CSBS BAI Online Course Catalog

Cybersecurity: Securing Mobile Devices 10 minutes This course is intended for all employees to ensure that they understand the threats that exist when using mobile devices and how they can protect both personal and company information. 15 minutes This interactive course, intended for all employees, provides an overview of the unique threats presented by social media sites for both users and financial institutions and identifies best practices for protecting sensitive and personal information. 30 minutes Financial institutions are required to maintain records on a variety of subjects. Upon completion of this course, recommended for employees who handle sensitive information, you will be able to determine why we retain certain types of data, identify the type of records to retain, where to retain them, and the duration they should be retained. You will also be able to describe the types of destructible data and proper destruction methods. 10 minutes By the end of this course, learners will be able to identify the common roles impersonators assume, explain typical ways impersonators carry out social engineering attacks, and recognize how to defend their institution from impersonation attacks. 10 minutes Phishing is a common technique that hackers use to steal valuable information. Upon completion of this course, recommended for all employees who handle sensitive information, they'll be able to identify how phishing applies to their financial institution, recognize the types of phishing attacks, and determine how everyone can play a role in protecting their institution from phishing. 10 minutes By the end of this course, learners will be able to defend themselves against pretexting and identify the various pretexts social engineers use to commit fraud. In addition, they'll be able to describe how pretexters are able to use seemingly harmless bits of information in order to get past security measures. 30 minutes This course introduces IT professionals to an important U.S. payment system for electronic funds transfers and several key regulations relevant to electronic banking. Covering the ACH Network, Regulations E, CC, and D, and the Bank Secrecy Act, the course relates compliance requirements to IT’s role in supporting online, mobile, and ATM technologies. 30 minutes Intended for IT professionals, this interactive course provides an overview of privacy and data security requirements for financial institutions and addresses the important role that the IT professional plays in helping the institution to meet these requirements. Topics include consumer privacy requirements under the Gramm Leach Bliley Act (GLBA) and Right to Financial Privacy Act (RFPA), identity theft protection, and records retention and management. 30 minutes Intended for managers and Human Resources personnel, this interactive course provides best practices for employers in monitoring and managing employees' use of social media in the workplace and addresses considerations for employers in developing and implementing a social media policy. Cybersecurity: Social Media Security Data and Records Retention Essentials for Financial Institutions Defense Against Social Engineering: Impersonation Defense Against Social Engineering: Phishing Defense Against Social Engineering: Pretexting IT Professional: ACH, Reg E, and Other Regs for Electronic Banking IT Professional: GLBA, RFPA, and Other Data Security Requirements Managing Social Media in the Workplace

35

Made with FlippingBook Digital Publishing Software