Categories

Information Risk Management: Strategies for Preventing and Mitigating Information Security Breaches, Online Training Format

SKU: 431
$9.50

Information Risk ManagementStolen laptops, misplaced USB drives, network infiltration by hackers or viruses, crippling denial-of-service attacks—the threats to an organization’s sensitive data are many and continue to grow, even as more and more sensitive data and personally identifying information are maintained and transmitted electronically. The costs associated with information security breaches continue to grow also, partly because of increasingly stringent regulations that hold organizations financially responsible when they fail to secure their sensitive information.

So how should organizations respond to these threats? With a comprehensive, coordinated plan that employs both physical and electronic measures designed to keep sensitive data and personally identifying information out of the hands of cyber criminals and identity thieves.

This course details the extent and potential costs of the information security problem, describes the key components of a well designed information security plan, and outlines strategies that can go a long way toward protecting one of an organization’s most valuable assets—its information.

TARGET AUDIENCE
Managers, Supervisors, and Leaders of Businesses and Organizations

TIME TO COMPLETE
100 - 110 minutes

PURPOSE
To describe the risks associated with maintaining and transmitting sensitive data and personally identifying information, and to instruct leaders of businesses and organizations in developing strategies for mitigating these risks.

LEARNING OBJECTIVES:
After completing this course, the learner will be able to:

  • distinguish between first- and third-party information risks;
  • recognize various types of first- and third-party information risks;
  • define the scope of the threat that information security breaches pose to organizations, based on current statistics;
  • interpret the major provisions of federal and state laws governing organizations' responsibilities for securing sensitive data and personally identifying information in their possession;
  • define the elements of effective risk management procedures;
  • develop and implement an appropriate information security policy for an organization;
  • identify the threats to information network security and the tools needed to secure networks against security breaches; and
  • develop a Computer Security Incident Response Plan and strategies for managing the risks associated with maintaining and transmitting sensitive data and personally identifying information.



TOPICS COVERED

  1. An Overview of Information Risk
  2. Statistics on Information Security Breaches
  3. Federal and State Regulations Governing Information Security
  4. Essential Risk Management Procedures
  5. Drafting an Information Security Policy
  6. Procedures for Properly Disposing of Sensitive Information
  7. Securing Networks against Information Security Breaches
  8. Responding to Information Security Breaches



ACCREDITATION
HRCI

HRCI logo This program has been approved for 1.75 recertification credit hour toward PHR, SPHR, and GPHR recertification through the HR Certification Institute. For more information about certification or recertification, visit the HR Certification Institute homepage at www.hrci.org.

(The use of this seal is not an endorsement by the HR Certification Institute of the quality of this program. It means that this program has met the HR Certification Institute's criteria to be pre-approved for recertification credit.)

SHRM logo SOCIETY FOR HUMAN RESOURCE MANAGEMENT
The Human Equation is recognized by SHRM to offer Professional Development Credits (PDCs) for the SHRM-CPSM or SHRM-SCPSM. This program is valid for 1.75 PDCs for the SHRM-CP or SHRM-SCP. For more information about certification or recertification, please visit www.shrmcertification.org.


If you're not completely satisfied with the quality of our courses, we will refund your money - guaranteed. Click here for details


Information Risk Management: Strategies for Preventing and Mitigating Information Security Breaches

