K2's Ripped From The Headlines – Outrageous Tales Of Cybercrimes

K2's Ripped From The Headlines – Outrageous Tales Of Cybercrimes

K2’s Ripped From The Headlines – Outrageous Tales Of Cybercrimes

Course - K2's Ripped From The Headlines – Outrageous Tales Of Cybercrimes
Topics Learning Objectives Description Compliance

Major Topics

  • Common security weaknesses which occur with hardware and software at home and in the office
  • Malware, ransomware, data breach, and incident response tips
  • Internal control failures that resulted in the theft of assets or unauthorized manipulation of data
  • User authentication and security awareness training

Learning Objectives

  1. List at least three major security incidents reported in the headlines in the last year, and explain at least one primary internal control design or operation flaws that allowed the hack to occur
  2. Select the correct definitions for security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
  3. List at least three best practices learned by reviewing the control failures cited in the case studies

Description

Remote work environments have created many new opportunities for cybercriminals and other fraudsters to exploit, and accounting professionals are some of the most commonly targeted individuals. This session is a series of case studies that examine actual criminal filings and news accounts and use them to highlight some of the actions you can take to limit your exposure to similar schemes. Attend this session and learn more about how high-profile control failures occurred so you can be more effective at preventing crimes in your organization.

Compliance Information

Managers, owners, and accounting professionals who desire to learn from computer crime incidents best practices they can use to enhance their organization’s security posture None Auditing 2 Credits January 4, 2023

Overview

Remote work environments have created many new opportunities for cybercriminals and other fraudsters to exploit, and accounting professionals are some of the most commonly targeted individuals. This session is a series of case studies that examine actual criminal filings and news accounts and use them to highlight some of the actions you can take to limit your exposure to similar schemes. Attend this session and learn more about how high-profile control failures occurred so you can be more effective at preventing crimes in your organization.

Course Details

  • Common security weaknesses which occur with hardware and software at home and in the office
  • Malware, ransomware, data breach, and incident response tips
  • Internal control failures that resulted in the theft of assets or unauthorized manipulation of data
  • User authentication and security awareness training

  1. List at least three major security incidents reported in the headlines in the last year, and explain at least one primary internal control design or operation flaws that allowed the hack to occur
  2. Select the correct definitions for security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
  3. List at least three best practices learned by reviewing the control failures cited in the case studies

Intended Audience — Managers, owners, and accounting professionals who desire to learn from computer crime incidents best practices they can use to enhance their organization’s security posture

Advanced Preparation — None

Field of Study — Auditing

Credits — 2 Credits

IRS Program Number

Published Date – January 4, 2023

Revision Date

Course Authors

No items found