Description
Understand the risks to your data through social engineering attacks and the various methods used by attackers.To err is human. Strong cybersecurity is typically equated with implementing technology safeguards. Nevertheless, despite increasing spending on technology, hackers often employ lowtech social engineering attacks to exploit the weakest link in the security chain human beings. These human errors continue to cause major data breaches and other security incidents. This course will provide a background of how systems containing sensitive electronic data can be at risk through social engineering attacks, describe various methods used by attackers and how these attacks work, and highlight key steps needed to safeguard data and systems in order to mitigate risks facing organizations of all sizes.
Date: 2022-08-29 Start Time: End Time:
Learning Objectives
Understand the Cyber Threat Landscape
• Identify and Understand Social Engineering Techniques
• Understand the Types of Human Error That Can Place an Organization at Risk
Understand Regulatory Risks Associated With Data Breach
• Federal Law Reporting Requirements
• State Law Reporting Requirements
• Regulatory Enforcement Background
Understand Effective Measures That Can Be Taken to Mitigate the Effect of Human Error and Social Engineering Attacks
• Training and Awareness Best Practices
• Technology Best Practices
IAAP ,Additional credit may be available upon request. Contact Lorman at 866-352-9540 for further information.
Alaap B. Shah, J.D., MPH-Epstein Becker & Green, P.C.