Corporate Compliance Seminars - Left Menu, General Pages
Cybersecurity Technical Excellence - Risk Management Options
"How can we implement a holistic approach to cybersecurity?"
"What methodologies, policies, technologies, and specific tools can we deploy to prevent, detect and monitor cybersecurity threats"?
"How can we build a more effective program?"
As more data breaches are disclosed, cybersecurity is at the forefront of Boards, executives, employees and consumers. Breaches are a continuing threat to an organization's reputation through the disclosure of intellectual property and non-public, confidential information. Organizations must remain vigilant in their attempt to prevent a cyberattack and minimize the damage once it occurs. We must raise the awareness of threats and harden our defenses.
As attacks develop, so do awareness and defensive tools. To help you be more proactive in maturing your cybersecurity program we have created this training academy on the best tips or applications to improve cybersecurity at your business.
This training program focuses on the policies and software tools needed in a the effective modern cybersecurity risk management program.
We have divide the program into the following tool groups:
. Hardware security
. Data encryption at rest
. Around-the-clock monitoring
. Cybersecurity education
. User Access
. Phishing threats
. Two-factor authentication
. Intrusion detection systems
. System & Application Items
. Insider threat protection
This comprehensive training course is for anyone who wants to have a strong base of knowledge and understanding of the essentials of cybersecurity risk management. We cover an overview of ten principles that need to be considered within a Cybersecurity Risk Management Program in a short video available on YouTube. Here is a link to it:
Cybersecurity Risk Management Principles
This timely, three-day CPE training seminar is designed for the project director, project leader and individuals who have to create effective set of cybersecurity program tools and the related documents.
Follow the below links for further detail information:
. Seminar Highlights
. Learning Objectives
. Key Issues on the Agenda
Each attendee will receive 24 CPE Hours. A certificate of completion will be provided.
The retail cost of this CPE seminar is $2,275.00 for the first attendee from a single organization. Discounts are available for more than one attendee from each organization: (2) $4,390.00 (3) $6,585.00 (4) $8,780.00 (5) $10,975.00.
To reserve your space, click on the "SIGN-UP NOW!" link in the right margin, complete the registration form, and use the corresponding "Submit Registration Form and Move to Payment Options Page" button for filing the registration and moving to the payment page.
Our instructors are experts in risk management, auditing, corporate accounting, executive management, information technology and CPA firm operations. Our goal is to provide expert advice on COSO ERM, COSO, FDICIA, COBIT, NIST, ITIL, CMMI, FCPA, PCAOB standards, AICPA standards and cyber risk management.
Course Duration: 3 Days; CPE Credits: 24; Knowledge Level: Advanced; Field of Study: Information Technology, Risk Assessment, Audit; Delivery Format: Group-Live Presentation; Prerequisites: None; Advance Preparation: None.
Upcoming Cybersecurity Technical Excellence events:
Day - Date
Timing - Location
Denver - Downtown, CO
|Wednesday-Friday, August 28-30, 2019
||Wed. & Thurs. 9:00a to 4:45p - Fri. 9:00a to 2:45p
|Denver - Downtown - Spaces: 2301 Blake Street, Denver, Colorado, 80205
Refer to our Seminar Cities Index for a list of our seminar locations. The individual city
pages provide a listing of topics being presented. Our Seminar Cities by Week provides a
guide to the locations during a calendar week.
top of page
We created this comprehensive seminar to help you become more proactive in the maturity of your cybersecurity program.
The class is based on our experience implementing best practices from security experts in industry and agencies.
We translate the technical security and networking jargon into plain English. We discuss case studies of breaches and remediation activities.
top of page
- Attendees will understand the standard definitions and concepts associated with cybersecurity
top of page
- Attendees will identify sources of security information
- Attendees will know the major laws and regulations governing data security and privacy
- Attendees will identify popular frameworks for security risk, control and assessment
- Attendees will recognize how breaches occur and attackers gain access to our systems
- Attendees will understand the best practice tools and countermeasures for minimizing the impact of a breach
Key Issues on the Agenda
top of page
Introduction and Learning Objectives
Overview, Definitions and Concepts
Security Organizations and Material
Security and Privacy Laws and Regulations
Internal Control and Security Frameworks
Implementing a Cybersecurity Initiative
Security Risk Assessment
Strengthening the Control Environment
Security Policy Administration
Computer Communications, Networks and Firewalls
Controls and Countermeasures
The Insider Threat
The Outsider Threat
Testing the Internal Controls
NIST Security Framework
Anatomy of an Attack
AICPA Cybersecurity Risk Assessment
Securing the Physical Environment
Vendor Management and SSAE 18 SOC Audits
Personal Cyber Safety Measures
Discussion, Documentation and Summary
Experts Providing CPE Training Seminars
Corporate Compliance Seminars has been created by experts who enjoy providing CPE classroom training, workshops and consulting on internal controls, internal auditing, information technology and accounting related subjects. We have focused on SOX, COSO, PCAOB, COBIT, GRC, IFRS, AICPA, GAO and IIA Standards.
Our programs are CPE for professionals with CPA, CGA, CIA, CFE, CISA, CMA, PMP and CA designations.
Corporate Compliance Seminars presents CPE to auditors, compliance staff, engineers, and IT professionals, Boards of Directors and Audit Committees. We examine the details of risk management, Sarbanes-Oxley Act compliance, Model Audit Rule compliance, auditing, internal controls, IT security and compliance, project management, and fraud prevention and detection.
Corporate Compliance Seminars allows the attendee to earn Official NASBA CPE credit.
Our seminars focus on the details of the Institute of Internal Auditor's IPPF, Committee of Sponsoring Organizations of the Treadway Commission (COSO) Internal Control Frameworks, ISACA's Control Objectives over Information Technology (COBIT), Information Technology Infrastructure Library (ITIL), Open Compliance & Ethics Group's (OCEG) Governance, Risk & Compliance (GRC) methodology, PCAOB's Auditing Standard 5 (AS5), AICPA auditing standards, Sarbanes-Oxley Act of 2002 (SOX), NAIC Model Acts, and the future conversion from GAAP to the International Financial Reporting Standards (IFRS).
Our seminars provide CPE for the CPA, CFE, CIA, CISA, auditors and others with effective and engaging training.