In the age of the data breach, fraudsters operate in a broad and complex cybercrime landscape. Almost daily, organizations experience data breaches, most of which include personally identifiable information (PII) about a company’s constituents,
partners, customers and employees. Other breach targets include corporate documents containing business processes, intellectual property designs and systems information, as well as credentials, passwords and digital certificates.
This session will describe ways to ensure good cybersecurity hygiene and combat this kind of fraud, including a risk-appropriate defense program, threat hunting, incident response and digital forensics. It will also discuss the use of cyberthreat
monitoring to identify stolen data quickly in deep and dark web forums.
You Will Learn How To:
- Assess the risk of PII and cyberfraud
- Identify ways to combat cyberfraud
- Use cyberthreat monitoring to identify data theft
- Compare tools to identify and monitor cyberfraud
Recommended Prerequisites: None
Field of Study: Information Technology