K2's Tales of True Tech Crimes: Ripped from the Headlines | 4183623G


Date :
April 17, 2019 11:00 AM - 12:40 PM
Location :
Facility :
Webcast Event
Level of Difficulty :
Member Price :
Nonmember Price :
CPE Credits :
CPE 2.00
Show tabs
Security is a top concern for business professionals every year, and yet many hacks result from the failure of organizations to implement effective internal controls over information technology. This session will teach you about critical IT-related controls in a case study approach using examples from recent breaches and security failures to help you better understand how to protect your company and its data. Attend this fast-paced session and learn more about IT-related controls which can be used to prevent computer crimes such as unauthorized access, theft of information, identity theft, data exfiltration, tax refund fraud, and more.


List at least three major security incidents reported in the headlines in the last two years, and explain at least one major control design or operation flaws which allowed the hack to occur
Define the three factors used to authenticate someone to a system, and explain why two-factor authentication is preferable to one-factor authentication
Explain why home-grade computer hardware and applications are inherently less secure than business and enterprise grade hardware and applications
List at least three best practices learned as a result of reviewing the incidents cited in the case studies

Major Subjects:

Security Incidents
Two-factor authentication and one-factor authentication
Home-grade computer hardware and business and enterprise grade hardware and applications

Advanced Prep:


Misc. Information:

Level of Difficulty:
Field of Interest:
Information Technology
Designed For:
Accountants and financial professionals


Tommy Stephens


  • Materials - eBook