K2's Ripped From The Headlines: Lessons From Interesting Tech Crimes

K2's Ripped From The Headlines: Lessons From Interesting Tech Crimes

K2’s Ripped From The Headlines: Lessons From Interesting Tech Crimes

Course - K2's Ripped From The Headlines: Lessons From Interesting Tech Crimes

Major Topics

  • Common security weaknesses that occur with hardware and software at home and in the office
  • Malware, ransomware, data breach, and incident response tips
  • Internal control failures which result in the theft of assets or unauthorized manipulation of data

Learning Objectives

  1. List at least three major security incidents reported in the headlines in the last year, and explain at least one major internal control design or operation flaw that allowed the hack to occur
  2. Select the correct definitions for common security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
  3. List at least three best practices learned by reviewing the control failures cited in the case studies

Description

Generative AI and “ransomware for hire” have helped cybercriminals thrive in the post-pandemic period – but how do they do it? This all-new session is a series of case studies that examine actual criminal filings and news accounts and use them to highlight some of the actions you can take to limit your exposure to similar schemes. Attend this session and learn more about how high-profile control failures occurred so you can be more effective at preventing crimes such as theft, malware, ransomware, phishing, and hacking.

Compliance Information

Business professionals seeking to optimize their home network solution None Information Technology 2 Credits January 1, 2025

Overview

Generative AI and “ransomware for hire” have helped cybercriminals thrive in the post-pandemic period – but how do they do it? This all-new session is a series of case studies that examine actual criminal filings and news accounts and use them to highlight some of the actions you can take to limit your exposure to similar schemes. Attend this session and learn more about how high-profile control failures occurred so you can be more effective at preventing crimes such as theft, malware, ransomware, phishing, and hacking.

Course Details

  • Collaboration and security techniques
  • Tables, data models, and PivotTables
  • Advanced formulas
  • Data queries
  • Creating effective visualizations

  1. Identify? and? implement? the? best?techniques? to? secure? sensitive? information? in? Excel? workbooks?and? collaborate with other users to improve accuracy and efficiency
  2. Create tables and take advantage of their advanced features, such as dynamic data ranges, structured reference formulas, and the ability to relate multiple tables together into a Data Model
  3. Import and link data into Excel from external sources – including text, Access, and SQL Server – and use advanced tools, such as Power Query and various cleanup tools to manipulate the data to meet specific needs
  4. Use advanced functions, such as SUMPRODUCT, VLOOKUP, HLOOKUP, MATCH, INDEX, NETWORKDAYS, RAND, RANDBETWEEN, NPV, IRR, XNPV, and XIRR to create and audit complex formulas
  5. Analyze worksheet data using techniques such as Data Tables, Subtotals, Slicers, Filters, and PivotTables
  6. Describe techniques used to create, manipulate, and customize charts for analyzing and communicating information

Intended Audience

Advanced Preparation — None

Field of Study — Accounting, Computer Software and Applications

Credits — 8 Credits

IRS Program Number

Published Date – November 2, 2022

Revision Date

Course Authors

No items found