Did you know that the financial industry is the 3rd most common target for cyber attacks in the US? To make matters worse, evidence indicates that it’s not a matter of if you get hacked, it’s a matter of when you will get hacked. Fortunately, you can help to protect your company from attacks and/or mitigate the impact of an attack by learning about the threats and solutions.
This online, self-paced course will provide you with the knowledge, skills, and tools to start you on a path to a more secure future. You will experience the content through course readings, engaging videos, interactive tools, and learning activities. Click the tabs below to learn more!
The first module will equip you with basic knowledge of the scams, malware, and mistakes that commonly result in cyber attacks. In the second module, you will apply and expand upon this new knowledge by creating a Business Continuity Plan for your company (or a mock company if you so choose). The data you provide will result in a robust map of your company’s business processes and the associated cybersecurity risk levels. You can take this map with you after the course to enact real change in your company.
In the final module, you will delve into the NIST Cybersecurity Framework to discover the core functions and associated security controls that can help your company (1) IDENTIFY assets, (2) PROTECT against future attacks, (3) DETECT current attacks, (4) RESPOND appropriately during an attack, and (5) RECOVER from an attack. You will then use this knowledge and your Business Continuity Plan to create a Target Profile that represents where your goals for improving your company’s cybersecurity strategies after you complete the course.
Upon completion of this course, participants will be able to:
- Identify the most common cyber scams and malware.
- Analyze case studies of major cyber attacks and identify ways by which the companies could have prevented the attacks.
- Explain the importance of creating a Business Continuity Plan.
- Create your Business Continuity Plan.
- Analyze and define the risk-level of your business processes.
- List and describe the core functions of the NIST Cybersecurity Framework.
- Align each security control with the appropriate NIST CSF core function.
- Explain the importance of creating a target cybersecurity profile.
- Create a target cybersecurity profile.
The course content will be delivered through a variety of methods including:
- Interactive Questionnaires
- Downloadable Handouts
This course does not require participants to be from a particular field of study and requires only a basic knowledge level of CPA business practices. No prerequisites or advance preparation are required for successful completion of this course.
Participants may cancel their enrollment for a full refund within 2 hours of enrollment. If enrollment is canceled between 2 and 24 hours after registration, participants will receive a 75% refund or 100% credit towards a similar Chalk & Tablet offering. Cancellation after the 24 hour grace period will result in a 0% refund or a 90% credit.
If Chalk & Tablet or Element Security Group C&T must cancel or reschedule an offering, all efforts will be made to communicate this change to participants via the preferred contact method specified by participants at registration (email or phone). Participants will have the option to withdraw their registration for a full refund or apply their registration fee to the rescheduled offering or a different Chalk & Tablet offering of the same format.
Refunds will be issued within 30 days in the same format as the payment was received. If participants paid with a credit card, their refund will equal the specified percentage of the course fee minus the 3.5% credit card fee that is non-refundable.
To file a complaint regarding this offering, please contact Chalk and Tablet at email@example.com.