Webcast: K2's Critical Tips for Avoiding Identity Theft (XKCTI217)
Register Tell a Friend About This EventTell a Friend
 

Identity theft is the fastest growing crime in the United States, with approximately 10 million occurrences every year. On average, it will cost the victim several hundred dollars and dozens of hours to resolve. It can cause irrevocable damage to an organization's reputation and change public opinion. This session will examine the major causes, factors, and outcomes of identity theft and organizational security breaches.

 Export to Your Calendar 10/13/2017
When: 10/13/2017
9:30 AM until 11:30 AM
Where: Webcast
K2 Enterprises
United States
Presenter: Steve Yoss


Online registration is available until: 10/11/2017
« Go to Upcoming Event List  

Acronym XKCTI217
CPE 2 hours
Vendor K2 Enterprises
Category
Management
Level Basic
Prerequisite None
Adv Prep None
Yellow Book? No
Designed for Accounting and business professionals responsible for information security
Registration
Member $79
CPA Non-Member $104

The Member rate applies to LCPA members, other state society members, and non-CPA staff of LCPA members. To register online, use the ‘Register’ button above. To register by phone, call the LCPA Member Service Center at 800.288.5272 or 504.464.1040, Monday through Friday, 8am to 5pm.

Course Description

Identity theft is the fastest growing crime in the United States, with approximately 10 million occurrences every year. On average, it will cost the victim several hundred dollars and dozens of hours to resolve. It can cause irrevocable damage to an organization's reputation and change public opinion. This session will examine the major causes, factors, and outcomes of identity theft and organizational security breaches.

Objectives

Upon completing this course, you should be able to:

  • List and classify potential threats in technology areas that leave organizations susceptible to privacy breaches, data theft, and distribution
  • Contrast the potential benefits and risks of allowing internal staff to use their personal technology devices for organizational projects
  • Build an action plan to safeguard personal and organizational data from potential threats
  • Identify the threat factors and areas of risk based on industry profile
  • Implement data security best practices for personal and organizational information

Topics

  • Examples of identity theft attacks
  • Identify when theft occurs
  • Information most at risk
  • Best practices for preventing identity theft