Companies mishandle data because personnel misunderstand practices, risks, and implications. Explore data protection, devices and social media, and good governance through security principles and programs.
An Executive's Guide to Security: Protecting Your Information
- Course Overview
- describe best practices for working with and handling corporate information while traveling
- discuss the problems presented by organizational and personal e-mail, and best practices for working with e-mail, including how to protect yourself from spam
- specify the proper ways to handle sensitive company information, including the differences between working with online data and physical media
- describe best practices for sharing data with colleagues, customers, and the public
- discuss BYOD and IoT, how they pose a unique security threat for organizations, and how they should be treated on an organizational scale
- specify the challenges surrounding wireless networking and how wireless networks should be handled on an organizational scale
- discuss the dangers of posting on social media, as well as organizational policies and procedures
- specify the importance of implementing organizational security programs and why companies that don't have them put themselves at risk
- describe how employee training, awareness, and advocacy should be implemented and how it plays a crucial role in the protection of an organization's information
- discuss the importance of security programs and how to balance up-front costs vs. downtime in the long-run
- specify how new technology impacts security, and how to balance it in relation to convenience vs. security
- explain data protection practices, devices and social media, and corporate security principles and programs
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.