CSBS BAI Course Catalog
Cybersecurity: Securing Mobile Devices 10 minutes This course is intended for all employees to ensure that they understand the threats that exist when using mobile devices and how they can protect both personal and company information. 20 minutes This course, intended for all employees, provides an overview of the unique threats presented by social media sites for both users and financial institutions and identifies best practices for protecting sensitive and personal information. 30 minutes Financial institutions are required to maintain records on a variety of subjects. Upon completion of this course, recommended for employees who handle sensitive information, you will be able to determine why we retain certain types of data, identify the type of records to retain, where to retain them, and the duration they should be retained. You will also be able to describe the types of destructible data and proper destruction methods. 10 minutes By the end of this course, learners will be able to identify the common roles impersonators assume, explain typical ways impersonators carry out social engineering attacks, and recognize how to defend their institution from impersonation attacks. 10 minutes Phishing is a common technique that hackers use to steal valuable information. Upon completion of this course, recommended for all employees who handle sensitive information, they'll be able to identify how phishing applies to their financial institution, recognize the types of phishing attacks, and determine how everyone can play a role in protecting their institution from phishing. 10 minutes By the end of this course, learners will be able to defend themselves against pretexting and identify the various pretexts social engineers use to commit fraud. In addition, they'll be able to describe how pretexters are able to use seemingly harmless bits of information in order to get past security measures. 30 minutes This course introduces IT professionals to an important U.S. payment system for electronic funds transfers and several key regulations relevant to electronic banking. Covering the ACH Network, Regulations E, CC, and D, and the Bank Secrecy Act, the course relates compliance requirements to IT’s role in supporting online, mobile, and ATM technologies. 30 minutes Intended for IT professionals, this course provides an overview of privacy and data security requirements for financial institutions and addresses the important role that the IT professional plays in helping the institution to meet these requirements. Topics include consumer privacy requirements under the Gramm-Leach Bliley Act (GLBA) and Right to Financial Privacy Act (RFPA), identity theft protection, and records retention and management. Cybersecurity: Social Media Security Data and Records Retention Essentials for Financial Institutions Defense Against Social Engineering: Impersonation Defense Against Social Engineering: Phishing Defense Against Social Engineering: Pretexting IT Professional: ACH, Reg E, and Other Regs for Electronic Banking IT Professional: GLBA, RFPA, and Other Data Security Requirements
35
Made with FlippingBook Online newsletter creator