• Sep 22, 2016 from 15:00 to 16:00
  • Location: Online Webinar
  • Latest Activity: Oct 12, 2020

Overview:

This webinar will prepare your organization to understand the need for information security and data privacy, steps that can be taken to institute or augment your data security policies/procedures, and the implementation of the needed controls.

Why Should You Attend:

Information security and data privacy have become an important area for all enterprises. All organizations have sensitive data that requires protection.

This data may be proprietary or private company data, product data, employee data, customer data or any data considered sensitive by your organization. In the face of data loss or compromise, potential liability for all organizations is significant. Taking steps to protect data has become mandatory for all businesses and governmental entities.

Areas Covered in this Webinar:

• Policies, Procedures and Controls that govern Information Security and Data Privacy

Implementing and maintaining a set of written policies and procedures results in a comprehensive approach to data privacy and information security. The importance of these controls is stressed. The need for the identification of all of your organization’s system components including network devices/appliances, servers, computing devices, storage devices, data bases and applications will be stressed.

Identify your organization’s sensitive, critical data that must be protected. The level of protection is proportional to the relative importance and sensitivity of the data

• Safety and Security of Networks

Identify and implement all necessary security controls. Ensure that security policies and operational procedures for protecting stored sensitive, critical data are documented, in use, and known to all affected parties

• Monitoring security controls continuously

Track and monitor all accesses to network resources and sensitive, critical data on a daily basis. Implementation of audit trails and logs that are secure against alteration

• Authentication

Implement controls that ensure that your organization’s critical data can only be accessed by authorized personnel, systems and processes. Access to your critical data must be limited based on need to know and job responsibilities

Who Will Benefit:

• Executive Positions

• Compliance and Risk Management Personnel

• Vendor Management Personnel

• Data Security Personnel

• Data base/Network Administration Personnel

• Vendor Management Personnel

• Point of Sale Development Personnel

• Software Developers

• Business Owners

• All Organizations, Public or Private, that need to protect sensitive data and networks

• Any Business accepting payment cards (e.g. credit cards, payment cards, loyalty cards, etc.)

• Financial Institutions such as Credit Unions and Community Banks, Municipalities and other Governmental Entities, Non Profit Organizations, etc.

For more information, please visit : https://www.complianceglobal.us/product/700542/MarcPerl/dos-and-don-ts-related-to-information-security-and-data-privacy/1
Email: support@complianceglobal.us
Toll Free: +1-844-746-4244
Tel: +1-516-900-5515

Level:
Intermediate

Speaker Profile:

Marc Perl brings over 30 years of professional experience to Teknowlogy Associates. Marc’s diverse experience includes risk management, payments processing, data security, product development, software development and software quality assurance.

E-mail me when people leave their comments –

You need to be a member of Global Risk Community to add comments!

Join Global Risk Community

Upcoming Featured events

 
 

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead