CPE Today Logo

Developing and Deploying Effective Cloud Cyber Security Best Practices For Your Organization

Course - Developing and Deploying Effective Cloud Cyber Security Best Practices For Your Organization

Upcoming Live Event Schedule

This course is part of an event and you must register for the associated event to participate.

Cyber Security Best Practices Conference
December 3, 2024 | Seminar

Major Topics

  • Overall Security Recommendations
  • Data & Privacy Regulations
  • Implementing Security Policies in Your Organization

Learning Objectives

  1. Identify the location of the security and privacy settings for the major cloud providers such as Microsoft, Amazon, Google, and Zoho. Determine which security and privacy features are relevant to your organization and their optimum settings.
  2. Develop a training plan to increase the knowledge and awareness of the importance of security and privacy to an organization’s staff and stakeholders.
  3. List, determine, and implement major security technologies such as multifactor authentication, data loss prevention, access control lists, and more to improve the protection of an organization’s cloud data.
  4. Implement better internal controls using tools such as Microsoft’s Security and Compliance center or Amazon’s Identity and Access Management to reduce the risk of a data breach.
  5. Recognize the importance and impact of privacy frameworks such as GDPR or CCPA on business today. Implement better security inside your Cloud tools to promote better compliance with these and other major privacy frameworks.

Course Description

Protecting your organization from cyber threats is paramount in today’s business environment. There are countless ways that your data can be compromised and the industry’s best practices are ever-changing to adapt to the latest threats. Increasingly more professionals are working remotely and Cloud technology is what is connecting us all. It is business-critical that our organizations have correct and relevant security settings and procedures. Permissive security and privacy controls for Microsoft 365, Microsoft Azure, Amazon Web Services, or Google could pose a major security risk to the organization.

This course looks at practical approaches to managing the security and privacy settings of today’s major Cloud tools. It will give specific and direct advice on best practices for configuration and settings for today’s major Cloud platforms to promote better security. Specific attention will be paid to the major Cloud business platforms including, Microsoft, Google, Amazon, and Zoho. We will review everything from the importance of multi-factor authentication, to user levels/permissions, to methods to quickly identify when a user’s account might be compromised. Business professionals will leave the class with specific insight on how they can protect their organization’s cloud data.

Compliance Information

Intended Audience

Accountants and financial professionals who would like to increase their cyber security

Advanced Preparation

None

Field of Study

Information Technology

Credits

2 Credits

Published Date

March 22, 2024

Course Authors

Stephen Yoss

Big Bear Lake, CA
Speaker & Author, CPE Today

Stephen M. Yoss, Jr., CPA, MS, is a certified public accountant, partner and CEO of Devmatics, LLC, a continuing education instructor for financial professionals, a and a licensed pyrotechnician. While his interests and skills are varied, they all share a common thread—his love for and skill in finding technology-based solutions. In 2017, Stephen and Alex White formed Devmatics, LLC, a company focused on helping organizations develop technology strategies to streamline their business operations. He specializes in taking on high-difficulty, mission-critical organizational issues that require technological expertise and an ability to find solutions to problems that no one else can answer. With all of his clients, he emphasizes the need to embrace technology at every opportunity and utilize the latest technological trends and breakthroughs in order to gain a competitive advantage while increasing efficiency and productivity.

About Instructor Read Less

Overview

Protecting your organization from cyber threats is paramount in today’s business environment. There are countless ways that your data can be compromised and the industry’s best practices are ever-changing to adapt to the latest threats. Increasingly more professionals are working remotely and Cloud technology is what is connecting us all. It is business-critical that our organizations have correct and relevant security settings and procedures. Permissive security and privacy controls for Microsoft 365, Microsoft Azure, Amazon Web Services, or Google could pose a major security risk to the organization.

This course looks at practical approaches to managing the security and privacy settings of today’s major Cloud tools. It will give specific and direct advice on best practices for configuration and settings for today’s major Cloud platforms to promote better security. Specific attention will be paid to the major Cloud business platforms including, Microsoft, Google, Amazon, and Zoho. We will review everything from the importance of multi-factor authentication, to user levels/permissions, to methods to quickly identify when a user’s account might be compromised. Business professionals will leave the class with specific insight on how they can protect their organization’s cloud data.

Course Details

  • Overall Security Recommendations
  • Data & Privacy Regulations
  • Implementing Security Policies in Your Organization

  1. Identify the location of the security and privacy settings for the major cloud providers such as Microsoft, Amazon, Google, and Zoho. Determine which security and privacy features are relevant to your organization and their optimum settings.
  2. Develop a training plan to increase the knowledge and awareness of the importance of security and privacy to an organization’s staff and stakeholders.
  3. List, determine, and implement major security technologies such as multifactor authentication, data loss prevention, access control lists, and more to improve the protection of an organization’s cloud data.
  4. Implement better internal controls using tools such as Microsoft’s Security and Compliance center or Amazon’s Identity and Access Management to reduce the risk of a data breach.
  5. Recognize the importance and impact of privacy frameworks such as GDPR or CCPA on business today. Implement better security inside your Cloud tools to promote better compliance with these and other major privacy frameworks.

Intended Audience — Accountants and financial professionals who would like to increase their cyber security

Advanced Preparation — None

Field of Study — Information Technology

Credits — 2 Credits

IRS Program Number

Published Date – March 22, 2024

Revision Date

Course Authors

Stephen Yoss

Big Bear Lake, CA
Speaker & Author, CPE Today

Stephen M. Yoss, Jr., CPA, MS, is a certified public accountant, partner and CEO of Devmatics, LLC, a continuing education instructor for financial professionals, a and a licensed pyrotechnician. While his interests and skills are varied, they all share a common thread—his love for and skill in finding technology-based solutions. In 2017, Stephen and Alex White formed Devmatics, LLC, a company focused on helping organizations develop technology strategies to streamline their business operations. He specializes in taking on high-difficulty, mission-critical organizational issues that require technological expertise and an ability to find solutions to problems that no one else can answer. With all of his clients, he emphasizes the need to embrace technology at every opportunity and utilize the latest technological trends and breakthroughs in order to gain a competitive advantage while increasing efficiency and productivity.

About Instructor Read Less