CPE Today Logo

K2’s Biggest Security and Privacy Concerns

Course - K2's Biggest Security and Privacy Concerns

Upcoming Live Event Schedule

This course is part of an event and you must register for the associated event to participate.
No Events Scheduled

No Upcoming Events

Sorry! There are no scheduled events at the moment. Please check back soon.

Major Topics

  • Key risks that all businesses need to manage
  • Leading-edge options to mitigate security and privacy risks
  • Understanding how a ransomware attack differs from other forms of cybersecurity incidents

Learning Objectives

  1. Identify examples of best practices for securing technology assets, including Windows
  2. List examples of tactics that can minimize risks associated with ransomware and phishing
  3. Define social engineering and identify how to avoid becoming a victim of this threat
  4. List examples of password management procedures and identify related best practices

Course Description

Technology is a business-critical business capability in today’s day and age. Any interruption to an organization’s ability to use its information system poses a significant risk to the viability of the organization. Data breaches, cyber-attacks, and ransomware are examples of some of the biggest existential risks facing businesses today. There are threat actors all around the world that entirely focus on stealing organizational data, stealing economic resources, and disrupting the flow of business. They are using complex social engineering attacks, pervasive phishing messages, intricate malware, and other highly effective techniques. From recently released data breach reports, there were 100k data breaches publicly reported in 2020 alone. Resulting in the personal information of millions of people worldwide being released, billions of dollars of organizational assets, and putting countless people in harm’s way.

This course will go over recent major security breaches including breaches at Solarwinds, Ubiquity, Colonial Pipeline, Tecnimont SpA, Citrix, LabCorp, and others. It will discuss how these breaches occurred, why the breaches happened, and how organizations can prevent them from happening to them. Each case study will discuss a different form of security vulnerability and how to prevent it. The topics will include social engineering, auditing processes for IT Security systems, forensic accounting, password, two-factor authentication, and improvements for managerial oversight. Participants will gain real-world knowledge from the mistakes of other organizations and from that experience develop their own security best practices for their organizations.

Compliance Information

Intended Audience

Professionals who are interested in improving security procedures

Advanced Preparation

None

Field of Study

Information Technology

Credits

4 Credits

Published Date

November 2, 2022

Course Authors

K2 Enterprises

Hammond, LA
Various Speaker, Company Tagline

K2’s goal is to produce and deliver the highest quality technology seminars and conferences available to business professionals. We work cooperatively with professional organizations (such as state CPA societies and associations of Chartered Accountants) and vendors of technology products. K2 also provides consulting services and advice on technology.

We make every effort to maintain a high level of integrity, family values, and friendship among all involved.

About Instructor Read Less

Overview

Technology is a business-critical business capability in today’s day and age. Any interruption to an organization’s ability to use its information system poses a significant risk to the viability of the organization. Data breaches, cyber-attacks, and ransomware are examples of some of the biggest existential risks facing businesses today. There are threat actors all around the world that entirely focus on stealing organizational data, stealing economic resources, and disrupting the flow of business. They are using complex social engineering attacks, pervasive phishing messages, intricate malware, and other highly effective techniques. From recently released data breach reports, there were 100k data breaches publicly reported in 2020 alone. Resulting in the personal information of millions of people worldwide being released, billions of dollars of organizational assets, and putting countless people in harm’s way.

This course will go over recent major security breaches including breaches at Solarwinds, Ubiquity, Colonial Pipeline, Tecnimont SpA, Citrix, LabCorp, and others. It will discuss how these breaches occurred, why the breaches happened, and how organizations can prevent them from happening to them. Each case study will discuss a different form of security vulnerability and how to prevent it. The topics will include social engineering, auditing processes for IT Security systems, forensic accounting, password, two-factor authentication, and improvements for managerial oversight. Participants will gain real-world knowledge from the mistakes of other organizations and from that experience develop their own security best practices for their organizations.

Course Details

  • Key risks that all businesses need to manage
  • Leading-edge options to mitigate security and privacy risks
  • Understanding how a ransomware attack differs from other forms of cybersecurity incidents

  1. Identify examples of best practices for securing technology assets, including Windows
  2. List examples of tactics that can minimize risks associated with ransomware and phishing
  3. Define social engineering and identify how to avoid becoming a victim of this threat
  4. List examples of password management procedures and identify related best practices

Intended Audience — Professionals who are interested in improving security procedures

Advanced Preparation — None

Field of Study — Information Technology

Credits — 4 Credits

IRS Program Number

Published Date – November 2, 2022

Revision Date

Course Authors

K2 Enterprises

Hammond, LA
Various Speaker, Company Tagline

K2’s goal is to produce and deliver the highest quality technology seminars and conferences available to business professionals. We work cooperatively with professional organizations (such as state CPA societies and associations of Chartered Accountants) and vendors of technology products. K2 also provides consulting services and advice on technology.

We make every effort to maintain a high level of integrity, family values, and friendship among all involved.

About Instructor Read Less

All of our self-study courses are NASBA approved (through our partners at K2 Enterprises) the revisions to the Statement on Standards for Continuing Professional Education (CPE) Programs (Standards).

Your Registration Includes:

  • Course materials (video & PDF version)
  • Unlimited attempts to complete exam
  • Course materials (PDF & Sample Materials)
  • Instant grading & certificate of completion
  • One year access to complete your CPE
  • Completion certificate

Recommended Products

Courses and Events You’ll Love!