Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)



Similar documents
Course 1208: IFRS Overview for Derivatives and Hedging (2 days)

What do the income statement, the balance sheet and statement of cash flows tell us, how are they prepared and how do they interact?

Course 1602: International Oil and Gas Accounting and Financial Management - Comprehensive Workshop (5 days)

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

counter fraud centre FRAUD CENTRE CIPFA COUNTER Training, tools and ideas to shape the future of counter fraud

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER RISK SECURITY, NETWORK & PRIVACY

Cyber Essentials Scheme. Protect your business from cyber threats and gain valuable certification

THE HUMAN COMPONENT OF CYBER SECURITY

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

BT Assure Threat Intelligence

counter fraud specialist (cacfs)

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Protecting your business interests through intelligent IT security services, consultancy and training

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Cybernetic Global Intelligence. Service Information Package

Business Plan 2012/13

Protecting against cyber threats and security breaches

InfoSec Academy Pen Testing & Hacking Track

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION

EC Council Certified Ethical Hacker V8

Information Technology Security Review April 16, 2012

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Care Providers Protecting your organisation, supporting its success. Risk Management Insurance Employee Benefits Investment Management

future data and infrastructure

September 20, 2013 Senior IT Examiner Gene Lilienthal

What legal aspects are needed to address specific ICT related issues?

Top Ten Fraud Risks That Impact Your Financial Institution. Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC.

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Case Study: Hiring a licensed Security Provider

Cyber Security Evolved

Top Fraud Trends Facing Financial Institutions

Cyber security in an organization-transcending way

Committees Date: Subject: Public Report of: For Information Summary

Click to edit Master title style

Business Case. for an. Information Security Awareness Program

Technology and Cyber Resilience Benchmarking Report December 2013

Cyber Risk Management

BUSINESS CONTINUITY POLICY

A COMPLETE APPROACH TO SECURITY

THE EVOLUTION OF CYBERSECURITY

Information Security Services

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

Fraud and Abuse Policy

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

Unit 3 Cyber security

REPORT. Next steps in cyber security

Cisco Security Optimization Service

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

A practical guide to IT security

Penetration Testing Services. Demonstrate Real-World Risk

Cyber Security An Exercise in Predicting the Future

Vulnerability Assessment & Compliance

Who s Doing the Hacking?

InfoSec Academy Application & Secure Code Track

Internet Safety and Security: Strategies for Building an Internet Safety Wall

The battle to contain fraud is as old as

The Human Component of Cyber Security

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

ENSURING SECURITY IN AND FACILITATING INTERNATIONAL TRADE. Measures toward enhancing maritime cybersecurity. Submitted by Canada SUMMARY

Cyber Security Strategy

A Guide to the Cyber Essentials Scheme

A Case for Managed Security

AUTOMATED PENETRATION TESTING PRODUCTS

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Into the cybersecurity breach

A Decision Maker s Guide to Securing an IT Infrastructure

Government of Canada Cyber Security Event Management Plan (formerly GC IT Incident Management Plan)

SMALL BUSINESS REPUTATION & THE CYBER RISK

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Securing Internet Payments across Europe. Guidelines for Detecting and Preventing Fraud

U. S. Attorney Office Northern District of Texas March 2013

Physical Security Services

MANAGED SECURITY SERVICES (MSS)

Combating a new generation of cybercriminal with in-depth security monitoring

Information Security Awareness Training. Course Outline. Provides a brief orientation to the topics covered in the module.

Transcription:

Course introduction It is vital to ensure that your business is protected against the threats of fraud and cyber crime and that operational risk processes are in place. This three-day course provides an in-depth examination of fraud and cyber security. The workshop will provide an overview of the threat landscape and the importance of combatting these threats. We will outline the different vectors of fraud, cyber security and social engineering (where malicious individuals use deception or impersonation to gain access to sensitive information, financial or physical resources, e.g. through phishing emails). The course will unpick these concepts and using real-world case studies, help delegates understand the rise in these threats and what it means for organisations. We will run interactive table top exercises to educate delegates in how fraud and cyber attacks are carried out and identified, and steps that should be taken to minimise damage and prevent attacks in future. As part of this immersive workshop, delegates will take away essential advice on how to help combat the threats discussed which can be implemented within the work place. The workshop will explore: Fraud Awareness Whether it be the management of projects, implementing changes, or going to market with new or enhanced products; you need to ensure your business (be it large or small) has the appropriate knowledge and skills to support, manage and implement these with the least impact and risk to your business. At the same time, you need to ensure your business is protected from the insider threat (employee fraud). This module will explore these areas and provide you with useful tools to implement into your business. Cyber Security Cyber security is a crucial issue for all organisations. Information is the lifeblood of an organisation and as we share and store more information online, and as more of our systems rely on the Internet to run, the need to understand cyber security threats and how to mitigate against them becomes ever more important. Criminals target enterprises in all sectors and of all sizes, taking advantage of weaknesses in people, processes and technology. Motivations for these attacks vary from financial to political and the threat is internal as well as external, accidental as well as malicious. Experts now agree that it is not a case of if your organisation will be attacked, but when. With public awareness and interest in cyber security higher than ever, the reputational and financial implications of failing to detect or respond to a cyber attack are incredibly costly. Printed from http://www.iaseminars.com/ on 2 Jul 2016 Page 1 of 5

