Technology is a business-critical business capability in today’s day and age. Any interruption to an organization’s ability to use its information system poses a significant risk to the viability of the organization. Data breaches, cyber-attacks, and ransomware are examples of some of the biggest existential risks facing businesses today. There are threat actors all around the world that entirely focus on stealing organizational data, stealing economic resources, and disrupting the flow of business. They are using complex social engineering attacks, pervasive phishing messages, intricate malware, and other highly effective techniques. From recently released data breach reports, there were 100k data breaches publicly reported in 2020 alone. Resulting in the personal information of millions of people worldwide being released, billions of dollars of organizational assets, and putting countless people in harm’s way.
This course will go over recent major security breaches including breaches at Solarwinds, Ubiquity, Colonial Pipeline, Tecnimont SpA, Citrix, LabCorp, and others. It will discuss how these breaches occurred, why the breaches happened, and how organizations can prevent it from happening to them. Each case study will discuss a different form of security vulnerability and how to prevent it. The topics will include social engineering, auditing processes for IT Security systems, forensic accounting, password, two-factor authentication, and improvements for managerial oversight. Participants will gain real-world knowledge from the mistakes of other organizations and from that experience develop their own security best practices for their organizations
Are you a CPA?? Are you a Financial Professional?? Earn CPE Credits for Today's Podcast. Check out https://cpe.cx/22BSC3/. Take a quick 5 question quiz and get your certificate today. Super Easy!
Presented by Stephen M. Yoss, CPA, MS (https://yoss.io) Produced by Alicia Yoss & Alanna Regalbuto Graphics By Flaticon.com and iStock Music by Bensound.com Education and Compliance By K2 Enterprises (https://k2e.com)
Copyright. All product names, logos, and brands are the property of their respective owners. All company, product, and service names used in this website are for identification purposes only. The use of these names, logos, and brands does not imply endorsement.
Educational Use Only. The information presented in this presentation is for educational use only. The presenter will make specific recommendations, but the participant is highly recommended to do their own due diligence before making any investment decision.
To leave or reply to comments, please download free Podbean or
To leave or reply to comments, please download free Podbean App.