Information Risk Management: Strategies for Preventing and Mitigating Information Security Breaches
||Online Training Course
Stolen laptops, misplaced USB drives, network infiltration by hackers or viruses, crippling denial-of-service attacks—the threats to an organization’s sensitive data are many and continue to grow, even as more and more sensitive data and personally identifying information are maintained and transmitted electronically. The costs associated with information security breaches continue to grow also, partly because of increasingly stringent regulations that hold organizations financially responsible when they fail to secure their sensitive information.
So how should organizations respond to these threats? With a comprehensive, coordinated plan that employs both physical and electronic measures designed to keep sensitive data and personally identifying information out of the hands of cyber criminals and identity thieves.
This course details the extent and potential costs of the information security problem, describes the key components of a well designed information security plan, and outlines strategies that can go a long way toward protecting one of an organization’s most valuable assets—its information.
After completing this course, the learner will be able to:
- Distinguish between first- and third-party information risks
- Recognize various types of first- and third-party information risks
- Define the scope of the threat that information security breaches pose to organizations, based on current statistics
- Interpret the major provisions of federal and state laws governing organizations' responsibilities for securing sensitive data and personally identifying information in their possession;
- Define the elements of effective risk management procedures
- Develop and implement an appropriate information security policy for an organization
- Identify the threats to information network security and the tools needed to secure networks against security breaches
- Develop a Computer Security Incident Response Plan and strategies for managing the risks associated with maintaining and transmitting sensitive data and personally identifying information
- An Overview of Information Risk
- Statistics on Information Security Breaches
- Federal and State Regulations Governing Information Security
- Essential Risk Management Procedures
- Drafting an Information Security Policy
- Procedures for Properly Disposing of Sensitive Information
- Securing Networks against Information Security Breaches
- Responding to Information Security Breaches
To describe the risks associated with maintaining and transmitting sensitive data and personally identifying information, and to instruct leaders of businesses and organizations in developing strategies for mitigating these risks.
Managers, Supervisors, and Leaders of Businesses and Organizations
Time To Complete: 60 minutes
PHR / SPHR Re-Certification Credits
This program has been approved for 1.0 recertification credit hour[s] toward PHR, SPHR, and GPHR recertification through the HR Certification Institute. For more information about certification or recertification, visit the HR Certification Institute homepage at www.hrci.org.
|Licenses / Designations / Educational Credits:||PHR / SPHR Re-Certification Credits|
All US States: 1
|About The Provider:
||Founded in 1997 by a group of risk management, insurance, and human resources professionals, The Human Equation offers knowledge, training, coaching, and research support on human resources and risk management in both traditional and web-based environments.
Our high-quality e-Learning materials deliver real-world and cost-effective instruction that result in improved employee productivity and reduced employer risk.
The Human Equation's mission is to significantly improve business performance for organizations of all sizes by promoting a fundamental awareness of, and learning solutions for, operational and employment risks.
The Human Equation's products and services portfolio includes a variety of learning solutions that include web-based training courses, labor consulting and coaching helplines, a research repository of news, forms, documents and policies, and an Employee Report Line that manages employee grievances.
Each of our courses are legally reviewed, certified by the American Society for Training & Development (ASTD) for excellence in instruction and design, and accredited by The Human Resources Certification Institute (HRCI) for re-certification credit hours toward PHR and SPHR recertification.
|Applicable Discounts:||Required Volume||Discount||Price|
| ||Qty: 10||$2.00||$17.96|
| ||Qty: 25||$2.99||$16.96|
| ||Qty: 50||$3.99||$15.96|
| ||Qty: 100||$4.99||$14.96|
| ||Qty: 250||$5.99||$13.97|
| ||Qty: 500||$6.98||$12.97|
| ||Qty: 750||$7.98||$11.97|
||Contact Us For More Information
||Share on Facebook
Share on Twitter
Share on Google+
|Keywords For This Course:|
Information Risk Management: Strategies for Preventing and Mitigating Information Security Breaches, Online Training Format. The Human Equation, Information security, network security, information risk management, identity theft, Hitech Act, cyber crime, computer system security, privacy, online security, online, training, HRCI
Reasonable Accommodation - Impairment
Garnishments, Child Support Orders and Other Levies
Internal Investigations Certificate Program
How To Write Clear, Concise, And Compliant Job Descriptions
How To Drive HR Strategy
How To Get Your Managers To Cooperate With HR
Background Checks And Safe Hiring: Trends, Legal Developments, And Best Practices
Personnel Records: What To Keep, What To Toss
Creative - And Free - Ways To Use LinkedIn As A Recruiting Tool
Certificate Program For HR Generalists
HR′s Guide To Medical Marijuana In The Workplace
How To Properly Complete A Form I-9
Basics Of OSHA Recordkeeping
Certificate Program In FMLA &ADA Compliance
IRS Rules For Travel Pay
IRS Rules For Work Visas