School of Cyber Claims - Level 1 - Schedule ­

Schedule/Sessions

Foundations of Privacy 101

September 07, 2022 11:00 AM ET

This course will provide a general overview of the development of data privacy. The course will cover types of information that is protected, the processing of personal data and information risk management principles that impact organizational risk. The course will cover the lifecycle of privacy data from collection, use, disclosure and retention to destruction and the risks associated with each phase. The course will also cover information security and the safeguarding of personal information including ISO security standards and common security controls.

Back to top

Break

September 07, 2022 12:30 PM ET

Back to top

Internet of Things and Implications for Liability Claims

September 07, 2022 1:00 PM ET

This course will the emerging technology of IOT and the implications that the IOT has for liability claims handling.   The course explain what is the Internet of Things and describe the current IOT devices being used by manufacturing, transportation, health care, small businesses, and consumers.  The course will cover wearable technology, telematics, and ingestibles.  The course will cover security risks associated with the use of IOT devices and the legal implications arising out of the use and hacking of IOT devices.  The course will also cover the use of IOT devices in investigations and how IOT interfaces with two other emerging technologies artificial intelligence and blockchain.

Back to top

Break

September 07, 2022 2:30 PM ET

Back to top

Understanding Threats and Vulnerabilities

September 07, 2022 3:00 PM ET

This course will acquaint you with three prominent cyber threat actors and the vulnerabilities they exploit that can lead to a data or privacy breach. Primary topics that will be explored include: the motivations and capabilities goals of bad actors and how these distinctions lead to different types of attacks; various types of cyber attack and their effect on business operations; physical and electronic vulnerabilities that are generally exploited; and common security protocols that can be used to guard against these vulnerabilities.
 

Back to top