\n10-15 mints break\nOWASP top 10\nWeb Application testing\nDVWA – damn vulnerable web app\nQ&A and feedback form submission request\n\nRegister yourself – https://forms.gle/aLL36ht7aMevSnCy9 \n 
URL:https://charitynz.org/event/vulnerability-scanning-and-web-application-testing-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20211106T180000
DTEND;TZID=UTC:20211106T210000
DTSTAMP:20260430T153551
CREATED:20211010T101529Z
LAST-MODIFIED:20211010T101529Z
UID:13600-1636221600-1636232400@charitynz.org
SUMMARY:Vulnerability scanning and Web Application Testing
DESCRIPTION:Difference between Vulnerability\, Threat\, and Risk\nVulnerability scan\nWeb Application standards\nQ&A\n10-15 mints break\nOWASP top 10\nWeb Application testing\nQ&A and feedback form submission request\n\nRegister yourself – https://forms.gle/aLL36ht7aMevSnCy9
URL:https://charitynz.org/event/vulnerability-scanning-and-web-application-testing/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20211031T190000
DTEND;TZID=UTC:20211031T210000
DTSTAMP:20260430T153551
CREATED:20210927T113611Z
LAST-MODIFIED:20210927T113611Z
UID:13584-1635706800-1635714000@charitynz.org
SUMMARY:Cloud SC900 - Microsoft Security\, Compliance and identity Fundamentals
DESCRIPTION:High-Level Agenda of the workshop \n\nThe Zero-Trust methodology\, Shared Responsibility Model\, Threat Detection\, Defence in Depth\, Cloud Adoption Framework\, and Identity Concepts\nMicrosoft Identity\, Authentication\, Access Management\, Identity Protection and Governance Capabilities of Azure AD\nMicrosoft Security Solutions capabilities including Azure NSGs\, DDoS protection\, Firewall\, Bastion\, WAF\, and Encryption\nAzure Security Management capabilities including\, Security Posture Management\, Azure Security Centre\, Azure Secure Score\, Azure Defender\, and Azure Security Baselines\nThreat Protection and Security Management Capabilities of Microsoft 365 and Endpoint Security with Microsoft Intune\nInformation Protection Governance\, Insider Risk\, eDiscovery\, and Audit capabilities of Microsoft 365.\n\nRegister yourself – https://forms.gle/aLL36ht7aMevSnCy9
URL:https://charitynz.org/event/cloud-sc900-microsoft-security-compliance-and-identity-fundamentals/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20211030T173000
DTEND;TZID=UTC:20211030T210000
DTSTAMP:20260430T153551
CREATED:20211010T100533Z
LAST-MODIFIED:20211010T100533Z
UID:13596-1635615000-1635627600@charitynz.org
SUMMARY:Cyber Security Advanced GRC - Focused on Risk\, Privacy and Business continuity Management
DESCRIPTION:Introduction to GRC\nDifference between Privacy and Confidentiality\nHow to maintain your personal privacy consideration\nRisk Management Life cycle\, Risk heat map\nCase study – Producing Risk Management document\nQ&A\n10-15 Minutes break\nPractical – Hands-on using GRC tool\nBusiness Continuity Planning and Disaster Recovery\nHow to maintain your personal Cyber Hygiene\nQ&A\n\nRegister yourself  – https://forms.gle/aLL36ht7aMevSnCy9
URL:https://charitynz.org/event/cyber-security-advanced-grc-focused-on-risk-privacy-and-business-continuity-management/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20211017T190000
DTEND;TZID=UTC:20211017T210000
DTSTAMP:20260430T153551
CREATED:20210924T094229Z
LAST-MODIFIED:20210924T094229Z
UID:13575-1634497200-1634504400@charitynz.org
SUMMARY:DDOS Attacks and its mitigation
DESCRIPTION:DDoS – A cheap service to be so expensive? \nWe will briefly talk about ; \n– Ransomware and Ransome notes\n– Innovative attack techniques\n– Disruption of Stock exchanges\n– Spy agencies\, war rooms\, etc ….sound like a movie !!! \nThis talk will be a focus on A day in the life of a Defender !!\n– Lessons you can learn protecting a range of NZ financial institutions\n– The cost to run a cheap DDoS service\n– Proactive approach to prepare and defend yourself from cyber attacks \nRegister yourself – https://forms.gle/aLL36ht7aMevSnCy9 \n 
