10 things you need to know to protect yourself and your company from cyber-attacks
Objectives: Every day the number of ransomware, identity thefts, credit card fraud, email message hacking, etc. grows and costs individuals and institutions both short-term and long-term loss. The press is full of reports of data center breaches that result in loss of intellectual property, trade secrets, and/or customer data and affect the company’s reputation. Successful cyber protection at the individual level or enterprise level is not possible without having well-trained people who are aware of security risks and are knowledgeable enough to make sound judgments when they are confronted with cyber-attacks such as phishing or fraudulent phone calls. The active involvement of employees and their awareness are paramount to a company’s security compliance. The objective of this tutorial is to cover 10 important areas of cybersecurity risks and teach attendees about protective measures. After the completion of this training, session participants will learn practical ways of dealing with cyber-attacks, and a list of actions to take to protect themselves at both the individual and the company level."
Click to Register for Tutorials
AHFEI 2020
Dashboard Design and Data Visualization
With a growing need for mass data visualization, most business and consumer applications display a dashboard page that includes an overview of the system status and content. Are all these dashboards effective? What are the basic principles behind designing effective and intuitive dashboards? This introductory/intermediate course in dashboard design will provide an overview of the fundamentals for designing and evaluating effective dashboards. Participants will then evaluate several dashboards and practice building an effective dashboard.
HCII 2020
All you need to know and to protect yourself and your company from cyber-attacks.
The objective of this training session to give awareness to the participants about the risks and teach them what they can do about it. After completion of this training session participants will have a very real and under stables knowledge about the cyber risk and a list of what they need to do to protect themselves at individual and company level.