BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P1H
REFRESH-INTERVAL:P1H
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=2SU
DTSTART:20070101T000000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:Eastern Daylight Time
END:DAYLIGHT
BEGIN:STANDARD
RRULE:FREQ=YEARLY;BYMONTH=11;BYDAY=1SU
DTSTART:20070101T000000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:Eastern Standard Time
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260414T110000
DTEND;TZID=America/New_York:20260414T120000
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Evolving Tactics of Terror: From Proxy Networks to Lone-Actor Violence in the Iran Conflict Era
DESCRIPTION:Join our expert panel for an in-depth discussion on how the evolving Iran-related threat landscape is reshaping the tactics of terrorism\, from state-linked proxy operations to decentralized lone-actor attacks. Drawing on recent analysis\, the webinar will examine how weakened yet adaptive proxy networks\, shifting operational methods\, and emerging lone-actor dynamics are influencing the risk environment in the United States\, the United Kingdom\, and beyond. The discussion will also explore how strategic messaging and narrative warfare shape radicalization pathways\, transforming ideological grievances into sustained and self-reinforcing forms of violence. Speakers will assess how these tactical shifts complicate detection and prevention\, and what they reveal about the future of terrorism in a fragmented and volatile geopolitical environment.Objectives:Analyze how Iran's proxy networks are adapting tactically despite signs of degradation.Examine the operational shift from centralized control to fragmented and less detectable threat actors.Assess the rise of lone-actor terrorism and its connection to geopolitical conflict dynamics.Analyze how strategic narratives and ideological messaging function as tools of radicalization\, transforming belief systems into drivers of violent action.Evaluate implications for counterterrorism strategies in the U.S.\, UK\, and other Western countries.SPEAKERS: Opening remarks: Kristina Tanasichuk\, Executive Editor\, Homeland Security Today\nModerator: Mahmut Cengiz\, PhD\, Managing Editor for Counterterrorism\, Homeland Security Today\; Associate Professor\, Schar School of Policy and Government\, George Mason UniversityPanelists:\nDexter Ingram\, Former Director\, Office of Violent Extremism\; Former Acting Director\, Office of the Special Envoy for the Global Coalition to Defeat ISIS\, U.S. Department of State\; Editorial Board Member\, Counterterrorism\, HSToday\nKristyn Shapiro\, Former SES\, Counterterrorism Division\, FBI\; Associate Director\, Defense and Security\, Guidehouse\; Editorial Board Member\, Counterterrorism\, HSToday\nDr. Kutluer Karademir\,  Lecturer\, Policing\, Teesside UniversityDr. Suha Hassen\, School of Conflict Analysis and Resolution\, George Mason University\; Columnist\, Homeland Security Today
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE html><html><head><title></title></head><body aria-disabled="false"><div style="font-size: 12pt\; line-height: 19.200001px\; margin: 0in 0in 8pt\; font-family: Aptos\, Aptos_EmbeddedFont\, Aptos_MSFontService\, Calibri\, Helvetica\, sans-serif\;"><span style="color: rgb(0\, 0\, 0)\;"><br></span></div><div style="font-size: 12pt\; line-height: 19.200001px\; margin: 0in 0in 8pt\; font-family: Aptos\, Aptos_EmbeddedFont\, Aptos_MSFontService\, Calibri\, Helvetica\, sans-serif\;"><span style="color: rgb(0\, 0\, 0)\;"><span style="font-size: 14px\;">Join our expert panel for an in-depth discussion on how the evolving Iran-related threat landscape is reshaping the tactics of terrorism\, from state-linked proxy operations to decentralized lone-actor attacks. Drawing on recent analysis\, the webinar will examine how weakened yet adaptive proxy networks\, shifting operational methods\, and emerging lone-actor dynamics are influencing the risk environment in the United States\, the United Kingdom\, and beyond. The discussion will also explore how strategic messaging and narrative warfare shape radicalization pathways\, transforming ideological grievances into sustained and self-reinforcing forms of violence. Speakers will assess how these tactical shifts complicate detection and prevention\, and what they reveal about the future of terrorism in a fragmented and volatile geopolitical environment.</span></span></div><div style="font-size: 12pt\; line-height: 19.200001px\; margin: 0in 0in 8pt\; font-family: Aptos\, Aptos_EmbeddedFont\, Aptos_MSFontService\, Calibri\, Helvetica\, sans-serif\;"><span style="color: rgb(0\, 0\, 0)\;"><span style="font-size: 14px\;"><strong fr-original-style="" style="font-weight: 700\;">Objectives:</strong></span></span></div><ul fr-original-style="margin-top: 0in\; margin-right: 0in\;" style="margin-top: 0in\; margin-right: 0in\; list-style-position: inside\;"><li style="font-size: 14px\; font-family: Aptos\, Aptos_EmbeddedFont\, Aptos_MSFontService\, Calibri\, Helvetica\, sans-serif\; line-height: normal\; margin: 0in 0in 8pt\; color: rgb(0\, 0\, 0)\;">Analyze how Iran&rsquo\;s proxy networks are adapting tactically despite signs of degradation.