MENU

Certified Cyber Security Specialist TM

Why become a Certified Cyber Security Specialist TM?

The Certified Cyber Security SpecialistTM program provides in-depth knowledge of the identity theft, identity fraud, cyber security, cyber anonymity and other information such as data protection, virtual private networks and biometric security. Prior experience in the cyber security industry is not required nor needed. The CCSS program will help risk managers, employers, employees and insurance professionals to gain extensive knowledge in the world of cyber security.

What is involved for Certification?

What is the Cost?

Covers course and two tests.

$150

You will have two (2) opportunities to pass the exam. re-testing fee is required after two (2) failed attempts.

$100

Annual fee beginning in year 2

$149

**** Instructions and your license code will be sent to you after payment is received.****

Course Descriptions

Course Overview:

This one hour continuing education and certification program will impart, to licensed insurance agents, risk managers, consultants and other individuals, in-depth knowledge of the global Identity Theft crisis and educating agents on how to assist their clients (employers) from a Risk Management perspective. The course will discuss the differences between, Data Breach, Data Comprise and Data Leaks. Topics such as cloud-based data storage risks, public networks, personal virtual private networks (”VPN’s”), safer passwords, and how to select the appropriate Identity Theft protection program as part of the overall benefit program. Information on how to protect company emails, email attachments, how agents can better protect client.

We are seeing Insurance carriers offer corporate liability insurance rate reductions when a business has internal written Cyber Security protocols and employee training on how to protect company and client data. Insurance professionals will gain an enhanced understanding on how to help clients set-up internal policies and procedures and negotiate and work with Insurance Carriers to secure the best possible coverage and rates for their clients.

Learning Objectives:

  • After completing this workshop, you will be able to:
  • Understand the definitions and statistics of identity theft
  • Be aware of how fraudsters gain access to information
  • Suggest the appropriate individual digital safety & protection products to clients
  • Identify and repair damage done from this kind of fraud
  • Know the resources and tips to use when applying security
  • Apply the knowledge you’ve learned to various case scenarios

Course Outline:

Keeping Data Secure

  • How is data stolen?
  • Passwords: The Reality Check
  • Computer system OS updates
  • Email protection & safety strategy

Understanding Data Loss

  • What are the cost of ID Theft & Data Breaches
  • Data Breach vs. Comprise vs. Leak
  • How hacking is really done

Open Source Intelligence

  • How your personal data is discovered and used by criminals
  • Virtual Private Networks (“VPNs”)
  • Methods used for discovering your data

Understanding Your Risks

Data and Public Access

  • Credit Monitoring vs. Credit Freeze
  • Cloud Storage / File Sharing
  • Public Networks

Identity Protection Products

  • Credit Monitoring

Review What Your Learned

  • Exercises
  • Applying What You Learned

Course Overview:

This one hour continuing education and certification program will impart, to licensed insurance agents, risk managers, consultants and other individuals, in-depth knowledge of the global Identity Theft crisis. It will educate agents on how to assist their clients (employers) from a Risk Management perspective. The course will discuss Medical Identity Theft and how to protect employee health data. Agents can help their employer groups in creating corporate Identity Theft and Data Protection protocols, helping employees to gain an increased awareness and understanding relative to the risks of Identity Theft, both personal and at their workplace. Information on how to protect company emails, email attachments, how employees can better protect their employer and possible employer’s client. Understanding the industry nomenclatures as well as the steps necessary to repair any damage and other industry resources.

Learning Objectives:

After completing this workshop, you will be able to:

  • Understand the definitions and statistics of identity theft
  • Be aware of how fraudsters gain access to information
  • Suggest the appropriate individual digital safety & protection products to clients
  • Identify and repair damage done from this kind of fraud
  • Know the resources and tips to use when applying security
  • Apply the knowledge you’ve learned to various case scenarios

Course Outline:

What is Identity Theft

  • Identity Theft 101
  • Types of Identity Theft

Definitions

  • PII: Personal Identifying Information
  • Identity Theft vs. Identity Fraud
  • Victim Fraud & Financial Losses

How Fraudsters Can Get Your Information

  • How Non-Fraudsters Can Get Your Information
  • Old School Methods
  • Targeted Methods
  • Pharming & Phishing
  • SMShing, Vishing & Spoofing
  • Check Fraud

Identifying Risk

  • Installed Devices Risk
  • Chip Enabled Credit Cards
  • EMV & RFID Protection
  • Financial Account Risks

Digital Safety Risk

  • Password Protections
  • 2FA/MFA
  • Wi-Fi Keylogging
  • Geotagging
  • Biometrics
  • Social Media

Recovery and Protection

  • Steps Required to Repair the Damage
  • Report Your Identity Theft or Fraud
  • Identity Protection
  • Alerts for Minors
  • Sex Offender Reporting
  • Resources and Tips
  • Password Managers

Review What You Learned

  • Exercises
  • Applying What You Learned

Course Overview:

This one hour continuing education and certification program will impart, to licensed insurance agents, risk managers, consultants and other individuals, the various types of Identity Theft Insurance programs and the differences between them, such as, proactive versus reactive programs, services included in various programs, insurance coverages, how they work and what to look for. If an employee is part of a global data breach, and they receive correspondence, what exactly will the no cost identity monitoring services include. Information on insured versus non-insured programs will be discussed as well as peeling back the insurance policy with a deep dive review of what insurance policies typically include, what is excluded and what to look for in recommending the right solution for their clients and their employees.

A review of credit monitoring services, social media monitoring, digital footprint exposures, retirement plan stolen funds reimbursement, tax fraud protection and employee financial wellness. Discussions on fiduciary responsibilities of an insurance professionals on helping employers navigate through the complexities of Identity Theft programs as an employee benefit.

