Insider's Guide to Information Security and Avoiding Identity Theft (Completed)

Date: Wednesday, April 3, 2019
Instructor: Stephen M. Yoss
Begin Time:  9:00am Pacific Time
10:00am Mountain Time
11:00am Central Time
12:00pm Eastern Time
CPE Credit:  2 hours for CPAs

Identity theft is the fastest growing crime in America with approximately 10 million occurrences every year. On average, it will cost the victim several hundred dollars and dozens of hours to resolve. It can cause irrevocable damage to an organization's public opinion and reputation. This course will examine the major causes, factors, and outcomes of identity theft and organizational security breaches. Participants will be presented with current examples from a wide range of industries and attack types. This course will show participants how to identify when theft occurs, what information is most at risk, where the stolen information is used, and best practices on how to prevent it from occurring. This course is recommended for anybody concerned about their online safety and responsible for safeguarding their organizational data.

Participants are encouraged to bring their technology devices to follow along with interactive discussions, technology demonstrations, and demo tools. Financial professionals will walk away from this course with valuable tools and insights into understanding, managing, preventing security theft in their organizations.

Who Should Attend
Practitioners concerned about their online safety and responsible for safeguarding their organizational data,

Topics Covered

  • Major causes, factors, and outcomes of identity theft
  • Organizational security breaches
  • Current examples from a wide range of industries and attack types
  • How to identify when theft occurs
  • What information is most at risk
  • Where the stolen information is used
  • Best practices on how to prevent it from occurring

Learning Objectives

  • Identify and classify potential threats in technology areas, which leave organizations susceptible to privacy breaches, data theft and distribution
  • Identify the major causes of identity theft, how it occurs and best practices for preventing from happening
  • Recognize how to build an action plan to safeguard personal and organizational data from potential threats and identity theft
  • Identify the threat actors and areas of data risk based on industry profile
  • Describe how to implement data security best practices for their personal and organizational information

Level
Basic

Instructional Method
Group: Internet-based

NASBA Field of Study
Computer Software & Applications (2 hours)

Program Prerequisites
None

Advance Preparation
None

">
 Chat — Books Support