URL:https://charitynz.org/event/ddos-attacks-and-its-mitigation/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20211004T090000
DTEND;TZID=UTC:20211013T160000
DTSTAMP:20260430T153551
CREATED:20210929T000942Z
LAST-MODIFIED:20210929T000942Z
UID:13586-1633338000-1634140800@charitynz.org
SUMMARY:School Holidays STEM Workshop
DESCRIPTION:3 Days workshops from 9 AM to 4 PM with a variety of activities \nRobotics \nCoding \n3D Modelling/Printing \nMathematics \nScience \nFill the form to get your child to register for these workshops \nhttps://forms.gle/1sdbU8o7UsH2FQrV9
URL:https://charitynz.org/event/school-holidays-stem-workshop/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20211004T090000
DTEND;TZID=UTC:20211007T180000
DTSTAMP:20260430T153551
CREATED:20210815T063825Z
LAST-MODIFIED:20210815T063825Z
UID:13531-1633338000-1633629600@charitynz.org
SUMMARY:Coding Robotics 3D Modelling and Printing for Youth
DESCRIPTION:We are holding these sessions during term 3 break (October 2021) \nPls\, note that these sessions are for ages 8-15. \nPlease get yourself registered by sending the following details to holidays@charitynz.org \n \n  \nhttps://docs.google.com/forms/d/e/1FAIpQLSciBmlsKi3Ih2yehkVn9CrFHRuIZIyDqznYc_2rUDGSiBud3Q/viewform
URL:https://charitynz.org/event/coding-robotics-3d-modelling-and-printing-for-youth/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20211002T190000
DTEND;TZID=UTC:20211002T213000
DTSTAMP:20260430T153551
CREATED:20210924T094836Z
LAST-MODIFIED:20210924T094836Z
UID:13577-1633201200-1633210200@charitynz.org
SUMMARY:Cyber Security Basics to Advanced
DESCRIPTION:Difference between Privacy and Confidentiality \nDay-to-day use cases for Privacy concerns and how to deal with them – Cost of convenience. \nRisk Management life Cycle \nCyber Governance and Assurance \nAttack vectors and Attack surfaces \n  \n  \n 
URL:https://charitynz.org/event/cyber-security-basics-to-advanced/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20210919T160000
DTEND;TZID=UTC:20210919T180000
DTSTAMP:20260430T153551
CREATED:20210830T092014Z
LAST-MODIFIED:20210830T092014Z
UID:13548-1632067200-1632074400@charitynz.org
SUMMARY:Health and Safety expert Training
DESCRIPTION:Agenda \n\nWhat is a health and safety expert?\nLegislation\, ISO45001\, International Associations\nHealth and Safety Management System\nHow to identify and manage hazards\nHow to audit workplaces\nHow to investigate incidents\nCareer Pathway as a Health and Safety Expert
URL:https://charitynz.org/event/health-and-safety-expert-training/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20210905T160000
DTEND;TZID=UTC:20210905T190000
DTSTAMP:20260430T153551
CREATED:20210830T053602Z
LAST-MODIFIED:20210830T053602Z
UID:13539-1630857600-1630868400@charitynz.org
SUMMARY:Fundamentals of Cyber Security Part2
DESCRIPTION:  \nGet ready for Sunday\, Sep 05\, 2021\, covering the below topics \n– GRC – Cyber Security Governance\n– Risk Management\n– Business Continuity Planning (BCP) and Disaster Recovery\n– Personal Security Hygiene\, do’s and don’t to keep yourself safe \nget in touch for more details\nwww.charitynz.org/events  \nadmin@charitynz.org
URL:https://charitynz.org/event/fundamentals-of-cyber-security-part2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20210904T160000
DTEND;TZID=UTC:20210925T190000
DTSTAMP:20260430T153551
CREATED:20210815T063154Z
LAST-MODIFIED:20210815T063154Z
UID:13527-1630771200-1632596400@charitynz.org
SUMMARY:Basics of Python Programming
