Video Game

Cyber Security Technical Excellence Tools

Offered monthly on Monday-Fridays in five four hour CPE events

"How can we implement a holistic approach to cybersecurity?"


"What methodologies, policies, technologies, and specific tools can we deploy to prevent, detect and monitor cybersecurity threats"?

"How can we build a more effective program?"


As more data breaches are disclosed, cybersecurity is at the forefront of Boards, executives, employees and consumers. Breaches are a continuing threat to an organization's reputation through the disclosure of intellectual property and non-public, confidential information. Organizations must remain vigilant in their attempt to prevent a cyberattack and minimize the damage once it occurs. We must raise the awareness of threats and harden our defenses.

As attacks develop, so does the stakeholder awareness and defensive tools available. To help you be more proactive in maturing your cybersecurity program, we created this training academy based on the best practices or tools to improve cybersecurity at your business.

This training program focuses on the policies and software tools needed in a the effective modern cybersecurity risk management program.

The program is divided into the following tool groups:

  • Hardware security

  • Data encryption at rest

  • Around-the-clock monitoring

  • Cybersecurity education

  • User Access

  • Phishing threats

  • Two-factor authentication

  • Intrusion detection systems

  • System and application items

  • Insider threat protection

  • Self-service

This comprehensive training course is for anyone who wants to have a strong base of knowledge and understanding of the essentials of cybersecurity risk management. We cover an overview of ten principles that need to be considered within a Cybersecurity Risk Management Program in a short video available on YouTube as well.

Each attendee will receive 20 CPE Hours (YB). A certificate of completion will be provided.

Program Level of Understanding: Basic
Prerequisites: None
Advance Preparation: None
Delivery Format: Group Internet Based
NASBA Field(s) of Study: Auditing, Business Management & Organization, Information Technology
CPE Credits: 20, based on 50 minutes of instruction per hour

Testimonials: The real world examples that Dave was able to share were great in reinforcing the training material included in the binder.

Our instructors are experts in risk management, auditing, corporate accounting, executive management, information technology and CPA firm operations. Our goal is to provide expert advice on COSO ERM, COSO, FDICIA, COBIT, NIST, ITIL, CMMI, FCPA, PCAOB standards, AICPA standards and cyber risk management.

Who should attend?

This timely virtual CPE event is designed for the project director, project leader and individuals who have to create effective sets of cybersecurity program tools and the related documents.

CPE Event Highlights

We created this comprehensive seminar to help you become more proactive in the maturity of your cybersecurity program. The class is based on our experience implementing best practices from security experts in industry and agencies. We translate the technical security and networking jargon into plain English. We discuss case studies of breaches and remediation activities.

Learning Objectives

  • Attendees will understand the standard definitions and concepts associated with cybersecurity

  • Attendees will identify sources of security information

  • Attendees will know the major laws and regulations governing data security and privacy

  • Attendees will identify popular frameworks for security risk, control and assessment

  • Attendees will recognize how breaches occur and attackers gain access to our systems

  • Attendees will understand the best practice tools and countermeasures for minimizing the impact of a breach

Key Concepts on the Agenda

  • Introduction and Learning Objectives

  • Overview, Definitions and Concepts

  • Security Organizations and Material

  • Security Certifications

  • Security and Privacy Laws and Regulations

  • Internal Control and Security Frameworks

  • Implementing a Cybersecurity Initiative

  • Security Risk Assessment

  • Strengthening the Control Environment

  • Security Policy Administration

  • Computer Communications, Networks and Firewalls

  • Controls and Countermeasures

  • The Insider Threat

  • The Outsider Threat

  • DevOps Security

  • Asset Security

  • Testing the Internal Controls

  • NIST Security Framework

  • Anatomy of an Attack

  • AICPA Cybersecurity Risk Assessment

  • Securing the Physical Environment

  • Vendor Management and SSAE 18 SOC Audits

  • Configuration Management

  • Personal Cyber Safety Measures

  • Discussion, Documentation and Summary