Dr. Michael Abitz is an Adjunct Professor at New Mexico Jr. College, Hobbs, NM. He received his Doctorate in Management from Colorado Technical University and Master of Science in Quality Assurance from California State University and a certified Quality Black Belt. His areas of interest include teaching online, mentoring org Read more
The cost of cyberattacks in the US varies from a few Million to Billions of dollars per year; problem is nobody knows for sure because many companies are embarrassed to report such crimes. According to IBM Security Services, there were 1.5 million cyber-attacks in the United States in 2016, with nearly 40% of those attacks were motivated by industrial espionage, terrorism, financial crimes, data theft, or dissatisfaction with employers.
2016 has been a challenging year for politics, public safety, individuals and companies in terms of online security. Unwanted attacks became more sophisticated, difficult to find and extremely expensive to correct. Win32/Conflicker, WannaCry, Cloak and Dagger, Botnets and thousands more are responsible for significant data and financial loss.
2017 will ‘see’ and experience in increase in attacks and sophistication; predictions and trends for the future are discussed in this webinar:
• Symantec
• Trend Micro
• McAfee
• Forcepoint
• FireEye
• Kaspersky
• Palo Alto Networks
• WatchGuard Technologies
• Imperva
• Beyond Trust
• Checkpoint
• Forrester
• Gartner
• White Hat Security
• Sophos
• IDC – And if you are not depressed yet
• IBM
Countermeasures: Typewriters are back and we have Edward Snowden to thank (article by Siobhan Lyons).
Course Objctive:
By the end of the Webinar participants should be able to:
• Explain Cyber Security
• Analyze Personal Security
• Identity Threats to Computer Security
• Apply Internet Security Procedures
• Examine Mobile Security
• Identify Risks to Internet Privacy
Course Outline:
INTRODUCTION TO SECURITY
• Challenges of Securing Information
• What Is Information Security?
• Who Are the Attackers?
• Building a Comprehensive Security Strategy
PERSONAL SECURITY
• Personal Security Attacks
• Personal Security Defenses
COMPUTER SECURITY
• Attacks Using Malware
• Computer Defenses
INTERNET SECURITY
• How the Internet Works
• Internet Security Risks
• Internet Defenses
MOBILE SECURITY
• Mobile Attacks
• Mobile Defenses
PRIVACY
• Privacy Primer
• Privacy Protections
What You Get:
• Training Materials
• Live Q&A Session with the Speaker
• Participation Certificate
• Access to Signup Community (Optional)
• Reward Points
Who Will Benefit:
• All Management and Supervisory personal
• Employees
• Contractors
Writing Effective Audit Observations
LIVE : Scheduled on
22-October-2024 :01:00 PM EDT
|
Essentials of Successful Fraud Risk Management
LIVE : Scheduled on
31-October-2024 :01:00 PM EDT
|