K2's Tales of True Tech Crimes - Ripped From the Headlines!
(2 CPE Hour Course)
Security is a top concern for business professionals every year, and yet many hacks result from the failure of organizations to implement effective internal controls over information technology. This session will teach you about critical IT-related controls in a case study approach using examples from recent breaches and security failures to help you better understand how to protect your company and its data. Attend this fast-paced session and learn more about IT-related controls which can be used to prevent computer crimes such as unauthorized access, theft of information, identity theft, data exfiltration, tax refund fraud, and more.
Upon completing this course, you should be able to:
- List at least three major security incidents reported in the headlines in the last two years, and explain at least one major control design or operation flaws which allowed the hack to occur
- Define the three factors used to authenticate someone to a system, and explain why two-factor authentication is preferable to one-factor authentication
- Explain why home-grade computer hardware and applications are inherently less secure than business and enterprise grade hardware and applications
- List at least three best practices learned as a result of reviewing the incidents cited in the case studies
- CPE credit: Recommended for 2 hours Information Technology
- Prerequisites: Fundamental knowledge of basic technological and security concepts
- Program level: Intermediate
- Advance preparation: None
- Who should participate: Business professionals who are seeking to enhance the security surrounding both personal and organizational data