Cybersecurity: How to Deal with the Risks, Hidden Threats & the Latest Financial Reporting Disclosures Self-Study Webinar
Overview
Your organization’s information systems are a constant target of malicious, online attacks. Data breaches can be incredibly costly, so thwarting these cyberattacks is vital to the health of your business and requires expertise and 24/7 diligence. In this self-study webinar, you’ll discover the best ways to stop these attacks before they damage your organization’s reputation and finances. Plus, you’ll find out the necessary steps that must be taken to contain the impact when a breach occurs. You’ll learn how to:
- Recognize and understand the numerous ways in which cyberattacks can occur
- Structure your cybersecurity program—what to do and how to do it
- Reduce, mitigate, and eliminate risk
- Comply with SOX audits and SEC reporting disclosures
Objective
In this self-study webinar, you will learn core principles and proven techniques to successfully safeguard your organization from cyberattacks and effectively deal with breaches when they occur. You will also learn how to comply with financial reporting and SEC disclosure requirements.
DETAILED LEARNING OBJECTIVES
• Identify effective strategies for minimizing damages from a cyber breach
• Recognize common types of cybercrime such as phishing and ransomware
• Understand motivations and characteristics of nation-state threat actors
• Describe the role of the Department of Homeland Security in cybersecurity
• Explain the impact and mechanisms of ransomware attacks
• Identify common weaknesses exploited by phishing attempts
• Recognize the organizational structure of cybercriminal groups
• Understand the risks posed by insider threats
• Identify key government agencies involved in cyber defense
• Explain how remote work increases cybersecurity risks
• Understand the goals of advanced persistent threats (APTs)
• Define residual risk and its role in cyber risk management
• Describe the purpose of a cyber risk assessment
• Identify misconceptions about blockchain in cybersecurity
• Classify data based on sensitivity and risk
• Determine which types of data are considered high or low risk
• Understand challenges in identifying and mitigating inherent risk
• Explain the cybersecurity benefits of blockchain technology
• Identify limitations of AI in cybersecurity applications
• Understand the role of Data as a Service (DaaS)
• Describe the Common Vulnerability Scoring System (CVSS)
• Identify purposes of penetration testing in security programs
• Understand compensating controls and when they are used
• Recognize the purpose of third-party risk assessments
• Explain the use and value of SSAE 18 and SOC reports
• Identify components of a well-documented security exception
• Describe the intent of PCI-DSS and its origin
• Understand GDPR requirements such as breach notifications
• Identify risks and challenges in managing vendor contracts
• Describe the role of the board of directors in overseeing cybersecurity
Emphasis
- Recent cybercrime history and statistics
- Risks and risk alignment
- Artificial Intelligence (AI)
- Data classification
- General Data Protection Regulation (GDPR)
- Role of the Board of Directors
- SEC disclosure requirements
- Disclosure examples
- Public relations and crisis management
- Cloud computing
- Types of clouds and levels of services
- IT vendors
- SOC reports
- Strategies for when SOC-1 is incomplete