Customer Service: 800-778-7436     

To access your product click the Log In link at the top right of the screen. Once inside your account, you will be able to access your Packages, Self-Study Product, and Webinar Registrations.

Sign In to Your Surgent Account

Forgot Username or Password | Register for an Account

Cybersecurity Risk Management for Financial Professionals: Policies, Controls, and Emerging Threats (CYR2)

  • Format Self-Study Webcasts
  • Credits 2.00
  • Level Basic
  • Field of Study Information Technology (2)

Overview

This course focuses on implementing cybersecurity policies, controls, and risk management strategies tailored to financial environments. It emphasizes practical applications to mitigate threats and highlights global compliance standards, particularly their relevance and applicability to U.S. organizations.



Major Topics:

  • Core components of a cybersecurity risk management program
  • Overview of key policies, controls, and procedures for financial organizations
  • Applicability of global compliance standards, like the EU AI Act and GDPR, in the U.1`S. financial landscape
  • Case studies: financial implications of breaches and mitigation strategies
  • Best practices for integrating cybersecurity with financial reporting

Learning Objectives:

  • Identify essential components of a cybersecurity risk management program, including policies and controls
  • Evaluate cybersecurity risks and develop risk mitigation strategies tailored for financial professionals
  • Understand global compliance standards, such as the EU AI Act and GDPR, and their implications for U.S.-based organizations.
  • Analyze financial impacts from cybersecurity breaches using real-world case studies
  • Apply cybersecurity policies and controls that align with U.S. regulatory frameworks while addressing global compliance trends

Who should take this course:

Experienced CPAs, CITPs, accountants, & anyone who wants to better understand current cybersecurity & data privacy threats for individuals & businesses; anyone responsible for designing or implementing data security policies

None

None

No

No

No

CPE Webinars
CPE Webinars

Thank You!

Thank You! Your subscription has been submitted.