Information Risk Management: Strategies for Preventing and Mitigating Information Security Breaches
||Online Training Course
Stolen laptops, misplaced USB drives, network infiltration by hackers or viruses, crippling denial-of-service attacks—the threats to an organization’s sensitive data are many and continue to grow, even as more and more sensitive data and personally identifying information are maintained and transmitted electronically. The costs associated with information security breaches continue to grow also, partly because of increasingly stringent regulations that hold organizations financially responsible when they fail to secure their sensitive information.
So how should organizations respond to these threats? With a comprehensive, coordinated plan that employs both physical and electronic measures designed to keep sensitive data and personally identifying information out of the hands of cyber criminals and identity thieves.
This course details the extent and potential costs of the information security problem, describes the key components of a well designed information security plan, and outlines strategies that can go a long way toward protecting one of an organization’s most valuable assets—its information.
Managers, Supervisors, and Leaders of Businesses and Organizations
TIME TO COMPLETE
100 - 110 minutes
To describe the risks associated with maintaining and transmitting sensitive data and personally identifying information, and to instruct leaders of businesses and organizations in developing strategies for mitigating these risks.
After completing this course, the learner will be able to:
- distinguish between first- and third-party information risks;
- recognize various types of first- and third-party information risks;
- define the scope of the threat that information security breaches pose to organizations, based on current statistics;
- interpret the major provisions of federal and state laws governing organizations' responsibilities for securing sensitive data and personally identifying information in their possession;
- define the elements of effective risk management procedures;
- develop and implement an appropriate information security policy for an organization;
- identify the threats to information network security and the tools needed to secure networks against security breaches; and
- develop a Computer Security Incident Response Plan and strategies for managing the risks associated with maintaining and transmitting sensitive data and personally identifying information.
- An Overview of Information Risk
- Statistics on Information Security Breaches
- Federal and State Regulations Governing Information Security
- Essential Risk Management Procedures
- Drafting an Information Security Policy
- Procedures for Properly Disposing of Sensitive Information
- Securing Networks against Information Security Breaches
- Responding to Information Security Breaches
This program has been approved for 1.75 recertification credit hour toward PHR, SPHR, and GPHR recertification through the HR Certification Institute. For more information about certification or recertification, visit the HR Certification Institute homepage at www.hrci.org.
(The use of this seal is not an endorsement by the HR Certification Institute of the quality of this program. It means that this program has met the HR Certification Institute's criteria to be pre-approved for recertification credit.)
SOCIETY FOR HUMAN RESOURCE MANAGEMENT
The Human Equation is recognized by SHRM to offer Professional Development Credits (PDCs) for the SHRM-CPSM or SHRM-SCPSM. This program is valid for 1.75 PDCs for the SHRM-CP or SHRM-SCP. For more information about certification or recertification, please visit www.shrmcertification.org.
|Licenses / Designations / Educational Credits:||PHR / SPHR Re-Certification Credits|
All US States: 1.75
|About The Provider:
||Founded in 1997 by a group of risk management, insurance, and human resources professionals, The Human Equation offers knowledge, training, coaching, and research support on human resources and risk management in both traditional and web-based environments.
Our high-quality e-Learning materials deliver real-world and cost-effective instruction that result in improved employee productivity and reduced employer risk.
The Human Equation's mission is to significantly improve business performance for organizations of all sizes by promoting a fundamental awareness of, and learning solutions for, operational and employment risks.
The Human Equation's products and services portfolio includes a variety of learning solutions that include web-based training courses, labor consulting and coaching helplines, a research repository of news, forms, documents and policies, and an Employee Report Line that manages employee grievances.
Each of our courses are legally reviewed, certified by the American Society for Training & Development (ASTD) for excellence in instruction and design, and accredited by The Human Resources Certification Institute (HRCI) for re-certification credit hours toward PHR and SPHR recertification.
|Applicable Discounts:||Required Volume||Discount||Price|
| ||Qty: 10||$0.95||$8.55|
| ||Qty: 25||$1.43||$8.08|
| ||Qty: 50||$1.90||$7.60|
| ||Qty: 100||$2.38||$7.13|
| ||Qty: 250||$2.85||$6.65|
| ||Qty: 500||$3.33||$6.18|
| ||Qty: 750||$3.80||$5.70|
||Contact Us For More Information
||Share on Facebook
Share on Twitter
Share on Google+
|Keywords For This Course:|
Information Risk Management: Strategies for Preventing and Mitigating Information Security Breaches, Online Training Format. The Human Equation, Information security, network security, information risk management, identity theft, Hitech Act, cyber crime, computer system security, privacy, online security, online, training, HRCI
How To Keep HR From Being The Employee Complaint Department
Rules And Requirements For Employee Expense Reimbursements
Garnishments, Child Support Orders, And Other Levies
Internal Investigations Certificate Program
Dress Code Policy Do′s and Don′ts
How To Deal With Employees Who Are Chronically Late Or Absent
Certificate Program In FMLA &ADA Compliance
Reasonable Or Unreasonable Accommodation? How To Identify Disabilities And Handle Employee Issues - Without Violating The ADA
Certificate Program For HR Generalists
Assertiveness Skills For HR Professionals
HRCI / SHRM 60 Hour Re-Certification Training Suite
IRS Rules For Travel Pay
Dealing with Difficult People
9 Ways To Spot, Handle, and Reduce Workers′ Comp Fraud
How To Use PTO To Reduce Absenteeism