Register Online - Add to Cart

Credits

Sponsored by Lorman Education
Product ID: 407452EAU
 
Credit & Course Provided by:

Impact and Prevention of Tax Identity Theft

OnDemand Webinar (87 minutes)

Gain a better understanding of tax identity theft, how to prevent it and what to do if your client is affected.Data privacy and cybersecurity threats are constantly and rapidly evolving. This topic will address the most pressing cyber threats and provide information on developing a cybersecurity strategy to better combat fraud and protect client data as well as your own. The information will focus on providing tips for enhancing safeguards and implementing security controls and incident response plans to prevent, protect, mitigate, respond, and remediate cyber incidents. We will also discuss enterprise risk management and prevention; data security plan development and implementation; effective responses to an attack and/or breach; and state and federal laws and regulations governing data security.

Authors

Linn Freedman, Robinson & Cole LLP

Agenda

Current Trends and Cyber Risks

• Emerging Cyber Threats

• High-Risk Data in a Highly Connected World

Security Challenges During a Pandemic

• Challenges of Remote Working

• Connected Devices and Vulnerable Communication Platforms

• Remote Access to Corporate Networks and Data

How to Minimize Risks and Protect Yourself Against Identity Theft

• Developing Data Security Plans to Prevent, Protect From, and Counter Cyber Threats

• Developing a Cybersecurity Strategy to Better Combat Fraud and Protect Clients' Data

• Developing Incident Response Plans to Mitigate, Respond, and Remediate Cyber Incidents or Data Breaches

Laws and Regulations

• Laws and Regulations Governing Data Security That Apply to Specific Sectors/Industries

• State and Federal Identity Theft Protections Laws and Data Breach Notification Requirements

• Available Guidelines, Frameworks, and Benchmarks

Practicing Cyber Hygiene

• Cybersecurity Best Practices to Protect Sensitive Data at Rest and in Transit

• Security Controls to Protect Connected Devices, Email Communication, and Avoid Phishing Scams and Ransomware Attacks

• Privacy Issues and Employee Training