INTERNATIONAL FOUNDATION FORCULTURAL PROPERTY PROTECTION
News
Reposted from CISA/DHS
We are pleased to share the 2024 CISA Year in Review, which invites readers to learn about CISA’s work over the past year and dive deeper into each topic through related links and videos. We are grateful to all our partners across industry, government at all levels, international partners, and beyond, whose strong collaboration contributed to a wide array of achievements across CISA’s broad cybersecurity, infrastructure security, and emergency communications missions.
Just a few of our efforts over the year include:
The 2024 Year in Review is in an easy-to-use, interactive web-based format that invites readers to learn about the agency’s work over the past year and dive deeper into each topic through links and videos.
See Original Post
The Cybersecurity and Infrastructure Security Agency (CISA) issued Binding Operational Directive (BOD) 25-01, Implementing Secure Practices for Cloud Services to safeguard federal information and information systems. This directive requires federal civilian agencies to identify specific cloud tenants, implement assessment tools, and remediate deviations from CISA’s Secure Cloud Business Applications secure configuration baselines. Recent cybersecurity incidents highlight the significant risks posed by misconfigurations and weak security controls, which attackers can use to gain unauthorized access, exfiltrate data, or disrupt services. As part of CISA and the broad U.S. government's effort to move the federal civilian enterprise to a more defensible posture, this Directive will further reduce the attack surface of the federal government networks. While this Directive only applies to federal civilian executive branch agencies, the threat to cloud environments extends to every sector. We are urging all organizations to adopt this guidance. When it comes to reducing cyber risk and ensuring resilience, we all have a role to play.
The Cybersecurity and Infrastructure Security Agency (CISA) published Mobile Communications Best Practices Guidance which provides individuals, especially highly targeted individuals, with practices they can apply to their mobile communications to protect against exploitation by People’s Republic of China (PRC)-affiliated and other cyber threat actors. “Highly targeted” individuals are senior government or senior political figures who likely possess information of interest to these threat actors. Recently, PRC-affiliated actors were identified conducting cyber espionage activity targeting commercial telecommunications infrastructure. This activity enabled the theft of customer call records and the compromise of private communications for a limited number of highly targeted individuals. Communications infrastructure organizations were encouraged to strengthen their visibility and harden their network devices. Recommended actions in the mobile communications guidance for individuals to apply include end-to-end encryption, Fast Identity Online, password manager and Telco Personal Identification Number. The guidance also recommends individuals do not use personal virtual private network and migrate away from Short Message Service-based multifactor authentication. This guidance includes specific recommendations for iPhone and Android mobile devices. While no single solution eliminates all risks, implementing these best practices significantly enhances protection. CISA urges individuals, specifically highly targeted individuals, to immediately review and apply recommended best practices in this guidance.
Reposted from EMR-ISAC InfoGram
The Federal Emergency Management Agency (FEMA) released the third edition of the National Disaster Recovery Framework (NDRF) this week. The revised framework includes feedback and recommendations from the public during a 30-day public comment period that ended in October 2024. The NDRF streamlines and clarifies the federal government’s approach to providing disaster recovery resources and support to disaster-impacted communities. It is one of five national planning frameworks for each of the five preparedness mission areas within the National Preparedness System – prevention, protection, mitigation, response, and recovery.
Key revisions include:
FEMA encourages states, local governments, Tribal Nations and territories, as well as nonprofits and the emergency management community, to view and use the NDRF as a model to guide and inform their own disaster recovery planning and policymaking. The NDRF is valuable for recovery practitioners at all levels, ranging from full time professionals in state and county emergency management to individuals across the whole recovery community.
Reposted from AAM
MUSEUMS & TRUST
MAY 6-9, 2025, • LOS ANGELES
REGISTRATION IS NOW OPEN!
Early Bird registration for the 2025 AAM Annual Meeting & MuseumExpo is now open! These rates won’t last long, so be sure to register by January 31.
Plus, when you register early, you can secure your spot at the evening events including the AAM Party!
Reposted from learning cultural heritage.org
We are excited to announce that the January AFR meetup will be a joint learning opportunity with our National Heritage Responder network. Please join us as David Carmicheal presents how to conduct your own tabletop exercises.
