Register Online - Add to Cart
Product ID: 407789EAU
 
Credit & Course Provided by:

Hackers and Viruses: Protecting Your Network

OnDemand Webinar (59 minutes)

Learn security rules of the road that can be implemented in your organization to better address risk.This program will provide you with tools to better understand the origins and kinds of cyber risks. This topic will address how technology in the workplace, cloud computing, remote workers, and other factors have come together to create a perfect storm of cyber risk. We will also discuss the two most common sources of security compromises and how to mitigate them.

Authors

Michael R. Overly, Foley & Lardner LLP

Agenda

State of the World - Some Fundamental Statistics

Why Cyber Risks Are so Insidious

Why Now? Why Are Cyber Risks Particularly Problematic at This Time?

Common Security Myths

Sources of Risks

Integrating Security Into Vendor and Business Partner Relationships

Two Most Common Areas of Security Compromise

Security Rules of the Road