Tales of True Tech Crimes: Ripped From the Headlines

12:00 am–11:59 pm ET

CPE SelectAvailable with CPE Select

# of CPE Credits

2

Description

Technology controls are more important than ever. In the absence of properly-functioning controls, entire systems and the data contained therein can quickly become infected, breached, or simply stop functioning. Auditors, business managers, and consultants all need to know how to evaluate critical technology controls and in this session, you will learn the best ways to evaluate critical information technology general controls and application controls.
 
Please note—This course will expire on Tuesday, December 31, 2019. If you don’t complete the course by midnight on this date, you will forfeit your registration fee for this course.   

Objective

Upon completing this course you should be able to * List at least three major security incidents reported in the headlines in the last two years, and explain at least one major control design or operation flaws which allowed the hack to occur * Define the three factors used to authenticate someone to a system, and explain why two-factor authentication is preferable to one-factor authentication * Explain why home-grade computer hardware and applications are inherently less secure than business and enterprise grade hardware and applications * List at least three best practices learned as a result of reviewing the incidents cited in the case studies

Highlights

* Identifying common themes between major computer crimes and data breaches * Understanding the importance of authentication controls play in mitigating threats * Listing common technology controls that should have been in place to prevent each of the crimes discussed in this session

Who Should Attend

Business professionals who are seeking to enhance the security surrounding both personal and organizational data

Required Knowledge

Fundamental knowledge of basic technological and security concepts

Advanced Prep

None

Event Speaker(s)

Mr. Tommy Stephens, Jr., CPA, MS, CITP ( K2 Enterprises, Hammond, LA ),

Additional Event Information

Technical Support
Contact NCACPA if you need assistance with your online program. For the quickest results, email the Online Learning Team at onlinelearning@ncacpa.org, and a team member will contact you shortly.

If you need assistance with internet access issues, browser capability, or when the NCACPA office is closed* please call Freestone Technical Support at 866-702-3278 or by email at support@peachnewmedia.com.

*NCACPA office hours are 9:00 am–5:00 pm ET. Online Learning Team members will be available via phone or email 30 minutes prior to the start of a live online program.

CPE Select Pass Policies
The CPE Select pass is available only for NCACPA members and the price is applicable for an individual user. The pass includes access to on demand and webinar programs, but excludes webcasts, “hot topic” webinars, and on demand Ethics programming. All eligible programs for the CPE Select pass will be marked in the online catalog and in promotions. Licensed CPAs who elect the student membership status must provide proof of enrollment in an advanced degree.

The CPE Select pass grants unlimited access to qualifying webinars and on demand programs on a calendar-year basis. Early bird pricing runs January 1 through June 30, and regular pricing runs July 1 through December 31.

We anticipate a spike in webinar activity later in the calendar year, and NCACPA is not liable for third-party service outages that may occur. Please plan your CPE before 12/31 to avoid any unforeseen technology issues.

Test Your System
You may test your system by clicking here. Please test your system to ensure you have the proper components installed.

Share This Event

Event Vendor:K2 Enterprises
Field of Study:Information Technology
Level: Intermediate

Event Type:On Demand
Event Code:OD009019

Registration Fees

Registration Fee Early Bird Regular
CPE Select N/A $0.00
NCACPA Member N/A $85.00
Non-Member N/A $120.00