Biggest Security and Privacy Concerns for 2022
Author: Stephen M. Yoss
CPE Credit: |
2 hours for CPAs |
Technology is a business-critical business capability in today’s day and age. Any interruption to an organization’s ability to use its information system poses a significant risk to the viability of the organization. Data breaches, cyber-attacks, and ransomware are examples of some of the biggest existential risks facing businesses today. There are threat actors all around the world that entirely focus on stealing organizational data, stealing economic resources, and disrupting the flow of business. They are using complex social engineering attacks, pervasive phishing messages, intricate malware, and other highly effective techniques. From recently released data breach reports, there were 100k data breaches publicly reported in 2020 alone. Resulting in the personal information of millions of people worldwide being released, billions of dollars of organizational assets, and putting countless people in harm’s way.
This course will go over recent major security breaches including breaches at Solarwinds, Ubiquity, Colonial Pipeline, Tecnimont SpA, Citrix, LabCorp, and others. It will discuss how these breaches occurred, why the breaches happened, and how organizations can prevent it from happening to them. Each case study will discuss a different form of security vulnerability and how to prevent it. The topics will include social engineering, auditing processes for IT Security systems, forensic accounting, password, two-factor authentication, and improvements for managerial oversight. Participants will gain real-world knowledge from the mistakes of other organizations and from that experience develop their own security best practices for their organizations.
Publication Date: September 2022
Topics Covered
- Getting Started with Data Breaches
- Insider and Privilege Abuse
- Supply Chain Attack
- Business Email Compromise (BCE)
- Malware
- Ransomware
- Overall Security Recommendations
Learning Objectives
- Define the intention, purpose, usual threat actors, and potential impact of a data breach on an organization
- Discuss the significant security trends for 2022 and their potential impact
- Analyze today's most common security incidents, including insider and privilege abuse, supply chain attacks, etc.
- Discuss the differences and similarities between malware and ransomware, including reviewing the risk and impact
- Recognize how to prepare a plan to help reduce the organizational risk for major security attacks for attacks like ransomware, distributed denial of service (DDoS), spear-phishing, and more
- Outline security best practices and select techniques to promote compliance and reduce risk to your organization
- Identify what occurs when an unauthorized 3rd party penetrates an individual or organization's information systems and steals their data
- Identify what percent of cyber attacks are aimed at small businesses, according to recent statistics published by Accenture
- Identify the type of attack that had the highest level of concern among IT and business professionals, based on the SonicWall 2022 Cyber Threat Report
- Identify the industry with the highest percentage of customers targeted with malware
Level
Basic
Instructional Method
Self-Study
NASBA Field of Study
Information Technology (2 hours)
Program Prerequisites
None
Advance Preparation
None