Customer Service: 800-778-7436     

To access your product click the Log In link at the top right of the screen. Once inside your account, you will be able to access your Packages, Self-Study Product, and Webinar Registrations.

Sign In to Your Surgent Account

Forgot Username or Password | Register for an Account

Cybersecurity Risk Management for Financial Professionals: Policies, Controls, and Emerging Threats (CYR2)

Monday, August 25, 2025
02:00 PM - 04:00 PM (Eastern)

Cory Ng

  • Format Webinar
  • Credits 2.00
  • Level Basic
  • Field of Study Information Technology (2)

$99.00


Overview

This course focuses on implementing cybersecurity policies, controls, and risk management strategies tailored to financial environments. It emphasizes practical applications to mitigate threats and highlights global compliance standards, particularly their relevance and applicability to U.S. organizations.

Major Topics:

  • Core components of a cybersecurity risk management program
  • Overview of key policies, controls, and procedures for financial organizations
  • Applicability of global compliance standards, like the EU AI Act and GDPR, in the U.1`S. financial landscape
  • Case studies: financial implications of breaches and mitigation strategies
  • Best practices for integrating cybersecurity with financial reporting

Learning Objectives

  • Identify essential components of a cybersecurity risk management program, including policies and controls
  • Evaluate cybersecurity risks and develop risk mitigation strategies tailored for financial professionals
  • Understand global compliance standards, such as the EU AI Act and GDPR, and their implications for U.S.-based organizations.
  • Analyze financial impacts from cybersecurity breaches using real-world case studies
  • Apply cybersecurity policies and controls that align with U.S. regulatory frameworks while addressing global compliance trends

Who should take this course:

Experienced CPAs, CITP designation holders and aspirants, accountants, and anyone who wants to better understand current cybersecurity and data privacy threats for individuals and businesses. Anyone who is responsible for designing or implementing data se

None

None

No

No

No

loading

Loading...

Loading...

Thank You!

YOU HAVE ADDED THE FOLLOWING TO YOUR CART:


Loading...

CPE Webinars
CPE Webinars

Thank You!

Thank You! Your subscription has been submitted.