K2’s Expense Reporting Automation
Computer Software and Applications
2 CPE Credits
Major Topics
- Overview of selected expense and corporate credit card reporting and management platforms
- Major fraud schemes associated with expense reporting
- Extracting and importing transaction data from bank feeds and matching to receipts
Learning Objectives
- Select at least two types of employee expenses that are identified as very risky by the course
- Identify at least two common expense reimbursement fraud schemes.
- Choose responses that explain how bank feeds are different from data extraction/OCR applications
- Identify at least two comprehensive expense reporting solutions discussed in detail during the course which offer both OCR data extraction and mobile receipt capture
- Explain how artificial intelligence can be used to identify unusual items in expense reports
Description
Managing and auditing employee spending on personal and corporate credit cards is a challenge everywhere. Legacy manual expense reporting preparation and approval processes are tedious and repetitive and are an excellent place to start your company’s use of business process automation solutions. This session will cover a variety of expense workflow tools which use technologies and features like bank feeds, mobile receipt capture, OCR data extraction/filling, automated policy enforcement, and artificial intelligence-based validation to automate and eliminate the tedium. Attend this session and learn how to use automation and cure the expense reporting blues for you and your employees.
Compliance Information
Overview
Managing and auditing employee spending on personal and corporate credit cards is a challenge everywhere. Legacy manual expense reporting preparation and approval processes are tedious and repetitive and are an excellent place to start your company’s use of business process automation solutions. This session will cover a variety of expense workflow tools which use technologies and features like bank feeds, mobile receipt capture, OCR data extraction/filling, automated policy enforcement, and artificial intelligence-based validation to automate and eliminate the tedium. Attend this session and learn how to use automation and cure the expense reporting blues for you and your employees.
Course Details
- Common security weaknesses that occur with hardware and software at home and in the office
- Malware, ransomware, data breach, and incident response tips
- Internal control failures which result in the theft of assets or unauthorized manipulation of data
- List at least three major security incidents reported in the headlines in the last year, and explain at least one major internal control design or operation flaw that allowed the hack to occur
- Select the correct definitions for common security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
- List at least three best practices learned by reviewing the control failures cited in the case studies
Intended Audience — Business professionals seeking to optimize their home network solution
Advanced Preparation — None
Field of Study — Information Technology
Credits — 2 Credits
IRS Program Number –
Published Date – January 1, 2025
Revision Date –