This seminar is designed for accountants, controllers, CFOs, tax managers, presidents and vice presidents, bankers, enrolled agents and attorneys.
Who’s guarding your valuables? Paper documents, electronic media, the information in your corporate databases; all represent assets that must be protected to ensure the success of your business.
Protecting the safety of information assets is one of the most critical areas of business concern today. Not simply an IT issue; protecting sensitive information is mission critical for your business to survive. From legal risks to the loss of vital business information, failure to adequately protect sensitive information can result in serious damage to your business, costing you time and money.
Understanding the risks and how to go about creating a plan for mitigating those risks is a critical step in protecting your business from harm. This seminar will provide you and your business with a comprehensive overview of what you need to know to maintain the safety of your information assets.
8:30 a.m. - 10:00 a.m.
I. Information Security – What You Need To Know In A Nutshell
A. What Do You Need To Protect?
B. Security – Not Just An It Issue
C. Key Elements Of Information Security
D. “What, Me Worry?” – Top 10 Reasons Why Securing Your Information Assets Should Be Your Top Priority
E. What Are You Protecting Your Information From?
F. Overview Of Security Regulations And Requirements
10:00 a.m. - 10:50 a.m.
II. What Are You Vulnerable From?
A. Information Security Myths
B. The “Big 3” – Common Security Vulnerabilities
C. Other Security Risks
D. Disasters And Other “Acts Of Nature”
10:50 a.m. - 11:00 a.m.
11:00 a.m. - 12:00 p.m.
III. Preparing To Protect Your Information
A. ISO/IEC 17799 – International Standards For Information Security Management – 10 Areas To Begin Looking To Manage And Minimize Your Risks
B. What’s Records Management Got To Do With It?
C. Identifying And Mitigating The Threats To Your Information Assets
D. Who’s Responsible? – Roles And Expectations For Members Within Your Organization
E. The Role Of Your IT Staff
12:00 p.m. - 1:00 p.m.
Lunch (On Your Own)
1:00 p.m. - 2:00 p.m.
IV. Legal/Liability Issues – Is Your Organization A Lawsuit Waiting To Happen?
C. California Privacy Law (SB 1386)
E. Civil Liabilities
2:00 p.m. - 3:00 p.m.
VI. Beyond Passwords – A Security Primer
A. Assessing Your Risks
B. Threat Preparedness And Mitigation
C. Security Policy Development
D. Business Continuity/Disaster Recovery Planning
3:00 p.m. - 3:10 p.m.
3:10 p.m. - 4:15 p.m.
VII. What’s The Plan?
A. Meeting “Reasonable Man” Requirements
B. What Should Your Staff Do?
C. Network Security
D. Physical Security
4:15 p.m. - 4:30 p.m.
VIII. Panel Discussion