top of page
Understanding Cyber Security Risks - In-Person

Understanding Cyber Security Risks - In-Person

Demystifying Cyber Security Risks in Intellectual Property: A Comprehensive Webinar

 

In the digital age, where intellectual property (IP) forms the backbone of innovation and competitive advantage, protecting this invaluable asset and non-public information from cyber security threats is paramount. Our webinar, "Understanding Cyber Security Risks in Intellectual Property," invites professionals to a deep and insightful exploration of the complex landscape of information protection in the context of mounting cyber threats.

 

Event Overview: This workshop has been carefully crafted for those at the forefront of information management, cybersecurity, and risk assessment. It offers an immersive experience into the intricacies of safeguarding information amidst the evolving cyber threat landscape, delivering practical knowledge and actionable strategies.

 

Date and Time: Join us for a session that promises not only to enlighten but also empower you with the tools needed to protect your organization's most precious assets. Duration: 2 CPE Hours dedicated to the rigorous examination and understanding of cybersecurity risks associated with intellectual property.

Format: Engage in a Group Internet-Based setting that brings together like-minded professionals in an interactive, collaborative learning environment.

 

Who Should Attend:

  • IP attorneys and legal professionals looking to integrate cyber security considerations into their practice.
  • Cybersecurity specialists aiming to understand the nuances of information protection within the cyber domain.
  • Business leaders and innovators who recognize the critical importance of protecting information assets against cyber security threats.

 

Learning Objectives:

  • Gain a comprehensive understanding of the cyber security challenges.
  • Learn to identify potential vulnerabilities in the protection of information and devise robust security measures.
  • Understand the legal and regulatory framework surrounding cyber security, enhancing your compliance strategy.
  • Explore case studies and real-world examples of cyber breaches, drawing lessons on prevention, response, and recovery.

 

Highlights of the Workshop:

  • Expert-led presentations providing in-depth insights into the intersection of cybersecurity and intellectual property.
  • Practical sessions on assessing risk and implementing security protocols tailored to the unique needs of information protection.
  • Interactive discussions that foster peer learning and offer diverse perspectives on combating cyber risks.

 

Secure Your Information Assets: Don't miss this opportunity to transform your approach to information protection in the digital world.

 

Join us as we chart a course through the complexities of cyber security and IP protection. Empower yourself with the knowledge and skills to safeguard the heart of innovation and maintain your competitive edge in an increasingly digital marketplace.

  • Details on Event Presentation

    Being offered on Tuesdays at 1:00 p.m. to 3:00 p.m.

    We can schedule private events on your timetable for two or more attendees.

    NASBA Program Disclosure

    Program Level of Understanding: Basic

    Prerequisites: None

    Advance Preparation: None

    Delivery Format: On-site Training (Group-Live); Seminar (Group-Live)

    NASBA Field(s) of Study: Auditing, Information TechnologyCPE Credits: 2, based on 50 minutes of instruction per hour

  • CPE Event Highlights

    The purpose of this seminar is to provide each attendee with a high-level understanding of Cybersecurity and the Board's major fiduciary oversight and responsibilities concerning:

    • What is cyber security?

    • Traditional information security vs. cyber security

    • Key principles of cyber security oversight

    • What is an effective cyber security plan?

    • Questions to ask Management about the cyber security plan.

    • Situational awareness

    • Strategy and operations

    • Insider threats

    • Supply-chain and third party risks

    • Incident responses

    • After a cyber security incident

  • Learning Objectives

    What you will hear at this seminar:

    • Cyber-Risk Threats by the Numbers

    • Principles of cyber-risk oversight

    • Identify the key components of a cybersecurity plan

    • Example questions to ask management about the cybersecurity situation

  • Key Issues on the Agenda

    Introductions
    Section 1 - Executive Summary

    • What is cybersecurity?

    • Information security is complex.

    • Assume you will have a security breach.

    • Engage IT Audit and Security Leaders by asking good questions.

    Section 2 - Board Guidance - Tone at the Top

    • Cybersecurity and the Board of Directors

    • Is cybersecurity an audit committee responsibility?

    • Building an effective cybersecurity plan.

    • Words of caution when dealing with risks.

    Section 3 - Questions the Board Asks Management

    • Situational awareness questions

    • Strategy and operations

    • Insider threats

    • Supply-Chain and Third-Party Risks

    • Designing an Incident Response

    • After a cybersecurity incident

    Section 4 - Sample Guidance

    • Top Cybersecurity Safety Actions

    • Holistic Cybersecurity

    • What is internal control?

    Section 5 - Moving Forward with a Response

    • What are the contents of an Information Security Program?

    • How do you investigate an event?

    • Who needs to be notified of an event?

  • Summary of the Subject Matter

    This CPE event "Understanding Cyber Security Risks" provides in-depth insights into the ever-evolving landscape of cybersecurity threats and risks. This comprehensive seminar aims to equip participants with the knowledge and tools necessary to understand and mitigate the potential dangers associated with cyber breaches.

    The event covers key topics such as emerging cyber threats, industry-specific risks, best practices for risk assessment, and strategies for enhancing cybersecurity posture. By delving into these critical areas, the event empowers attendees to proactively address cyber security challenges and bolster their organization's resilience against evolving cyber threats.

  • Authoritative Sources

    Here are some authoritative sources along with web links to expand attendees' knowledge after the CPE event "Understanding Cyber Security Risks":

    • NIST Cybersecurity Framework: The National Institute of Standards and Technology (NIST) Cybersecurity Framework provides a comprehensive set of guidelines, standards, and best practices for managing cybersecurity risks. Attendees can explore this framework to gain insights into effective cybersecurity risk management.
    • ISO/IEC 27001: The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) jointly developed the ISO/IEC 27001 standard, which outlines the requirements for establishing, implementing, maintaining, and continually improving an information security management system. This standard serves as a valuable resource for understanding information security risk management.
    • CIS Controls: The Center for Internet Security (CIS) Controls offers a set of best practices for cyber defense that provide specific and actionable ways to stop today's most pervasive and dangerous cyber attacks. Attendees can refer to the CIS Controls for practical guidance on improving cybersecurity posture.

    By delving into these authoritative sources, attendees can further enhance their knowledge and understanding of cybersecurity risk management and strengthen their organization's cybersecurity strategies.

$180.00Price
bottom of page