BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P1H
REFRESH-INTERVAL:P1H
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=2SU
DTSTART:20070101T000000
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:Central Daylight Time
END:DAYLIGHT
BEGIN:STANDARD
RRULE:FREQ=YEARLY;BYMONTH=11;BYDAY=1SU
DTSTART:20070101T000000
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:Central Standard Time
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260429T081500
DTEND;TZID=America/Chicago:20260429T170000
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Phishing\, Fraud & Social Engineering Awareness
DESCRIPTION:Phishing\, Fraud & Social Engineering AwarenessDate: April 29th\, 2026Time: 8:15am - 5pm (A one-hour lunch break is included in the workshop schedule)Location: Cyber Command Center - Dempster Hall (1121 Greek Dr\, Cape Girardeau\, MO)This immersive\, full‑day workshop equips participants with the awareness and practical skills needed to recognize and respond to today's most sophisticated social engineering attacks. Designed for employees at all levels\, the course requires no technical background and encourages discussion\, curiosity\, and engagement throughout the day.The morning session introduces participants to the core concepts of modern social engineering. It explores how phishing emails\, phone scams\, and impersonation attacks are constructed and why they remain effective. Special emphasis is placed on how artificial intelligence is transforming these threats by enabling attackers to create highly convincing emails\, realistic voice clones\, and other deceptive content that can be difficult to distinguish from legitimate communication. Participants gain insight into the psychological techniques behind these attacks\, the common red flags that still apply\, and the reasons social engineering continues to bypass even the strongest technical defenses.In the afternoon\, the course shifts into a hands‑on experience that allows participants to apply what they learned. Using sanitized real-world samples and generated scenarios\, they examine phishing attempts\, fraudulent messages\, and impersonation scripts in a guided\, interactive environment. This session helps participants practice identifying subtle indicators of malicious intent\, analyzing suspicious communication\, and walking through the steps of proper reporting and escalation. Small‑group exercises and open conversation help reinforce best practices and build confidence in recognizing and responding to threats.
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE html><html><head><title></title></head><body aria-disabled="false" spellcheck="false"><p data-cid="Heading" style='box-sizing: border-box\; margin: 1rem 0px\; display: block\; padding: 0px\; color: rgb(39\, 53\, 64)\; font-family: LatoWeb\, Lato\, "Helvetica Neue"\, Helvetica\, Arial\, sans-serif\; font-size: 16px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-weight: 400\; letter-spacing: normal\; orphans: 2\; text-align: start\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\;'><strong fr-original-style="box-sizing: border-box\; font-weight: 700\;" style="box-sizing: border-box\; font-weight: 700\;">Phishing\, Fraud &amp\; Social Engineering Awareness</strong></p><p data-cid="Heading" style='box-sizing: border-box\; margin: 1rem 0px\; display: block\; padding: 0px\; color: rgb(39\, 53\, 64)\; font-family: LatoWeb\, Lato\, "Helvetica Neue"\, Helvetica\, Arial\, sans-serif\; font-size: 16px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-weight: 400\; letter-spacing: normal\; orphans: 2\; text-align: start\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\;'>Date: April 29th\, 2026</p><p style='box-sizing: border-box\; margin: 1rem 0px\; display: block\; padding: 0px\; color: rgb(39\, 53\, 64)\; font-family: LatoWeb\, Lato\, "Helvetica Neue"\, Helvetica\, Arial\, sans-serif\; font-size: 16px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-weight: 400\; letter-spacing: normal\; orphans: 2\; text-align: start\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\;'>Time: 8:15am - 5pm (A one-hour lunch break is included in the workshop schedule)</p><p style='box-sizing: border-box\; margin: 1rem 0px\; display: block\; padding: 0px\; color: rgb(39\, 53\, 64)\; font-family: LatoWeb\, Lato\, "Helvetica Neue"\, Helvetica\, Arial\, sans-serif\; font-size: 16px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-weight: 400\; letter-spacing: normal\; orphans: 2\; text-align: start\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\;'>Location:&nbsp\;Cyber Command Center - Dempster Hall (1121 Greek Dr\, Cape Girardeau\, MO)</p><p style='box-sizing: border-box\; margin: 1rem 0px\; display: block\; padding: 0px\; color: rgb(39\, 53\, 64)\; font-family: LatoWeb\, Lato\, "Helvetica Neue"\, Helvetica\, Arial\, sans-serif\; font-size: 16px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-weight: 400\; letter-spacing: normal\; orphans: 2\; text-align: start\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\;'>This immersive\, full‑day workshop equips participants with the awareness and practical skills needed to recognize and respond to today&rsquo\;s most sophisticated social engineering attacks. Designed for employees at all levels\, the course requires no technical background and encourages discussion\, curiosity\, and engagement throughout the day.</p><p style='box-sizing: border-box\; margin: 1rem 0px\; display: block\; padding: 0px\; color: rgb(39\, 53\, 64)\; font-family: LatoWeb\, Lato\, "Helvetica Neue"\, Helvetica\, Arial\, sans-serif\; font-size: 16px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-weight: 400\; letter-spacing: normal\; orphans: 2\; text-align: start\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\;'>The morning session introduces participants to the core concepts of modern social engineering. It explores how phishing emails\, phone scams\, and impersonation attacks are constructed and why they remain effective. Special emphasis is placed on how artificial intelligence is transforming these threats by enabling attackers to create highly convincing emails\, realistic voice clones\, and other deceptive content that can be difficult to distinguish from legitimate communication. Participants gain insight into the psychological techniques behind these attacks\, the common red flags that still apply\, and the reasons social engineering continues to bypass even the strongest technical defenses.</p><p style='box-sizing: border-box\; margin: 1rem 0px\; display: block\; padding: 0px\; color: rgb(39\, 53\, 64)\; font-family: LatoWeb\, Lato\, "Helvetica Neue"\, Helvetica\, Arial\, sans-serif\; font-size: 16px\; font-style: normal\; font-variant-ligatures: normal\; font-variant-caps: normal\; font-weight: 400\; letter-spacing: normal\; orphans: 2\; text-align: start\; text-indent: 0px\; text-transform: none\; widows: 2\; word-spacing: 0px\; -webkit-text-stroke-width: 0px\; white-space: normal\; background-color: rgb(255\, 255\, 255)\; text-decoration-thickness: initial\; text-decoration-style: initial\; text-decoration-color: initial\;'>In the afternoon\, the course shifts into a hands‑on experience that allows participants to apply what they learned. Using sanitized real-world samples and generated scenarios\, they examine phishing attempts\, fraudulent messages\, and impersonation scripts in a guided\, interactive environment. This session helps participants practice identifying subtle indicators of malicious intent\, analyzing suspicious communication\, and walking through the steps of proper reporting and escalation. Small‑group exercises and open conversation help reinforce best practices and build confidence in recognizing and responding to threats.</p></body></html>
LOCATION:1121 Greek Drive Cape Girardeau
UID:e.4520.1429855
SEQUENCE:3
DTSTAMP:20260409T231259Z
URL:https://business.farmingtonregionalchamber.com/event-calendar/Details/phishing-fraud-social-engineering-awareness-1691483?sourceTypeId=Hub
END:VEVENT
END:VCALENDAR