Learning Objectives:

After completing this workshop, you will be able to:

  • Understand the definitions and statistics of identity theft
  • Be aware of how fraudsters gain access to information
  • Suggest the appropriate individual digital safety & protection products to clients
  • Identify and repair damage done from this kind of fraud
  • Know the resources and tips to use when applying security
  • Apply the knowledge you’ve learned to various case scenarios

Course Outline:

Identity Theft Programs

  • Insured vs. non-insured programs
  • Proactive vs. Reactive Programs
  • Standalone programs

Comprehensive Coverage Review

  • Remediation
  • Monitoring
  • Alerts
  • Digital Footprints
  • PII & PHI
  • IP address monitoring
  • Deceased family members
  • Mobile Apps

Why Identity Theft Programs as an Employee Benefit

  • How do they protect employees?
  • How do they protect and benefit the company?
  • Recruitment & Retention
  • Employee Productivity
  • Absenteeism & Presenteeism

The “Insurance Policy”

  • What does it specifically cover?
  • What are the exclusions
  • What to look for

Review What Your Learned

  • Exercises
  • Applying What You Learned

Course Overview:

This one hour continuing education and certification program will impart, to licensed insurance agents, risk managers, consultants and other individuals, in-depth knowledge of the layers of the Internet which go far
beyond the surface web. The furthest corners of the Deep Web, segments known as the Dark Web, contain content that has been intentionally concealed. The Dark Web may be used for legitimate purposes as well as to conceal criminal or otherwise malicious activities. There are several different ways that ransomware can infect computers. From a risk management perspective, we will share methods to protect company and client data as well as insurance products to financially protect employers. Further discussions on Advanced Threat Intelligence on how to recognize and protect from breaches and financial fraud with proactive prevention methods to protect company assets.

We are seeing Insurance Carriers offer corporate liability insurance rate reductions when a business has internal written Cyber Security protocols and employee training on how to protect company and client data. Insurance professionals will gain an enhanced understanding on how to help clients set-up internal policies and procedures and negotiate and work with Insurance Carriers to secure the best possible coverage and rates for their clients.

Further discussions on your Digital footprint which refers to one’s unique set of traceable digital activities, actions, contributions and communications manifested on the Internet or on digital devices. On the World Wide Web, the internet footprint is the information left behind as a result of a user’s web-browsing and stored as cookies. This creates vulnerability to an individual person, business, clients and other organizations. We will discuss risk management and mitigation protocols as well as the implementation of insurance programs to financially protect organizations. Information on Identity theft protection programs as part of the overall employee benefit program and business protection insurance.

Learning Objectives:

  • After completing this workshop, you will be able to:
  • Understand the definitions and statistics of the Dark Web
  • Be aware of how fraudsters gain access to information and hold company data hostage
  • Providing information on your “Digital Footprint” and how that puts your business at risk
  • Discussions on Cyber Anonymity
  • Know the resources and tips to use when applying security
  • Apply the knowledge you’ve learned to various case scenarios

Course Outline:

Risk Mitigation & Protection

  • World Wide Web
  • The Surface Web
  • The Deep Web
  • The Dark Web
  • How the Web layers works
  • Anonymous browsers
  • Search engines
  • Chatrooms
  • Forums
  • Dangers and precautions

Cyber anonymity to reduce risk exposure

  • The Onion Router: “TOR”
  • Invisible Internet Project: “I2P”
  • Using the right protocols

Data Theft

  • Ransomware
  • Extortionware
  • Malware

Digital Footprint

  • What you leave behind and what is at risk
  • How to protect personal, business and client information
  • How to insure your risk
  • Biometrics
  • Retina scans
  • Thump prints
  • Voice recognition
  • Facial recognition
  • Risks associated with biometrics

Child Identity Theft

  • How it Happens
  • How to Recognize
  • How to Prevent
  • Can children have insurance

Identity Protection Products

  • Employee benefit programs
  • Employer risk management programs
  • What to look for in a product
  • How to select the right insurance program
  • Embedded programs
  • Corporate Liability Coverage

Review What Your Learned

  • Exercises
  • Applying What You Learned

Course Overview:

This one hour continuing education and certification program will impart, to licensed insurance agents, risk managers, consultants and other individuals, in-depth knowledge of the layers of a cyber security insurance
policy. This module will review what is and is not covered, what to look for, how to negotiate removal of certain exclusions and how to negotiate what to include.

Learning Objectives:

After completing this workshop, you will be able to:

  • Understand the definitions of a cyber insurance policy
  • What to be aware of relative to exclusions
  • How to negotiate coverage and cost
  • How to select the right carrier and coverage

Course Outline:

What The Typical Policy Covers

  • Legal Expenses
  • IT Forensics
  • Negotiation of ransomware payment
  • Data restoration
  • Breach notifications to customers
  • Public relations expertise
  • Credit monitoring and Identity Restoration for customers

What The Typical Policy Does Not Cover

  • Cyber insurance policies generally do not cover
  • Potential future lost profits
  • Loss of value due to theft of your Intellectual Property
  • The cost to improve internal technology systems
  • The cost to upgrade any software or security patch’s after a cyber event

What is the Typical cost of Cyber Insurance

  • Your reputation
  • Your customer retention
  • First-Party and Third-party policies
  • Older vs. new cyber insurance policies

What to Look For in a Policy

  • Cyber extortion coverage
  • Data recovery services
  • Cyber business interruption
  • Hacker demand negotiations
  • Hacker demand reimbursement
The owner of this website has made a commitment to accessibility and inclusion, please report any problems that you encounter using the contact form on this website. This site uses the WP ADA Compliance Check plugin to enhance accessibility.