K2’s Ripped From The Headlines: Lessons From Interesting Tech Crimes
Information Technology
2 CPE Credits
Major Topics
- Common security weaknesses that occur with hardware and software at home and in the office
- Malware, ransomware, data breach, and incident response tips
- Internal control failures which result in the theft of assets or unauthorized manipulation of data
Learning Objectives
- List at least three major security incidents reported in the headlines in the last year, and explain at least one internal control design or operation flaw that allowed the hack to occur
- Select the correct definitions for security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
- List at least three best practices learned by reviewing the control failures cited in the case studies
Description
Remote and hybrid work during the Pandemic created new opportunities for cybercriminals and other fraudsters to exploit, and accounting professionals are among the most targeted individuals. This session is a series of case studies that examine actual criminal filings and news accounts and use them to highlight the actions you can take to limit your exposure to similar schemes. Attend this session and learn more about how high-profile control failures occurred so you can be more effective at preventing crimes such as theft, malware, ransomware, phishing, and hacking.
Compliance Information
Overview
Remote and hybrid work during the Pandemic created new opportunities for cybercriminals and other fraudsters to exploit, and accounting professionals are among the most targeted individuals. This session is a series of case studies that examine actual criminal filings and news accounts and use them to highlight the actions you can take to limit your exposure to similar schemes. Attend this session and learn more about how high-profile control failures occurred so you can be more effective at preventing crimes such as theft, malware, ransomware, phishing, and hacking.
Course Details
- Common security weaknesses that occur with hardware and software at home and in the office
- Malware, ransomware, data breach, and incident response tips
- Internal control failures which result in the theft of assets or unauthorized manipulation of data
- List at least three major security incidents reported in the headlines in the last year, and explain at least one internal control design or operation flaw that allowed the hack to occur
- Select the correct definitions for security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
- List at least three best practices learned by reviewing the control failures cited in the case studies
Intended Audience — Managers, owners, and accounting professionals who want to learn from computer crime incidents best practices that can be used to enhance their organization’s security posture
Advanced Preparation — None
Field of Study — Information Technology
Credits — 2 Credits
IRS Program Number –
Published Date – January 1, 2024
Revision Date –