Menu

K2's 2024 Ripped From The Headlines - Lessons From Interesting Tech Crimes

Overview

Hacks, attacks, ransomware, malware – where does it end? Unfortunately, tech crimes continue to plague businesses of all sizes. Participate in this session to learn how you can reduce the risk of becoming yet another victim.

Prerequisites

Fundamental understanding of business-related technology

Objectives

  • List at least three major security incidents reported in the headlines in the last year, and explain at least one internal control design or operation flaw that allowed the hack to occur
  • Select the correct definitions for security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
  • List at least three best practices learned by reviewing the control failures cited in the case studies

Highlights

  • Common security weaknesses that occur with hardware and software at home and in the office
  • Malware, ransomware, data breach, and incident response tips
  • Internal control failures which result in the theft of assets or unauthorized manipulation of data

Register Now

Materials are generally available 3 days in advance of an event. Once you have downloaded the manual, we are unable to cancel your registration.

Event Code:

6024744

2 CPE Credits
Information technology: 2 Credits

Registration

Member Price:
$79
Non-member Price:
$109

Registration is open through 06/05.

Wednesday, June 5th

4:00pm to 6:00pm

Add to Calendar

Instructor

Thomas Stephens