Loading Events

« All Events

  • This event has passed.

Cybersecurity Webinar Series

October 27, 2020 @ 2:00 pm - 4:00 pm EDT

|Recurring Event (See all)

One event on October 20, 2020 at 2:00 pm

One event on October 27, 2020 at 2:00 pm

Free
CLA CPE Webinars

Participants of the live webinar will be eligible for 2 free CPE credits.

Register Here

October is National Cybersecurity Awareness Month (NCSAM). Mark the occasion by learning how to reduce cyber risks for yourself and your organization. Join us for our complimentary series of webinars that will cover risks, trends, IT security attack and defense, and mitigation and response techniques.

Who should attend

  • IT Personnel such as CIOs, CISOs, IT Directors, and other technology professionals
  • Business Leaders such as CEOs, CFOs, and other organization leaders

Webinars

Risks and Trends in Cybersecurity and Fraud
October 13

1 – 2:30 p.m. CT

Hackers have learned to profit from their activities. While breaches at large companies dominate the news, this threat is significant for the small organizations as well. Virtually every industry segment is affected, including small businesses. Any organization that stores personal financial information on the network or conducts online cash management is a potential target. New trends in ransomware have shown the ability to cripple entire networks. As a result, any organization that relies on its technology being available is a potential target. Payment fraud targeting wire transfers, automatic clearing house payments, and credit cards is also increasing at an alarming rate. Historically, hacking has been a high risk issue only for banks, but attackers are now targeting all businesses in an effort to access bank funds via online payment methods.

Learning objectives

By the end of this session, you will be able to:

  • Define cyber crime
  • Identify payment fraud trends and tactics hackers are using
  • Recognize how and why hackers are targeting you
  • Describe recent cyber crime litigation issues
  • Describe common information security weaknesses
  • Explain solutions to help minimize risk

Speaker

Recommended CPE

1.5 Credits Information Technology

Purple Network Eaters: Live IT Security Attack and Defense
October 20

1 – 3 p.m. CT

This session will discuss network attacks from two perspectives: the attacker (red team) and the defender (blue team). The attacker will demonstrate the steps that are taken to hack into a company from targeting employees with social engineering attacks to data exfiltration. The defender will demonstrate how to defend against these attacks. The goal is that attackers and defenders can work collaboratively (red + blue = purple) to evaluate the security posture of an organization, identify gaps, and improve defensive controls.

Learning objectives

By the end of this session, you will be able to:

  • Describe the attacker’s methodology
  • Identify the ways to detect malicious activity
  • Describe defensive tools and mitigating controls that assist network administrators secure their environment

Speakers

Recommended CPE

2 credits Information Technology

Data Breaches – Mitigation and Response Strategies
October 27

1 – 3 p.m. CT

As data breaches continue to make the headlines, organizations are challenged to maintain consumer confidence in their ability to recognize, react, and respond to intrusions in order to safeguard confidential information and transactions. A core component of cybersecurity risk management is a well-designed incident response program that supports the organizations business needs. This session will summarize up to date information on the latest cybersecurity risks and how breaches occur. We will explore governance and compliance frameworks and current practices for the business to define and manage an incident response program.

Learning objectives

By the end of this session, you will be able to:

  • Describe the latest developments in ransomware and account take over attacks
  • Give examples from case studies about recent intrusions, breaches, and lessons learned from each case study
  • Describe key risks and controls to mitigate and respond to breaches in Office 365
  • Describe the aspects of the “Cybersecurity Kill Chain”
  • Define key strategies to test the organization’s Incident Response program

Speaker

Recommended CPE

2 credits Information Technology

 

CPE

Recommended CPE: Up to 5.5 credits available
Prerequisites: None
Program level: Overview
Advance preparation: None
Delivery method: Group Internet Based

View CPE sponsorship information.

Event Cancellation Policy

For more information:

Leave a Reply

Subscribe Here