Cyberfraud and Data Breaches (Formerly Protecting AGainst Data breaches and Cyberfraud) 

 

 

DAY ONE  

DAY TWO  

7:30 a.m. - 8:00 a.m.  

Registration & Continental Breakfast  

Continental Breakfast  

8:00 a.m. - 9:20 a.m.  

Introduction to Data Protecting and Information Security  

In this opening session, you will learn what intellectual property is; the types of information that are susceptible to loss, theft or misappropriation; common causes of data breaches; the types of individuals who perpetrate information theft; common motivations driving information theft; types of threats to proprietary information; common challenges with protecting information assets; and possible repercussions of data breaches.  

Risks of Social Media in the Workplace   

The use of social media provides many benefits to organizations, but it also creates numerous risks. This session examines the role of social media in today's business environment, focusing on the problems that can occur when using social media and the measures that organizations can take to reduce such risks. 

9:20 a.m. - 9:35 a.m.  

Break  

Break  

9:35 a.m. - 10:55 a.m.  

Legal Issues in Information Security

Every country has laws and regulations that concern information security. This session examines some of the key legal issues concerning the protection of data and intellectual property.  

Managing the Risks of Bring Your Own Device Programs 

Bring your own device (BYOD) refers to the concept whereby employees bring their own personal electronic devices to work and use them to work. Embracing BYOD offers several advantages to organizations, but it also creates challenges and risks. This session examines those advantages and risks and it discusses ways organizations can minimize risks associated with BYOD systems.   

10:55 a.m. - 11:10 a.m.  

Break  

Break  

11:10 a.m. - 12:30 p.m.  

Corporate Espionage 101

Corporate espionage, which refers to the use of illegal means to gather information for commercial purposes, is a major issue for the business world. This session examines corporate espionage, focusing on targets of corporate espionage, industries that make attractive targets for corporate espionage, various forms of corporate espionage, different ways to move data, insider threats, and case studies that highlight the motivations and methods behind theses schemes

Cloud Computing  

Organizations and individuals are increasingly storing data and applications on the cloud, but there are risks associated with using cloud-based infrastructure. This session examines cloud computing, focusing on the characteristics and models of cloud computing, compliance issues that arise in the cloud, security challenges with the cloud, and protecting data in the cloud.

12:30 p.m. - 1:30 p.m.  

Group Lunch  

Lunch on Own 

1:30 p.m. - 2:50 p.m.  

Corporate Espionage: Where Attackers Get Information 

This session will explore the variety of techniques that fraudsters employ to obtain trade secrets, proprietary information and information that they can use to develop knowledge-based attacks. 

Responding to Data Breaches 

To help ensure that an organization responds to data breaches timely and efficiently, management should have an incident response plan in place that outlines how to respond to such issues. This session explores the basic elements of incident response plans. 

2:50 p.m. - 3:05 p.m.  

Break  

Break  

3:05 p.m. - 4:25 p.m.  

Social Engineering

This session will cover the means by which attackers use social engineering tactics to gain access to targets' information resources. It will focus on why social engineering attacks succeed, the different categories of social engineers, the types of information that social engineers target, common red flags of social engineering schemes and measures to prevent becoming victims of social engineering attacks. 

Data Breach Prevention 

To prevent the loss or misuse of data or proprietary information, organizations should develop and implement risk-based information security systems designed to detect and prevent unauthorized access to sensitive information. This session examines the key components to an effective information security system. 

 

Event Details 

Transparent Image