Mitigating Corporate and Personal Identity Theft

Monday, August 02, 2010

Global Knowledge

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Hardly a day goes by without hearing about someone becoming a victim of identity theft or learning about another corporate data breach.  Since 2005 more than 300 million records containing sensitive information have been involved in security breaches in the US alone.

Recently it was revealed to the public that even those at the upper echelons of the U.S. Government are not immune from the threat of identity theft - just ask Ben Bernanke, Chairman of the Federal Reserve, who has been dealing with the aftermath of the theft of his wife's purse. NewsWeek reports:

The theft of the Bernanke check book—never publicly revealed until now—soon became part of a wide-ranging (and previously underway) identity-theft investigation by the Secret Service and the U.S. Postal Inspection Service.

The probe culminated in recent months with a series of arrests, criminal complaints, and indictments brought by federal prosecutors in Alexandria, Va. The targets: members of a nationwide ring that used an inventive combination of old-fashioned thievery and high-tech fraud to loot the bank accounts of unsuspecting victims.

"Identity theft is a serious crime that affects millions of Americans each year," Bernanke said

Of course, it is not surprising that high profile victims would eventually be caught up in the identity theft trend given the sophisticated nature and aggressive tactics employed by criminal elements.

What is less apparent is that corporations are just as much at risk of being victimized by similar tactics, and that proactive mitigation strategies must be engaged in order to protect corporate integrity and the company's bottom line.

Global Knowledge,  the worldwide leader in IT and business skills training, is introducing an exclusive four part Webinar series, “Arming Your Company (and yourself) Against Identity Theft”, based on their recently announced hands-on cyber security course entitled Cyber Security Foundations.

In Part One of the Webinar attendees will examine the following topics:

* Understanding what information cyber criminals are after
* How they obtain this information
* How to protect your company and yourself from being victim
* How to recognize if information has been stolen

Be sure to watch for the remaining three parts of this Webinar Series:

* Part Two: Cyber Security – Risk Management
* Part Three: Cyber Security – Physical Security
* Part Four: Cyber Security – Patch Management

The Cyber Security Foundations course, which is the catalyst for the Webinar series, covers all current and emerging security issues including ethical hacking, forensics, intrusion detection, and policy/procedure, and attendees will leave class armed with the tools to develop an interconnected security solution.

Infosec Island professionals who have completed their member profiles prior to August 31, 2010, including uploading a picture or company logo, will have the opportunity to win a seat at an exclusive and highly comprehensive cyber security training course. (Not a member yet? Register today - it's free!)

Register for this free webinar HERE.

To qualify to win a seat for the Cyber Security Foundations course, simply register as a member at Infosec Island and complete the brief professional profile, and be sure to upload a picture or company logo. All members with completed profiles by August 31, 2010 are automatically entered to win this cutting-edge course valued at US$3295.00!

Global Knowledge is the worldwide leader in IT and business skills training. We deliver via training centers, private facilities, and the Internet, enabling our customers to choose when, where, and how they want to receive training programs and learning services.

Possibly Related Articles:
16428
Impersonation
Identity Theft Enterprise Security
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.