Hacking Your Operations for Improved Security

Instructor: Kevin Beaver
Product ID: 700302
Training Level: Intermediate
  • Duration: 60 Min
In this IT compliance training learn about real-world examples and how you can use the malicious mindset to look beyond the technical weaknesses and view your information security from a broader perspective that takes the entire business in account.

recorded version

1x Person - Unlimited viewing for 6 Months
(For multiple locations contact Customer Care)
Recorded Link and Ref. material will be available in My CO Section
Last Recorded Date: Apr-2007

Training CD / USB Drive

One CD/USB is for usage in one location only.
(For multiple locations contact Customer Care)
CD/USB and Ref. material will be shipped within 15 business days

Customer Care

Fax: +1-650-362-2367

Email: customercare@complianceonline.com

Read Frequently Asked Questions

Many organizations test their information systems for security vulnerabilities on an ongoing basis. The problem is that’s only half the issue. There’s also security documentation, users, and various IT-related business processes that affect overall information risks just as much. In this presentation, learn about real-world examples and how you can use the malicious mindset to look beyond the technical weaknesses and view your information security from a broader perspective that takes the entire business in account. This will enable you to find many vulnerabilities in your organization you haven’t thought about or have overlooked and get to the root of many information security issues that technical controls only serve to cover up.

Areas Covered in the seminar:

  • Understanding the malicious mindset from the perspectives of a rogue insider and external attacker
  • Looking at information risks differently
  • Operational security issues you haven’t thought about
  • Techniques you can use to uncover weaknesses
  • Real-world examples

Who Will Benefit:

Anyone responsible for the ongoing compliance and IT governance needs of within their business - regardless of the size of the organization:

  • IT managers
  • Information security managers
  • Compliance officers/managers
  • Business executives ultimately responsible for compliance
  • Information security consultants
  • Information security auditors

Instructor Profile:

Kevin Beaver, CISSP, is an independent information security consultant, author, and expert witness with over 18 years of experience in IT. He focuses his work on performing information security assessments related to compliance and IT governance. Kevin has authored or co-authored six books on information security including the highly successful ethical hacking book Hacking For Dummies, 2nd edition and Hacking Wireless Networks For Dummies (both by Wiley) as well as, The Practical Guide to HIPAA Privacy and Security Compliance (Auerbach). In addition, Kevin is a contributing author and editor of the book Healthcare Information Systems, 2nd edition by Auerbach Publications, technical editor of the book Network Security For Dummies by Wiley Publishing, and technical editor for over a dozen books and whitepapers for Realtimepublishers.com.
In addition to his books, Kevin writes and produces practical information security advice called Security on Wheels for IT professionals on the go. He is also a regular columnist and information security advisor for various TechTarget websites including SearchWindowsSecurity.com, SearchSQLServer.com, and SearchStorage.com. In addition, his information security work has been published in Information Security Magazine, SecurityFocus.com, and CSI’s Computer Security ALERT newsletter. Kevin is a frequent and top-rated speaker on information security at various conferences for RSA, CSI, TechTarget, IIA, and SecureWorld Expo.

Follow us :
Reduce costs for compliance with data integrity: 21 CFR Part 11, SaaS/Cloud, EU GDPR
Effectively Addressing and Remediating FDA's Form 483 Findings, Warning Letters and Consent Decree Compliance Issues

Refund Policy

Registrants may cancel up to two working days prior to the course start date and will receive a letter of credit to be used towards a future course up to one year from date of issuance. ComplianceOnline would process/provide refund if the Live Webinar has been cancelled. The attendee could choose between the recorded version of the webinar or refund for any cancelled webinar. Refunds will not be given to participants who do not show up for the webinar. On-Demand Recordings can be requested in exchange.

Webinar may be cancelled due to lack of enrolment or unavoidable factors. Registrants will be notified 24hours in advance if a cancellation occurs. Substitutions can happen any time.

If you have any concern about the content of the webinar and not satisfied please contact us at below email or by call mentioning your feedback for resolution of the matter.

We respect feedback/opinions of our customers which enables us to improve our products and services. To contact us please email customercare@complianceonline.com call +1-888-717-2436 (Toll Free).

Product Reviews

This product hasn't received any reviews yet. Be the first to review this product! Write review

Best Sellers
You Recently Viewed