K2’s Case Studies In Fraud And Technology Controls
Auditing
8 CPE Credits

Major Topics
- Key fraud risks impacting businesses today
- Examples of fraud and the monetary impact on victims
- How to create, implement, and assess technology-based internal controls to reduce the probability of becoming a fraud victim
Learning Objectives
- Define information technology general controls and information technology application controls and distinguish between the two
- List examples of critical information technology controls
- Recognize control failures and weaknesses that can lead to fraud
- •List recommendations for improving internal controls in an organization
Description
Fraud continues to plague businesses at epidemic levels, and technology control failures are a significant reason fraud occurs. Using a case study approach, in this session, you will learn about the pervasiveness of fraud, the control failures contributing to fraud, and what you can do to mitigate fraud risk.
A specific focus of this course is applying information technology general controls and information technology application controls. In this course, you will examine numerous reported fraud cases and identify the general and application control failures that contributed to each fraud. By learning through these real-world case studies, you will be positioned better to reduce fraud risk.
Compliance Information
Overview
Fraud continues to plague businesses at epidemic levels, and technology control failures are a significant reason fraud occurs. Using a case study approach, in this session, you will learn about the pervasiveness of fraud, the control failures contributing to fraud, and what you can do to mitigate fraud risk.
A specific focus of this course is applying information technology general controls and information technology application controls. In this course, you will examine numerous reported fraud cases and identify the general and application control failures that contributed to each fraud. By learning through these real-world case studies, you will be positioned better to reduce fraud risk.
Course Details
- Editing PDF documents
- Securing PDF documents
- Extracting data from PDFs
- Converting documents to the PDF format
- Identifying multiple options for generating PDFs
- Differentiating between Adobe software options
- Listing the steps necessary to convert PDF documents to fillable forms
- Specifying options for securing PDFs
- Identifying options for collaborating on PDFs
Intended Audience — Business professionals seeking to work with PDF documents more efficiently and effectively
Advanced Preparation — None
Field of Study — Computer Software and Applications
Credits — 1 Credits
IRS Program Number –
Published Date – January 1, 2025
Revision Date –