K2's Case Studies in Fraud and Technology Controls

K2's Case Studies in Fraud and Technology Controls

K2’s Case Studies in Fraud and Technology Controls

Course - K2's Ripped From The Headlines: Lessons From Interesting Tech Crimes

Major Topics

  • Key fraud risks impacting businesses today
  • How to create, implement, and assess technology-based internal controls to reduce the probability of becoming a fraud victim
  • Examples of fraud and the monetary impact on victims

Learning Objectives

  1. Define information technology general controls and information technology application controls and distinguish between the two
  2. List examples of critical information technology controls
  3. List recommendations for improving internal controls in an organization
  4. Recognize control failures and weaknesses that can lead to fraud

Description

Fraud plagues businesses at epidemic levels, and technology control failures are a major contributing factor. Using a case study approach, in this session, you will learn about the pervasiveness of fraud, the control failures that contribute to fraud, and what you can do to mitigate fraud risk.

A specific focus of this course is the application of information technology general controls and information technology application controls. In this course, you will examine numerous reported fraud cases and identify the general control and application control failures that contributed to each fraud. By learning through these real-world case studies, you will be better positioned to reduce fraud risk.

Compliance Information

None Auditing 4 Credits November 2, 2022

Overview

Fraud plagues businesses at epidemic levels, and technology control failures are a major contributing factor. Using a case study approach, in this session, you will learn about the pervasiveness of fraud, the control failures that contribute to fraud, and what you can do to mitigate fraud risk.

A specific focus of this course is the application of information technology general controls and information technology application controls. In this course, you will examine numerous reported fraud cases and identify the general control and application control failures that contributed to each fraud. By learning through these real-world case studies, you will be better positioned to reduce fraud risk.

Course Details

  • PivotTable fundamentals, including Recommended PivotTables and the six elements of PivotTables
  • Formatting PivotTables
  • Advanced PivotTable techniques and options, including consolidation PivotTables, user-defined calculations, and working with Power Pivot
  • Analytical techniques available in PivotTables

  1. Identify the six main elements of a PivotTable report and their use when creating PivotTables
  2. Create PivotTables and manipulate data in PivotTables using grouping techniques, modified Field Settings, user-defined calculations, and sorting and filtering options
  3. Import and link data from external data sources into PivotTables; additionally, use Tables and Data Models as data sources for PivotTables
  4. Create Consolidation PivotTables to consolidate data from multiple data sources in Excel
  5. Construct PivotTables in enterprise-class organizations using Power Pivot and Slicers
  6. Analyze data in PivotTables using tools and techniques, such as sorting, filtering, and Excel’s GETPIVOTDATA function
  7. Apply specific PivotTable methods to solve problems in areas of PivotTable formatting, creating multiple PivotTables from a single data source, grouping PivotTable data into fiscal reporting periods, and keeping PivotTable row order intact

Intended Audience — Accounting and financial professionals who want to use the power of Excel PivotTables to analyze and summarize data

Advanced Preparation — None

Field of Study — Accounting, Computer Software and Applications

Credits — 8 Credits

IRS Program Number

Published Date – November 2, 2022

Revision Date

Course Authors

No items found