 |
Corporate Compliance Seminars - Left Menu, General Pages
|
NAIC Cybersecurity Model Law Training Academy - Risk Management Strategies
New cybersecurity risk management regulations for insurance companies are approaching faster than you might think. The National Association of Insurance Commissioners (NAIC) approved Insurance Data Security Model Law and the State of New York in March 2017 placed into effect Section 500 of Title 23 of the Official Compilation of Codes.
"Computers, software, programming and algorithms are all parts of a cybersecurity risk program but it is the interaction with the "humans" that makes all the difference in world."
NAIC's model law requires insurance organizations to have everything from information security program policies to incident response plans to specific breach notification procedures. Insurance organizations will also have to certify compliance to state insurance commissioners annually. Now that NAIC's model law is heading for adoption, it's important to learn how it might apply to your organization and what you can do now to start preparing for compliance.
This event focuses on describing the effective components of a modern cybersecurity risk management program. The attendees will be prepared to start the evaluation of an existing program. They will then be able to discuss with senior management, the audit committee, and the board of directors how to proceed in improving cybersecurity risk management. We consider five main components of an effective risk management program: data, control implementation, verification, breach preparedness and risk management.
This comprehensive training course is for anyone who wants to have a strong base of knowledge and understanding of the essentials of cybersecurity risk management.
This timely, two day CPE training seminar is designed for the project director, project leader and individuals who have to create effective cybersecurity program and the related documents for an insurance organization. Each attendee will go home with a set of 35 documents that were used to create the academy.
Follow the below links for further detail information:
. Seminar Highlights
. Learning Objectives
. Key Issues on the Agenda
Each attendee will receive 16 CPE Hours.
The retail cost of this CPE seminar is $1,195.00 per attendee.
To reserve your space, click on the "SIGN-UP NOW!" link in the right margin, complete the registration form, and use the corresponding "Submit Registration Form and Move to Payment Options Page" button for filing the registration and moving to the payment page.
Testimonials:
Course Duration: 2 Days; CPE Credits: 16; Knowledge Level: Basic; Field of Study: Information Technology, Risk Assessment, Audit; Delivery Format: Group-Live Presentation; Prerequisites: None; Advance Preparation: None. A certificate of completion will be provided.
Upcoming NAIC Cybersecurity Model Law Training Academies:
City |
Date |
Timing |
|
|
|
San Antonio, TX |
Monday-Tuesday, March 25-26, 2019 |
Monday-Tuesday - 9:00a to 4:45p |
Signup Now |
Confirmed Presentation |
Regus Office Facility, 300 Convent Street, Suite 1330, San Antonio, Texas 78205 |
Jersey City, NJ |
Monday-Tuesday, April 8-9, 2018 |
Monday-Tuesday - 9:00a to 4:45p |
Signup Now |
... |
Regus Office Facility at 101 Hudson Street, 21st Floor, Jersey City, NJ 07302 |
Columbia, SC |
Monday-Tuesday, April 29-30, 2019 |
Monday-Tuesday - 9:00a to 4:45p |
Signup Now |
... |
Regus Office Suites, 1320 Main Street, Suite 300 Columbia, South Carolina 29201 |
Austin, Texas |
Monday-Tuesday, May 6-7, 2018 |
Monday-Tuesday - 9:00a to 4:45p |
Signup Now |
... |
Regus Office Suites, 111 Congress Avenue, Suite 400, Austin, Texas 78701 |
Dulles, VA |
Monday-Tuesday, May 13-14, 2019 |
Monday-Tuesday - 9:00a to 4:45p |
Signup Now |
... |
Executive Conference & Training Center, 22685 Holiday Park Drive, Dulles, VA 20166 |
Santa Monica, CA |
Monday-Tuesday, June 24-25, 2019 |
Monday-Tuesday - 9:00a to 4:45p |
Signup Now |
... |
West Los Angeles - Regus - Santa Monica, 2500 Broadway, Building F, Suite F-125, Santa Monica, CA 90404 |
Chicago - Fulton Market, IL |
Monday-Tuesday, August 12-13, 2018 |
Monday-Tuesday - 9:00a to 4:45p |
Signup Now |
... |
Spaces Fulton Market, 159 N. Sangamon Street, Suite 200 & 300, Chicago, IL 60607 |
Seattle, WA |
Monday-Tuesday, October 21-22, 2019 |
Monday-Tuesday - 9:00a to 4:45p |
Signup Now |
... |
Regus Office Facility, Columbia Tower, 701 Fifth Avenue, 42nd Floor, Seattle, Washington 98104-5119 |
|
|
|
|
|
|
Refer to our Seminar Cities Index for a list of our seminar locations. The individual city
pages provide a listing of topics being presented. Our Seminar Cities by Week provides a
guide to the locations during a calendar week.
