Losing data to fraud can be more costly than the loss of cash and other assets. To ensure data security, safeguard intellectual property and guard against cyber fraud, fraud examiners must stay informed of rapidly advancing technologies, emerging business trends and the methods employed by increasingly sophisticated information thieves.
This two-day, instructor-led course will clarify these issues while guiding you through the crucial strategies needed to mitigate the threat of malicious data theft and minimize the risk of inadvertent data loss. You will also learn useful steps for the creation of data security policies and related internal controls.
Phoenix, AZ | January 19-20, 2017
Vancouver, BC | July 27-28, 2017
You Will Learn How To:
Explain the ways data can be stolen by employees and information thieves
Enact data security measures and be prepared in the event of a data breach
Contend with data theft maneuvers such as social engineering, hacking and espionage
Identify various sources of data loss, both internal and external
Recognize the impacts of converging trends such as cloud computing and BYOD
Recognize the legal and regulatory concerns related to data security
Who Should Attend:
Governance, risk management and compliance officers
Loss prevention and security professionals
Internal and external auditors, CPAs and CAs
Business professionals, educators and students interested in the anti-fraud field
Certified Fraud Examiners and other anti-fraud professionals
Field of Study
||Day One |
||Registration and Continental Breakfast |
Introduction to Data Protection and Information Security
In this opening session, you will learn what intellectual property is; the types of information that are susceptible to loss, theft or misappropriation; common causes of data breaches; the types of individuals who perpetrate information theft; common motivations driving information theft; types of threats to proprietary information; common challenges with protecting information assets; and possible repercussions of data breaches.
Legal Issues in Information Security
Every country has laws and regulations that concern information security. This session examines some of the key legal issues concerning the protection of data and intellectual property.
|11:10 a.m.-12:30 p.m.
Corporate Espionage 101
Corporate espionage, which refers to the use of illegal means to gather information for commercial purposes, is a major issue for the business world. This session examines corporate espionage, focusing on targets of corporate espionage, industries that make attractive targets for corporate espionage, various forms of corporate espionage, different ways to move data, insider threats, and case studies that highlight the motivations and methods behind these schemes.
||Group Lunch |
Corporate Espionage: Where Attackers Get Information
This session will explore the variety of techniques that fraudsters employ to obtain trade secrets, proprietary information and information that they can use to develop knowledge-based attacks.
This session will cover the means by which attackers use social engineering tactics to gain access to targets’ information resources. It will focus on why social engineering attacks succeed, the different categories of social engineers, the types of information that social engineers target, common red flags of social engineering schemes and measures to prevent becoming victims to social engineering attacks.
||Day Two |
||Continental Breakfast |
Risks of Social Media in the Workplace
The use of social media provides many benefits to organizations, but it also creates numerous risks. This session examines the role of social media in today’s business environment, focusing on the problems that can occur when using social media and the measures that organizations can take to reduce such risks.
Managing the Risks of Bring Your Own Device Programs
Bring your own device (BYOD) refers to the concept whereby employees bring their own personal electronic devices to work and use them to work. Embracing BYOD offers several advantages to organizations, but it also creates challenges and risks. This session examines those advantages and risks and it discusses ways organizations can minimize the risks associated with BYOD systems.
|11:10 a.m.-12:30 p.m.
Organizations and individuals are increasingly storing data and applications on the cloud, but there are risks associated with using cloud-based infrastructure. This session examines cloud computing, focusing on the characteristics and models of cloud computing, compliance issues that arise in the cloud, security challenges with the cloud, and protecting data in the cloud.
||Lunch on Own |
Responding to Data Breaches
To help ensure that an organization responds to data breaches timely and efficiently, management should have an incident response plan in place that outlines how to respond to such issues. This session explores the basic elements of incident response plans.
Data Breach Prevention
To prevent the loss or misuse of data or proprietary information, organizations should develop and implement risk-based information-security systems designed to detect and prevent unauthorized access to sensitive information. This session examines the key components to an effective information security system.
Event Cancellation Policy
cancellation policy is intended to keep costs low for attendees. Due to financial obligations incurred by ACFE, Inc. you must cancel your registration prior to the start of the event. Cancellations received less than 14 calendar days prior to an event start date are subject to a $100 administrative fee. No refunds or credits will be given for cancellations received on or after the start date of the event. Those who do not cancel and do not attend are responsible for the full registration fee.
ACFE seminars are unmatched in scope and effectiveness and backed by our unconditional satisfaction guarantee. If you attend an ACFE event and are not completely satisfied, please contact an ACFE Member Services Representative at
MemberServices@ACFE.com or call (800) 245-3321 / +1 (512) 478-9000.
The Association of Certified Fraud Examiners, Inc. is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website:
If you would like to begin receiving email notifications from the ACFE, please
click here to subscribe.