Webcast: K2's Securing Your Data - Practical Tools for Protecting Information (XKSEC117)
Register Tell a Friend About This EventTell a Friend
 

Security is not optional and yesterday’s security techniques are not working to minimize today’s security threats. Therefore, now is the time for you to tune up what you know about protecting sensitive data. In this program, you will learn about the latest tools and techniques for securing your data, including encryption, virus protection, secure communications, electronic signatures, secure authentication, and more. You will also learn the types of questions you should be asking of your staff

 Export to Your Calendar 9/13/2017
When: 09/13/2017
8:00 AM until 12:00 PM
Where: Webcast
K2 Enterprises
United States
Presenter: Brian Tankersley


Online registration is available until: 9/11/2017
« Go to Upcoming Event List  

Acronym XKSEC117
CPE 4 hours
Vendor K2 Enterprises
Category
Management
Level Intermediate
Prerequisite Basic understanding of computer operations
Adv Prep None
Yellow Book? No
Designed for Accounting and business professionals seeking to secure sensitive data
Registration
Member $129
CPA Non-Member $179

The Member rate applies to LCPA members, other state society members, and non-CPA staff of LCPA members. To register online, use the ‘Register’ button above. To register by phone, call the LCPA Member Service Center at 800.288.5272 or 504.464.1040, Monday through Friday, 8am to 5pm.

Course Description

Security is not optional and yesterday’s security techniques are not working to minimize today’s security threats. Therefore, now is the time for you to tune up what you know about protecting sensitive data. In this program, you will learn about the latest tools and techniques for securing your data, including encryption, virus protection, secure communications, electronic signatures, secure authentication, and more. You will also learn the types of questions you should be asking of your staff to ensure server-based information remains protected.

Objectives

Upon completing this course, you should be able to:

  • Assess the relevant security risks in your organization
  • Identify specific tools and techniques to protect sensitive data
  • List five specific steps to improve PC security
  • Implement security procedures to improve organizational security

Topics

  • Five-step approach to securing your PC
  • Security tools necessary to secure sensitive data and systems
  • Implement viable and practical solutions to mitigating today’s security threats