K2’s Biggest Security and Privacy Concerns
Information Technology
4 CPE Credits
Upcoming Live Event Schedule
This course is part of an event and you must register for the associated event to participate.
No Upcoming Events
Sorry! There are no scheduled events at the moment. Please check back soon.
Major Topics
- Key risks that all businesses need to manage
- Leading-edge options to mitigate security and privacy risks
- Understanding how a ransomware attack differs from other forms of cybersecurity incidents
Learning Objectives
- Identify examples of best practices for securing technology assets, including Windows
- List examples of tactics that can minimize risks associated with ransomware and phishing
- Define social engineering and identify how to avoid becoming a victim of this threat
- List examples of password management procedures and identify related best practices
Course Description
Technology is a business-critical business capability in today’s day and age. Any interruption to an organization’s ability to use its information system poses a significant risk to the viability of the organization. Data breaches, cyber-attacks, and ransomware are examples of some of the biggest existential risks facing businesses today. There are threat actors all around the world that entirely focus on stealing organizational data, stealing economic resources, and disrupting the flow of business. They are using complex social engineering attacks, pervasive phishing messages, intricate malware, and other highly effective techniques. From recently released data breach reports, there were 100k data breaches publicly reported in 2020 alone. Resulting in the personal information of millions of people worldwide being released, billions of dollars of organizational assets, and putting countless people in harm’s way.
This course will go over recent major security breaches including breaches at Solarwinds, Ubiquity, Colonial Pipeline, Tecnimont SpA, Citrix, LabCorp, and others. It will discuss how these breaches occurred, why the breaches happened, and how organizations can prevent them from happening to them. Each case study will discuss a different form of security vulnerability and how to prevent it. The topics will include social engineering, auditing processes for IT Security systems, forensic accounting, password, two-factor authentication, and improvements for managerial oversight. Participants will gain real-world knowledge from the mistakes of other organizations and from that experience develop their own security best practices for their organizations.
Compliance Information
Intended Audience
Professionals who are interested in improving security procedures
Advanced Preparation
None
Field of Study
Information Technology
Credits
4 Credits
Published Date
November 2, 2022
Course Authors
K2 Enterprises
K2’s goal is to produce and deliver the highest quality technology seminars and conferences available to business professionals. We work cooperatively with professional organizations (such as state CPA societies and associations of Chartered Accountants) and vendors of technology products. K2 also provides consulting services and advice on technology.
We make every effort to maintain a high level of integrity, family values, and friendship among all involved.
Overview
Technology is a business-critical business capability in today’s day and age. Any interruption to an organization’s ability to use its information system poses a significant risk to the viability of the organization. Data breaches, cyber-attacks, and ransomware are examples of some of the biggest existential risks facing businesses today. There are threat actors all around the world that entirely focus on stealing organizational data, stealing economic resources, and disrupting the flow of business. They are using complex social engineering attacks, pervasive phishing messages, intricate malware, and other highly effective techniques. From recently released data breach reports, there were 100k data breaches publicly reported in 2020 alone. Resulting in the personal information of millions of people worldwide being released, billions of dollars of organizational assets, and putting countless people in harm’s way.
This course will go over recent major security breaches including breaches at Solarwinds, Ubiquity, Colonial Pipeline, Tecnimont SpA, Citrix, LabCorp, and others. It will discuss how these breaches occurred, why the breaches happened, and how organizations can prevent them from happening to them. Each case study will discuss a different form of security vulnerability and how to prevent it. The topics will include social engineering, auditing processes for IT Security systems, forensic accounting, password, two-factor authentication, and improvements for managerial oversight. Participants will gain real-world knowledge from the mistakes of other organizations and from that experience develop their own security best practices for their organizations.
Course Details
- Key risks that all businesses need to manage
- Leading-edge options to mitigate security and privacy risks
- Understanding how a ransomware attack differs from other forms of cybersecurity incidents
- Identify examples of best practices for securing technology assets, including Windows
- List examples of tactics that can minimize risks associated with ransomware and phishing
- Define social engineering and identify how to avoid becoming a victim of this threat
- List examples of password management procedures and identify related best practices
Intended Audience — Professionals who are interested in improving security procedures
Advanced Preparation — None
Field of Study — Information Technology
Credits — 4 Credits
IRS Program Number –
Published Date – November 2, 2022
Revision Date –
Course Authors
K2 Enterprises
K2’s goal is to produce and deliver the highest quality technology seminars and conferences available to business professionals. We work cooperatively with professional organizations (such as state CPA societies and associations of Chartered Accountants) and vendors of technology products. K2 also provides consulting services and advice on technology.
We make every effort to maintain a high level of integrity, family values, and friendship among all involved.
All of our self-study courses are NASBA approved (through our partners at K2 Enterprises) the revisions to the Statement on Standards for Continuing Professional Education (CPE) Programs (Standards).
Your Registration Includes:
- ✓ Course materials (video & PDF version)
- ✓ Unlimited attempts to complete exam
- ✓ Course materials (PDF & Sample Materials)
- ✓ Instant grading & certificate of completion
- ✓ One year access to complete your CPE
- ✓ Completion certificate