Principles for Understanding, Managing, and Monitoring Your Information Systems
As financial institutions and your customers become more reliant on technology, it is important to have a better understanding of your information systems to mitigate and monitor risks. Using basic concepts without using technical jargon, this seminar describes and demonstrates fundamental information security strategies for protecting your information systems. Many of the security principles presented are described in the FFIEC IT Examination Handbook and various interagency guidelines.
Who should attend?
Senior Management, Information Security Officers, Information System Administrators, Operations Managers, and IT Auditors
Key Topics Include:
Cybersecurity
• Cyber threat trends
• FFIEC cybersecurity awareness
• Cybersecurity resources
Data Communications
• Roles of routers, switches, and firewalls
• Wireless technologies
Information Security Concepts
• Terminology
• Defense in depth
• Security trends
IT Audit Program
• Risk assessment
• Scope
• Audit plan
• Social engineering
Network Audit Tools
• Patch management
• Network security parameters
• Microsoft® Active Directory
Network Security Management
• Server roles
• Data backup
• Data encryption
• Basic group policy management
• User access privileges
• Perimeter protection
• Microsoft® security updates
• Mobile device security
• Social media
Security Monitoring
• Intrusion detection/prevention
• Perimeter vulnerability assessments
• Event log management
• Social engineering
Cybersecurity
• Cyber threat trends
• FFIEC cybersecurity awareness
• Cybersecurity resources
Data Communications
• Roles of routers, switches, and firewalls
• Wireless technologies
Information Security Concepts
• Terminology
• Defense in depth
• Security trends
IT Audit Program
• Risk assessment
• Scope
• Audit plan
• Social engineering
Network Audit Tools
• Patch management
• Network security parameters
• Microsoft® Active Directory
Network Security Management
• Server roles
• Data backup
• Data encryption
• Basic group policy management
• User access privileges
• Perimeter protection
• Microsoft® security updates
• Mobile device security
• Social media
Security Monitoring
• Intrusion detection/prevention
• Perimeter vulnerability assessments
• Event log management
• Social engineering
Agenda
8:30 – 9:00 a.m. Registration and continental breakfast
9:00 a.m. – Noon Morning session
Noon – 1:00 p.m. Lunch (provided)
1:00 p.m. – 4:00 p.m. Afternoon session
1:00 p.m. – 4:00 p.m. Afternoon session
Presented by
Mark Scholl, Partner, Wipfli LLP
Registration Fee
$245 per person
Dates and locations
Please join your colleagues and Wipfli compliance experts for a one-day workshop on the date and at the location most convenient for you. Click the links below to learn more or to register.
Tuesday, August 22, 2017 COMPLETED
St. Paul, Minnesota
Thursday, August 24, 2017 COMPLETED
Madison, Wisconsin
St. Paul, Minnesota
Thursday, August 24, 2017 COMPLETED
Madison, Wisconsin
Wednesday, November 1, 2017 CANCELLED
Helena, Montana
Thursday, November 2, 2017 CANCELLED
Bozeman, Montana
Helena, Montana
Thursday, November 2, 2017 CANCELLED
Bozeman, Montana
Questions
Please contact Mary Boortz at 715.858.6677 or mboortz@wipfli.com.