Log In
  • Thursday-Friday, June 27-28 | 8:30 AM-4:55 PM


    CPE Credit: 16

    Level: Overview

    Recommended Prerequisite: None

    Field of Study: Information Technology

    Losing data to fraud can be more costly than the loss of cash and other assets. To ensure data security, safeguard intellectual property and guard against cyberfraud, fraud examiners must stay informed of rapidly advancing technologies, emerging business trends and the methods employed by increasingly sophisticated information thieves.

    This 2-day, post-conference course will clarify these issues while guiding you through the crucial strategies needed to mitigate the threat of malicious data theft and minimize the risk of inadvertent data loss. You will also learn useful steps for the creation of data security policies and related internal controls.

    You Will Learn How To:

    • Explain the ways data can be stolen by employees and information thieves
    • Enact data security measures and be prepared in the event of a data breach
    • Contend with data theft maneuvers such as social engineering, hacking and espionage
    • Identify various sources of data loss, both internal and external
    • Recognize the impacts of converging trends such as cloud computing and BYOD
    • Recognize the legal and regulatory concerns related to data security



    cmoore Headshot
    Cary Moore, CFE

    Chief Executive Officer, MegaByte Security

    With a career distinguished by 14 years of highly decorated service to the United States Air Force, of which seven were as a federal agent for the Air Force Office of Special Investigations (AFOSI), Cary Moore has more than 17 years of specialized experience in cybersecurity, enterprise forensics and technical surveillance countermeasures (TSCM). Focusing on counterintelligence and counterespionage, he brings a unique perspective to insider threats and protecting some of the most sensitive data.

    Prior to his current role, he served as a senior vice president, cyber intelligence and emerging threats manager at Bank of America. As a banking-industry specialist, Moore developed new ways to rob a bank and banking customers, then devised controls to prevent such fraud from realization. Currently, he is an associate partner for the IBM Red Cell Team where he conducts dark Web intelligence-gathering operations to identify compromised accounts, and get in front of fraud. Moore is also chief executive officer of MegaByte Security, a private consulting firm specializing in the secure management of information systems in the age of cyber terrorism and warfare, developing customized training and solution plans for the private and federal public sectors.

    Most recently, Moore earned his master’s in business administration from the University of Texas in San Antonio and works primarily out of his office near Blackwater Bay, Florida.

  • cmoore Headshot
    Cary Moore, CFE

    Chief Executive Officer, MegaByte Security

    With a career distinguished by 14 years of highly decorated service to the United States Air Force, of which seven were as a federal agent for the Air Force Office of Special Investigations (AFOSI), Cary Moore has more than 17 years of specialized experience in cybersecurity, enterprise forensics and technical surveillance countermeasures (TSCM). Focusing on counterintelligence and counterespionage, he brings a unique perspective to insider threats and protecting some of the most sensitive data.

    Prior to his current role, he served as a senior vice president, cyber intelligence and emerging threats manager at Bank of America. As a banking-industry specialist, Moore developed new ways to rob a bank and banking customers, then devised controls to prevent such fraud from realization. Currently, he is an associate partner for the IBM Red Cell Team where he conducts dark Web intelligence-gathering operations to identify compromised accounts, and get in front of fraud. Moore is also chief executive officer of MegaByte Security, a private consulting firm specializing in the secure management of information systems in the age of cyber terrorism and warfare, developing customized training and solution plans for the private and federal public sectors.

    Most recently, Moore earned his master’s in business administration from the University of Texas in San Antonio and works primarily out of his office near Blackwater Bay, Florida.

Sign up for conference updates