BEGIN:VCALENDAR
VERSION:2.0
CALSCALE:GREGORIAN
METHOD:PUBLISH
PRODID://NDCP//416004
BEGIN:VEVENT
DTSTAMP:20260505T232023
VTIMEZONE:America/Chicago
DTSTART:20260212T160000Z
DTEND:20260212T180000Z
UID:416004
SUMMARY:Current Cybersecurity Risk Management Trends
LOCATION:Webinar
DESCRIPTION:Current Cybersecurity Risk Management Trends\n\n02/12/26 10:00 AM CST\n - 02/12/26 12:00 PM CST\Description:\nOne of the top concerns of any organization's leadership is how to mitigate the risk of cybersecurity threats, along with the prevention and detection of fraud. This course will focus on the most common cybersecurity vulnerabilities and fraud trends, and best practices for managing them.
 This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.Objectives:After attending this presentation, you will be able to...
 Recall the most common cybersecurity threats and protections
 Analyze methods to protect data
 Utilize resources available for designing and implementing a cybersecurity risk management programInstructor:Jennifer F. Louis, CPAFields of Study:Information TechnologyMajor Topics:The major topics that will be covered in this course include:Overview of current cybersecurity threats and how to mitigate data breach risk.Describe how to avoid malware and other security threats\Location:\nWebinar\n\n,
X-ALT-DESC;FMTTYPE=text/html:Current Cybersecurity Risk Management Trends<br /><br />02/12/26 10:00 AM CST - 02/12/26 12:00 PM CST<br />Description:<br />One of the top concerns of any organization's leadership is how to mitigate the risk of cybersecurity threats, along with the prevention and detection of fraud. This course will focus on the most common cybersecurity vulnerabilities and fraud trends, and best practices for managing them.<br />
<br />
This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.<br><br><b>Objectives:</b><br>After attending this presentation, you will be able to...<br />
Recall the most common cybersecurity threats and protections<br />
Analyze methods to protect data<br />
Utilize resources available for designing and implementing a cybersecurity risk management program<br><br><b>Instructor:</b><br>Jennifer F. Louis, CPA<br><br><b>Fields of Study:</b><br>Information Technology<br><br><b>Major Topics:</b><br><br><span style="display:inline-block;margin-left:1em;"><p>The major topics that will be covered in this course include:</p><ul><li>Overview of current cybersecurity threats and how to mitigate data breach risk.</li><li>Describe how to avoid malware and other security threats</li></ul></span><br />Location:<br />Webinar<br /><br />,  
PRIORITY:3
TRANSP:TRANSPARENT
BEGIN:VALARM
TRIGGER:-PT5M
ACTION:DISPLAY
DESCRIPTION:Reminder
END:VALARM
END:VEVENT
END:VCALENDAR
