Back 

Seminar

Cyber Security for CPAs, Part I: Protecting Client Information, The Bottom Line, Dos and Don'ts (407)

Register for this course:

The meeting times for this class are in the past. Please check here for additional meeting times.

Meeting Times:

Tuesday, June 07, 2016 1:00 PM - Tuesday, June 07, 2016 4:30 PM
The meeting time above is expressed in MOUNTAIN TIME, which is:
Eastern Time:
3:00 PM - 6:30 PM
Central Time:
2:00 PM - 5:30 PM
Pacific Time:
12:00 PM - 3:30 PM

Price:

This course is in the past and can no longer be purchased.

Location:

Internet Course - Live Streamed

Delivery Method:

Group Internet Based

Credit Hours:

4

Field of Study:

Business Management & Organization - Management Information Systems in Industry

Course Level:

Intermediate

Prerequisites:

Basic understanding of computers

General Description:

Participants will learn what the threats to data are: how data is lost and stolen, by whom, how, and why. You must understand the who, how, and why in order to effectively defend your data. Participants will learn what the current defenses are, tools and techniques, and how inadequate they are, whether protecting data on networks, mobile devices, in the Cloud, or elsewhere. Participants will learn what a good cyber security plan looks like and how simple it is to develop and implement. Participants will learn about free or inexpensive tools and techniques to better help protect data. Finally, participants will understand the risks associated with data breach and how to lower or mitigate risk, reduce liability, and protect reputation.

Learning Objectives:

After completing this course the participant will be able to:

  • Recognize and apply cyber security basics necessary for all business owners and those handling sensitive information.
  • Identify current threats to data: who is stealing or losing data, how, and why.
  • Practice protecting data on mobile devices, in the Cloud, in transit, and at rest.
  • Recognize who the hacker is and apply this knowledge to better recognize scams and threats.
  • Recognize the tools, techniques, and scams used by hackers and thieves and apply this knowledge to protect data.
  • Discover and analyze the risks to data and the organization in order to reduce those risks.
  • Apply the tools and techniques learned to help lower the risk of a breach.
  • Practice the basics of securing data.
  • Recognize and apply safeguards before, during, and after entering the Cloud.
  • Implement various tools and techniques to better secure data.

Instructors:

David Willson is owner and sole practitioner of Titan Info Security Group, a law firm focused on risk, cyber security, data breach, and unique security issues. He is a retired Army JAG officer and expert in risk management, cyber security, and litigation. He provided legal advice in computer network operations and information security and international law to the DoD and NSA, and was the legal advisor for what is now CYBERCOM. He holds the CISSP (Certification for Information Systems Security Professional). He has published many articles on cyber security, presents at conferences worldwide, conducts risk assessment training for companies, and investigates data breaches.

Related Courses:

Code Seminar Location Get details or register

Attend an AES seminar and see why our participants say,

“The real-life cases and decisions were extremely insightful.”

“Great! Well balanced program and I learned techniques I will use in my practice.”

“It was fascinating!”

“The material covered is applicable to a wide range of clients.”

“This is the best class I have taken in 30 years of practice!”

 

Upcoming Internet Courses

Please wait while the upcoming seminars are loaded...


Contact Us

Accountant's Education Services
4380 S Syracuse St Ste 110
Denver, Colorado 80237
720-389-5900 · Fax 720-708-3246
info@aestax.com

Copyright 2024 by Tax Education Services