K2's Ripped From The Headlines

Monday, June 24, 2024
Webcast or Webinar, Online
9:00 AM - 10:46AM (opens at 8:30 AM) EST
2Credits
Accounting and Auditing

Registration is Open

Members
$79.00 Regular Price
Non-Members
$109.00 Regular Price

CPE PowerPass Users

Click the "Apply PowerPass" button to use your PowerPass for the applicable course below.
$40.00 Members / $56.00 Non-Members
Course Type: Webcast
Course Code: 24/AC084030
Level: Basic
Vendor: ACPEN
Field of Study: Auditing

Overview:

Remote work environments have created many new opportunities for cybercriminals and other fraudsters to exploit, and accounting professionals are some of the most commonly targeted individuals. This session is a series of case studies that examine actual criminal filings and news accounts and use them to highlight some of the actions you can take to limit your exposure to similar schemes. Attend this session and learn more about how high-profile control failures occurred so you can be more effective at preventing crimes in your organization.

Objectives:

  • List at least three major security incidents reported in the headlines in the last year, and explain at least one primary internal control design or operation flaws that allowed the hack to occur
  • Select the correct definitions for security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
  • List at least three best practices learned by reviewing the control failures cited in the case studies

Major Topics:

  • Malware, ransomware, data breach, and incident response tips
  • Internal control failures that resulted in the theft of assets or unauthorized manipulation of data
  • User authentication and security awareness training

Major Topics:

  • Malware, ransomware, data breach, and incident response tips
  • Internal control failures that resulted in the theft of assets or unauthorized manipulation of data
  • User authentication and security awareness training

Designed For:

Managers, owners, and accounting professionals who desire to learn from computer crime incidents best practices they can use to enhance their organization's security posture

Prerequisites:

None