Protect Your Organization from the Growing Internal Cyber Threat

Instructor: Peter Goldmann
Product ID: 704817
  • Duration: 60 Min

recorded version

1x Person - Unlimited viewing for 6 Months
(For multiple locations contact Customer Care)
Recorded Link and Ref. material will be available in My CO Section

Training CD

One CD is for usage in one location only.
(For multiple locations contact Customer Care)
CD and Ref. material will be shipped within 15 business days

Customer Care

Fax: +1-650-963-2556


Read Frequently Asked Questions

With the constant tide of data breaches and hacker threats, cybersecurity is a critical element in an organization’s policies. This training program will explore the common and not-so-common insider threats to your organization’s information security and help identify the red flags of potential or actual insider cyber crime.

Why Should You Attend:

Companies have enough to worry about from outsiders when it comes to cybersecurity. From clever hackers infiltrating their networks to criminal gangs stealing their data and government surveillance off their systems, security teams have to be on their toes at all times. But insider threat can be just as dangerous and sometimes harder to detect.

According to the 2015 Insider Threat Spotlight Report, 62 per cent of security professionals are seeing a rise in insider attacks. While many of these are malicious attacks, they can also be unintentional breaches. The consequences, no matter the motivation, can be equally devastating.

This webinar will discuss the most current and dangerous insider cybersecurity threats and outlines measures for preventing and investigating insider data theft, industrial espionage, cyber-sabotage, identity theft and more.

Learning Objectives:

  • Explore the common and not-so-common insider threats to your organization’s information security
  • Identify the most common insider cyber perpetrators
  • Understand the red flags of potential or actual insider cyber crime
  • Learn how to detect and initiate an investigation of suspected insider cyber crime

Areas Covered in the Webinar:

  • Types of insider threats and most common perpetrators
  • Red flags of internal data theft, cyber-sabotage, identity theft and espionage to watch for
  • Latest best practices in information security
  • Insider data theft investigation essentials

Who Will Benefit:

  • CPAs
  • IT managers
  • Financial services professionals
  • Senior financial executives
  • Internal auditors
  • AP managers
  • Treasury staff
  • Operations managers
  • Controllers, CFOs
  • Treasurers
  • Compliance officers
  • Security and risk managers

Instructor Profile:

Peter Goldmann has 25 years of experience as a business journalist and trainer, having launched, edited and published numerous business trade periodicals covering small business, international trade, management strategy, banking and personal finance. He is a certified fraud examiner (CFE) and a member of the Editorial Advisory Committee of the Association of Certified Fraud Examiners (ACFE) as well as an active member of the Institute of Internal Auditors, the High-Tech Crime Investigation Association, and the IOFM Controller Certification Advisory Board. He is a regular columnist for the ACFE’s newsletter and The Fraud Examiner, and is a frequent contributor to other leading industry publications on anti-fraud topics. He has appeared on Fox Business News and The Wall Street Journal This Morning, and has contributed to the The New York Times and Internal Auditor magazine.

Mr. Goldmann is president of White-Collar Crime 101 LLC, the publisher of White-Collar Crime Fighter, a widely read monthly newsletter for internal auditors, controllers, corporate counsel, financial operations managers and fraud investigators. He is the author of Fraud in the Markets: Why it Happens and How to Fight It, as well as four other anti-fraud books. Mr. Goldmann also developed FraudAware, a leading fraud awareness training program.

Follow us :
ComplianceOnline Banking Summit 2016 | Risk Management and Data Security - 80390SEM
21 CFR Part 11 Compliance for SaaS/Cloud Applications - 80202SEM

Product Reviews

This product hasn't received any reviews yet. Be the first to review this product! Write review

Best Sellers
You Recently Viewed