Losing data to fraud can be more costly than the loss of cash and other assets. To ensure data security, safeguard intellectual property and guard against cyberfraud, fraud examiners must stay informed of rapidly advancing technologies, emerging
business trends and the methods employed by increasingly sophisticated information thieves.
This 2-day, instructor-led course will clarify these issues while guiding you through the crucial strategies needed to mitigate the threat of malicious data theft and minimize the risk of inadvertent data loss. You will also learn
useful steps for the creation of data security policies and related internal controls.
Upcoming Seminars
No courses are scheduled at this time. Please view our
Calendar of Events for other upcoming seminars.
You Will Learn How To:
Explain the ways data can be stolen by employees and information thieves
Enact data security measures and be prepared in the event of a data breach
Contend with data theft maneuvers such as social engineering, hacking and espionage
Identify various sources of data loss, both internal and external
Recognize the impacts of converging trends such as cloud computing and BYOD
Recognize the legal and regulatory concerns related to data security
Who Should Attend:
Governance, risk management and compliance officers
Corporate managers
IT professionals
Loss prevention and security professionals
Government employees
Internal and external auditors, CPAs and CAs
Business professionals, educators and students interested in the anti-fraud field
Certified Fraud Examiners and other anti-fraud professionals
Fees
Members: $795
Non-Members: $995
CPE Credit
16
Field of Study
Information Technology
Course Level
Overview
Prerequisite
None
Advanced Preparation
None
Delivery Method
Group-Live
Full Course Outline
Cyberfraud and Data Breaches (Formerly Protecting AGainst Data breaches and Cyberfraud)
|
DAY ONE
|
DAY TWO
|
7:30 a.m. - 8:00 a.m.
|
Registration & Continental Breakfast
|
Continental Breakfast
|
8:00 a.m. - 9:20 a.m.
|
Introduction to Data Protecting and Information Security
In this opening session, you will learn what intellectual property is; the types of information that are susceptible to loss, theft or misappropriation; common causes of data breaches; the types of individuals who perpetrate information theft; common motivations driving information theft; types of threats to proprietary information; common challenges with protecting information assets; and possible repercussions of data breaches.
|
Risks of Social Media in the Workplace
The use of social media provides many benefits to organizations, but it also creates numerous risks. This session examines the role of social media in today's business environment, focusing on the problems that can occur when using social media and the measures that organizations can take to reduce such risks.
|
9:20 a.m. - 9:35 a.m.
|
Break
|
Break
|
9:35 a.m. - 10:55 a.m.
|
Legal Issues in Information Security
Every country has laws and regulations that concern information security. This session examines some of the key legal issues concerning the protection of data and intellectual property.
|
Managing the Risks of Bring Your Own Device Programs
Bring your own device (BYOD) refers to the concept whereby employees bring their own personal electronic devices to work and use them to work. Embracing BYOD offers several advantages to organizations, but it also creates challenges and risks. This session examines those advantages and risks and it discusses ways organizations can minimize risks associated with BYOD systems.
|
10:55 a.m. - 11:10 a.m.
|
Break
|
Break
|
11:10 a.m. - 12:30 p.m.
|
Corporate Espionage 101
Corporate espionage, which refers to the use of illegal means to gather information for commercial purposes, is a major issue for the business world. This session examines corporate espionage, focusing on targets of corporate espionage, industries that make attractive targets for corporate espionage, various forms of corporate espionage, different ways to move data, insider threats, and case studies that highlight the motivations and methods behind theses schemes
|
Cloud Computing
Organizations and individuals are increasingly storing data and applications on the cloud, but there are risks associated with using cloud-based infrastructure. This session examines cloud computing, focusing on the characteristics and models of cloud computing, compliance issues that arise in the cloud, security challenges with the cloud, and protecting data in the cloud.
|
12:30 p.m. - 1:30 p.m.
|
Group Lunch
|
Lunch on Own
|
1:30 p.m. - 2:50 p.m.
|
Corporate Espionage: Where Attackers Get Information
This session will explore the variety of techniques that fraudsters employ to obtain trade secrets, proprietary information and information that they can use to develop knowledge-based attacks.
|
Responding to Data Breaches
To help ensure that an organization responds to data breaches timely and efficiently, management should have an incident response plan in place that outlines how to respond to such issues. This session explores the basic elements of incident response plans.
|
2:50 p.m. - 3:05 p.m.
|
Break
|
Break
|
3:05 p.m. - 4:25 p.m.
|
Social Engineering
This session will cover the means by which attackers use social engineering tactics to gain access to targets' information resources. It will focus on why social engineering attacks succeed, the different categories of social engineers, the types of information that social engineers target, common red flags of social engineering schemes and measures to prevent becoming victims of social engineering attacks.
|
Data Breach Prevention
To prevent the loss or misuse of data or proprietary information, organizations should develop and implement risk-based information security systems designed to detect and prevent unauthorized access to sensitive information. This session examines the key components to an effective information security system.
|
Event Details
Event Cancellation Policy
Our
cancellation policy is intended to keep costs low for attendees. Due to financial obligations incurred by ACFE, Inc. you must cancel
your registration prior to the start of the event. Cancellations received less than 14 calendar days prior to an event start date are subject to a $100 administrative fee. No refunds or credits will be given for cancellations received
on or after the start date of the event. Those who do not cancel and do not attend are responsible for the full registration fee. Should an event be cancelled or postponed by the ACFE due to unforeseen circumstances, ACFE will process
a full refund of registration fees within 30 days of such circumstances becoming known. ACFE will attempt to notify affected customers by phone and email after it determines cancellation is necessary.
Satisfaction Guarantee
ACFE seminars are unmatched in scope and effectiveness and backed by our unconditional satisfaction guarantee. If you attend an ACFE event and are not completely satisfied, please contact an ACFE Member Services Representative at
MemberServices@ACFE.com or call (800) 245-3321 / +1 (512) 478-9000.
The
Association of Certified Fraud Examiners, Inc. is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards
of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website:
www.nasbaregistry.org.
If you would like to begin receiving email notifications from the ACFE, please
click here to subscribe.