Slide Deck

12 Slides available anytime
  • 12 Slides

Data Security Tips for Remote and Mobile Working

 

Learn best practices for securing your workspace, wherever your remote workers' office may be.

Cyber actors have and will continue to exploit increased use of virtual environments by government agencies, the private sector, private organizations, and individuals as a result of the COVID-19 pandemic. Computer systems and virtual environments are the essential lifeline for many companies and organizations that are conducting regular business remotely. This topic addresses how cyber actors exploit vulnerabilities in these systems to steal sensitive information, target individuals and businesses performing financial transactions, and engage in extortion. And more importantly, what you can do to mitigate the risks of working remotely. If your organization, like so many others, has deployed remote working options, this information provides important best practices for organizations to consider for securing your workspace, wherever your remote workers' office may be, while meeting your obligations of business operations.

Agenda

Faculty

Mason Clark

Mason Clark

Ice Miller LLP

  • Member of Ice Miller LLP's data security and privacy group
  • Prior to joining Ice Miller, he served as a corrections officer for a local county department of corrections
  • Worked at the Indiana Department of Transportation where he was responsible for co-authoring legislative proposals for innovative technologies like automated transportation vehicles, and drafting private-public partnership agreements with multinational corporations, with heavy privacy implications
  • J.D. degree, Indiana University Maurer School of Law; M.S. degree in cybersecurity risk management, Indiana University
Tiffany Kim

Tiffany Kim

Ice Miller LLP

  • Member of Ice Miller LLP's data security and privacy group
  • Former co-chair of the Homeland Security Region 6, West Michigan Cyber Security Consortium, where she was responsible for maintaining a multijurisdictional, public/private partnership to enhance the prevention, protection, response, and recovery to cyber security threats, disruptions, and degradation to critical information technology functions
  • Former tactical communications operator with the United States Marine Corps
  • J.D. degree, Indiana University Maurer School of Law

All of your training, right here at Lorman.

Pay once and get a full year of unlimited training in any format, any time!

  • Live Webinars
  • OnDemand Webinars
  • MP3 Downloads
  • Course Manuals
  • Audio Recordings*
  • Executive Reports
  • White Papers and Articles
  • Sponsored Live Webinars

Additional benefits include:

  • State Specific Credit Tracker
  • Members Only Newsletter
  • All-Access Pass Course Concierge

* For audio recordings you only pay shipping

Questions? Call 877-296-2169 to speak with a real person.

Sign Up Today

Access to all training products $699/year

Unlimited Lorman Training

With the All-Access Pass there is no guessing what you will need for your yearly training budget. $699 will cover all of your training needs for an entire year!

Easy Registrations

Once you purchase your All-Access Pass you will never be any further than one-click away from attending any Lorman training course.

Invest in Yourself

You haven't gotten to where you are professionally by luck alone; it's taken a lot of hard work and training. Invest in yourself with the All-Access Pass.