BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
DTSTART:20260308T030000
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:CDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20251102T010000
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:CST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20251113T160837Z
UID:A55880B1-102C-4BAE-A6A1-601472719DE8
DTSTART;TZID=America/Chicago:20251120T180000
DTEND;TZID=America/Chicago:20251120T203000
DESCRIPTION:Cybersecurity isn&#39;t just about prevention—it&#39;s about preparat
 ion. In this unique session\, attendees will step into a modified Cybersec
 urity Incident Management Exercise (CIME) designed to simulate the stress\
 , decisions\, and challenges of responding to a real cyber crisis. Rather 
 than focus on technical fixes\, this condensed 60-minute version emphasize
 s the human side of cybersecurity—how operations\, communication\, and l
 eadership are affected when core systems go down.\n\nParticipants will tak
 e on roles\, walk through a fictional but realistic scenario\, and reflect
  on the decisions made under pressure. This hands-on experience will offer
  practical insights into building resilience and the importance of a whole
 -organization response to cyber incidents.\n\nAs artificial intelligence b
 ecomes more integrated into everyday tools and systems\, it brings promise
  and peril to cybersecurity and personal privacy. This talk explores the d
 ual-edged nature of AI—how it is used to launch more sophisticated cyber
 -attacks and how it can enhance our ability to detect\, defend\, and educa
 te. We’ll discuss current applications of AI in threat detection\, data 
 protection\, and user training\, as well as the growing need for ethical f
 rameworks and risk-aware deployment strategies.\n\nNo technical background
  is required—just a willingness to think\, communicate\, and learn.\n\nS
 peaker(s): \, Doug\n\nAgenda: \n6:00 PM – Pizza and Pop provided by the 
 Central Iowa Section\n\n6:45 PM – Presentation\n\nRoom: 3043\, Bldg: Coo
 ver Hall\, 2520 Osborn Drive\, Iowa State University\, Ames\, Iowa\, Unite
 d States\, 50011
LOCATION:Room: 3043\, Bldg: Coover Hall\, 2520 Osborn Drive\, Iowa State Un
 iversity\, Ames\, Iowa\, United States\, 50011
ORGANIZER:biswasr@iastate.edu
SEQUENCE:37
SUMMARY:Experiencing the Impact – A Simulated Cyber Crisis
URL;VALUE=URI:https://events.vtools.ieee.org/m/514398
X-ALT-DESC:Description: &lt;br /&gt;&lt;p class=&quot;MsoNoSpacing&quot;&gt;&lt;span style=&quot;font-siz
 e: 12.0pt\;&quot;&gt;Cybersecurity isn&#39;t just about prevention&amp;mdash\;it&#39;s about p
 reparation. In this unique session\, attendees will step into a modified C
 ybersecurity Incident Management Exercise (CIME) designed to simulate the 
 stress\, decisions\, and challenges of responding to a real cyber crisis. 
 Rather than focus on technical fixes\, this condensed 60-minute version em
 phasizes the human side of cybersecurity&amp;mdash\;how operations\, communica
 tion\, and leadership are affected when core systems go down.&lt;/span&gt;&lt;/p&gt;\n
 &lt;p class=&quot;MsoNoSpacing&quot;&gt;&lt;span style=&quot;font-size: 12.0pt\;&quot;&gt;Participants wil
 l take on roles\, walk through a fictional but realistic scenario\, and re
 flect on the decisions made under pressure. This hands-on experience will 
 offer practical insights into building resilience and the importance of a 
 whole-organization response to cyber incidents.&lt;/span&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoN
 oSpacing&quot;&gt;&lt;span style=&quot;font-size: 12.0pt\;&quot;&gt;As artificial intelligence bec
 omes more integrated into everyday tools and systems\, it brings promise a
 nd peril to cybersecurity and personal privacy. This talk explores the dua
 l-edged nature of AI&amp;mdash\;how it is used to launch more sophisticated cy
 ber-attacks and how it can enhance our ability to detect\, defend\, and ed
 ucate. We&amp;rsquo\;ll discuss current applications of AI in threat detection
 \, data protection\, and user training\, as well as the growing need for e
 thical frameworks and risk-aware deployment strategies.&lt;/span&gt;&lt;/p&gt;\n&lt;p cla
 ss=&quot;MsoNoSpacing&quot;&gt;&lt;span style=&quot;font-size: 12.0pt\;&quot;&gt;No technical backgroun
 d is required&amp;mdash\;just a willingness to think\, communicate\, and learn
 .&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;p class=&quot;MsoNoSpacing&quot;&gt;&lt;span style=
 &quot;font-size: 12.0pt\;&quot;&gt;6:00 PM &amp;ndash\; Pizza and Pop provided by the Centr
 al Iowa Section&lt;/span&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNoSpacing&quot;&gt;&lt;span style=&quot;font-size
 : 12.0pt\;&quot;&gt;6:45 PM &amp;ndash\; Presentation&lt;/span&gt;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

