Compliance Key INC - Financial compliance training
Peter Goldmann
Peter Goldmann is Keynote Speaker at Compliance Key Inc. He is president of Fraud Aware LLC, the publisher of White-Collar Crime Fighter, a widely read monthly newsletter for internal auditors, controllers, corporate counsel, financial operations managers and fraud investigators.
Webinar Id: CICPC001
10:00 AM PT | 01:00 PM ET
12/13/2017
Duration: 90 mins
Peter Goldmann
Peter Goldmann is Keynote Speaker at Compliance Key Inc. He is president of Fraud Aware LLC, the publisher of White-Collar Crime Fighter, a widely read monthly newsletter for internal auditors, controllers, corporate counsel, financial operations managers and fraud investigators.
Webinar Id: CICPC001
10:00 AM PT | 01:00 PM ET
12/13/2017
Duration: 90 mins
Overview
Companies have enough to worry about from outsiders when it comes to cyber security. From clever hackers infiltrating their networks to criminal gangs stealing their data and government surveillance of their systems, security teams have to be on their toes at all times. But the insider threat can be just as dangerous and sometimes harder to detect.
According to the 2015 Insider Threat Spotlight Report, 62 percent of security professionals are seeing a rise in insider attacks. While many of these are malicious attacks, they can also be unintentional breaches. The consequences, no matter the motivation, can be equally devastating.
This timely webinar discusses the most current and dangerous insider cyber security threats and outlines measures for preventing and investigating incidents of data theft, industrial espionage, cyber-sabotage, identity theft and more.
According to the 2015 Insider Threat Spotlight Report, 62 percent of security professionals are seeing a rise in insider attacks. While many of these are malicious attacks, they can also be unintentional breaches. The consequences, no matter the motivation, can be equally devastating.
This timely webinar discusses the most current and dangerous insider cyber security threats and outlines measures for preventing and investigating incidents of data theft, industrial espionage, cyber-sabotage, identity theft and more.
Why should you attend this webinar?
- Explore the common and not-so-common cyber-threats to your organization's information security
- Identify the most common cyber-perpetrators
- Understand the red flags of potential or actual insider cyber-crime
- Learn how to detect and initiate an investigation of suspected insider cyber-crime
Areas Covered in the Session:
- Types of insider threats and most common perpetrators
- Main data assets to protect: Personally identifiable data, intellectual property, trade secrets and more
- Red flags of internal data theft, cyber-sabotage, identity theft and espionage to watch for
- Latest best practices in information security today
Who can Benefit:
- Compliance managers
- IT staff and managers
- HR
- Internal audit
- legal Professionals
- Senior management
Compliance Key INC
717-208-8666
Comments
Post a Comment