top of page
Seminar Highlights
. What are the NAIC goals with this Act?
. How does this Act compare to New York State Regulation Section 500?
. Which organizations fall under the Act's provisions?
. What is the definition of "cybersecurity event".
. What is contained in an "Information Security Program".
. What is nonpublic information under an information security program?
. What is "publicly available information"?
. How do you approach creating a cybersecurity risk assessment?
. What are the eleven enumerated security measures?
. What does continuous monitoring mean?
. What Board of Director's oversight is required?
. What certficiation is required?
top of page
Learning Objectives
- Attendees will see how cybersecurity is an evolving art.
- Attendees will understand risk assessment from the cybersecurity viewpoint.
- Attendees will have examples for the minimum standards.
- Attendees will know the components in an effective information security program.
- Attendees will have an approach to controls at third party providers.
- Attendess will have a example incident reporting and notification plan.
top of page
Key Issues on the Agenda
Introduction and Overview
. About Us and About Your Instructors
. Who are You?
. What are Your Needs?
. What is "Cybersecurity"?
. This is War!
. Myths!
. Key Players in Cyber Risk Standards
Section 1 - Concepts and Definitions
. What is "Information Technology"?
. Risk Appetite
. Risk Tolerance
. What is an "Information Security Program"?
. What is "Non-Public Information"?
. The NAIC's 12 Principles of Cybersecurity
. SIFMA Principles of cybersecurity Regulation
. Insurance Data Security Model Law by Section
. New York State Section 500
. Comparison of NAIC to Section 500
Section 2 - Initiating the Improvement of an Information Security Program (ISP)
. NAIC Model Law Section 4a - Implementation of an ISP
. SLCA - Creating the Appropriate Environment
. Where did the "Current State" come from?
. How good is our Risk Assessment?
. NAIC Model Law Section 4b - Objectives of an ISP
. What questions do you start with?
. Cyber Threats by the Numbers
. NAIC Model Law Section 4e - Oversight by the Board of Directors
. Key Principles of Cyber Risk Oversight per the NACD
. NAIC Model Law Section 4f - Oversight of Third-Party Service Providers
. NAIC Model Law Section 4h - Incident Response Plan
Section 3 - Define the Problems and Opportunities
. The Effects of "Moore's Laws"
. SLCA - Program Management
. The Usual Suspects - Cyber Security Issues
. Measuring the Maturity of Internal Controls
. Internal Breaches
. External Breaches
. Business Alignment Issues
. Governance and Leadership Issues
. Extended Ecosystem Issues
Section 4 - Deep Dive into The Issues
. NAIC Model Law Section 4e - Oversight by the Board of Directors
. Mission Statement - Explicit Values - Business Model
. Ethics
. Authorized Individuals
. User Access and Passwords
. Desktop Management
. Email Management
. Mobile Device Management
. "WiFi"
. Cyber Attacks
Section 5 - The Effective Information Security Program Management
. NAIC Model Law Section 4g - Program Adjustments
. How do we manage the Program?
. Project Scoping
. Governance
. Cybersecurity Domains
. Resources
Section 6 - The Information Security Program
. NAIC Model Law Section 4d - Risk Management
. Strategic Management Elements
. Tactical Management Elements
. Operational Management Elements
. Data Assets
. Security Policies
. Physical Security Items
. Personnel Security Items
. System & Application Items
. NIST System Security Plan Standards
. System & Software Life Cycle
. Configuration Management
. Training & Awareness Program
. System Documentation
. Disaster Recovery & Business Continuity
Section 7 - Review The Effectiveness
. Business Objective - Risks - Controls
. NAIC Model Law Section 4g - Program Adjustments
. NAIC Model Law Section 4i - Annual Certification
. What is Effectiveness?
