K2's Case Studies in Fraud and Technology Controls

K2's Case Studies in Fraud and Technology Controls

K2’s Case Studies in Fraud and Technology Controls

Course - K2's Ripped From The Headlines: Lessons From Interesting Tech Crimes

Major Topics

  • Key fraud risks impacting businesses today
  • How to create, implement, and assess technology-based internal controls to reduce the probability of becoming a fraud victim
  • Examples of fraud and the monetary impact on victims

Learning Objectives

  1. Define information technology general controls and information technology application controls and distinguish between the two
  2. List examples of critical information technology controls
  3. List recommendations for improving internal controls in an organization
  4. Recognize control failures and weaknesses that can lead to fraud

Description

Fraud plagues businesses at epidemic levels, and technology control failures are a major contributing factor. Using a case study approach, in this session, you will learn about the pervasiveness of fraud, the control failures that contribute to fraud, and what you can do to mitigate fraud risk.

A specific focus of this course is the application of information technology general controls and information technology application controls. In this course, you will examine numerous reported fraud cases and identify the general control and application control failures that contributed to each fraud. By learning through these real-world case studies, you will be better positioned to reduce fraud risk.

Compliance Information

None Auditing 4 Credits November 2, 2022

Overview

Fraud plagues businesses at epidemic levels, and technology control failures are a major contributing factor. Using a case study approach, in this session, you will learn about the pervasiveness of fraud, the control failures that contribute to fraud, and what you can do to mitigate fraud risk.

A specific focus of this course is the application of information technology general controls and information technology application controls. In this course, you will examine numerous reported fraud cases and identify the general control and application control failures that contributed to each fraud. By learning through these real-world case studies, you will be better positioned to reduce fraud risk.

Course Details

  • Fraud in small business environments
  • Internal control options in small business accounting software
  • Understanding the need for application controls and general controls
  • Common challenges associated with implementing appropriate internal controls in small business environments

  1. Cite internal control fundamentals, including definitions and concepts, types of internal control activities, and the need for internal controls
  2. Identify common small business control deficiencies and issues, including concentration of ownership and inadequate segregation of duties, and list five key risk areas for small businesses
  3. Recognize the common types of fraud schemes occurring in small businesses and implement internal control measures to reduce the threat of becoming a victim
  4. List the objectives and common deficiencies of small business accounting systems
  5. Define the purpose of general controls and list examples of typical control techniques in small businesses
  6. Implement technology tools to prevent and detect occupational fraud
  7. List opportunities to enhance security over information systems and sensitive data

Intended Audience — Business professionals responsible for internal control and fraud prevention and detection

Advanced Preparation — None

Field of Study — Auditing

Credits — 8 Credits

IRS Program Number

Published Date – November 2, 2022

Revision Date

Course Authors

No items found