Gain a better understanding of tax identity theft, how to prevent it, and what to do if your client is affected.
Data privacy and cybersecurity threats are constantly and rapidly evolving. This topic will address the most pressing cyber threats and provide information on developing a cybersecurity strategy to better combat fraud and protect client data as well as your own. The information will focus on providing tips for enhancing safeguards and implementing security controls and incident response plans to prevent, protect, mitigate, respond, and remediate cyber incidents. We will also discuss enterprise risk management and prevention; data security plan development and implementation; effective responses to an attack and/or breach; and state and federal laws and regulations governing data security.
Learning Objectives:-
- You will be able to describe the cyber risk landscape and the current threats to data.
- You will be able to discuss the increased cyber risks associated with the COVID-19 pandemic and remote workforces.
- You will be able to identify high-risk data and best practices for protecting it, as well as tips for preventing a cyber incident.
- You will be able to review your company’s approach to data security and enhance your practices as necessary.
Agenda:-
- Current Trends and Cyber Risks
- Emerging Cyber Threats
- High-Risk Data in a Highly Connected World
- Security Challenges During a Pandemic
- Challenges of Remote Working
- Connected Devices and Vulnerable Communication Platforms
- Remote Access to Corporate Networks and Data
- How to Minimize Risks and Protect Yourself Against Identity Theft
- Developing Data Security Plans to Prevent, Protect From, and Counter Cyber Threats
- Developing a Cybersecurity Strategy to Better Combat Fraud and Protect Clients' Data
- Developing Incident Response Plans to Mitigate, Respond, and Remediate Cyber Incidents or Data Breaches
- Laws and Regulations
- Laws and Regulations Governing Data Security That Applies to Specific Sectors/Industries
- State and Federal Identity Theft Protections Laws and Data Breach Notification Requirements
- Available Guidelines, Frameworks, and Benchmarks
- Practicing Cyber Hygiene
- Cybersecurity Best Practices to Protect Sensitive Data at Rest and in Transit
- Security Controls to Protect Connected Devices, Email Communication, and Avoid Phishing Scams and Ransomware Attacks
- Privacy Issues and Employee Training
Who should Attend?
This live webinar is designed for accountants, CFOs, controllers, accounts payable professionals, tax managers, presidents, vice presidents, bookkeepers, tax preparers, and attorneys.