This training program will prepare your organization to understand the need for data security, the steps that can be taken to institute or augment your data security policies/procedures, and the implementation of the needed controls. This webinar will introduce attendees to a set of known and respected data security standards that can be employed by your organization to improve your security. Attendees will walk away with ideas to leverage the curriculum with their existing security infrastructure.
Federal, state and local jurisdictions have taken notice of the potential negative effect caused by the loss of data on individuals and companies. In some cases, legislation has passed requiring companies that have been compromised to notify all effected individuals and entities.
This webinar targets recommended DOs that your organization should consider when implementing or augmenting data security and privacy policies, procedures and controls. It will also discuss some definite DON’Ts of information security. Both electronic and physical issues will be addressed; data security best practices will also be discussed. The program will provide a list of data security standards that your organization can review and use as a guide when developing your organization’s data security program.
Why Should You Attend:
Information security and data privacy have become an important area for all enterprises. All organizations have sensitive data that requires protection. This data may be proprietary or private company data, product data, employee data, customer data or any data considered sensitive by your organization. In the face of data loss or compromise, potential liability for all organizations is significant. Taking steps to protect data has become mandatory for all businesses and governmental entities.Federal, state and local jurisdictions have taken notice of the potential negative effect caused by the loss of data on individuals and companies. In some cases, legislation has passed requiring companies that have been compromised to notify all effected individuals and entities.
This webinar targets recommended DOs that your organization should consider when implementing or augmenting data security and privacy policies, procedures and controls. It will also discuss some definite DON’Ts of information security. Both electronic and physical issues will be addressed; data security best practices will also be discussed. The program will provide a list of data security standards that your organization can review and use as a guide when developing your organization’s data security program.
Areas Covered in the Webinar:
- Policies, procedures and controls that govern information security and data privacy
- Monitoring security controls continuously
- Safety and security of networks
- Security of sensitive information
- Authentication
- Use of company resources
- Controls to limit the effect of social engineering
- Software development life cycle
- Production support
- Incident reporting as part of a BRP
- Disciplinary actions
- Data security standards that your organization may want to consult
Who Will Benefit:
- Executives
- Compliance Management
- Risk Management
- Vendor Management
- Data Security
- Network Administration
- Data Base Administration
- Software Development and Quality Assurance
- Retail Business Ownership
Course Provider
Marc Perl,