K2's Tales of True Tech Crimes: Ripped from the Headlines Webinar

Oct 18
9:00 - 11:00 a.m.

Online

2-Other
CPE Credits

Security is a top concern for business professionals every year, and yet many hacks result from the failure of organizations to implement effective internal controls over information technology. This session will teach you about critical IT-related controls in a case study approach using examples from recent breaches and security failures to help you better understand how to protect your company and its data. Attend this fast-paced session and learn more about IT-related controls which can be used to prevent computer crimes such as unauthorized access, theft of information, identity theft, data exfiltration, tax refund fraud, and more.
Highlights

• List at least three major security incidents reported in the headlines in the last two years, and explain at least one major control design or operation flaws which allowed the hack to occur
• Define the three factors used to authenticate someone to a system, and explain why two-factor authentication is preferable to one-factor authentication
• Explain why home-grade computer hardware and applications are inherently less secure than business and enterprise grade hardware and applications
• List at least three best practices learned as a result of reviewing the incidents cited in the case studies

Registration

PICPA Member: $79
Nonmember: $104

More Information

Course No. 4183623A

Level: Intermediate

Prerequisites: Fundamental knowledge of basic technological and security concepts

Notes

This webinar is hosted by PICPA's partner, CALCPA. After registering, you will receive an email from CALCPA with the log-in information.

Speaker(s)

Thomas Stephens

K2 Enterprises