Online talk on Identity Theft

I will be presenting a talk on Identity Theft on 8/25/2010 at 12:00 PM ET.

You can  attend this free webinar by going here

Hardly a day goes by without hearing about someone becoming a victim of identity theft or learning about another corporate data breach. Corporations and individuals are constantly under attack by cyber criminals. Since 2005 more than 300 million records containing sensitive information have been involved in security breaches in the US alone!

Global Knowledge is introducing an exclusive four part Webinar series devoted to the subject of Cyber Security, based on our recently announced hands-on cyber security course entitled Cyber Security Foundations.

In Part One, "Arming Your Company (and yourself) Against Identity Theft" we will examine the following topics:

  • Understanding what information cyber criminals are after
  • How they obtain this information
  • How to protect your company and yourself from being victim
  • How to recognize if information has been stolen

Be sure to watch for the remaining three parts of this Webinar Series:

  • Part Two: Cyber Security – Risk Management
  • Part Three: Cyber Security – Physical Security
  • Part Four: Cyber Security – Patch Management

You can  attend this free webinar by going here

The presenter is  Jayson Ferron, CEHI, CISM, CISSP, CWSP, MCITP, MCSE, MCT, MVP NSA-IAM,

Jay Ferron brings more than 20 years of experience in security, networking, virtualization, and high performance computing. A multi-faceted author, trainer, speaker, and designer, Jay has led the development of Windows and UNIX security designs, network infrastructures, enterprise designs and installations for numerous Fortune 500 companies as well as government and health agencies.

Jay is the author of more than 15 courseware books and papers for Microsoft and other vendors on security, networking, and virtualization technologies. In his current work at Global Knowledge, he is building a unique cyber security program that provides a global perspective of the challenges of designing a secure system.