Webcast: Data Security - Need We Say More? (XCDSNM17)
Tell a Friend About This EventTell a Friend
 

With so many data breaches and targeted attacks, you should be concerned about the security of your data. In this session, learn about some of the recent high profile attacks and how these crimes occurred; critical security concepts and techniques to help minimize your risks; and review strengths and weaknesses of data security in the cloud compared to on-premise solutions and storage.

7/24/2017
When: 07/24/2017
11:00 AM until 1:00 PM
Where: Webcast
CALCPA
4173185A
United States
Presenter: Thomas G. Stephens, Jr., CPA.CITP


Online registration is closed.
« Go to Upcoming Event List  

Acronym XCDSNM17
CPE 2 hours
Vendor CalCPA
Category
Management
Level Beginning
Prerequisite None
Adv Prep None
Yellow Book? No
Designed for Business professionals seeking to secure sensitive data.
Registration
Member $60
CPA Non-Member $94

The Member rate applies to LCPA members, other state society members, and non-CPA staff of LCPA members. To register online, use the ‘Register’ button above. To register by phone, call the LCPA Member Service Center at 800.288.5272 or 504.464.1040, Monday through Friday, 8am to 5pm.

Course Description

With so many data breaches and targeted attacks, you should be concerned about the security of your data, and the rapidly-growing volume of data you store, likely, only increases your concerns. In this session, you will learn about some of the recent high profile attacks and how these crimes occurred. More importantly, you will learn about critical security concepts and techniques that will help you minimize the risks of similar attacks affecting you and your organization. In addition, you will learn about the relative strengths and weaknesses of data security in the Cloud, compared to on-premise solutions and storage. If you are concerned about data security – and who isn’t – the information you will learn in this session will help address your data security concerns.

Objectives

  • Describe details about recent high profile data breaches
  • List prominent methods used by hackers to commit the breaches
  • Compare and contrast Cloud-based data storage to on-premise data storage based on relative strengths and weaknesses
  • Identify methods for adding security in order to protect electronic content