. The InfoSec Maturity Model
. FFIEC Cybersecurity Assessment Tool
. Maturity Levels of the Internal Controls
. Inherent Risk Profile
. Technologies & Connection Types
. Online & Mobile Products & Technology Services
. Organizational Characteristics
. Inherent Risk Profile
. The Five Risk Response Domains
. How is your Cybersecurity IC Maturity?
. Cyber Risk Management & Oversight Domain
. Threat Intelligence & Collaboration Domain
. Cybersecurity Controls Domain
. External Dependency Management Domain
. Cyber Incident Management & Resilience Domain
. Innovative - Advanced - Intermediate - Evolving - Baseline Levels
. Cybersecurity Inherent Risk & IC Maturity Relationship
. Management Assessment Results
. Certification & Accreditation Program
Section 8 - Incident Response to a Cybersecurity Event
. NAIC Model Law Section 4h - Incident Response Plan
. Who is on the "Team"?
. Key Layers of Management's Response
. What are the "Goals" for the Team?
. The Skills - The World Class Response Team
. Preparation
. The Observe - Orient - Decide - Act (O.O.D.A.) Methodology in Detail
. Incident Response Procedures
. SANS Institute "Jumpbag" Recommendations
. Post-Event Recommendations
Section 9 - SOC for Cybersecurity - AICPA Standards and Guidance
. AICPA's Three Key Components
. AICPA - SOC for Cybersecurity Resources
. Difference Between Cybersecurity and Information Security
. AICPA Objectives
. Three Reporting Levels - Entity - Service Provider - Supply Chain
. Two Sets of Criteria
. Cybersecurity Program Descriptive Criteria
. Cybersecurity Program Control Criteria
. Trust Services Approach to COSO 2103
. Trust Services Additional Points of Focus within COSO 2103
. Trust Services Supplemental Criteria
. Components of the Cybersecurity Report
. Management's Description
. Management's Assertion
. The Practitioner's Opinion
Section 10 - Summary and Wrap-Up
. "Information Security Program" Defined
. "Reactive" or "Proactive"
. Your Keys to Success!
|
top of page
Seminar Schedule
Experts Providing CPE Training Seminars
Corporate Compliance Seminars has been created by experts who enjoy providing CPE classroom training, workshops and consulting on internal controls, internal auditing, information technology and accounting related subjects. We have focused on SOX, COSO, PCAOB, COBIT, GRC, IFRS, AICPA, GAO and IIA Standards.
Our programs are CPE for professionals with CPA, CGA, CIA, CFE, CISA, CMA, PMP and CA designations.
Corporate Compliance Seminars presents CPE to auditors, compliance staff, engineers, and IT professionals, Boards of Directors and Audit Committees. We examine the details of risk management, Sarbanes-Oxley Act compliance, Model Audit Rule compliance, auditing, internal controls, IT security and compliance, project management, and fraud prevention and detection.
Corporate Compliance Seminars allows the attendee to earn Official NASBA CPE credit.
Our seminars focus on the details of the Institute of Internal Auditor's IPPF, Committee of Sponsoring Organizations of the Treadway Commission (COSO) Internal Control Frameworks, ISACA's Control Objectives over Information Technology (COBIT), Information Technology Infrastructure Library (ITIL), Open Compliance & Ethics Group's (OCEG) Governance, Risk & Compliance (GRC) methodology, PCAOB's Auditing Standard 5 (AS5), AICPA auditing standards, Sarbanes-Oxley Act of 2002 (SOX), NAIC Model Acts, and the future conversion from GAAP to the International Financial Reporting Standards (IFRS).
Our seminars provide CPE for the CPA, CFE, CIA, CISA, auditors and others with effective and engaging training.
|
|
 |