Events Search
  Summary & Check Out (0)
Monday, November 6, 2023 Live Webcast

Cyber Attacks Through Impersonation (X2-39388)

3:30 PM - 4:30 PM EDT
webcast

Vendor Platform

1 CPE Credits in SK

OVERVIEW

This course describes how cyber attacks through impersonation are conducted. It also provides practical advice and recommended security controls to implement, reducing the likelihood and impact of an impersonation cyber attack.

DESIGNED FOR

Everyone should attend this to help avoid becoming a victim of an impersonation cyber attack

BENEFITS

After attending this presentation you will be able to...

  • Identify what a cyber impersonation attack is
  • Recognize how impersonation attacks are conducted
  • Distinguish security controls & protocols that can help prevent or minimize the impact of impersonation attacks

HIGHLIGHTS

The major topics that will be covered in this class include:

  • Impersonation techniques used to launch cyber attacks
  • Cybercriminals' focus: stealing financial assets and intellectual property
  • Practical advice on controls to implement to reduce victimization from impersonation cyber attacks
  • Practical advice to reduce the impact of a cyber attack

COURSE LEVEL

Basic

PREREQUISITES

None

ADVANCE PREPARATION

None

INSTRUCTOR

Petrina Youhan

Petrina Youhan, CPA, CISSP