Foundations of Privacy 101
September 05, 2024 8:30 AM ETThis course will provide a general overview of the development of data privacy. The course will cover types of information that is protected, the processing of personal data and information risk management principles that impact organizational risk. The course will cover the lifecycle of privacy data from collection, use, disclosure and retention to destruction and the risks associated with each phase. The course will also cover information security and the safeguarding of personal information including ISO security standards and common security controls.
Back to topInternet of Things and Implications for Liability Claims
September 05, 2024 10:30 AM ETThis course will the emerging technology of IOT and the implications that the IOT has for liability claims handling. The course explain what is the Internet of Things and describe the current IOT devices being used by manufacturing, transportation, health care, small businesses, and consumers. The course will cover wearable technology, telematics, and ingestibles. The course will cover security risks associated with the use of IOT devices and the legal implications arising out of the use and hacking of IOT devices. The course will also cover the use of IOT devices in investigations and how IOT interfaces with two other emerging technologies artificial intelligence and blockchain.
Back to topAnatomy of a Data Breach
September 05, 2024 1:00 PM ETThis course covers the five stages of a cyber breach: (1) Preparation; (2) Detection and Analysis; (3) Containment, Eradication, and Recovery; (4) Post-Incident Activity; and (5) Reporting. The course will provide an in-depth analysis of the necessary steps and activities for each stage, the identification of employees and outside experts involved in each stage, associated costs and damages and risks to the organization. The course will generally cover the tools that are available to accomplish the tasks for each stage.
Back to topUnderstanding Threats and Vulnerabilities
September 05, 2024 2:45 PM ETThis course will acquaint you with three prominent cyber threat actors and the vulnerabilities they exploit that can lead to a data or privacy breach. Primary topics that will be explored include: the motivations and capabilities goals of bad actors and how these distinctions lead to different types of attacks; various types of cyber attack and their effect on business operations; physical and electronic vulnerabilities that are generally exploited; and common security protocols that can be used to guard against these vulnerabilities.
Back to topGroup Project - Jeopardy Game
September 05, 2024 4:30 PM ETBack to top