Table of Contents

  • Chapter 1: Instructions
    • THE HUMAN EQUATION, INC. - TERMS OF USE
      • Page 1, 2, 3
  • Course Objectives
  • Chapter 2: An Overview of Information Risk
    • Page 4
    • Classifying Information Risk
      • Page 5
    • Third-Party Risks
      • Page 6
    • Types of Third-Party Risks
      • Page 7
    • Types of Information at Risk
      • Page 8, 9
  • Chapter 3: Statistics on Information Risk
    • Page 10
    • Notification Costs
      • Page 11
    • Indirect Costs
      • Page 12
    • Frequency of Privacy Breaches
      • Page 13
    • Organizations Most Likely to be Breached
      • Page 14
    • Causes of Privacy Breaches
      • Page 15
    • Responsibility for Managing Information Security
      • Page 16, 17
  • Chapter 4: Information Security and the Law
    • Page 18
    • HITECH Act: Data Breach Notification Regulations
      • Page 19, 20, 21, 22, 23, 24, 25, 26, 27, 28
    • Florida’s Data Breach Notification Law
      • Page 29, 30, 31, 32, 33
    • Increased Regulatory Burdens
      • Page 34, 35
  • Chapter 5: Protecting Sensitive Information
    • Page 36
    • Identifying the Risk
      • Page 37
    • Risk Analysis & Risk Management Basics
      • Page 38, 39, 40, 41, 42, 43, 44
    • Identifying the Risk
      • Page 45
    • Preventing Data Leakage or Loss
      • Page 46
    • Privacy Policy
      • Page 47
    • Guidelines for Drafting a Privacy Policy
      • Page 48
    • Developing an Information Security Policy
      • Page 49, 50
    • Limit Access to Personally Identifying Information
      • Page 51
    • Data Collection and Retention Policy
      • Page 52, 53, 54
    • Data Storage Policy
      • Page 55
    • Sanitizing Electronic Media Holding Personally Identifying Information
      • Page 56, 57
    • Controls for Protecting Information
      • Page 58
    • The Risks Associated with Portable Devices and Media
      • Page 59
    • Balancing Security with the Need to Retain Information
      • Page 60
    • Encryption
      • Page 61, 62, 63
  • Chapter 6: Securing Networks against Privacy Breaches
    • Page 64
    • Virus Controls
      • Page 65
    • Perimeter Defenses
      • Page 66
    • Perimeter Defenses: VPNs
      • Page 67
    • Perimeter Defenses: Wi-Fi Protected Access
      • Page 68
    • Patch Management
      • Page 69
    • Configuration Management
      • Page 70
    • Network Monitoring
      • Page 71, 72
  • Chapter 7: Responding to Information Security Breaches
    • Page 73
    • Computer Security Incident Response Plan
      • Page 74
    • Computer Security Incident Response Plan
      • Page 75
    • Contractual Risk Transfer
      • Page 76
    • Agreements with Third-Party Custodians
      • Page 77, 78
    • Financing Information Risk through Insurance
      • Page 79, 80
    • Elements of Privacy Liability and Network Security Insurance Policies
      • Page 81
    • Privacy Injury Liability Insurance
      • Page 82
    • Regulatory Proceedings Coverage
      • Page 83
    • Public Relations Expense
      • Page 84, 85, 86, 87
  • Chapter 8: Conclusion
    • Page 88
  • Chapter 9: Time to Review
    • Page 89






Student Benefits

Students and employees who take the Information Risk Management: Strategies for Preventing and Mitigating Information Security Breaches course will enjoy:

 Course FeaturesIncludedComments
 
HRCI Recertification Credits
 
1.75 HRCI Recertification Credit(s).
 
SHRM PDC Credits
 
1.75 SHRM PDC Credit(s).
 
CAM Credits
 
0.00 CAM Credit(s).
 
Florida Bar CLE Recertification Credits
 
0.00 Florida Bar CLE Recertification Credit(s).
 
Florida Bar CLE Ethics Recertification Credits
 
0.00 Florida Bar CLE Ethics Recertification Credit(s).
 
State Bar of Georgia CLE Recertification Credits
 
0.00 State Bar of Georgia CLE Recertification Credit(s).
 
State Bar of Georgia CLE Ethics Recertification credits
 
0.00 State Bar of Georgia CLE Ethics Recertification credit(s).
 
FL CE 2-20 Credits
 
0.00 FL CE 2-20 Credit(s).
 
Unlimited 1 Year Access
 
The Human Equation's courses may be accessed and reviewed as many times as you wish even after completion.
 
90 Days Money Back Guarantee
 
The course must not be completed.
 
Friendly and Knowledgeable Customer Service
 
M-F from 8:00am to 4:30pm.
 
Table of Contents
 
Allows you to jump directly to slides and chapters that you have already viewed.
 
Pictures/Illustrations
 
37 pictures/illustrations.
 
Interactive Learning Activities
 
11 interactive learning activities.
 
Audio Narration
 
76 audio narrations.
 
Supporting Documents
 
1 supporting documents.
 
Case laws
 
5 case laws.
 
Definitions
 
8 definitions.
 
Questions and Answers
 
3 questions and answers.
 
Video Clips
 
0 video clips.
 
Practice Quiz
 
0 practice true or false questions and 0 practice multiple choice questions.
 
Scored Exam
 
0 exam true or false questions and 12 exam multiple choice questions.
 
Printable Certificate
 
The certificate contains your name, completion date, and the certification organization's ID which you will need to claim your credit(s).
 
Customizable Settings
 
Adjustable font sizes and sounds.
 
Automatic Bookmarking
 
Simply close the course when you are done and it will reopen on the last visited page on your next session.
(To see if you have the necessary technical requirements, visit our browser detection page.)

Training Manager Benefits

Managers and supervisors who purchase The Human Equation's courses to train their employees will enjoy:

 Learning Management System FeaturesIncludedComments
 
Convenient User Creation and Management
 
Hierarchy-tree based management
 
Reporting
 
Downloadable spreadsheets.
 
Course Scheduling
 
Customizable start dates and due dates.
 
Automated Email Reminders
 
Due date reminders.
 
Convenient Course Assignments
 
Single or multiple user course assignments.
 
Customized Learning Environment
 
The Human Equation's Learning Management System is customizable to match your organization's look and feel.
 
Enterprise Discounts
 
Significant wholesale discounts available for enterprises.