Log In to Register

Please note that this course is from a third party vendor, K2 Enterprises. We strongly recommend registering no later than one-hour before the course begins. Please contact K2 if you do not receive your invitation via email at least 24 hours before the course begins: [email protected]. Thank you.

Date(s):

10/30/2025

Registration Open:

12:45 PM - 1:00 PM

Time:

1:00 PM - 4:30 PM

Facility:

Online

Meeting Type:

Courses

CPE Credit:

4.00

Field(s) Of Study:

Information Technology (4.00)

Level of Knowledge:

Intermediate

Price:

Member: $255.00
Nonmember: $340.00

Individual Discounts:

Not Available

Group Discounts:

10+ Registrants - Discount: 5.00%
20+ Registrants - Discount: 10.00%

Overview

Security is not optional, and yesterday’s security techniques do not minimize today’s threats. Therefore, now is the time to tune up what you know about protecting sensitive data. This program will teach you the latest tools and techniques for securing your data, including encryption, virus protection, safe communications, electronic signatures, secure authentication, and more. You will also learn how to implement a practical, five-step approach to securing your PC and the questions you should ask your staff to ensure server-based information remains protected.

 

Security failures, such as client or customer data breaches, are costly – they can even drive your company out of business. So, what security tools do you need, and how should you use them to secure your sensitive data and systems? Can you risk attempting to manage today’s threats using yesterday’s techniques? Participate in this program to learn how to identify viable and practical solutions to mitigating today’s security threats.

 

Data security is a top-of-mind concern for almost all business professionals, yet most struggle to achieve this objective. Make plans to participate in this session to learn about many practical tools you can use to protect your data and enhance cybersecurity.

         Assess the relevant security risks in your organization

         Identify specific tools and techniques to protect sensitive data

         List five specific steps to improve PC security

         Differentiate between security procedures to improve organizational security

 

This course is designed for Business professionals seeking to secure sensitive data.

Highlights

         Understanding today’s cybersecurity risks

         Identifying major cybersecurity risks

         Implementing specific steps to reduce risk

Speaker(s)

Prerequisites

Basic understanding of computer operations