Colorado Society of CPAs names Alicia Gelinas, CPA, President and CEO - Read More.

K2’S Tales of True Tech Crimes – Ripped from the Headlines (On-Demand) 2022

Description

Security is a top concern for CPAs every year, yet many hacks result from organizations failing to implement effective information technology controls. In this session, you will learn about critical controls by using case studies from recent security incidents. This strategy helps you understand risks and appropriate responses.  Participate in this session to learn how to reduce your risk associated with unauthorized access, theft of information, identity theft, data exfiltration, tax refund fraud, and more.

Learning Objectives
  • List examples of major security incidents reported in the last two years and the related security weaknesses that allowed each breach to occur
  • Define the three methods used to authenticate a user to a system
  • Differentiate between the security in home-grade technology and business-grade technology
  • Identify three security best practices to help mitigate risk
Major Topics
  • Common security failures
  • The importance of user authentication
  • Security vulnerabilities embedded in hardware and software
  • Best practices to facilitating secure environments
Provider
K2 Enterprises, LLC
Course Level
Intermediate
CPE Field of Study
Information Technology
2
Who Should Attend

Business professionals who are seeking to enhance the security surrounding both personal and organizational data

Instructor(s)
Steve Yoss
Prerequisites

Fundamental knowledge of basic technological and security concepts

Purchase Now
When
Available 24/7
Location
Online
Total CPE Credits
2
Format
On-Demand

MEMBER


$ (% off)
$89.00

NON-MEMBER


$ (% off)
$115.00
Become A Member

Purchase This Program

K2’S Tales of True Tech Crimes – Ripped from the Headlines (On-Demand) 2022


Your browser is out-of-date!

Update your browser to view this website correctly.

Update my browser now

×