Information Technology

How You Can Manage Cyber Threats from Within v1.1

As we experience an unprecedented surge in the frequency and magnitude of cyber attacks, more organizations are focusing increased attention and resources on enterprise security. Yet, many businesses overlook the fact that "insiders" can do much more severe damage to their systems and data than could external sources. Ron Temske, vice president of security solutions for Logicalis U.S., explains what you can do to manage cyber threats from within your own organization.

IMPORTANT: This course, previously titled "How You Can Manage Cyber Threats from Within" has been republished. Please be aware that the content is the same, with only minor updates. If you have already received credit for this course, you cannot receive credit again.

Learning Objectives:

After completing this course, participants should be able to:

  • Identify why insider cyber threats are so difficult to detect.
  • Distinguish between "unwitting insiders" and "malicious insiders".
  • Define the principle of least privilege or minimal privilege.
  • Explain how business email compromise operates as fraud.


Prerequisites/Advanced Preparation:

Work experience in information technology or accounting, or an introductory course in information technology or accounting


Speaker / Author:

Ron Temske, Logicalis U.S.

Buy

Price (USD)

Standard: $24.95

Details

Course Code : 99SPK37A1

Release Date : 05/02/2023
Expire Date : 03/31/2025
Credits :
CPE 1.00
QAS 1.00

Length : 50min
Course Level : Update
Course Type : QAS Self-Study
Passing Grade : 70%
Format Type : eLearning
Mobile Compatible
Field Of Study : Information Technology

Theme : Communication Networks

Returning Subscribers

Login Login