You Transitioned to a Remote-work Environment. Have Your Cyber and Privacy Policies and Practices Moved with You?
Use the Main menu to See Our CCIA Event Calendar
You Transitioned to a Remote-work Environment. Have Your Cyber and Privacy Policies and Practices Moved with You?
Thursday, April 9, 2020 (2:00 PM - 3:00 PM) (PDT)
Description
Cybercriminals have been actively taking advantage of hastily implemented remote-work environments amid the COVID-19 pandemic using malware, spear phishing, and ransomware attacks. At the same time, these environments were not designed with an eye toward legal and liability implications.
Join our webinar as we discuss the current categories of cyberattacks, how preexisting cyber laws apply to a remote-work environment and the necessary security safeguards you should have in place to secure your highly vulnerable remote workers.
On this webinar we’ll cover:
- How a risk-based assessment of technologies and processes can help identify security gaps, particularly those related to remote access
- How to enhance your network monitoring for early detection of anomalous activity
- How to evaluate the security risks to your clients and third parties
- What should be included in incident-response plans to factor in a remote workspace
- Potential legal and privacy implications due to a remote workspace transition
- What should be part of an ongoing plan to manage the cultural changes created by a large-scale remote-work program
CPE Information
Live event participants can earn up to 1 CPE credit in the Specialized Knowledge field of study.
Program description: Join our webinar as we discuss the current categories of cyberattacks, how preexisting cyber laws apply to a remote-work environment, and the necessary security safeguards you should have in place to secure your highly vulnerable remote workers.
Program level: Intermediate
Prerequisites: Current or past experience with cybersecurity planning and implementation issues.
Advanced Preparation: None required.
Instructional Delivery Method: Group Internet Based
Who Should Attend: Professionals in the cybersecurity and privacy industries, as well as C-Suite personnel who are interested in learning more about cybersecurity policies in the remote-work environment.