K2's 2024 Ripped From The Headlines - Lessons From Interesting Tech Crimes

Friday, February 07, 2025
Webcast or Webinar, Online
12:00PM - 2:00 PM (opens at 11:30AM) EST
2Credits
Technical Business

Registration is Open

Members
$79.00 Regular Price
Non-Members
$109.00 Regular Price

CPE PowerPass Users

Click the "Apply PowerPass" button to use your PowerPass for the applicable course below.
$40.00 Members / $56.00 Non-Members
Course Type: Webcast
Course Code: 24/AC023585
Level: Intermediate
Vendor: ACPEN
Field of Study: Information Technology

Overview:

Hacks, attacks, ransomware, malware – where does it end? Unfortunately, tech crimes continue to plague businesses of all sizes. Participate in this session to learn how you can reduce the risk of becoming yet another victim.

Objectives:

  • List at least three major security incidents reported in the headlines in the last year, and explain at least one internal control design or operation flaw that allowed the hack to occur
  • Select the correct definitions for security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
  • List at least three best practices learned by reviewing the control failures cited in the case studies

Major Topics:

  • Common security weaknesses that occur with hardware and software at home and in the office
  • Malware, ransomware, data breach, and incident response tips
  • Internal control failures which result in the theft of assets or unauthorized manipulation of data

Major Topics:

  • Common security weaknesses that occur with hardware and software at home and in the office
  • Malware, ransomware, data breach, and incident response tips
  • Internal control failures which result in the theft of assets or unauthorized manipulation of data

Designed For:

Managers, owners, and accounting professionals who want to learn from computer crime incidents best practices that can be used to enhance their organization's security posture

Prerequisites:

Fundamental understanding of business-related technology