DESCRIPTION:This module will cover the basics of Python programming from very basic to advanced which will ultimately lead to Data Processing and Machine learning. We will have 4 weekly sessions each of 3 hours with 15 mins break in between. Wellington Professionals will attend physically in Brooklyn\, Wellington. Rest of the participants through remote video link \nThis module is for all ages ( High School\, College\, Uni students\, and Professionals). Please get yourself registered by sending the following details to Tech_stream@charitynz.org \nYour name \nPhone number \nAddress \nProfession
URL:https://charitynz.org/event/basics-of-python-programming/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20210828T160000
DTEND;TZID=UTC:20210828T190000
DTSTAMP:20260430T153551
CREATED:20210814T220011Z
LAST-MODIFIED:20210814T220011Z
UID:13495-1630166400-1630177200@charitynz.org
SUMMARY:Fundamentals of Cyber Security
DESCRIPTION:This Module is 3 hours workshop with interactive Q&A at the end. Wellington Professionals will attend physically in Brooklyn\, Wellington. Rest of the participants through remote video link \nPlease get yourself registered by sending the following details to Tech_stream@charitynz.org \nYour name \nPhone number \nAddress \nProfession \n  \nThis will cover below topics \nWorkshop contents\n1. Cyber Security Concepts\n\nCyber Security Concepts and Definitions\n– Difference between IT Security\, Information Security\, and Cyber Security\n– Assets\, Threats & Vulnerabilities\n– Likelihood\, Consequence\, and Impact\n– Inherent Risk\, Current Risk\, and Residual Risk\n\n\nCorporate Cyber Security Strategy\n– Supporting Business Goals and Objectives\n– Cyber Security Policy and Framework\n– Cyber Awareness\, Training and Education\nLaws\, Regulations and Industry Standards\nRoles and Responsibilities\nProfessional Organisations and Ethics\nQ&A\n\nExercise – Development of a cyber asset register \n2. Security Architecture\n\nSecurity Architecture Concepts and Definitions\n\n\nSecurity Architecture Frameworks\n– SABSA\n– TOGAF\n– PCI & ISO27K\nSecurity Architecture Design Principles\nService Models\n– Insourcing\n– Outsourcing\n– Managed Services – Single provider\, multiple providers\, prime provider\n– Cloud Services – Cloud service models and cloud deployment models\nQ&A\n\nExercise – Recommendations for service provider models in addressing risks\nExercise – Identification of security architecture design principles \n3. Implementing Security\n\nOSI and TCP/IP and Internet Models\nLow and high communication protocols/ports\n\n\nNetwork Fundamentals\n– Network Security\n– Network Topologies\n– Security Zones\n– Network Security Technologies\n– Virtualisation Benefits and Security Challenges\nVirtualization and VLAN segmentation\nEndpoint Security\n– Servers\, desktops\, laptops\, tablets\, mobile devices\, wearables\n– Endpoint Security Technologies\n– Specialised Endpoint Systems\nNext Generation of Endpoint with EUBA\nApplication Security\n– Software Development Lifecycle\n– OWASP Top 10\n– Web Application Firewall and Database Firewall\nData Security\n– Data owners\, data classification\, labeling\n– Access control\n– Data governance and lifecycle\n– Data remanence\nAustralian Signals Directorate Top 35\, E4 and E8\n– SANS Top 20 mapped to ASD Top 35 and other frameworks\n20 CIS controls of Centre for Internet Security\nQ&A\n\n\nExercise – Establish a data classification scheme\nExercise – Design a secure network topology with network security zones\, overlay the data classification scheme and placement of recommended perimeter and layered controls\n\n4. Cryptography\n\nCryptography Key Terms and Concepts\n\n\nSymmetric Algorithms\n– Data Encryption Standard (DES)\n– Triple DES\n– Advanced Encryption Standard (AES)\n– Other symmetric algorithms\nDiffie Helman groups and PFS\nAsymmetric Algorithms\nHashing Algorithms\nNon-Repudiation\nCryptographic Attacks\n– Side-channel\n– Birthday\n– Implementation\n– Other attack