Cybersecurity & Fraud Risks, Threats, and Solutions [ITC]
Subject:
Jun 1, 2016
Time: 8:00 am-11:30 am
Accounting
Time: 8:00 am-11:30 am
Credit Hours:
4.00Price:
Member: $150.00
Non-member: $225.00
Discussion Leader: Tommy Stephens, CPA
Full Description
Cybersecurity & Fraud Risks, Threats, and Solutions (ITC)June 1, 2016 / Morning Session
Sheraton Anchorage Hotel & Spa Kuskokwim Ballroom
401 East 6th Avenue
Anchorage, AK
LATE REGISTRATION POLICY
For registrations received less than 21 days from the course date will be charged a late fee of $50 for each 8 hour course and $25 for each 4 hour course.
Cybersecurity and the frauds resulting from security breaches are, and should be, on everyone's radar. Whether you control security choices or not, you can raise your awareness and ask the right questions to begin reducing risks by participating in this session.
Major Topics:
In this session, you will learn how changes in firewalls, anti-virus, encryption, and other technologies can help you to reduce the risk that your mission-critical data will become compromised. You will also learn about five common-sense steps that you can implement right away to all-but-eliminate security risk on your computer. Additionally, because cloud and mobile tools expand the footprint of your cybersecurity and fraud risk, you will learn what you need to do immediately to assess and manage the risk associated with these technologies. Finally, with identity theft growing at unprecedented levels, you will learn critical tips for avoiding identity theft.
In sum, if you are concerned about security and who isnt? participating in this session may be the best decision you make this year.
Learning Objectives:
Assess the relevant security risks in your organization;
Identify specific tools and techniques to protect sensitive data;
Define phishing and explain how it is used to gain access to systems and data;
List five methods to improve security on a personal computer;
Build an action plan to safeguard personal and organizational data from potential threats; and
Implement data security best practices for personal and organizational information.
Designed For: Business professionals seeking to secure sensitive data
CPE Credits: 4, Accounting - Specialized Knowledge and Applications
Level of Knowledge: Intermediate
Prerequisite: Basic understanding of computer operations
Acronym: ITC
Discussion Leader: Thomas G. Stephens, Jr., CPA.CITP, CGMA