Data Security For HR: Honey Pots, Spear Phishing, Whale Phishing And More: How To Work Collaboratively With IT To Prevent Hack Attacks
|Date / Time:
Data security breaches can expose organizations to massive financial and legal liabilities. Analysis of past breaches tell us that on average incidents can cost an organization $150 to $200 per lost record.
Recent headlines concerning breaches at Target, Sony Pictures, Hyatt Hotels, and restaurant chain owner Landry’s Inc., underscore that breaches of employees’ confidential information and other sensitive data can happen at any time, to any organization.
Cybersecurity efforts tend to take a technical approach, rather than focusing on user behavior. Thus, today’s cyber attacker is much more likely to direct attacks against the computer user, because “we” are increasingly the weak link in the security chain.
HR must assume the increasingly critical role as front line defender against cyber attacks. Without the awareness programs, training and policy implementation that HR provides, an organization cannot hope to mount more than a feeble cyber defense.
Join us as attorney and certified ethical hacker Daniel Nielson is joined by CompTIA Security+ and Microsoft Certified Solutions Expert (MCSE) engineer Jim Taylor to discuss HR’s role in partnering with IT to protecting your company’s confidential and sensitive data.
This insightful event will provide a comprehensive overview of the data security threats your workplace faces right now, suggest needed responses including training, and documentation best practices, plus cover your compliance obligations, and the severe and costly penalties you could face if a data breach occurs.
About Your Presenters
- Social engineering principles IT should discuss with HR (and vice versa)
- The difference between “spear phishing” and “Whale phishing” and practical pointers on how to protect your organization against both
- Your organization’s responsibility to protect privacy personal information (PII), and other information, such as payment card industry (PCI) data, and Health Insurance Portability and Accountability Act (HIPPA) information
- How IT and HR can work together to develop a “honey pot” to evaluate where user security vulnerabilities lie for your organization
- Pointers on how to vet subcontractors and temps working for your organization before giving them access to company computer systems
- Why the CEO, CFO, CTO and other employees are so attractive to hackers and practical strategies for preventing disastrous phishing schemes involving these employees
- Intrusion protection system best practices, including verification protocols for emails, digital signatures, and more
- And much more!
Daniel C. Nelson, Esq., C|EH (Certified Ethical Hacker)
Partner/Co-Chair Privacy and Data Security Practice
Daniel Nelson, a partner and co-chair of Armstrong Teasdale’s Privacy and Data Security practice, is a Certified Ethical Hacker (C|EH) through the International Council of E-Commerce Consultants (EC Council). He previously became a Certified Information Privacy Professional (CIPP/US) through the International Association of Privacy Professionals (IAPP) and is a seasoned practitioner in the areas of U.S. data protection laws, key privacy terminology, and practical concepts concerning the protection of personal data and trans-border data flows. He regularly counsels clients about security flaws and techniques to protect their data.
Green House Data
Jim Taylor has three decades of IT experience, including eight years as a
Systems Engineer and working in United States Air Force Network Operations Security Center also previously serving as Chief of Information Systems Branch in the United States Air Force. His certifications include CompTIA Security+ Microsoft Certified Solutions Expert (MCSE) and VMware Certified Professional 5.5. He is also a gadget geek and occasionally teaches at the local community college.
|About Webcasts / Audio Conferences / Podcasts:|
Webcasts, audio conferences, and podcasts are presentations that you
attend via the Internet, phone, or mobile device at a specified date and time for "live" versions, or at your convenience for "recorded" and "On-Demand" versions.
versions are interactive, meaning that participants can ask questions in real time, plus are a very cost-effective form of training because 1) you receive fast, convenient learning without
any out-of-office time; 2) you can invite as many colleagues as you'd like to listen in on a single phone line; 3) you incur no travel expenses; and 4) you and your colleagues are back
at work immediately after the session ends!
And though with recorded versions you do lose the ability to ask questions, you gain the ability to hear the presentation numerous
times and to share it with others in your office.
Handout materials and the phone number for live presentations are made available to you prior to the event via email from the
presenter and from the "MyAccount" link on the menu bar. Copies of the presentations are included with recorded versions.
|Licenses / Designations / Educational Credits:||PHR / SPHR Re-Certification Credits|
All US States: 1
|About The Provider:
||BLR® is the leader in helping organizations, and their employees, reduce safety, environmental and employment compliance-related legal exposure, stay on the right side of law, and achieve their full potential. We offer best-in-class compliance product and services that includes news, information & analysis, best practice guidance, employee training and turn-key tools delivered in a wide range of formats from online applications, live events and websites to books, CD's, Video, Posters and newsletters geared to all sized organizations and industries.
||Contact Us For More Information
||Share on Facebook
Share on Twitter
Share on Google+
|Keywords For This Course:|
Data security, IT, phishing
The 7 Traits Of A Successful HR Manager
Disability Discrimination And The Interactive Process
Certificate Program For HR Generalists
How To Keep HR From Being The Employee Complaint Department
HR′s Strategic Role In Team Building
21 Tips For Managing Employees Who Work Remotely
Multi-State Payroll Tax Compliance
HR For Beginners
Inclement Weather Pay Policies
Is It FMLA Or The “Friday-Monday Leave Act”? How To Identify And Investigate Employees Who Are Gaming The System
Internal Investigations Certificate Program
Certificate Program In FMLA &ADA Compliance
Curbing Unauthorized Overtime
Retirement Plan Training Courses
Best Practices For Employee Giving Programs
Fundamentals Of An Employee Recognition Program