America's Top Tradeshow Directory | Events In America
Facebook Linked In Twitter Videos

Event Description

Overview: While "low-tech" frauds such as embezzlement, check fraud and duplicate billing schemes continue to plague organizations of all kinds, computers and the Internet has become the weapon of choice of millions of dishonest individuals - both inside and outside of your organization. This means that without the necessary technological expertise your organization is at growing risk of costly cyber crimes. 

Areas Covered in the Session:

  • Introduction
    • Statistical overview of the cyber-crime problem
    • Summary of biggest information breaches in recent history
    • Who commits cybercrime (insider vs. outsider)
    • Why employees commit cyber-fraud (The Fraud Triangle)
    • Lessons from information thieves and cybercriminals
    • Type of information likeliest to be targeted (Personal Identifiable, trade secrets, etc.)
    • Greatest risk factors (Inadequate employee training and awareness, over-reliance on technology, etc.)
  • Common Types of Information Security/Cyber Fraud Today
    • Bank account takeover-conventional vs. cyber
    • Internal computer-based theft of proprietary information
    • Information security breach (internal AND external)
    • Phishing,
    • Spear-phishing
    • Smishing
    • Scareware
    • Mobile banking fraud
    • Industrial espionage
    • Social networking and constant online communication-and the proliferation of communication devices, networks, and users-have generated new vulnerabilities that create more cyber crime opportunities
  • Fraud Detection
    • Nature of cyber fraud is rapidly evolving and changing
    • Build an Organization Risk Profile- US Secret Service recommends assessing your systems to identify vulnerabilities
    • Hire proper experts to advise on implementation of proper detection software and practices
  • Anti-Cybercrime Controls
    • Internal Technology and Process Controls
    • Management's urgent role in prevention
    • Who Should Manage Anti-Fraud Activities
    • Internal Controls: Do's and Don't's
    • General controls: IT Security, Background Investigation
    • Specific controls: Harder passwords, tougher authentication, and isolation of vulnerable cash-handling computers/networks


Who Will Benefit:

  • Internal Auditors
  • Internal Control Management
  • Risk Managers
  • Privacy Officers
  • Security Managers
  • IT Staff
  • Information Security Staff
  • HR Staff
  • Department Managers
  • Compliance Managers

Speaker Profile:

Peter Goldmann is founder and President of White-Collar Crime 101 LLC, the parent company of FraudAware and publisher of the monthly newsletter, White-Collar Crime Fighter. Peter has been the Publisher and Editor of White-Collar Crime Fighter for over 12 years and is recognized as a leading expert in the areas of fraud detection, prevention, investigation and training. He has written numerous articles on practical approaches to fraud prevention and detection for, among others, Internal Auditor, Investor's Business Daily, Financial Executives Institute and Bottom Line/Personal, Recognizing the vulnerability to fraud posed by a lack of awareness on the part of rank-and-file employees about specific types of economic crime , Peter launched the development of FraudAware in 2001. Following enactment of the Sarbanes-Oxley Act of 2002, FraudAware began helping companies resolve the unexpected increase in fraud losses, despite the costly implementation of SOX- mandated internal controls. He determined that while internal controls, Tone at the Top and whistleblower hotlines are all essential components of an effective anti-fraud program, the primary reason for continuing losses to internal and external economic criminals was a widespread lack of fraud awareness on the part of corporate rank-and-file employees. He theorized that if an organization's most valuable asset--its workforce--could be taught to spot and report telltale signs of fraud, investigations could be initiated and perpetrators apprehended before major losses were incurred and negative publicity tarnished the organization's reputation. The theory has proved viable over the past six years, as FraudAware training programs implemented at numerous companies in all major industries, have taught employees how to detect the common and not-so-common red flags of fraud and--most importantly--how to report these incidents through their employer's confidential hotline channels. 

Price List:
Live : $239.00
Corporate live : $479.00
Recorded : $289.00

Contact:
James Richard
Phone: 800-447-9407
Fax: 302-288-6884
Email ID: webinars@eitaglobal.com/Support@eitaglobal.com

For more info click here

Not sure if you want to exhibit at or attend the Information Security and Cybercrime Prevention Essentials - Webinar By EITAGlobal? See the panels below to get the information you need to make an informed decision.

All information in Events In America is deemed to be accurate at the time we add it, and we take steps to verify all details and update our records when new information is provided, but as people, events and circumstances change, we caution users to independently confirm all information. EventsInAmerica.com and Events In America LLC make no guarantee of accuracy and assume no liability for inaccurate information.

Event Details

Website: http://bit.ly/1cOPWhT...
Conference/Event Dates: 01/17/2014 - 01/17/2014
Conference/Event Hours: 10:00 AM PST | 01:00 PM EST(75 minutes)
Classification: B2B
Primary Industry: Network Security
Other Industries: Network Security, Technology
Audience: Areas Covered in the Session:
Introduction
Statistical overview of the cyber-crime problem
Summary of biggest information breaches in recent history
Who commits cybercrime (insider vs. outsider)
Why employees commit cyber-fraud (The Fraud Triangle)
Lessons from information thieves and cybercriminals
Type of information likeliest to be targeted (Personal Identifiable, trade secrets, etc.)
Greatest risk factors (Inadequate employee training and awareness, over-reliance on technology, etc.)
Common Types of Information Security/Cyber Fraud Today
Bank account takeover-conventional vs. cyber
Internal computer-based theft of proprietary information
Information security breach (internal AND external)
Phishing,
Spear-phishing
Smishing
Scareware
Mobile banking fraud
Industrial espionage
Social networking and constant online communication-and the proliferation of communication devices, networks, and users-have generated new vulnerabilities that create more cyber crime opportunities
Fraud Detection
Nature of cyber fraud is rapidly evolving and changing
Build an Organization Risk Profile- US Secret Service recommends assessing your systems to identify vulnerabilities
Hire proper experts to advise on implementation of proper detection software and practices
Anti-Cybercrime Controls
Internal Technology and Process Controls
Management's urgent role in prevention
Who Should Manage Anti-Fraud Activities
Internal Controls: Do's and Don't's
General controls: IT Security, Background Investigation
Specific controls: Harder passwords, tougher authentication, and isolation of vulnerable cash-handling computers/networks

Who Will Benefit:
Internal Auditors
Internal Control Management
Risk Managers
Privacy Officers
Security Managers
IT Staff
Information Security Staff
HR Staff
Department Managers
Compliance Managers

Booth Details

Booth Size Booth Cost   Available Amenities
No exhibiting at this event.   Electricity: n/a
  Water: n/a
  Generator: n/a
  Marketing Vehicles Allowed: No
Other Booth Sizes Available: n/a

Advance Networking

How do I show up here?
 
Mark Travers

Personal Notes

Add a note here, it is only visible by you.

Event Exhibitors

We are EITAGlobal, a continuing professional education provider with a difference. We believe that coming from a responsible and professional continuing professional education provider in the IT industry space; our trainings have to carry a premier value.

We have devised a strategy of making trainings extremely effective and relevant by bringing Experts and participants across the table. In line with this philosophy, we ensure that a high proportion of our trainings are in the form of live, in-person seminars and Consulting.

To know more about us visit: www.eitaglobal.com

New Search Contact This Event
Information Security and Cybercrime Prevention Essentials - Webinar By EITAGlobal

exhibitor lists