Cyber Attacks Through Impersonation

Register Now
  • Location
    • Your Computer
      Your Space
      ISCPA / CPA Crossing Webinar, ID 00000
  • Credits
    • 1.00
  • Credit Type(s)
    • Information Technology (1.00)
  • Prerequisites
    • None

  • Vendor
    • CPA Crossings
  • Level
    • Basic
  • Fields of Study
    • Information Technology
  • Message
    • Virtual Experience

Description

This course describes how cyber attacks through impersonation are conducted. It also provides practical advice and recommended security controls to implement, reducing the likelihood and impact of an impersonation cyber attack. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
  • Presented by Petrina Youhan, CPA, CISSP
  • Designed For

    Everyone should attend this to help avoid becoming a victim of an impersonation cyber attack

    Objectives

    After attending this presentation you will be able to...

    • Identify what a cyber impersonation attack is
    • Recognize how impersonation attacks are conducted
    • Distinguish security controls & protocols that can help prevent or minimize the impact of impersonation attacks

    Highlights

    The major topics that will be covered in this class include:

    • Impersonation techniques used to launch cyber attacks
    • Cybercriminals' focus: stealing financial assets and intellectual property
    • Practical advice on controls to implement to reduce victimization from impersonation cyber attacks
    • Practical advice to reduce the impact of a cyber attack

    Advanced Prep

    None

    Register Now

    Leaders

    CPA Crossing Panel

    No Biography Available

    ← Back to List