K2's Case Studies in Fraud and Technology Controls
Course Information
8
CPE Credits
8-Hour Course
Auditing (8 Credits)
Fundamental Understanding of Internal Controls
Prerequisites
Intermediate
Program Level
No
Preparation
Course Information
8
CPE Credits
8-Hour Course
Auditing (8 Credits)
Fundamental Understanding of Internal Controls
Prerequisites
Intermediate
Program Level
No
Preparation
Major Topics
Small businesses have unique and specific technology needs, including those around remote access. Whether team members need remote access to desktops, data, voice services, instant messaging, or Cloud-based services, sometimes the list of available options can be overwhelming!
In this course, you will learn about practical solutions for facilitating remote access in small businesses. Among other items, included in this program is a detailed review of various solutions to provide remote access to a desktop, how to work securely from remote locations, key considerations when selecting Cloud-based solutions, and how to facilitate communication and collaboration in remote environments.
Course Description
Fraud continues to plague businesses at epidemic levels and technology control failures are a large reason fraud occurs. Using a case study approach, in this session you will learn about the pervasiveness of fraud, the control failures that contribute to fraud, and what you can do to mitigate fraud risk.
A specific focus of this course is the application of information technology general controls and information technology application controls. In this course, you will examine numerous reported fraud cases and identify the general control and application control failures that contributed to each of these frauds. By learning through these real-world case studies, you will be in a better position to reduce fraud risk.
Did You Know?
Fraud does not discriminate!
Learning Objectives
Upon completing this course, you should be able to:
- Define information technology general controls and information technology application controls and distinguish between the two
- List examples of key information technology controls
- Recognize control failures and weaknesses that can lead to fraud
- List recommendations for improving internal controls in an organization
Who is the course for?
CPAs and other accounting, auditing, and business professionals who are seeking to reduce fraud risk.
Instructional Delivery Method
Group-live demo and discussion.