Hackers and Viruses: Protecting Your Network
Learn security rules of the road that can be implemented in your organization to better address risk.
This program will provide you with tools to better understand the origins and kinds of cyber risks. This topic will address how technology in the workplace, cloud computing, remote workers, and other factors have come together to create a perfect storm of cyber risk. We will also discuss the two most common sources of security compromises and how to mitigate them.