Technology is a business-critical business capability in today’s day and age. Any interruption to an organization’s ability to use its information system poses a significant risk to its viability. Data breaches, cyber-attacks, and ransomware are examples of the most significant existential risks facing businesses today. There are threat actors worldwide that entirely focus on stealing organizational data, stealing economic resources, and disrupting commerce. They use complex social engineering attacks, pervasive phishing messages, intricate malware, and other highly effective techniques. For example, publically reported data breaches now exceed 100k annually. These breaches resulted in releasing the personal information of millions of people worldwide, billions of dollars of compromised organizational assets, and putting countless people in harm’s way.
This course covers recent major security breaches, including Solarwinds, Ubiquity, Colonial Pipeline, Tecnimont SpA, Citrix, and LabCorp. It will discuss how these breaches occurred, why they occurred, and how organizations can prevent similar incidents from impacting them. Each case study examines a different form of security vulnerability and how to avoid it. The topics will include social engineering, auditing processes for IT Security systems, forensic accounting, password, two-factor authentication, and improvements for managerial oversight. Participants will gain real-world knowledge from the mistakes of other organizations and, from that experience, develop their own security best practices for their organizations.
Upon completing this course, you should be able to: *Define social engineering and identify how to avoid becoming a victim of this threat *List examples of password management procedures and identify related best practices *Identify examples of best practices for securing technology assets, including Windows *List examples of tactics that can minimize risks associated with ransomware and phishing
* Learn about ecent major security breaches, including Solarwinds, Ubiquity, Colonial Pipeline, Tecnimont SpA, Citrix, and LabCorp. * Discuss how these breaches occurred, why they occurred, and how organizations can prevent similar incidents from impacting them.
Who Should Attend
Professionals who are interested in improving security procedures
Additional Event Information
Contact NCACPA if you need assistance with your online program. For the quickest results, email the Online Learning Team at [email protected], and a team member will contact you shortly.
If you need assistance with internet access issues, browser capability, or when the NCACPA office is closed* please call Freestone Technical Support at 866-702-3278 or by email at [email protected] .
*NCACPA office hours are 9:00 am–5:00 pm ET. Online Learning Team members will be available via email 30 minutes prior to the start of a live online program.
Test Your System
You may test your system by clicking here. Please test your system to ensure you have the proper components installed.
Also Available As
Tuesday, May 24, 2022 (1:00 pm–4:45 pm ET)
Wednesday, May 25, 2022 (8:30 am–12:15 pm ET)
Friday, June 17, 2022 (1:00 pm–4:45 pm ET)
Tuesday, October 11, 2022 (8:30 am–12:15 pm ET)
Wednesday, October 12, 2022 (8:30 am–12:15 pm ET)
Tuesday, January 3, 2023 (1:00 pm–4:45 pm ET)
Wednesday, January 4, 2023 (8:30 am–12:15 pm ET)
Share This Event
For information regarding refund, complaint, program cancellation or other policies, visit our Registration Policies page or call 800-469-1352.