Tabletop exercises are the safest, cheapest, and simplest way for a cultural repository to test its emergency planning and response. Having a disaster response plan is essential, but considering how you will apply that plan during a crisis is equally important. Tabletop exercises are simple, effective tools that any group can use to explore their assumptions about emergencies, predict their response, identify gaps in their thinking, assess their capabilities, and determine how to optimize their response in an actual emergency. This webinar will explain how tabletop exercises work and provide guidance for conducting your own.
David W. Carmicheal is the author of Implementing the Incident Command System at the Institutional Level: A Handbook for Libraries, Museums, Archives, and Other Cultural Institutions (Heritage Preservation and RescuingRecords.com, 2010) and two publications for the Council of State Archivists, Rescuing Family Records: A Disaster Planning Guide, and its companion volume, Rescuing Business Records: A Disaster Planning Guide for Small Businesses.
The webinar will take place January 15th from 2:00-3:00 ET. To attend, please register at https://learning.culturalheritage.org/products/exercise-without-leaving-your-seat-tabletop-exercises-for-effective-disaster-planning
Data for an Uncertain Future January 23 at 2 pm ET
As you wrap up 2024, do you have the data you need to plan for the year ahead? Join a free webinar to hear what museumgoers had to say about inclusion, imagination, and repeat visitation, and learn how the Annual Survey of Museumgoers can help you make confident, data-informed decisions in the year ahead. What is the Annual Survey of Museumgoers? It's a cost-effective way to learn about your visitors' experiences, what they value, and what your museum can do to keep improving. You simply sign up and send it out via email and social media. It's that easy.
SUBMIT YOUR SESSION IDEAS FOR ASTC 2025
As in the past, we invite you to propose content for ASTC 2025 for several different types of sessions:
ASTC 2025 will be held September 5–8, 2025, in the San Francisco Bay Area and is hosted by a consortium of eight ASTC members in the region.
Reposted from Art Loss Register
The Art Loss Register is the leading due diligence provider for the art market and maintains the world’s largest private database of stolen art, antiques and collectables. Experts around the world use our services to check the provenance of items before they buy or handle them. Police, insurers, the trade and the public may record items that have been stolen to maximize their chances of recovery, and to record disputes or items within collections.
The Art Loss Register (ALR) was established in London in 1990. Our founding shareholders included major businesses from the insurance industry and art market. Satellite offices were subsequently opened in New York, Cologne, Amsterdam and Paris to cater to growing client bases in these countries. In January 2010, we consolidated the regional offices into one central, international office, run from London.
The ALR’s origin was The International Foundation for Art Research (IFAR), a not-for-profit organization based in New York. In an attempt to deter international art theft, IFAR established an art theft archive in 1976 and began publishing the “Stolen Art Alert”.
See Original post
Reposted from SafeHaven Security
Upcoming Trainings
Occupational Safety: How to Navigate New Workplace Violence Prevention Plan Laws
Webinar | Jan 30 | 10:00am CST
With incidents of workplace violence on the rise, promoting a safer and more secure work environment is becoming a priority for many employers. To try and address these concerns, the state of California introduced Senate Bill No. 553, raising the workplace safety standards by mandating specific actions employers must take around workplace violence prevention. What is the bill and what does it mean? What are the requirements? Join this webinar to learn more about SB 553 and how this affects your company, even if outside of the state of California. Be on the frontline of new laws and policies and prepare your organization for new standards.
Certified Threat Analyst Course
Training | Jan 23-24 | Springdale, AR
Receive life-saving instruction developed and taught by experts with decades of real-life experience in the field of Threat Assessment and Management. Methodologies used by mental health experts and agencies like the United States Secret Service to assess-mitigate-protect against potentially violent situations.
This is a two day in-person course held at the AR Law Enforcement Training Academy. Certification requires successful completion of a competency-based exam at the end of the course.
QUICK LINKS
ConferenceMembershipTraining & CertificationDonate to IFCPP
TRAINING & EVENTS
1305 Krameria, Unit H-129, Denver, CO 80220 Local: 303.322.9667 Copyright © 1999 International Foundation for Cultural Property Protection. All Rights Reserved
Contact Us