(314) 504-0530 info@bac-mail.com

Safeguarding Personally Identifiable Information: Assessing and Mitigating the Threat of Identity Fraud

  • CPE Credits: 4 (one-half day presentation)
  • Prerequisites: None
  • Learning Level: Basic
  • Instructional Method: Group Live
  • Field of Study: Personnel/Human Resources – Non-Technical
Course Revision Date: March 1, 2023

Back to Training Catalog >

Course Description
This course will address the most significant issues in identity fraud faced by today’s business and records management professionals. Charged with ensuring the security of your organization’s confidential, personally identifiable information what risks threaten the integrity and security of these data and how will you mitigate these risks using the available technology?

The attendee will be provided with valuable resources, and insights into protecting on-line identities, ensuring greater privacy of protected information, avoiding online fraud schemes, protecting sensitive personal, employee, student, and customer information, plugging information leaks, assessing security exposures and even coping with identity fraud after an impostor strikes.

Also addressed will be what role security and the security function plays in providing a controlled work environment for protecting and safeguarding the confidentiality of institutional data.

Audience
This seminar is intended for internal/external auditors, Chief Technology Officers, General Counsels, Chief Information Officers, Chief Security Officers, Controllers, Chief Privacy Officers, acting Privacy Officers, managers responsible for directing internal and external audit professionals, Human Relations professionals charged with implementing innovative EAP programs, and any individual who wishes to learn how to take a proactive stance in protecting their individual privacy.
Objectives
After completing this seminar, participants will be able to answer the following questions:
1.     What Is Identity Fraud?
2.     Why Should I Care?
3.     How Can Someone Steal My Identity?
4.     Am I an ID Thief’s Next Victim?
5.     What If It Happens To Me?
And be able to:
1.     Identify Low-Tech Methods of Identity Fraud Protection
2.     Investigate the Feasibility of Implementing Privacy-Enhancing Technologies, Or “Pets”
3.     Implement 10 Steps to Plug Personal Information Leaks
4.    Recognize that Privacy Theft is an Implication of ID Fraud
Course Outline

Please contact Al with a request for a detailed course outline…

albert@bac-mail.com

Need more information?

If have questions or would like more information about any of our courses please contact us using the form below. We look forward to hearing from you.

1 + 4 =

Request a Consultation Today

We provide a variety of consultation services and training options to fit the demanding and changing needs of our clients. Contact us today and we will help you determine the best way to meet your goals.

cybersecurity and infrastructure security angency

BAC is a vetted, current provider of training courses through the NICCS Education and Training Catalog. BAC’s courses are aligned to the specialty areas of the National Cybersecurity Workforce Framework.