NEBRASKA SOCIETY OF
Certified Public Accountants
SERVING NEBRASKA AND ITS CPAS SINCE 1928
Securing Your Data - Practical Tools for Protecting Information
<— Previous Page
Online Registration Form

Date: July 29, 2019
Location: Quarry Oaks Golf Course, Ashland
Course Time: 1:00 PM to 4:30 PM
Afternoon Course
Registration Begins: 12:30 PM
Summary
Security is not optional and yesterday's security techniques are not working to minimize today's security threats. Therefore, now is the time for you to tune up what you know about protecting sensitive data. In this program, you will learn about the latest tools and techniques for securing your data, including encryption, virus protection, secure communications, electronic signatures, secure authentication, and more. You will also learn how to implement a very practical, five-step approach to securing your PC and the types of questions you should be asking of your staff to ensure server-based information remains protected. Extensive demonstrations will be used by your K2 instructor to teach the techniques and concepts presented. Security failures, such as a breach of client or customer data, are costly - they can even drive your company out of business. What are the security tools you need and how do you use them to secure your sensitive data and systems? Can you afford to take the risk of attempting to manage today's threats by using yesterday's techniques? Participate in this program to learn how you can implement viable and practical solutions to mitigating today's security threats. "Great info. I took several ideas from this class." W.H., CPA MS For more details, please visit www.k2e.com/sec-4.
Objectives
Upon completing this course, you should be able to: * Assess the relevant security risks in your organization * Identify specific tools and techniques to protect sensitive data * List five specific steps to improve PC security * Implement security procedures to improve organizational security
Highlights
* Identifying major security risks in your organization * Recognizing which tools you should use to mitigate specific risks * Understanding the importance of end-user training in mitigating security risks
Who Should Attend
Business professionals seeking to secure sensitive data

Course Level Intermediate
Prerequisites Basic understanding of computer operations
Course IDSEC4
Discussion LeaderTommy Stephens, K2 Enterprises
CPE Credit4
Additional Information: Parking provided on-site. If registered for both courses for the day, lunch is provided.
Fee: $150 - Society Member
$200 - Society Nonmember
<— Previous Page
635 S. 14TH ST. SUITE 330
LINCOLN, NE 68508
(402) 476-8482
(800) 642-6178
(402) 476-8731