HRTrainingCenter.com provides Human Resource training on FMLA, COBRA, HIPAA, HRAs (Health Reimbursement Accounts), HSAs (Health Savings Accounts), FLSA, Payroll, Cafeteria Plans, and more through seminars, online training, webcasts, webinars, and audio conferences. Best sellers include FMLA seminars, COBRA seminars, online payroll training, retirement plan training, and HIPAA training.
Course/Product Description
Title:

Data Security For HR: Honey Pots, Spear Phishing, Whale Phishing And More: How To Work Collaboratively With IT To Prevent Hack Attacks

SKU:WC-1020322
Date / Time: Recorded
Format: Webcast
Description:

Data security breaches can expose organizations to massive financial and legal liabilities. Analysis of past breaches tell us that on average incidents can cost an organization $150 to $200 per lost record.

Recent headlines concerning breaches at Target, Sony Pictures, Hyatt Hotels, and restaurant chain owner Landry’s Inc., underscore that breaches of employees’ confidential information and other sensitive data can happen at any time, to any organization.

Cybersecurity efforts tend to take a technical approach, rather than focusing on user behavior. Thus, today’s cyber attacker is much more likely to direct attacks against the computer user, because “we” are increasingly the weak link in the security chain.

HR must assume the increasingly critical role as front line defender against cyber attacks. Without the awareness programs, training and policy implementation that HR provides, an organization cannot hope to mount more than a feeble cyber defense.

Join us as attorney and certified ethical hacker Daniel Nielson is joined by CompTIA Security+ and Microsoft Certified Solutions Expert (MCSE) engineer Jim Taylor to discuss HR’s role in partnering with IT to protecting your company’s confidential and sensitive data.

This insightful event will provide a comprehensive overview of the data security threats your workplace faces right now, suggest needed responses including training, and documentation best practices, plus cover your compliance obligations, and the severe and costly penalties you could face if a data breach occurs.

Learning Objectives

  • Social engineering principles IT should discuss with HR (and vice versa)
  • The difference between “spear phishing” and “Whale phishing” and practical pointers on how to protect your organization against both
  • Your organization’s responsibility to protect privacy personal information (PII), and other information, such as payment card industry (PCI) data, and Health Insurance Portability and Accountability Act (HIPPA) information
  • How IT and HR can work together to develop a “honey pot” to evaluate where user security vulnerabilities lie for your organization
  • Pointers on how to vet subcontractors and temps working for your organization before giving them access to company computer systems
  • Why the CEO, CFO, CTO and other employees are so attractive to hackers and practical strategies for preventing disastrous phishing schemes involving these employees
  • Intrusion protection system best practices, including verification protocols for emails, digital signatures, and more
  • And much more!
About Your Presenters

Daniel C. Nelson, Esq., C|EH (Certified Ethical Hacker)
Partner/Co-Chair Privacy and Data Security Practice
Armstrong Teasdale

Daniel Nelson, a partner and co-chair of Armstrong Teasdale’s Privacy and Data Security practice, is a Certified Ethical Hacker (C|EH) through the International Council of E-Commerce Consultants (EC Council). He previously became a Certified Information Privacy Professional (CIPP/US) through the International Association of Privacy Professionals (IAPP) and is a seasoned practitioner in the areas of U.S. data protection laws, key privacy terminology, and practical concepts concerning the protection of personal data and trans-border data flows. He regularly counsels clients about security flaws and techniques to protect their data.

Jim Taylor
Systems Engineer
Green House Data

Jim Taylor has three decades of IT experience, including eight years as a
Systems Engineer and working in United States Air Force Network Operations Security Center also previously serving as Chief of Information Systems Branch in the United States Air Force. His certifications include CompTIA Security+ Microsoft Certified Solutions Expert (MCSE) and VMware Certified Professional 5.5. He is also a gadget geek and occasionally teaches at the local community college.

About Webcasts / Audio Conferences / Podcasts:

Webcasts, audio conferences, and podcasts are presentations that you attend via the Internet, phone, or mobile device at a specified date and time for "live" versions, or at your convenience for "recorded" and "On-Demand" versions.

The live versions are interactive, meaning that participants can ask questions in real time, plus are a very cost-effective form of training because 1) you receive fast, convenient learning without any out-of-office time; 2) you can invite as many colleagues as you'd like to listen in on a single phone line; 3) you incur no travel expenses; and 4) you and your colleagues are back at work immediately after the session ends!

And though with recorded versions you do lose the ability to ask questions, you gain the ability to hear the presentation numerous times and to share it with others in your office.

Handout materials and the phone number for live presentations are made available to you prior to the event via email from the presenter and from the "MyAccount" link on the menu bar. Copies of the presentations are included with recorded versions.

Licenses / Designations / Educational Credits:PHR / SPHR Re-Certification Credits
All US States: 1
About The Provider: BLR® is the leader in helping organizations, and their employees, reduce safety, environmental and employment compliance-related legal exposure, stay on the right side of law, and achieve their full potential. We offer best-in-class compliance product and services that includes news, information & analysis, best practice guidance, employee training and turn-key tools delivered in a wide range of formats from online applications, live events and websites to books, CD's, Video, Posters and newsletters geared to all sized organizations and industries.
More Info: Contact Us For More Information
Share This: Share on Facebook


Share on Twitter


Share on Google+


Keywords For This Course:

Data security, IT, phishing

Workplace Investigations 101: The Basics For Conducting Workplace Investigations
Workplace Investigations 101: The Basics For Conducting Workplace Investigations

Employee Handbooks: 2017 Issues
Employee Handbooks: 2017 Issues

How To Change The Perception Of The HR Department
How To Change The Perception Of The HR Department

How To Communicate Assertively To Exude Confidence And Competence
How To Communicate Assertively To Exude Confidence And Competence

Year End Legislative &Tax Changes In Payroll
Year End Legislative &Tax Changes In Payroll

Payroll Records: What To Keep, What To Toss
Payroll Records: What To Keep, What To Toss

PTO Plan Or Traditional Vacation And Sick Time? The Pros and Cons Of A Paid-Time-Off Plan
PTO Plan Or Traditional Vacation And Sick Time? The Pros and Cons Of A Paid-Time-Off Plan

Motivate Or Terminate
Motivate Or Terminate

Certificate Program For HR Generalists
Certificate Program For HR Generalists

 Agile Basics For HR
Agile Basics For HR

Internal Investigations Certificate Program
Internal Investigations Certificate Program

Certificate Program In FMLA &ADA Compliance
Certificate Program In FMLA &ADA Compliance

The Essentials Of HR Law
The Essentials Of HR Law

FMLA Training &Certification Program
FMLA Training &Certification Program

Certified Payroll Manager
Certified Payroll Manager

Fundamentals Of Form W-2 &Form W-4 Processing
Fundamentals Of Form W-2 &Form W-4 Processing

Google+HRTrainingCenter.com. 5755 North Point Parkway, Suite 228 | Alpharetta, GA 30022 | 770-410-1219 | support@HRTrainingCenter.com
Copyright HRTrainingCenter.com 2016 | Web Site Development by OTAU
Facebook