BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//on360.co - ECPv6.10.2//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:on360.co
X-ORIGINAL-URL:https://on360.co
X-WR-CALDESC:Events for on360.co
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250423T110000
DTEND;TZID=America/New_York:20250423T140000
DTSTAMP:20260403T122620
CREATED:20250415T182546Z
LAST-MODIFIED:20250415T184624Z
UID:14326-1745406000-1745416800@on360.co
SUMMARY:Information Security and Cyber Risk Awareness - Live Online
DESCRIPTION:Information Security and Cyber Risk Awareness\nLive Instructor-Led Course\nRegister Here\nWednesday\, April 23 2025\n3 Hours\n1:00 PM to 4:00 PM Eastern Time  (starting 10:00 AM PT / 5:00 PM GMT)\nThis comprehensive training course on “Information Security and Cyber Risk Awareness” provides participants with essential knowledge and skills to identify\, assess\, and manage cyber risks\, while promoting best practices for information security within their organizations. Spanning five modules\, the course covers a broad range of topics\, including key concepts\, common threats\, risk management\, securing networks and systems\, social engineering\, user awareness\, regulatory compliance\, and emerging technologies. Through a combination of expert instruction\, real-life examples\, and interactive activities\, participants will gain a solid understanding of the ever-evolving cyber threat landscape and the crucial role they play in safeguarding their organization’s assets and reputation. \n  \nCourse Objectives:\nUpon completion of this course\, participants will be able to: \n\nUnderstand the importance of information security and the impact of cyber risks on businesses.\nIdentify common threats and vulnerabilities\, and recognize their potential consequences.\nConduct cyber risk assessments and implement effective risk management strategies.\nApply best practices for securing networks\, systems\, and endpoints to protect organizational assets.\nRecognize and respond to social engineering attacks\, while promoting user awareness and a security-conscious culture within their organization.\nNavigate regulatory compliance requirements and avoid penalties associated with non-compliance.\nAssess the impact of emerging technologies on information security and stay up-to-date with future trends in cybersecurity.\nContinuously improve information security practices within their organization by staying informed and adapting to an ever-changing cyber threat landscape.\n\nCourse Content Outline\n1: Introduction to Information Security and Cyber Risk\n\nUnderstanding Information Security: Definition and importance.\nCyber Risk: Definition\, types\, and impact on businesses\nKey concepts: Confidentiality\, Integrity\, and Availability (CIA)\nCommon threats and vulnerabilities\nReal-life examples of cyber-attacks and their consequences\n\n2: Cyber Risk Assessment and Management\n\nRisk assessment: Identifying and prioritizing risks\nRisk management: Mitigation\, transfer\, acceptance\, and avoidance\nDeveloping a cybersecurity framework\nSecurity policies and procedures\nIncident response planning and execution\n\n3: Securing Networks and Systems\n\nNetwork security fundamentals: Firewalls\, VPNs\, and intrusion detection\nSecuring endpoints: Antivirus\, antimalware\, and patch management\nAuthentication and access control: Password policies\, multi-factor authentication\, and biometrics\nEncryption and secure communication\nCloud security and securing remote access\n\n4: Social Engineering and User Awareness\n\nSocial engineering techniques: Phishing\, pretexting\, and baiting\nRecognizing and responding to social engineering attacks\nThe role of user awareness in information security\nBest practices for online safety and data protection\nCreating a security-aware culture within an organization\n\n5: Regulatory Compliance and Emerging Technologies\n\nOverview of regulatory frameworks: GDPR\, HIPAA\, and PCI-DSS\nEnsuring compliance and avoiding penalties\nThe impact of emerging technologies on information security: IoT\, AI\, and blockchain\nFuture trends in cybersecurity\nContinual improvement and staying up-to-date in a rapidly evolving landscape\n\nThis course provides education toward many Web3 Certification Board (W3CB) Focus Areas Certification Exam Competencies.  \nReview Certification Focus Areas
URL:https://on360.co/event/information-security-and-cyber-risk-awareness/
LOCATION:On360 Zoom
CATEGORIES:Information Security and Cyber Risk
ATTACH;FMTTYPE=image/png:https://on360.co/wp-content/uploads/2024/10/Information-Security-and-Cyber-Risk-Awareness-Event-Image.png
END:VEVENT
END:VCALENDAR