Directors’ Role & Responsibilities When a Data Breach Occurs
Webinar OR Recorded Webinar + Free Digital Download
Tuesday, February 13, 2018
This is a morning webinar.
8:00 am – 9:30 am Pacific
9:00 am – 10:30 am Mountain
10:00 am – 11:30 am Central
11:00 am – 12:30 pm Eastern
Cybersecurity risk continues to rapidly evolve. New data breaches are publicized weekly. A core component of cybersecurity risk management is a well-thought-out incident response program. Directors’ responsibilities include staying abreast of the changing risk environment, while providing governance and oversight of the risk management program. This session will summarize the latest information on cybersecurity risks and provide guidance to directors to positively impact the incident response program.
- Controls to combat email phishing campaigns
- Circumstances that can lead to ransomware infection
- Key control elements necessary to mitigate the risk of a breach
- Elements of an incident response program
- Case studies from actual breach situations
- TAKE-AWAY TOOLKIT
- Examples of cybersecurity incident response tabletop exercise
- Resources and examples to build an incident response program policy
- Sample tabletop exercises for incident response program testing
- Employee training log
- Quiz you can administer to measure staff learning and a separate answer key
Attendance verification for CE credits provided upon request.
WHO SHOULD ATTEND?
This informative session is designed for staff responsible for management and oversight of internal audit, IT audit, risk management, and operational management and security.
Please note: The live webinar option allows you to have one telephone connection for the audio portion and one Internet connection (from a single computer terminal) to view online visuals as the presentation is delivered. You may have as many people as you like listen from your office speaker phone.
ABOUT THE PRESENTER – Randall J. Romes, CISSP, CRISC, MCP, CliftonLarsonAllen LLP
Randy Romes has been a consultant at CliftonLarsonAllen since 1999 and brings a strong background in computer technology, physics, and education. As a Principal in the Information Security Services Group, Randy leads a team of technology and industry specialists and is responsible for the continuing development of the open-source, Unix, and Windows applications used in security audits.
Randy has been involved in developing numerous leading-edge hacking/testing methods and security service offerings. A featured speaker at national information and security management conferences, Randy holds multiple certifications, a Master’s in Educational Technology from the University of Saint Thomas, and a Bachelor’s in Education from the University of Wisconsin – Madison. In addition, he is an instructor at the Graduate School of Banking at the University of Colorado in Boulder.
THREE REGISTRATION OPTIONS
Note: All materials are subject to copyright. Transmission, retransmission, or republishing this webinar to other institutions or those not employed by your financial institution is prohibited. Print materials may be copied for eligible participants only.
1. LIVE WEBINAR
The live webinar option allows you to have one internet connection from a single computer terminal. You may have as many people as you like listen and watch from your office computer. Registrants receive a website address and passcode that allows entrance to the seminar. The session will be approximately 90 minutes, including question and answer sessions. Seminar materials, including instructions, passcode, and handouts will be emailed prior to the broadcast. You will need the most-current version of Adobe Reader available free at www.adobe.com.
2. RECORDED WEBINAR + FREE DIGITAL DOWNLOAD
Can’t attend the live webinar? This option provides a recording of the live event, including audio, visuals, and handouts. We even provide the presenter’s email address for follow-up questions. You will receive an email with the recorded webinar link, which can be viewed anytime 24/7, beginning 6 business days after the webinar. You will also receive instruction on how to download a free digital copy of the webinar to your PC, which you may keep and use indefinitely.
The recorded webinar may ONLY be ordered for 6 months following the live webinar. In addition, the download must be completed within 6 months of the live webinar date.
3. BOTH LIVE WEBINAR & RECORDED WEBINAR + FREE DIGITAL DOWNLOAD
Options 1 and 2 described above.
AFFORDABLE, PROFESSIONAL TRAINING, WHEN AND WHERE YOU CHOOSE