Back to Search

K2's Case Studies in Fraud and Technology Controls (4 hour version) Webinar

CPE

When
Oct. 19
9:00 a.m. - 12:30 p.m.

CPE Credits
4-A&A

Details

 Pricing

PICPA Member: $150 | Nonmember: $201


 More Information

Course No.
4204353E
Level
Intermediate
Prerequisites
Fundamental understanding of internal controls
Note
None

Description

Define information technology general controls and information technology application controls and distinguish between the twoList examples of key information technology controlsRecognize control failures and weaknesses that can lead to fraudList recommendations for improving internal controls in an organization

Highlights

Fraud continues to plague businesses at epidemic levels. Technology control failures are a large reason fraud occurs. Using a case study approach, you'll learn about the pervasiveness of fraud, the control failures that contribute to fraud, and what you can do to mitigate fraud risk.A specific focus will be the application of information technology general controls and information technology application controls. We'll examine numerous reported fraud cases, and identify the general control and application control failures that contributed to each. Learn to reduce fraud risk through these real-world case studies.


Speaker(s)

Thomas G. Stephens, Jr., CPA.CITP

    • Bachelor of Science in Business Administration, Major in Accounting,Auburn University
    • Master of Science, Major in Finance (emphasis in Corporate Finance), Georgia State University
    • Twenty-five Years of Public Accounting Experience, Five Years of Corporate Internal Auditing Experience, Four Years of Corporate and Cost Accounting Experience
    • Nineteen Years of Experience as a Continuing Professional Education Discussion Leader
    • Member of the American Institute of Certified Public Accountants and the Georgia Society of Certified Public Accountants; Past Member of the Institute of Internal Auditors
    • To Date, Has Presented Over 1,800 Continuing Education Sessions to Over 55,000 Participants

You May Also Like

K2's Case Studies in Fraud and Technology Controls (8 hour version) Webinar
Jan. 13 | Webinar
Define information technology general controls and information technology application controls and distinguish between the twoList examples of key information technology controlsRecognize control failures and weaknesses that can lead to fraudList ...
K2's Business Intelligence: Featuring Microsoft's Power BI Tools Webinar
Oct. 26 | Webinar
Create Excel-based BI dashboards.List the potential shortcomings of BI solutions based wholly on Excel.Identify and implement various Excel add-ins that might useful in BI applications.Differentiate between the BI opportunities in ...
K2's Excel Financial Reporting and Analysis Webinar
Nov. 2 | Webinar
Implement techniques such as Custom Formats, Conditional Formatting, and the Accounting Format for formatting financial statements and other Excel-based reports more efficientlyIdentify opportunities to streamline report assembly and printing with ...