Generative AI and “ransomware for hire” have helped cybercriminals thrive in the post-pandemic period – but how do they do it? This all-new session is a series of case studies that examine actual criminal filings and news accounts and use them to highlight some of the actions you can take to limit your exposure to similar schemes. Attend this session and learn more about how high-profile control failures occurred so you can be more effective at preventing crimes such as theft, malware, ransomware, phishing, and hacking.
Upon completing this course, you should be able to:
• List at least three major security incidents reported in the headlines in the last year, and explain at least one major internal control design or operation flaw that allowed the hack to occur
• Select the correct definitions for common security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
• List at least three best practices learned by reviewing the control failures cited in the case studies