Protecting and Investigating Electronic Communications

Course Overview

We have developed a practical based course on Protecting and Investigating Electronic Communications, highlighting international best practices to keep the data security, cyber attacks and to investigate data from multiple sources with an effective learning environment.

This course will give you the best opportunity to be able to transfer the newly acquired knowledge and skills into the workplace.

All the models and scenarios are designed and delivered from a tax perspective ensuring that participants are able to fully relate to the material and thus increasing their understanding and knowledge retention.

The modules are specifically designed and tailored the Model for your organization where we also put in place Protective Intelligence for executives communicating such information.

Our complete approach to tax management brings together tax function design, technology and compliance delivery; setting a strategy which flexes to meet the changing needs/ challenges and putting in the place the right people, processes and systems to enable them to deliver more with less.

Making sound decisions as businesses change their commercial and operational models in a disrupted world is challenging.

The Model outlines is developed through the following phases:

  • Overview
  • Setting Strategic Direction
  • Information and Technology
  • Essential Data and Intelligence Analysis
  • Clear Communication
  • Protection and Investigation

Course contents

Introduction and Agenda

  • Health and safety (evacuation procedure)
  • Facilitator Introduction
  • Participant Introductions
  • Seminar Agenda

Introduction 

  • Knowing the local laws
  • Knowing the jurisdiction
  • Creating effective policies, if not in place
  • Communications Security
  • Database Management
  • Process Documentation and Strategy
  • Visual Analytics
  • Inter-agency interaction
  • Miniaturization

Protection Essentials

  • Active Cyber Defense: Whether or Not to Hack Back
  • The Tortoise & the Hare: Government Collaboration with Technology Innovators
  • Recruiting & Developing the Workforce of the Future
  • Defending Cyberspace
  • Combating Disinformation
  • Technology Futures
  • Continuous Evaluation: Balancing Security & Privacy
  • Strategic Threats & National Collection Priorities

Information and Technology

  • Data architecture integration with little automation
  • Use common applications with reduced manual entry and adjustments
  • Integrated and automated information
  • Setting up communication strategy

Structure and Organization

  • Define processes and communicate
  • Policies and procedures Integration, automation and accuracy

Talent and People

  • Talent acquisition strategy and continuously training
  • Resources are deployed appropriately according to skills and needs

Essential Data Analysis

  • An overview of statistics applied in organizations
  • Analytical Tools – Sensitivity analysis – Tornado diagrams – Cause and effect analysis
  • Exercise – Self assessment of current practices and development opportunities

Investigation through Intelligence Analysis

  • Understanding the Principles of intelligence analysis and investigation
  • Reactive and Proactive Investigations
  • How OSINT can help the organization
  • Techniques for managing collection and the passage of data between organizations
  • Comprehension of the various stages of the analytical process from collation, through evaluation, analysis and integration to the production of an assessment
  • The use of analytical software, statistical analysis, temporal, geospatial and link analysis techniques

Interception of Communications

  • Recording evidence of business transactions
  • Ensuring compliance with regulatory or self-regulatory guidelines
  • Maintaining the effective operation of the employer’s systems (for example, preventing viruses)
  • Monitoring standards of training and service
  • Preventing or detecting criminal activity
  • Preventing the unauthorized use of the computer or telephone system
  • Acquiring communications data: the “who, when, and where” of communications

Review of Course

  • Recap of course content
  • Questions and answers

Who must attend

The following personnel will benefit from the course:

  • Executives
  • IOs
  • Tax Professionals/ Officers
  • Compliance Managers
  • Internal Audit Staff
  • Risk Officers
  • Operational Managers

Materials Provided

  • Course Material File and Hand-outs
  • Exercise Sheets and Activities

Participants will Get

  • Seminar Pack containing the information presented on the day
  • Fun Learning Activities
  • Certificate of Participation