Updated: Mar. 2019
Description: Explains how to protect identifiable information from unauthorized access through cybersecurity attacks. Explains how banks can ensure secure remote access is controlled and enforced, and ways to handle information security breaches. Provides approaches to avoid falling victim to social engineering and identity theft.
After completing this course, students will be able to:
- Describe the intent of information security laws and types of protected information
- Describe guidelines for protecting information through security measures
- Recognize identity theft and develop an identity theft program
1.0 CCTS, CFSSP, CLBB, CRCM, CSOP, CAFP
This course is part of the ABA Frontline Compliance program.