Skip to main content

Cyber-Crime 2017: The Internal Threat to You and Your Organization

Compliance Key INC - Financial compliance training
                                               Peter Goldmann
Peter Goldmann is Keynote Speaker at Compliance Key Inc. He is president of Fraud Aware LLC, the publisher of White-Collar Crime Fighter, a widely read monthly newsletter for internal auditors, controllers, corporate counsel, financial operations managers and fraud investigators. 

 Webinar Id:  CICPC001
 10:00 AM PT | 01:00 PM ET 
 12/13/2017
 Duration: 90 mins 


Overview
Companies have enough to worry about from outsiders when it comes to cyber security. From clever hackers infiltrating their networks to criminal gangs stealing their data and government surveillance of their systems, security teams have to be on their toes at all times. But the insider threat can be just as dangerous and sometimes harder to detect.
According to the 2015 Insider Threat Spotlight Report, 62 percent of security professionals are seeing a rise in insider attacks. While many of these are malicious attacks, they can also be unintentional breaches. The consequences, no matter the motivation, can be equally devastating.
This timely webinar discusses the most current and dangerous insider cyber security threats and outlines measures for preventing and investigating incidents of data theft, industrial espionage, cyber-sabotage, identity theft and more. 
Why should you attend this webinar?
  • Explore the common and not-so-common cyber-threats to your organization's information security
  • Identify the most common cyber-perpetrators
  • Understand the red flags of potential or actual insider cyber-crime
  • Learn how to detect and initiate an investigation of suspected insider cyber-crime
Areas Covered in the Session:
  • Types of insider threats and most common perpetrators
  • Main data assets to protect: Personally identifiable data, intellectual property, trade secrets and more
  • Red flags of internal data theft, cyber-sabotage, identity theft and espionage to watch for
  • Latest best practices in information security today
Who can Benefit:
  • Compliance managers
  • IT staff and managers
  • HR 
  • Internal audit
  • legal Professionals
  • Senior management

Comments

Popular posts from this blog

HIPAA changes 2018 and How to comply?

Compliance Key INC  -  HIPAA W ebinar                                                   Brian L Tuttle Brian Tuttle is Keynote Speaker at Compliance key Inc . He is Certified Professional in Health IT (CPHIT), Certified HIPAA Professional (CHP), Certified Business Resilience Auditor (CBRA) with over 17 years experience in Health IT and Compliance Consulting.     Webinar Id:   HIPHBLT001 10:00 AM PT | 01:00 PM ET  01/23/2018 Duration: 90 mins  Overview This lesson will be addressing how practice/business managers (or compliance offers) need to get their HIPAA house in order as HIPAA is now fully enforced and the government is not using kid gloves any more. It will also address major changes under the Omnibus Rule, Trump administration, and any other applicable updates for 2018 and beyon...

Strategies for Becoming a Business Partner to Your Healthcare Leaders.Compliance Key INC -

Compliance Key INC  -  Healthcare Training Online                                                    Jay Anstine Mr. Anstine's professional background includes working on the provider and the payer side of the market, for large for-profit and non-profit health systems, and small physician-owned entities. In tackling the countless regulatory and operational issues for these diverse organization types, he has developed a deep understanding of the business of healthcare and the regulations that govern the industry.  Webinar Id:  LSHCSJA022  10:00 AM PT | 01:00 PM ET  12/13/2017  Duration 60 mins  Overview All too often compliance is seen as an obstacle or otherwise viewed negatively by healthcare leaders. This presentation will discuss strategies and insights to help the compliance of...

SOX Compliance: Accounts Receivable Risks and Controls

Overview The accounts receivable process includes the sub-cycles of acquiring and accepting customer orders; writing sales contracts; granting customer credit; shipping or otherwise delivering products or services; billing and recording sales and lease transactions; maintaining and monitoring accounts receivable; instituting effective collection procedures; recording and controlling cash receipts; establishing pricing and promotional activities; and properly valuing receivable balances. In management's selection of procedures and techniques of control, the degree of control implemented is a matter of reasonable business judgment. The common guideline used in determining the degree of internal controls implementation is that the cost of a control should not exceed the benefit derived. The Order to Cash Process (O2C) Process is comprised of several sub-processes that must have a foundation of internal controls for SOX 404 certification process. This webinar wil...