Cybersecurity CPE Events
Auditing Cybersecurity Programs
This in-person CPE event gives the internal auditor the background needed to understand the components of a Cybersecurity Program and how to assess its effectiveness.
This timely, valuable training covers the history of cybersecurity risks, types and motives of cyber attacker to further your knowledge of current and emerging threats to organizations and individuals.
Key terminology, system concepts and tools will be examined as to design, assess, and improve your cybersecurity program.
24 CPE - In-Person Event
Best Practices: Project Management
This four-hour CPE training event is presented by "Experts in Project Management". The CCS instructors are experts in internal auditing, information technology and project management. We present a complete overview of how to be a successful project leader and to produce the results management desires.
This online CPE event provides an overview of the PMBOK.
Attendees will be able to effectively implement project management principles for projects at their own organization.
Cybersecurity Tools and Techniques for the Auditor
This CPE training event gives within the webinar the attendee the background information needed for an internal auditor to understand cybersecurity programs and the products and services commonly used in any Cybersecurity program.
The training event prepares the internal auditor to approach auditing cybersecurity program.
CCS covers the history of cybersecurity, key terminology, basic system concepts, cyber tools to further your knowledge of current threats to organizations and individuals and how they are mitigated.
Effective NAIC Cybersecurity Programs
The NAIC Insurance Data Security Model Law seeks to establish data security standards for regulators and insurers in order to mitigate the potential damage of a information or data breach.
The NAIC Insurance Data Security Model Law applies to insurers, insurance agents and other entities licensed by the state department of insurance.
This in-person twelve CPE event covers how to approach compliance with the insurance industry regulations. CCS covers the various standard components of an effective cybersecurity program in the insurance industry.
16 CPE - In-Person Event
FFIEC Cybersecurity Assessment Tool
The FFIEC has developed the Cybersecurity Assessment Tool (CAT) to help banking institutions identify their cybersecurity risks and determine cybersecurity preparedness. The CAT provides a repeatable and measurable process for financial institutions to measure cybersecurity preparedness over time.
This on-line CPE event covers how to approach compliance with this banking industry regulation.
This CCS online CPE training event covers the various standard components of an effective cybersecurity program and how to use the CAT properly.
NAIC Cybersecurity Model Law Academy
The NAIC Insurance Data Security Model Law seeks to establish data security standards for regulators and insurers in order to mitigate the potential damage of a data breach.
The law applies to insurers, insurance agents and other entities licensed by any state department of insurance.
This on-line CPE training event covers how to approach compliance with the insurance industry regulations concerning information security programs. It also covers the various standard components of an effective cybersecurity program in the insurance industry.
Project Management Excellence
If you want to increase your project management skills this is the CPE event for you. This CPE event gives attendees the opportunity to analyze and apply theories and concepts to organizational change to bring about effective cybersecurity risk management.
Programs are calling on the members of an organization to change. Learn all the various skills you need to be a cybersecurity program leader. This event provides training on each knowledge area of the PMBOK.
Sarbanes-Oxley Act Compliance for Cybersecurity Assessments
SOX cybersecurity compliance refers to an issuer of securities maintaining strong internal control processes over its information technology infrastructure and applicaitons.
This event is focused on attendees being able to work within a cyber program that identifies and mitigates the cybersecurity threats, understands the cyber actors and includes tests of controls in a cybersecurity framework.
Understanding Cybersecurity Risks
Cyber criminals are smart. They’re creative. And they’re relentless in their search for the next tool, technique, and vulnerability that will help them achieve their goals.
Cybersecurity risk management is the responsibility of each employee. So how do you build a cyber risk assessment across every business function – and how do you prove it?
This training event focuses on a holistic approach to identifying and mitigating risks.