K2's Ripped from the Headlines: Lessons from Notable Tech Crimes 26-27
2.0 Credits
Member Price $99.00
Non-Member Price $129.00
Overview
Technological advancements facilitate new forms of cybercrime and fraud. In this session, you will learn how the crooks used technology to reap their ill-gotten rewards.
Highlights
- Common security weaknesses that occur with hardware and software at home and in the office
- Malware, ransomware, data breach, and incident response tips
- Internal control failures that result in the theft of assets or unauthorized manipulation of data
Prerequisites
Basic understanding of common business technologies and related risks
Objectives
- Identify at least three major security incidents reported in the headlines in the last year, and explain at least one major internal control design or operation flaw that allowed the hack to occur
- Select the correct definitions for common security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
- Identify at least three best practices learned by reviewing the control failures cited in the case studies
Preparation
None
Notice
This pre-recorded broadcast is provided through our partnership with K2 Enterprises. Instructor will be available via the chat feature.
Non-Member Price $129.00
Member Price $99.00