Streaming

All pricing

This item contains several different items. Purchasing this item includes all of the component items listed below.

About

Course ID
WITSRM

Component Items

This is a compilation item which contains other items. Licensing this one item causes all of the following items to be licensed.

Data Theft an on Ongoing Concern
The theft of intellectual property and personal data is a widespread, growing and expensive problem. In this report, we’ll take a close look at data theft and offer advice and best practices that will help organizations to get their arms around this challenging and potentially catastrophic security ... read more
Interactive course with lessons, pre-test, and post-test
Incident Response Plans: Advice and Best Practices
CIOs, IT and business leaders must be proactive in their planning and always ready to respond when it comes to cyber threats and attacks. Security experts agree that attacks are no longer a matter of “if” but are now clearly a matter of “when” for organizations today. A critical element in the IT an... read more
Interactive course with lessons, pre-test, and post-test
Vendor Risk Management: A Benchmark Study
The Vendor Risk Management Benchmark Study, includes data gathered from 460 executives and managers and shows that third party risk programs across industries lack maturity and could be putting data at significant risk. This program features interview guests, Gary Roboff of Shared Assessments, and R... read more
Interactive course with lessons, pre-test, and post-test
Identity Theft: What You Need to Know
How big of a problem is identity theft today? Just listen to these startling statistics. According to an online Harris Poll, some sixty million people have now become victims of identity theft here in the U.S., with fifteen-million of these thefts occurring in just this past year. In this report, ex... read more
Interactive course with lessons, pre-test, and post-test
How Cybercriminals Continue To Successfully Sneak Into Your Inbox!
Today’s cybercriminals are still sneaking into our email inboxes, and, with some 215 billion emails being received on a daily basis around the globe, that situation is likely to continue for the foreseeable future. In this report, we’ll explore the most current and pervasive types of email threats. ... read more
Interactive course with lessons, pre-test, and post-test
Data Breach: What to Expect and How to Prepare
In this report, we’ll feature segments from a live presentation by cybersecurity expert, John Reed Stark. Stark, will examine and analyze the workflows that are typical after a data breach. The presentation was recorded at a recent Financial Executives International conference. FEI, is an organizati... read more
Interactive course with lessons, pre-test, and post-test
Identity and Access Management: Advice and Best Practices
One of the more complex and challenging IT security issues for organizations today is authenticating user identity and managing access to business-critical networks, data and applications. Identity and Access Management, or IAM for short, has evolved at a rapid pace, spurred on by the rise of Cloud ... read more
Interactive course with lessons, pre-test, and post-test
Portability: A Key IT Security Requirement
With cyber threats evolving and the technology landscape changing so quickly it’s critically important that an organization’s information security be not only resilient, but also portable, in order to offer the maximum protection possible. In this program, we’ll discuss the concept of portability, a... read more
Interactive course with lessons, pre-test, and post-test
Cyber Risks & Trends You Must Be Aware Of!
Cybersecurity has escalated to one of the most critical issues facing the world today. It seems as though not a day goes by when we’re not hearing about another cyberattack, data breach, hack or scam. So, what can be done to defend against this cyber-onslaught? Well, one step that can be taken to he... read more
Interactive course with lessons, pre-test, and post-test
Cyberattacks: Trends, Threats and Prevention
The numbers have been tallied and just as expected, it was another record-breaking year for cyberattacks and breaches. In fact, the organization, Online Trust Alliance reports that “cyber incidents targeting businesses nearly doubled from 82,000 in 2016 to 159,700 in 2017, thanks to ransomware and o... read more
Interactive course with lessons, pre-test, and post-test
Top 5 Enterprise Security Projects
How big of a problem is identity theft today? Just listen to these startling statistics. According to an online Harris Poll, some sixty million people have now become victims of identity theft here in the U.S., with fifteen-million of these thefts occurring in just this past year. In this report, ex... read more
Interactive course with lessons, pre-test, and post-test
Your Email is Out to Get You  How did this happen?
Malicious email is one of the leading security risks for enterprises today. Email attacks can cause a loss of business, damage corporate reputations and reduce customer confidence. Then, there are the fines and legal fees that follow when customer information or financial data is breached. Combating... read more
Interactive course with lessons, pre-test, and post-test
Strategies and Best Proactices For Securing a Multi-Cloud Architecture
Over the course of the past decade, Cloud Computing has evolved with lightning speed and has become an indispensable part of our day to day computing lives. Can you even imagine a world without the Cloud! Today Cloud innovation and evolution marches on, with more and more organizations now adopting ... read more
Interactive course with lessons, pre-test, and post-test