Skip to main content

Cyber-Crime 2017: The Internal Threat to You and Your Organization

Compliance Key INC - Financial compliance training
                                               Peter Goldmann
Peter Goldmann is Keynote Speaker at Compliance Key Inc. He is president of Fraud Aware LLC, the publisher of White-Collar Crime Fighter, a widely read monthly newsletter for internal auditors, controllers, corporate counsel, financial operations managers and fraud investigators. 

 Webinar Id:  CICPC001
 10:00 AM PT | 01:00 PM ET 
 12/13/2017
 Duration: 90 mins 


Overview
Companies have enough to worry about from outsiders when it comes to cyber security. From clever hackers infiltrating their networks to criminal gangs stealing their data and government surveillance of their systems, security teams have to be on their toes at all times. But the insider threat can be just as dangerous and sometimes harder to detect.
According to the 2015 Insider Threat Spotlight Report, 62 percent of security professionals are seeing a rise in insider attacks. While many of these are malicious attacks, they can also be unintentional breaches. The consequences, no matter the motivation, can be equally devastating.
This timely webinar discusses the most current and dangerous insider cyber security threats and outlines measures for preventing and investigating incidents of data theft, industrial espionage, cyber-sabotage, identity theft and more. 
Why should you attend this webinar?
  • Explore the common and not-so-common cyber-threats to your organization's information security
  • Identify the most common cyber-perpetrators
  • Understand the red flags of potential or actual insider cyber-crime
  • Learn how to detect and initiate an investigation of suspected insider cyber-crime
Areas Covered in the Session:
  • Types of insider threats and most common perpetrators
  • Main data assets to protect: Personally identifiable data, intellectual property, trade secrets and more
  • Red flags of internal data theft, cyber-sabotage, identity theft and espionage to watch for
  • Latest best practices in information security today
Who can Benefit:
  • Compliance managers
  • IT staff and managers
  • HR 
  • Internal audit
  • legal Professionals
  • Senior management

Comments

Popular posts from this blog

HIPAA changes 2018 and How to comply?

Compliance Key INC  -  HIPAA W ebinar                                                   Brian L Tuttle Brian Tuttle is Keynote Speaker at Compliance key Inc . He is Certified Professional in Health IT (CPHIT), Certified HIPAA Professional (CHP), Certified Business Resilience Auditor (CBRA) with over 17 years experience in Health IT and Compliance Consulting.     Webinar Id:   HIPHBLT001 10:00 AM PT | 01:00 PM ET  01/23/2018 Duration: 90 mins  Overview This lesson will be addressing how practice/business managers (or compliance offers) need to get their HIPAA house in order as HIPAA is now fully enforced and the government is not using kid gloves any more. It will also address major changes under the Omnibus Rule, Trump administration, and any other applicable updates for 2018 and beyon...

Form I-9 Compliance For Small Business

Compliance Key INC  -  Compliance Online Training                                  Matthew W. Burr Matthew Burr has over ten years of experience working in the human resources field, starting his career as an Industrial Relations Intern at Kennedy Valve Manufacturing to most recently founding and managing a human resource consulting company; Burr Consulting, LLC. He specializes in labor and employment law, conflict resolution, performance management, employee relations and work with labor unions.   Webinar Id:  CICMF001  12:30 PM PT | 03:30 PM ET  11/28/2017  Duration 60 mins  Overview This training will focus on the importance of I-9 compliance for small businesses. The training will introduce the I-9 forms, importance of filling out the forms correctly, retention process and proactive I-9 audits. We will also ...

SOX Compliance: Accounts Receivable Risks and Controls

Overview The accounts receivable process includes the sub-cycles of acquiring and accepting customer orders; writing sales contracts; granting customer credit; shipping or otherwise delivering products or services; billing and recording sales and lease transactions; maintaining and monitoring accounts receivable; instituting effective collection procedures; recording and controlling cash receipts; establishing pricing and promotional activities; and properly valuing receivable balances. In management's selection of procedures and techniques of control, the degree of control implemented is a matter of reasonable business judgment. The common guideline used in determining the degree of internal controls implementation is that the cost of a control should not exceed the benefit derived. The Order to Cash Process (O2C) Process is comprised of several sub-processes that must have a foundation of internal controls for SOX 404 certification process. This webinar wil...