Back 

Seminar

Cyber Security for Accountants, Part II: Mitigate Risk, Build a Security Plan, Prepare for a Breach (414)

Register for this course:

The meeting times for this class are in the past. Please check here for additional meeting times.

Meeting Times:

Tuesday, June 13, 2017 1:00 PM - Tuesday, June 13, 2017 4:30 PM
The meeting time above is expressed in MOUNTAIN TIME, which is:
Eastern Time:
3:00 PM - 6:30 PM
Central Time:
2:00 PM - 5:30 PM
Pacific Time:
12:00 PM - 3:30 PM

Price:

This course is in the past and can no longer be purchased.

Location:

Internet Course - Live Streamed

Delivery Method:

Group Internet Based

Credit Hours:

4.0

Field of Study:

Information Technology - Technical (Cyber Security)

Course Level:

Intermediate

Prerequisites:

Basic understanding of computers

General Description:

After a brief overview of Cyber Security Part I, we will explore risks and threats to data and how they materialize; how to assess the risks to your data and business, and steps to take to mitigate those risks; how to identify what needs protecting, why, and how. Participants will then learn what an effective cyber security plan is, how to build it, and how to implement it, including policies, training, and what basic security looks like. You will also learn how to assess whether the vendors you use and allow access to data have implemented basic security; what to ask of your IT or security vendor; how to protect yourself from the client who refuses to implement security; and more.

Learning Objectives:

After completing this course the participant will be able to:

  • Recognize and identify the threats and risks to data and their business.
  • Assess the risks to data and the business and mitigate that risk.
  • Identify the steps necessary to conduct a risk assessment.
  • Conduct a risk assessment for their own organization.
  • Apply a model to lower the risk of a breach and reduce or eliminate the potential liability associated with a breach.
  • Identify the necessary pieces of a basic cyber security plan.
  • Build and implement a basic cyber security plan.
  • Recognize the necessary steps to build the plan and include the necessary policies, training, and implementation techniques.
  • Evaluate a vendor's security plan.
  • Recognize and react quickly to a data breach.

Instructors:

David Willson is owner and sole practitioner of Titan Info Security Group, a law firm focused on risk, cyber security, data breach, and unique security issues. He is a retired Army JAG officer and expert in risk management, cyber security, and litigation. He provided legal advice in computer network operations and information security and international law to the DoD and NSA, and was the legal advisor for what is now CYBERCOM. He holds the CISSP (Certification for Information Systems Security Professional). He has published many articles on cyber security, presents at conferences worldwide, conducts risk assessment training for companies, and investigates data breaches.

Related Courses:

Code Seminar Location Get details or register

Attend an AES seminar and see why our participants say,

“The real-life cases and decisions were extremely insightful.”

“Great! Well balanced program and I learned techniques I will use in my practice.”

“It was fascinating!”

“The material covered is applicable to a wide range of clients.”

“This is the best class I have taken in 30 years of practice!”

 

Upcoming Internet Courses

Please wait while the upcoming seminars are loaded...


Contact Us

Accountant's Education Services
4380 S Syracuse St Ste 110
Denver, Colorado 80237
720-389-5900 · Fax 720-708-3246
info@aestax.com

Copyright 2024 by Tax Education Services