methods\nImplementing Cryptography in the Real World\n– Public Key Infrastructure (PKI)\n– Electronic Document Exchange\n– Virtual Private Networks (VPNs)\n– Secure e-mail\n– Steganography\n– Digital Watermarks\n– Wireless Security\n– Secure Shell\n– Key Management\nQ&A\n\n5. Risk Management\n\nRisk Management Concepts and Definitions\n– The stages of risk\n– Systemic and systematic Risk\, Risk Aggregation\n– Risk treatment options Risk Acceptance\, Reduction\, Transfer and Avoidance\n– Risk Appetite and Tolerance\n– What is GRC (Governance\, Risk Management\, and Compliance)\n– Risk Management Process\n– Quantitative\, Semi-quantitative\, and Qualitative Risk\n– Introduction to Critical Security Controls CIS20” under the first few lines of Risk Management Concepts and Definition\,\nThreats and Opportunities\n– Assessing the current threat landscape\n– Developing a threat taxonomy\n– Advanced Persistent Threats (APT)\n– Bring Your Own Device or Technologies\n– The Internet of Things\nBlock chain is a way to save IOT\nControls\, Countermeasures\, and Enablers\nBusiness Impact Analysis\n– Sample Business Impact Analysis Template\n– Sample Business Impact Levels\nQ&A\nExercise – Development of a threat taxonomy and identification of vulnerabilities\nExercise – Evaluate inherent risk\, current controls\, current risk\, recommend controls and residual risk\n\n6. Business Continuity and Disaster Recovery Planning\n\nBusiness Continuity Planning\n– NIST SP800-34 as a framework\n\n\nDisaster Recovery Planning\n– Relationship between the BCP and DRP\n– Events that trigger a BCP/DRP\nDeveloping the BCP and DRP\n– Application of NIST SP800-34\n– Initiation\n– Business Impact Analysis – BIA\n– Identification of preventive controls\n– Recovery strategies\n– Plan design and development and important BCP/DRP frameworks\n– Ongoing maintenance\nQ&A\n\nExercise – Identify and rank the most important business operations \n7. Incident Response\n\nNIST Cyber Security Framework\n– Identify\n– Protect\n– Detect\n– Respond\n– Recover\n\n\n\n\nCyber Forensics\n– General phases of the forensic process\n– Anti-forensics\n– Forensic media analysis\n– Network forensics\n– Forensic analysis of software\, Embedded devices\, and Electronic Discovery\nIncident Response Management\n– Security events and Security incidents\n– Incident Response Methodology using NIST SP800-61\nSecurity Assurance\n– Defining and implementing meaningful metrics\n– Configuration management\n– Minimum Security Baselines\n– Vulnerability Assessments\n– Penetration Testing\n– Security Audits (Internal & External Audits)\n– Security Assessments and their types\n– Log reviews\, retention\, centralization\, and analysis\n– Security Information and Event Management System (SIEM)\nNext-Gen of SIEM and Security Orchestration and Automated Response (SOAR)\nQ&A
URL:https://charitynz.org/event/fundamentals-of-cyber-security/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Auckland:20210821T160000
DTEND;TZID=Pacific/Auckland:20210821T180000
DTSTAMP:20260430T153551
CREATED:20210814T215119Z
LAST-MODIFIED:20210814T215119Z
UID:17326-1629561600-1629568800@charitynz.org
SUMMARY:Microsoft Azure Fundamental and Core Services - AZ900
DESCRIPTION:This Module leading to Azure AZ900 Certification consists of two modules. \nModule1 was already delivered on Saturday\, August 14\, 4-6 pm. \nModule2 will be delivered on Saturday\, August 21\, 2021\, 4-6 pm. \nWellington Professionals will attend physically in Brooklyn\, Wellington. Rest of the participants through remote video link \nPlease get yourself registered by sending the following details to Tech_stream@charitynz.org \nYour name \nPhone number \nAddress \nProfession
URL:https://charitynz.org/event/microsoft-azure-fundamental-and-core-services-az900/
END:VEVENT
END:VCALENDAR