Social Engineering (deception or impersonation to gain access to sensitive information) Social engineering is a significant problem for businesses today. Because computer security is becoming more sophisticated, hackers are increasingly combining their technical expertise with social engineering skills as a means of getting what they want. Your business is only as secure as the people in it. Even where physical and technical information security controls have been implemented, employees can compromise security. Staff are the weakest link in any security programme and may fall for phishing emails, bogus telephone calls or even allow physical intrusions. This module will help equip participants with the skills to identify and deal with social engineering attempts. Topics Fraud Awareness Event horizon planning and scanning exploring the benefits; what does the threat landscape look like? Managing a fraud incident and implementing lessons learned; Combatting fraud risk problems; Are your products or businesses robust against the threat of fraud? Defining your product roadmaps and technology enhancements in the fraud prevention arena; Are your employees aware of the threats posed by fraudsters either targeting your business or individuals personally? Fraud awareness and the insider threat ; Interactive session identifying vulnerabilities, weaknesses and enablers that facilitate fraud an interactive session whereby delegates can look at areas of weakness and vulnerability; Training for Employees from senior to junior level: What does a good fraud awareness training matrix look like; Who should have what sort of training; Cyber Security An exploration of the cyber security threats, including which are most current and a look to the future The information most at risk in organisations The implications of a cyber attack or data breach on individuals and organisations, including real world case studies The most important steps to make your organisation more secure How to plan for cyber attacks and put in place measures to have the most effective and efficient response Printed from http://www.iaseminars.com/ on 2 Jul 2016 Page 2 of 5

Where to get more information and support Social Engineering Overview of social engineering How social engineering works Different types of social engineering (phishing, vishing, physical, etc.) Understanding what information is valuable to a social engineer How social engineers elicit information Indicators that you may be experiencing a social engineering attack What to do when a social engineering attack takes place Defence against social engineering Teaching method Live group instruction in a workshop format Extensive use of cyber security attacks to illustrate who commits fraud and cyber attacks, how they are committed, and how they are discovered High level of attention to individual participants Interactive participation is encouraged All participants receive a comprehensive binder containing copies of the presentation slides, handouts and other course materials. Prerequisites No advance preparation is required for this course. Course benefits Increased awareness of the fraud and cyber security landscape, including social engineering. A better understanding of how to identify when cyber and/or social engineering attacks are taking place and what to do when under attack. Participants will return to their workplace confident in the knowledge that they are better prepared to counter attempted attacks, and know how to respond to such attempts. Printed from http://www.iaseminars.com/ on 2 Jul 2016 Page 3 of 5

Who should attend? Anyone with an interest in learning how to protect themselves or their organisation against fraud, cyber security and social engineering attacks. CPE / CPD Accreditation NASBA IASeminars is registered with the US National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.learningmarket.org. Field of study: Accounting ICAEW Partner in Learning IASeminars is proud to have been named as an ICAEW Partner in Learning, working together to offer the ICAEW IFRS Certificate to our clients worldwide. ICAEW (The Institute of Chartered Accountants in England and Wales) is a world leading professional membership organisation that promotes, develops and supports over 145,000 chartered accountants worldwide. CPE certificates obtained from attending IASeminars courses are an ideal way for ICAEW members and others to demonstrate their continuing professional development, provided that the topic is relevant to their learning and development needs. New York State Board of Public Accountancy IASeminars is registered with the New York State Board of Public Accountancy as a CPE sponsor. Our CPE Sponsor ID is: 002546. This registration does not constitute an endorsement by the Board as to the quality of our CPE Program. Texas State Board of Public Accountancy IASeminars is registered with the Texas State Board of Public Accountancy as a CPE sponsor. Our CPE Sponsor ID is: 009689. This registration does not constitute an endorsement by the Board as to the quality of our CPE Program. In House To bring this course in-house please contact us and we will be pleased to assist Printed from http://www.iaseminars.com/ on 2 Jul 2016 Page 4 of 5

Printed from http://www.iaseminars.com/ on 2 Jul 2016 Page 5 of 5