Assessing and Mitigating
Cybersecurity Risk
Phase 1 of the Built to Survive Series
Did you know that the financial industry is the 3rd most common target for cyber attacks in the US? To make matters worse, evidence indicates that it's not a matter of if you get hacked, it's a matter of when you will get hacked. Fortunately you can help to protect your company from attacks and/or mitigate the impact of an attack by learning about the threats and solutions.
This online, self-paced course will provide you with the knowledge, skills, and tools to start you on a path to a more secure future. The first module will equip you with basic knowledge of the scams, malware, and mistakes that commonly result in cyber attacks. In the second module, you will apply and expand upon this new knowledge by creating a Business Continuity Plan for your company (or a mock company if you so choose). The data you provide will result in a robust map of your company's business processes and the associated cybersecurity risk levels. You can take this map with you after the course to enact real change in your company.
In the final module, you will delve into the NIST Cybersecurity Framework to discover the core functions and associated security controls that can help your company (1) IDENTIFY assets, (2) PROTECT against future attacks, (3) DETECT current attacks, (4) RESPOND appropriately during an attack, and (5) RECOVER from an attack. You will then use this knowledge and your Business Continuity Plan to create a Target Profile that represents where your goals for improving your company's cybersecurity strategies after you complete the course.
Upon completion of this course, participants will be able to:
The course content will be delivered through a variety of methods including:
This is a QAS Self-Study course that aligns with the NASBA Information Technology Field of Study and results in 3.5 CPE Credits.
Chalk & Tablet is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.NASBARegistry.org.
This course does not require participants to be from a particular field of study and requires only a basic knowledge level of CPA business practices. No prerequisites or advance preparation are required for successful completion of this course.
Participants may cancel their enrollment for a full refund within 2 hours of enrollment. If enrollment is canceled between 2 and 24 hours after registration, participants will receive a 75% refund or 100% credit towards a similar Chalk & Tablet offering. Cancellation after the 24 hour grace period will result in a 0% refund or a 90% credit.
If Chalk & Tablet or Element Security Group C&T must cancel or reschedule an offering, all efforts will be made to communicate this change to participants via the preferred contact method specified by participants at registration (email or phone). Participants will have the option to withdraw their registration for a full refund or apply their registration fee to the rescheduled offering or a different Chalk & Tablet offering of the same format.
Refunds will be issued within 30 days in the same format as the payment was received. If participants paid with a credit card, their refund will equal the specified percentage of the course fee minus the 3.5% credit card fee that is non-refundable.
To file a complaint regarding this offering, please contact Chalk and Tablet at [email protected].
Adam Anderson
Meet the Instructor
Course Introduction Video
Course Outline
Module 1 Introduction
Lesson 1.1 | Common Scams & Malware
Lesson 1.2 | Importance of Information Security
Module 1 Checkpoint
Module 2 Introduction
Lesson 2.1 | Business Continuity Plan Part 1
Lesson 2.2 Resources
Lesson 2.2 | Business Continuity Plan Part 2
Lesson 2.3 | Risk Score Overview
Lesson 2.4 | Risk Score Analysis
Module 2 Checkpoint
Module 3 Introduction
Lesson 3.1 | NIST Cybersecurity Framework
Lesson 3.2 | Mitigating Risk through Security Controls
Lesson 3.3 | Building Your Target Profile
Module 3 Checkpoint
CPE-Qualified Exam
Course Evaluation Survey
Video Send Off
Questionnaire Text & Videos
Key Terms Flashcards