Advancements in technology have raised the level of acknowledgement of threats in the cyber age. These threats touch both the business world and personal lives. Information technology is no longer a “back-office” function. Once considered a process area that was solely part of the Chief Information Officer’s domain, companies must now acknowledge that whether the threats are internal or external, they are very real and can and will cause harm to many organizations in many ways. As a result, it is imperative that professionals across the company understand and be prepared to deal with the multitude of ever-growing cyber threats.
In this two-part series, we examine the landscape of cyber threats as they currently exist. We take a look at the biggest incidents related to cyber security of the 21st century (so far). We then delve into obtaining an understanding of the various threats that can impact our everyday lives, both business and personal. Part two of this series will deal with a topic that has hit the boardroom and governance body agenda of almost all companies – Cyber Risk Management. In part two we discuss the various cyber risk management frameworks available and how your organization can utilize them to be prepared for the inevitable.
Training for all programs related to cyber security by this trainer are utilizing the framework of the National Institute of Standards and Technology (NIST) as a model. This information is freely available in the public domain. For more detailed information on the framework please refer to NIST.org.
Prerequisites
No advanced preparation or prerequisites are required for this course.
Learning Objective
- Explore the meaning and impact of data breaches.
- Examine recent cyber incidents and their impact on business.
- Identify types and methods of the most proliferate cyber threats.
- Explore actions professionals and organizations can take towards prevention of cyber threats.
Last updated/reviewed: July 9, 2025
(0) Reviews
(273 rating)Lesson Questions and Answers0 Questions
Progress
INTRODUCTION AND OVERVIEW
- Introduction to Cyber Threat – The Modern-Day Fraud: Breaches and Actions 3:06
- Data Breaches and Impact 17:07
- Largest Breaches of 21st Century (So Far) 14:50
- Examples 9:13
- State of Cyber Security 9:37
- Types and Methods of Threats 10:44
- Types of Attacks 10:06
- Types of Attacks Cont'd 11:12
- Cyber Threat Actions 10:09
CONTINUOUS PLAY
SUPPORTING MATERIALS
- Slides: Cyber Threat – The Modern-Day Fraud: Breaches and Actions PDF
- Cyber Threat – The Modern-Day Fraud: Breaches and Actions Glossary/Index PDF
REVIEW AND TEST
- REVIEW QUESTIONS quiz
- FINAL EXAM exam
Cyber Threat - The Modern-Day Fraud: Breaches and Actions
Certified Public Accountant
Online
No advanced preparation or prerequisites are required for this course.
Chartered Accountant (IES8 CPD)
Online
Certified Management Accountant
Online
No advanced preparation or prerequisites are required for this course.
Certified Fraud Examiner
Online
No advanced preparation or prerequisites are required for this course.
Certified Government Financial Manager
Online
No advanced preparation or prerequisites are required for this course.
Certified Internal Auditor
Online
No advanced preparation or prerequisites are required for this course.
Certification in Risk Management Assurance
Online
No advanced preparation or prerequisites are required for this course.
Certified Information Security Manager
Online
Certified in Risk and Information Systems Control
Online
Certified Information Systems Auditor
Online
Certified Identity and Security Technologist
Online
Ask the instructor a question about this lesson