</li><li style="font-size: 14px\; font-family: Aptos\, Aptos_EmbeddedFont\, Aptos_MSFontService\, Calibri\, Helvetica\, sans-serif\; line-height: normal\; margin: 0in 0in 8pt\; color: rgb(0\, 0\, 0)\;">Examine the operational shift from centralized control to fragmented and less detectable threat actors.</li><li style="font-size: 14px\; font-family: Aptos\, Aptos_EmbeddedFont\, Aptos_MSFontService\, Calibri\, Helvetica\, sans-serif\; line-height: normal\; margin: 0in 0in 8pt\; color: rgb(0\, 0\, 0)\;">Assess the rise of lone-actor terrorism and its connection to geopolitical conflict dynamics.</li><li style="font-size: 14px\; font-family: Aptos\, Aptos_EmbeddedFont\, Aptos_MSFontService\, Calibri\, Helvetica\, sans-serif\; line-height: normal\; margin: 0in 0in 8pt\; color: rgb(0\, 0\, 0)\;">Analyze how strategic narratives and ideological messaging function as tools of radicalization\, transforming belief systems into drivers of violent action.</li><li style="font-size: 14px\; font-family: Aptos\, Aptos_EmbeddedFont\, Aptos_MSFontService\, Calibri\, Helvetica\, sans-serif\; line-height: normal\; margin: 0in 0in 8pt\; color: rgb(0\, 0\, 0)\;">Evaluate implications for counterterrorism strategies in the U.S.\, UK\, and other Western countries.</li></ul><p><span style="color: rgb(0\, 0\, 0)\;"><span style="font-size: 14px\;">SPEAKERS:&nbsp\;</span></span></p><div style="font-size: 12pt\; line-height: 19.200001px\; margin: 0in 0in 8pt\; font-family: Aptos\, Aptos_EmbeddedFont\, Aptos_MSFontService\, Calibri\, Helvetica\, sans-serif\;"><span style="color: rgb(0\, 0\, 0)\;"><span style="font-size: 14px\;"><strong fr-original-style="" style="font-weight: 700\;">Opening remarks:</strong> Kristina Tanasichuk\, Executive Editor\, Homeland Security Today<br><strong fr-original-style="" style="font-weight: 700\;">Moderator:</strong> Mahmut Cengiz\, PhD\, Managing Editor for Counterterrorism\, Homeland Security Today\;&nbsp\;</span></span><span style="font-size: 14px\;">Associate Professor\, Schar School of Policy and Government\, George Mason University</span></div><div style="font-size: 12pt\; line-height: 19.200001px\; margin: 0in 0in 8pt\; font-family: Aptos\, Aptos_EmbeddedFont\, Aptos_MSFontService\, Calibri\, Helvetica\, sans-serif\;"><span style="color: rgb(0\, 0\, 0)\;"><span style="font-size: 14px\;"><strong fr-original-style="" style="font-weight: 700\;">Panelists:</strong><br><span style="font-family: Arial\, Helvetica\, sans-serif\;">Dexter Ingram\, <span style="font-variant-ligatures: normal\; background-color: rgb(255\, 255\, 255)\;">Former Director\, Office of Violent Extremism\; Former Acting Director\, Office of the Special Envoy for the Global Coalition to Defeat ISIS\, U.S. Department of State\; Editorial Board Member\, Counterterrorism\,&nbsp\;</span><span style="font-variant-ligatures: normal\; background-color: rgb(255\, 255\, 255)\; font-style: italic\;">HSToday</span><br>Kristyn Shapiro\, <span style="font-variant-ligatures: normal\; background-color: rgb(255\, 255\, 255)\;">Former SES\, Counterterrorism Division\, FBI\; Associate Director\, Defense and Security\, Guidehouse\; Editorial Board Member\, Counterterrorism\,&nbsp\;</span><span style="font-variant-ligatures: normal\; background-color: rgb(255\, 255\, 255)\; font-style: italic\;">HSToday</span><br>Dr. Kutluer Karademir\, <span style="font-variant-ligatures: normal\; letter-spacing: 0.25px\;">&nbsp\;Lecturer\, Policing\, Teesside University</span></span></span></span></div><div style="font-size: 12pt\; line-height: 19.200001px\; margin: 0in 0in 8pt\; font-family: Aptos\, Aptos_EmbeddedFont\, Aptos_MSFontService\, Calibri\, Helvetica\, sans-serif\;"><span style="color: rgb(0\, 0\, 0)\;"><span style="font-size: 14px\;"><span style="font-family: Arial\,Helvetica\,sans-serif\;">Dr. Suha Hassen\, School of Conflict Analysis and Resolution\, George Mason University\; Columnist\, <i style="box-sizing: border-box\;">Homeland Security Today</i></span></span></span></div><div style="font-size: 12pt\; line-height: 19.200001px\; margin: 0in 0in 8pt\; font-family: Aptos\, Aptos_EmbeddedFont\, Aptos_MSFontService\, Calibri\, Helvetica\, sans-serif\;"><span style="font-family: Arial\, Helvetica\, sans-serif\; font-size: 14px\; color: rgb(0\, 0\, 0)\;">&nbsp\;</span></div></body></html>
LOCATION:
UID:e.3345.1432325
SEQUENCE:3
DTSTAMP:20260404T121609Z
URL:https://members.gtscoalition.com/events/Details/evolving-tactics-of-terror-from-proxy-networks-to-lone-actor-violence-in-the-iran-conflict-era-1695277?sourceTypeId=Hub
END:VEVENT
END:VCALENDAR
