CPE Today Logo

K2’s Ripped From The Headlines: Lessons From Interesting Tech Crimes

Course - K2's Ripped From The Headlines: Lessons From Interesting Tech Crimes

Upcoming Live Event Schedule

This course is part of an event and you must register for the associated event to participate.

Southeast Technology Conference
May 20, 2024 | Conference

Summer Tech Essentials Multi-State Conference
June 13, 2024 | Conference

Major Topics

  • Common security weaknesses that occur with hardware and software at home and in the office
  • Malware, ransomware, data breach, and incident response tips
  • Internal control failures which result in the theft of assets or unauthorized manipulation of data

Learning Objectives

  1. Select the correct definitions for security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
  2. List at least three best practices learned by reviewing the control failures cited in the case studies
  3. List at least three major security incidents reported in the headlines in the last year, and explain at least one internal control design or operation flaw that allowed the hack to occur

Course Description

Remote and hybrid work during the Pandemic created new opportunities for cybercriminals and other fraudsters to exploit, and accounting professionals are among the most targeted individuals. This session is a series of case studies that examine actual criminal filings and news accounts and use them to highlight the actions you can take to limit your exposure to similar schemes. Attend this session and learn more about how high-profile control failures occurred so you can be more effective at preventing crimes such as theft, malware, ransomware, phishing, and hacking.

Compliance Information

Intended Audience

Managers, owners, and accounting professionals who want to learn from computer crime incidents best practices that can be used to enhance their organization’s security posture

Advanced Preparation

None

Field of Study

Information Technology

Credits

2 Credits

Published Date

January 1, 2024

Course Authors

Brian Tankersley

Knoxville, TN
Speaker & Author, K2 Enterprises

Brian Tankersley is a consultant who advises US firms and companies on accounting technology issues. Mr. Tankersley is a frequent speaker at continuing education courses for K2 Enterprises, and publishes a nationally recognized blog on accounting and technology (www.cpatechblog.com). He has also served as the technology editor for a major accounting industry publication. Mr. Tankersley has over 25 years of professional experience, including accounting, auditing, technology, and education, and has been with K2 Enterprises since 2005, and he is also one of the national instructors for Yaeger CPA Review.

About Instructor Read Less

Overview

Remote and hybrid work during the Pandemic created new opportunities for cybercriminals and other fraudsters to exploit, and accounting professionals are among the most targeted individuals. This session is a series of case studies that examine actual criminal filings and news accounts and use them to highlight the actions you can take to limit your exposure to similar schemes. Attend this session and learn more about how high-profile control failures occurred so you can be more effective at preventing crimes such as theft, malware, ransomware, phishing, and hacking.

Course Details

  • Common security weaknesses that occur with hardware and software at home and in the office
  • Malware, ransomware, data breach, and incident response tips
  • Internal control failures which result in the theft of assets or unauthorized manipulation of data

  1. Select the correct definitions for security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
  2. List at least three best practices learned by reviewing the control failures cited in the case studies
  3. List at least three major security incidents reported in the headlines in the last year, and explain at least one internal control design or operation flaw that allowed the hack to occur

Intended Audience — Managers, owners, and accounting professionals who want to learn from computer crime incidents best practices that can be used to enhance their organization’s security posture

Advanced Preparation — None

Field of Study — Information Technology

Credits — 2 Credits

IRS Program Number

Published Date – January 1, 2024

Revision Date

Course Authors

Brian Tankersley

Knoxville, TN
Speaker & Author, K2 Enterprises

Brian Tankersley is a consultant who advises US firms and companies on accounting technology issues. Mr. Tankersley is a frequent speaker at continuing education courses for K2 Enterprises, and publishes a nationally recognized blog on accounting and technology (www.cpatechblog.com). He has also served as the technology editor for a major accounting industry publication. Mr. Tankersley has over 25 years of professional experience, including accounting, auditing, technology, and education, and has been with K2 Enterprises since 2005, and he is also one of the national instructors for Yaeger CPA Review.

About Instructor Read Less

All of our self-study courses are NASBA approved (through our partners at K2 Enterprises) the revisions to the Statement on Standards for Continuing Professional Education (CPE) Programs (Standards).

Your Registration Includes:

  • Course materials (video & PDF version)
  • Unlimited attempts to complete exam
  • Course materials (PDF & Sample Materials)
  • Instant grading & certificate of completion
  • One year access to complete your CPE
  • Completion certificate

Recommended Products

Courses and Events You’ll Love!