Course Description
Data security breaches can expose organizations to massive financial and legal liabilities. Analysis of past breaches tell us that on average incidents can cost an organization $150 to $200 per lost record.
Recent headlines concerning breaches at Target, Sony Pictures, Hyatt Hotels, and restaurant chain owner Landry’s Inc., underscore that breaches of employees’ confidential information and other sensitive data can happen at any time, to any organization.
Cybersecurity efforts tend to take a technical approach, rather than focusing on user behavior. Thus, today’s cyber attacker is much more likely to direct attacks against the computer user, because “we” are increasingly the weak link in the security chain.
HR must assume the increasingly critical role as front line defender against cyber attacks. Without the awareness programs, training and policy implementation that HR provides, an organization cannot hope to mount more than a feeble cyber defense.
Join us as attorney and certified ethical hacker Daniel Nielson is joined by CompTIA Security+ and Microsoft Certified Solutions Expert (MCSE) engineer Jim Taylor to discuss HR’s role in partnering with IT to protecting your company’s confidential and sensitive data.
This insightful event will provide a comprehensive overview of the data security threats your workplace faces right now, suggest needed responses including training, and documentation best practices, plus cover your compliance obligations, and the severe and costly penalties you could face if a data breach occurs.
Learning Objectives- Social engineering principles IT should discuss with HR (and vice versa)
- The difference between “spear phishing” and “Whale phishing” and practical pointers on how to protect your organization against both
- Your organization’s responsibility to protect privacy personal information (PII), and other information, such as payment card industry (PCI) data, and Health Insurance Portability and Accountability Act (HIPPA) information
- How IT and HR can work together to develop a “honey pot” to evaluate where user security vulnerabilities lie for your organization
- Pointers on how to vet subcontractors and temps working for your organization before giving them access to company computer systems
- Why the CEO, CFO, CTO and other employees are so attractive to hackers and practical strategies for preventing disastrous phishing schemes involving these employees
- Intrusion protection system best practices, including verification protocols for emails, digital signatures, and more
- And much more!
About Your PresentersDaniel C. Nelson, Esq., C|EH (Certified Ethical Hacker)
Partner/Co-Chair Privacy and Data Security Practice
Armstrong Teasdale
Daniel Nelson, a partner and co-chair of Armstrong Teasdale’s Privacy and Data Security practice, is a Certified Ethical Hacker (C|EH) through the International Council of E-Commerce Consultants (EC Council). He previously became a Certified Information Privacy Professional (CIPP/US) through the International Association of Privacy Professionals (IAPP) and is a seasoned practitioner in the areas of U.S. data protection laws, key privacy terminology, and practical concepts concerning the protection of personal data and trans-border data flows. He regularly counsels clients about security flaws and techniques to protect their data.
Jim Taylor
Systems Engineer
Green House Data
Jim Taylor has three decades of IT experience, including eight years as a
Systems Engineer and working in United States Air Force Network Operations Security Center also previously serving as Chief of Information Systems Branch in the United States Air Force. His certifications include CompTIA Security+ Microsoft Certified Solutions Expert (MCSE) and VMware Certified Professional 5.5. He is also a gadget geek and occasionally teaches at the local community college.