K2’s Case Studies in Fraud and Technology Controls
Auditing
4 CPE Credits
Major Topics
- Key fraud risks impacting businesses today
- How to create, implement, and assess technology-based internal controls to reduce the probability of becoming a fraud victim
- Examples of fraud and the monetary impact on victims
Learning Objectives
- Define information technology general controls and information technology application controls and distinguish between the two
- List examples of critical information technology controls
- List recommendations for improving internal controls in an organization
- Recognize control failures and weaknesses that can lead to fraud
Description
Fraud plagues businesses at epidemic levels, and technology control failures are a major contributing factor. Using a case study approach, in this session, you will learn about the pervasiveness of fraud, the control failures that contribute to fraud, and what you can do to mitigate fraud risk.
A specific focus of this course is the application of information technology general controls and information technology application controls. In this course, you will examine numerous reported fraud cases and identify the general control and application control failures that contributed to each fraud. By learning through these real-world case studies, you will be better positioned to reduce fraud risk.
Compliance Information
Overview
Fraud plagues businesses at epidemic levels, and technology control failures are a major contributing factor. Using a case study approach, in this session, you will learn about the pervasiveness of fraud, the control failures that contribute to fraud, and what you can do to mitigate fraud risk.
A specific focus of this course is the application of information technology general controls and information technology application controls. In this course, you will examine numerous reported fraud cases and identify the general control and application control failures that contributed to each fraud. By learning through these real-world case studies, you will be better positioned to reduce fraud risk.
Course Details
- Collaboration and security techniques
- Tables, data models, and PivotTables
- Advanced formulas
- Data queries
- Creating effective visualizations
- Identify? and? implement? the? best?techniques? to? secure? sensitive? information? in? Excel? workbooks?and? collaborate with other users to improve accuracy and efficiency
- Create tables and take advantage of their advanced features, such as dynamic data ranges, structured reference formulas, and the ability to relate multiple tables together into a Data Model
- Import and link data into Excel from external sources – including text, Access, and SQL Server – and use advanced tools, such as Power Query and various cleanup tools to manipulate the data to meet specific needs
- Use advanced functions, such as SUMPRODUCT, VLOOKUP, HLOOKUP, MATCH, INDEX, NETWORKDAYS, RAND, RANDBETWEEN, NPV, IRR, XNPV, and XIRR to create and audit complex formulas
- Analyze worksheet data using techniques such as Data Tables, Subtotals, Slicers, Filters, and PivotTables
- Describe techniques used to create, manipulate, and customize charts for analyzing and communicating information
Intended Audience —
Advanced Preparation — None
Field of Study — Accounting, Computer Software and Applications
Credits — 8 Credits
IRS Program Number –
Published Date – November 2, 2022
Revision Date –