Shopping Cart | Training Portal | Contact Us | 1-800-473-5181

Strategy to Reality - Residual Risks Seminar

Why residual risks?

In addition to integrating a life cycle approach to securing IT infrastructure, we must begin with an awareness of the tried-and-true strategies like risk management, and compliance, as well as seek-out emerging information technologies that put you at risk. There are five main areas driving health care, government, finance, and other sectors to take action.  These five areas include:

1. Cloud computing - Threats, vulnerabilities, exploits, contracting, compliance, & management

2. Risk management - Fiscally sound defense postures, asymmetric returns and correlated threats

3. Compliance - GRC, efficiencies and integration, real time data and aggregate reporting, transparency and accountability

4. Emerging exploits - What filters miss, dissecting attack vectors, understand how vulnerabilities are aggregated with automated techniques

5. Cryptography - Center stage for authentication, now under attack

Learning Objectives

INVESTIGATE and analyze emerging information technologies as they relate to data protection and security.

IDENTIFY critical security issues associated with new information technologies, threats, risks and vulnerabilities.

EVALUATE solutions needed to protect your data assets.

SUMMARIZE how to implement the security standards necessary to ensure compliance with government, law and regulations.

PERFORM and apply best practices in IT risk management.

INTEGRATE information assurance in a life cycle risk management framework.

What you get

  • Seminar workbook
  • Security tools CD
  • Certificate of Completion
  • 16 CPEs

Why you should attend

RELEVANT Case studies will be discussed that identify: the latest threats to the enterprise; security threat impact analysis; new technology deployment; and, risk in the corporate environment, health care channels and government sectors.

POPULAR  IP3’s seminar series has been attended by over 6,000 security professionals from small business, medium to large corporations, government, professional associations, health care and numerous other industries.

EARN CPEs Industry professionals that hold certifications can utilize their Certificate of Completion for 16 CPEs toward credential maintenance.

DISSECTION OF CURRENT SECURITY ISSUES Google, Aurora, Sony, and Epsilon are real time eye-opening examples of just some of the most significant exploits of the century.

NETWORKING Brush elbows with IT security peers. Gain critical and insightful updates and knowledge while enjoying one of the nation’s leaders in information assurance.

CENTRAL MICHIGAN UNIVERSITY
GRAWN HALL – PIERPONT AUDITORIUM
Date To Be Determined

$595.00


Live Seminar Instruction



Security Blog

Does your smartphone app discover all your accounts?

There’s a chill in the air, and it’s not just the normal fall morning breeze. In the era of NSA Prism/Xkeyscore/whatnext surveillance, and...

Ethical implications of whistle blowing

(ISC)2 code of ethics; Protect society, the commonwealth, and the infrastructure. Act honorably, honestly, justly, responsibly, and legally. Provide diligent and competent service to principals. Advance and protect...

The Great ATM Heist - is it really newsworthy?

On Friday, May 10, we saw many headlines about the latest great ATM bank robbery. Apparently these types of attacks are being regarded as...