Together, Reducing Fraud Worldwide

Protecting Data and Intellectual Property


Share |

  CPE Credit: 16
Course Level: Overview
Prerequisite: None


 

Losing data to fraud can be more costly than the loss of cash and other assets. To ensure data security and safeguard intellectual property, fraud examiners must stay informed of rapidly advancing technologies, emerging business trends and the methods employed by increasingly sophisticated information thieves. 

This two-day, instructor-led course will clarify these issues while guiding you through the crucial strategies needed to mitigate the threat of malicious data theft and minimize the risk of inadvertent data loss. You will also learn useful steps for the creation of data security policies and related internal controls. 

 

Upcoming Seminars

Washington, D.C. | November 5-6, 2015

 

You Will Learn How To:  

Explain the ways data can be stolen by employees and information thieves

Enact data security measures and be prepared in the event of a data breach

Contend with data theft maneuvers such as social engineering, hacking and espionage

Identify various sources of data loss, both internal and external

Recognize the impacts of converging trends such as cloud computing and BYOD

Recognize the legal and regulatory concerns related to data security


Who Should Attend:  

Governance, risk management and compliance officers

Corporate managers

IT professionals

Loss prevention and security professionals

Government employees

Internal and external auditors, CPAs and CAs

Business professionals, educators and students interested in the anti-fraud field

Certified Fraud Examiners and other anti-fraud professionals

  

Fees 

Members: $695 

Non-Members: $845 

 

CPE Credit
16 


Field of Study
Specialized Knowledge and Applications 


Course Level
Overview 

 

Prerequisite 

None


Advanced Preparation 

None

  

Delivery Method 

Group-Live
  

  Day One  
7:30-8:00 a.m.   Registration and Continental Breakfast  
8:00-9:20 a.m. 

Introduction to Data Protection and Information Security
In this opening session, you will learn what intellectual property is; the types of information that are susceptible to loss, theft or misappropriation; common causes of data breaches; the types of individuals who perpetrate information theft; common motivations driving information theft; types of threats to proprietary information; common challenges with protecting information assets; and possible repercussions of data breaches.

9:20-9:35 a.m.  Break 
9:35-10:55 a.m. 

Legal Issues in Information Security 
Every country has laws and regulations that concern information security. This session examines some of the key legal issues concerning the protection of data and intellectual property.

10:55-11:10 a.m.  Break  
11:10 a.m.-12:30 p.m. 

Corporate Espionage 101 
Corporate espionage, which refers to the use of illegal means to gather information for commercial purposes, is a major issue for the business world. This session examines corporate espionage, focusing on targets of corporate espionage, industries that make attractive targets for corporate espionage, various forms of corporate espionage, different ways to move data, insider threats, and case studies that highlight the motivations and methods behind these schemes. 

12:30-1:30 p.m.  Group Lunch  
1:30-2:50 p.m. 

Corporate Espionage: Where Attackers Get Information 
This session will explore the variety of techniques that fraudsters employ to obtain trade secrets, proprietary information and information that they can use to develop knowledge-based attacks.

2:50-3:05 p.m.  Break  
3:05-4:25 p.m.  

Social Engineering 
This session will cover the means by which attackers use social engineering tactics to gain access to targets’ information resources. It will focus on why social engineering attacks succeed, the different categories of social engineers, the types of information that social engineers target, common red flags of social engineering schemes and measures to prevent becoming victims to social engineering attacks.

 

 

  Day Two 
7:30-8:00 a.m.   Continental Breakfast   
8:00-9:20 a.m. 

Risks of Social Media in the Workplace 
The use of social media provides many benefits to organizations, but it also creates numerous risks. This session examines the role of social media in today’s business environment, focusing on the problems that can occur when using social media and the measures that organizations can take to reduce such risks.

9:20-9:35 a.m.  Break  
9:35-10:55 a.m. 

Managing the Risks of Bring Your Own Device Programs 
Bring your own device (BYOD) refers to the concept whereby employees bring their own personal electronic devices to work and use them to work. Embracing BYOD offers several advantages to organizations, but it also creates challenges and risks. This session examines those advantages and risks and it discusses ways organizations can minimize the risks associated with BYOD systems.

10:55-11:10 a.m.  Break  
11:10 a.m.-12:30 p.m. 

Cloud Computing 
Organizations and individuals are increasingly storing data and applications on the cloud, but there are risks associated with using cloud-based infrastructure. This session examines cloud computing, focusing on the characteristics and models of cloud computing, compliance issues that arise in the cloud, security challenges with the cloud, and protecting data in the cloud. 

12:30-1:30 p.m.  Lunch on Your Own  
1:30-2:50 p.m. 

Responding to Data Breaches 
To help ensure that an organization responds to data breaches timely and efficiently, management should have an incident response plan in place that outlines how to respond to such issues. This session explores the basic elements of incident response plans.

2:50-3:05 p.m.  Break  
3:05-4:25 p.m.  

Data Breach Prevention 
To prevent the loss or misuse of data or proprietary information, organizations should develop and implement risk-based information-security systems designed to detect and prevent unauthorized access to sensitive information. This session examines the key components to an effective information security system.

 

 

Event Cancellation Policy 

Our cancellation policy is intended to keep costs low for attendees. Due to financial obligations incurred by ACFE, Inc. you must cancel your registration prior to the start of the event. Cancellations received less than 14 calendar days prior to an event start date are subject to a $100 administrative fee. No refunds or credits will be given for cancellations received on or after the start date of the event. Those who do not cancel and do not attend are responsible for the full registration fee.

 

Satisfaction Guarantee 

ACFE seminars are unmatched in scope and effectiveness and backed by our unconditional satisfaction guarantee. If you attend an ACFE event and are not completely satisfied, please contact an ACFE Member Services Representative at MemberServices@ACFE.com or call (800) 245-3321 / +1 (512) 478-9000.

 

NASBA CPEThe Association of Certified Fraud Examiners, Inc. is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.learningmarket.org 
 

 

If you would like to begin receiving email notifications from the ACFE, please click here to subscribe.



Reviews
We welcome your reviews and feedback on ACFE Events, Training & Products. If you have questions or need assistance, please contact an ACFE Member Services Representative.

 

  You must be logged in to leave a review....

0 Comments

Add Comment

Text Only 2000 character limit

Page 1 of 1

Related Information

Calendar of Events