The Growing Internal Cyber-Threats and How to Protect Against Them

  • Speaker:Peter Goldmann
  • Date: 8th March 2017 10:00 AM PST | 01:00 PM EST
  • Duration:75Min
  • Product Code:GRC-90088

$249

refer

Refer Friend's


Live Session - How it works

  • Username and Password will be sent to you 24 hours prior to the webinar.
  • Presentation handouts in pdf format will be mailed to you.
  • Login to the session using the username and password provided to you.
  • Get answer to your queries through interactive Q&A sessions via chat.
  • Please let us know your thoughts and views at the end of webinar, your valuable feedback will help us improve.
  • Get certification of attendance.

Recorded Session - How it works

  • Login Information with Password to view the webinar, 24 hours after the Live webinar (link valid for 6 months).
  • A link will be provided to you upon purchase of the recorded session.
  • Please click on the link to access the session.
  • Presentation handouts in pdf format will be mailed to you.
  • Get certification of attendance.

Training CD - How it works

  • Free shipment within 72 Hours, from the date of webinar completion.

(More about our products contact +1- 248-233-2049)

Description:
Companies have enough to worry about from outsiders when it comes to cybersecurity. From clever hackers infiltrating their networks to criminal gangs stealing their data and government surveillance of their systems, security teams have to be on their toes at all times. But the insider threat can be just as dangerous and sometimes harder to detect.
 According to the 2015 Insider Threat Spotlight Report, 62 per cent of security professionals are seeing a rise in insider attacks.  While many of these are malicious attacks, they can also be unintentional breaches. The consequences, no matter the motivation, can be equally devastating.
This timely webinar discusses the most current and dangerous insider cybersecurity threats and outlines measures for preventing and investigating insider data theft, industrial espionage, cyber-sabotage, identity theft and more.
 
The webinar will cover:
•      Types of insider threats and most common perpetrators
•      Red flags of internal data theft, cyber-sabotage, identity theft and espionage to watch for
•      Latest best practices in information security
•      Insider data theft investigation essentials
 
Learning Objectives:
○      Explore the common and not-so-common insider threats to your organization’s information security
○      Identify the most common insider cyber-perpetrators
○      Understand the red flags of potential or actual insider cyber-crime
○      Learn how to detect and initiate an investigation of suspected insider cyber-crime

Instructor Profile:

Peter Goldmann is President of FraudAware LLC, the publisher of White-Collar Crime Fighter, a widely read bi-monthly newsletter for internal auditors, controllers, corporate counsel, financial operations managers and investigators. The newsletter is in its 15th year of publication under Peter’s leadership. 

Peter is the author of Fraud in the Markets: Why it Happens and How to Fight It, published by John Wiley & Sons. The book is an in-depth account of the role that fraud played in bringing about the financial crisis of 2008. 

Peter is also the author of four other anti-fraud books covering accounts payable fraud, accounts receivable fraud, as well as two workbooks on fraud and cyber-risk and control, also published by Wiley. 

Peter also developed FraudAware, the leading fraud and cyber-crime awareness training program. A user-friendly learning tool, FraudAware uses seminar, Webinar and E-Learning formats to train employees and managers at all levels in how to detect, prevent and report incidents of fraud, information theft and other forms of financial and electronic suspicious conduct. 

FraudAware courses, which are customized for individual corporate, non-profit and government agency clients, reinforces organizations’ whistleblowing programs by enabling employees to detect illegal activity that can then be reported to supervisors or managers or by using the organization’s confidential hotline in accordance with established policy. 

In addition, Peter has conducted numerous on-site fraud and cyber-crime detection and prevention workshops for internal auditors, attorneys, HR executives and compliance officers at Fortune 500 companies including Siemens Corp., Marriott International, Sony Denny’s Corp, as well as large not-for-profit organizations. He has also been a guest lecturer for college accounting and auditing courses. 

Peter has 25 years of experience as a business journalist and trainer, having launched, edited and published numerous business trade periodicals covering small business, international trade, management strategy, cyber-crime (Cyber-Crime Fighter) banking and personal finance. He is a Certified Fraud Examiner (CFE) and a member of the Editorial Advisory Committee of the Association of Certified Fraud Examiners (ACFE). 

He has been a columnist for the ACFE’s newsletter, The Fraud Examiner and is a frequent contributor to other leading industry publications on anti-fraud and cyber-crime topics. He has appeared on Fox Business News, The Wall Street Journal This Morning, The New York Times and Internal Auditor magazine. 

Peter holds a Bachelor’s degree from the University of Michigan and a Master’s from the London School of Economics.

Available Options

Recording: Access it for 6 months from any location

$249

CD: Shipped within 2 working days

$339

5 Member Group: Access the Live Meeting online from any location globally

$919

10 Member group: Access the Live Meeting online from any location globally

$1,479

Recording: 24 Hour Access Only

$49
For discounts and offers call support

Related Products

Travel & Entertainment Reimbursement Fraud Detection and Prevention

Travel & Entertainment Reimbursement Fraud Detection and Prevention

Description:Expense reimbursement fraud encompassing the numerous forms of employee travel and entertainment (T&E) schemes as well as Purchasing Card (P-Card) fraudcosts organizations hundreds of thousands, if not millions of dollars per year. According to the Association of Certified Fraud Examiners (ACFE), expense reimbursement frauds result in a median loss of $26,000 per incident and represent 14.5 percent of all employee fraud. While many of these schemes are considereda immaterial such..

$249

Procure-to-Pay Fraud: Detecting and Preventing Purchasing, Receiving and Disbursement Frauds

Procure-to-Pay Fraud: Detecting and Preventing Purchasing, Receiving and Disbursement Frauds

Description:For many organizations, the procure-to-pay cycle offers extensive opportunity for increased operational efficiency. However, it also provides potentially numerous opportunities for fraudsters to exploit control deficiencies in all three stages—purchasing, receiving and disbursements.One common management mistake in the P2P cycle is adhering to a reactive anti-fraud posture. A criminal act committed in, for example, the purchasing department through a kickback scheme, may be detected ..

$219