Managing Shadow IT Threats: A Tactical Game Plan For Guarding Against Damaging Data Breaches
|Date / Time:
Recently, there have been many news stories about damaging data breaches, and the hefty legal fines imposed on those involved. Breaches can harm a company’s reputation and create huge financial burdens. Many breaches can be blamed on the rise of “shadow IT,” or unauthorized software installed by employees on company equipment. Sensitive or proprietary company data is vulnerable and you may not even know there’s a problem.
How do you protect against such data breaches within your organization? Training and implementing proper security protections are essential. Unfortunately, employees who have access to intellectual property (IP) that is vital to the company may have no idea that they have put it at risk. Often data breaches result from carelessness or ignorance on the part of employees.
Depending on how your organization uses cloud hosting applications, you may also need to examine not only how secure your IP is but also what problems could result from a breach.
Join us for an in-depth webinar when Daniel C. Nelson, a data privacy and security attorney and certified ethical hacker, and Nick Hogg, a technical training director for a leading global cybersecurity company, will deliver valuable insights on the dangers of shadow IT breaches, and what you can do to guard against the threats you face.
About Your Presenters
- What shadow IT is and why employees don’t realize the danger
- How shadow IT works, and the real risks it poses to your company
- How to train employees on handling company data so you can better protect your company’s intellectual property
- IT security steps to immediately take to prevent shadow IT risks
- Legal ramifications your organization could face in the event of a breach
- What not to do, as illustrated through case studies revealing the types of mistakes to avoid
- And much more!
Daniel C. Nelson, Esq.
Partner, Co- Chair, Data Security & Privacy Practice Group
Daniel Nelson is among the few U.S. attorneys to hold the title of Certified Ethical Hacker (C|EH), which means he has been trained to break into computers, but for the right reasons. His combined interest in technology and the desire to help clients protect their privacy and sensitive data motivated him to take the unusual step of becoming what’s known as a “white hat” hacker. In addition to his ethical hacking credential, Mr. Nelson is a Certified Information Privacy Professional (CIPP/US). This credential means that he knows privacy laws and regulations and how to apply them.
Mr. Nelson’s special training and experience enhances his ability to help clients protect against and prepare for data breaches and other cybersecurity incidents. He assists clients in the creation, implementation and enforcement of privacy and security policies and data breach plans. This guidance includes counseling on appropriate cybersecurity insurance coverage and risk assessment engagements. He also assists businesses with understanding their duties to retain and protect sensitive information, including privacy and document retention requirements. In the event of a cyberattack, Mr. Nelson serves as a data breach and cyber incident coach. His knowledge of both the technical details of likely breaches and the attendant legal and business impacts enables him to provide clients the information needed from both a technical and legal standpoint.
Mr. Nelson also represents plaintiffs and defendants in commercial cases and has tried some 40 cases to verdict in both state and federal courts. In recognition of his achievements, The Best Lawyers in America named him “St. Louis Lawyer of the Year” for real estate litigation, as well as listed for commercial litigation.
Director of Technical Education
Nick Hogg is Director of Technical Training at Clearswift, a leading global cybersecurity company that helps organizations protect their critical information. An international expert in defense and security systems training, Mr. Hogg has over 19 years’ experience designing and delivering advanced enablement programs for organizations ranging from the world’s most sophisticated cybersecurity teams and Royal Navy to the British Airways cabin crew. Prior to joining Clearswift, Mr. Hogg held previous technical instructor roles with IBM, Tata Interactive Systems and Leonardo, and has degrees from the UK’s top universities in Aerospace Engineering and Information Technology Systems.
|About Webcasts / Audio Conferences / Podcasts:|
Webcasts, audio conferences, and podcasts are presentations that you
attend via the Internet, phone, or mobile device at a specified date and time for "live" versions, or at your convenience for "recorded" and "On-Demand" versions.
versions are interactive, meaning that participants can ask questions in real time, plus are a very cost-effective form of training because 1) you receive fast, convenient learning without
any out-of-office time; 2) you can invite as many colleagues as you'd like to listen in on a single phone line; 3) you incur no travel expenses; and 4) you and your colleagues are back
at work immediately after the session ends!
And though with recorded versions you do lose the ability to ask questions, you gain the ability to hear the presentation numerous
times and to share it with others in your office.
Handout materials and the phone number for live presentations are made available to you prior to the event via email from the
presenter and from the "MyAccount" link on the menu bar. Copies of the presentations are included with recorded versions.
|Licenses / Designations / Educational Credits:||PHR / SPHR Re-Certification Credits|
All US States: 1
|About The Provider:
||BLR® is the leader in helping organizations, and their employees, reduce safety, environmental and employment compliance-related legal exposure, stay on the right side of law, and achieve their full potential. We offer best-in-class compliance product and services that includes news, information & analysis, best practice guidance, employee training and turn-key tools delivered in a wide range of formats from online applications, live events and websites to books, CD's, Video, Posters and newsletters geared to all sized organizations and industries.
||Contact Us For More Information
||Share on Facebook
Share on Twitter
Share on Google+
|Keywords For This Course:|
IT, data breaches, HR management
How To Keep HR From Being The Employee Complaint Department
Rules And Requirements For Employee Expense Reimbursements
Garnishments, Child Support Orders, And Other Levies
Internal Investigations Certificate Program
Dress Code Policy Do′s and Don′ts
How To Deal With Employees Who Are Chronically Late Or Absent
Certificate Program In FMLA &ADA Compliance
Reasonable Or Unreasonable Accommodation? How To Identify Disabilities And Handle Employee Issues - Without Violating The ADA
Certificate Program For HR Generalists
Assertiveness Skills For HR Professionals
HRCI / SHRM 60 Hour Re-Certification Training Suite
IRS Rules For Travel Pay
Dealing with Difficult People
9 Ways To Spot, Handle, and Reduce Workers′ Comp Fraud
How To Use PTO To Reduce Absenteeism