CPE Packages (Incl. Ethics) for Multiple States and Qualifications Available. Price $4/credit - CLICK HERE to view.

Cyber Security: Managing Risk in the Information Age

Big4 CPA, CA

AK Consulting Inc.

Friday, July 30, 2021 | 12:00 PM EDT

  • CPA Canada

3 Credits

$60

Subject Area

Information Technology

Webinar Qualifies For

3 CPE credit of Information Technology for all CPAs

3 General Educational credit for Tax Professionals / Bookkeepers / Accountants

Upcoming Webinars

everything you need to know about partnerships

(2)

Jul 26, 2021 | 09:00 AM EDT View Details

basis calculations & distributions for pass-thru entity owners schedule k-1 analysis (latest)

(7)

Jul 26, 2021 | 09:00 AM EDT View Details

sox internal controls for inventory

Jul 26, 2021 | 09:30 AM EDT View Details

basic concepts of fixed asset accounting

(1)

Jul 26, 2021 | 09:30 AM EDT View Details

quickbooks for desktop pc exploring the interface - for beginners

(1)

Jul 26, 2021 | 10:00 AM EDT View Details

yellow book boot camp – introduction to nfp and governmental accounting & auditing

Jul 26, 2021 | 10:00 AM EDT View Details

excel accountant: intro to spreadsheets in-depth

(1)

Jul 26, 2021 | 10:00 AM EDT View Details

2020 t2 - step-by-step guide preparing t2 return in profile

Jul 26, 2021 | 10:00 AM EDT View Details

workplace culture

Jul 26, 2021 | 10:00 AM EDT View Details

employment law – what will get you sued in 2021

(67)

Jul 26, 2021 | 10:30 AM EDT View Details

ethics irs circular 230 - controversy side of circular 230

(47)

Jul 26, 2021 | 10:30 AM EDT View Details

s-corp preparation, basis calculations & distributions – form 1120s schedule k & k-1 analysis

(4)

Jul 26, 2021 | 11:00 AM EDT View Details

agile auditing

(3)

Jul 26, 2021 | 11:00 AM EDT View Details

itemized deduction updates - with examples & case studies (basic overview)

(222)

Jul 26, 2021 | 11:30 AM EDT View Details

excel’s data validation tools - keep out bad data from the start

(2)

Jul 26, 2021 | 11:30 AM EDT View Details

Course Description

As global cybercrime increases, governments and businesses are struggling to keep up with the threats they are facing; because of the changing and innovative methods of attack being used against them. With internet of things (IoT) developments, there are near-limitless capabilities for companies to incorporate intelligent wireless technologies into their work-space. Whether using smartphones and watches, remote asset management systems, or other seamlessly connected devices, businesses have more flexibility than ever before regarding how they operate.

Unfortunately, however, these connected assets also create new gateways for malicious sources to gain access to sensitive information and critical systems. Hackers are now using artificial intelligence and automated software programs to funnel information about their intended targets. In fact, with the help of system exploits and phishing scams, it’s never been easier for passwords to become compromised.

The past decade has seen a plague of devastating ransomware attacks cause catastrophic damage to businesses in nearly every industry. Data breaches cause problems to businesses in several ways. According to IBM, it now takes companies on average 197 days to identify a breach to data security as it occurs. Additionally, it can take up to another 69 days to contain it.

It is important to prepare your employees on how to effectively mitigate their cybersecurity risks. While online digital retailers can rely on business insurance to mitigate some of the risks associated with data breaches, the cost of this downtime alone can be extremely problematic and companies can also experience legal troubles. It is much easier for hackers to pose as authorized members of a company while they inflict their damage from the inside and do so undetected.

Digitization of assets, large data storage capabilities, and cloud-based services, organizations can now streamline their operations and provide better quality goods and services to their customers. However, these advancements in technology, along with better accessibility to company data, also comes with great risk to both personal and business security. Which are all highlighted in this course.


Learning Objectives

  • To discuss about the top data breaches and financial losses to some mega giants and how they were attacked.
  • To discuss what are some basic tips which can be applied to prevent data breach
  • To discover the top cyber security threats and a bit of information about them and how they attack your system or organization
  • To discuss what measures can be taken when your organization has a cyber attack
  • To discuss how to protect your mobile phone access and its vulnerability
  • To rethink the entire concept of cyber security leadership and methods that can be acquired to keep your companies safe
  • To discuss what are the expected predictions and spending on cyber security
  • To discuss what will be the future trend with statistical data and figures

Who Should Attend?

  • Certified Management Accountant
  • CPA (Industry)
  • CPA - Mid Size Firm
  • CPA - Small Firm
  • Young CPA