Social Engineering Attacks: What Are They and How to Prevent Them (OnDemand Webinar)

$79.00

SKU: 411037EAU

Description

Understand the risks to your data through social engineering attacks and the various methods used by attackers.To err is human. Strong cybersecurity is typically equated with implementing technology safeguards. Nevertheless, despite increasing spending on technology, hackers often employ lowtech social engineering attacks to exploit the weakest link in the security chain human beings. These human errors continue to cause major data breaches and other security incidents. This course will provide a background of how systems containing sensitive electronic data can be at risk through social engineering attacks and how human error can place an organization at risk.

Date: 2023-09-26 Start Time: End Time:

Learning Objectives

Understand the Cyber Threat Landscape
• Identify and Understand Social Engineering Techniques
• Understand the Types of Human Error That Can Place an Organization at Risk

IAPP ,Additional credit may be available upon request. Contact Lorman at 866-352-9540 for further information.

Alaap B. Shah, J.D., MPH-Epstein Becker & Green, P.C.

Social Engineering Attacks: What Are They and How to Prevent Them (OnDemand Webinar)

$79.00

SKU: 410014EAU

Description

Understand the risks to your data through social engineering attacks and the various methods used by attackers.To err is human. Strong cybersecurity is typically equated with implementing technology safeguards. Nevertheless, despite increasing spending on technology, hackers often employ lowtech social engineering attacks to exploit the weakest link in the security chain human beings. These human errors continue to cause major data breaches and other security incidents. This course will provide a background of how systems containing sensitive electronic data can be at risk through social engineering attacks, describe various methods used by attackers and how these attacks work, and highlight key steps needed to safeguard data and systems in order to mitigate risks facing organizations of all sizes.

Date: 2022-08-29 Start Time: End Time:

Learning Objectives

Understand the Cyber Threat Landscape
• Identify and Understand Social Engineering Techniques
• Understand the Types of Human Error That Can Place an Organization at Risk

Understand Regulatory Risks Associated With Data Breach
• Federal Law Reporting Requirements
• State Law Reporting Requirements
• Regulatory Enforcement Background

Understand Effective Measures That Can Be Taken to Mitigate the Effect of Human Error and Social Engineering Attacks
• Training and Awareness Best Practices
• Technology Best Practices

IAAP ,Additional credit may be available upon request. Contact Lorman at 866-352-9540 for further information.

Alaap B. Shah, J.D., MPH-Epstein Becker & Green, P.C.