CPE PACKAGES (Incl. Ethics) for Multiple States and Qualifications @ $4/credit. CLICK HERE to view.

Fail Proof Method for Implementing an Information Security Program

  • CPA (CA)
  • CPA (US)
  • CFE
Fail Proof Method for Implementing an Information Security Program

2 Credits


Subject Area

Information Technology

Webinar Qualifies For

2 CPE credit of Information Technology for all CPAs

2 CPD credit (Verifiable) for Canadian CPAs

2 CPE credit for Certified Fraud Examiners (CFEs)

2 CPD credit (Verifiable) for Certified Information Technology Professionals (CITP)

2 General Educational credit for Tax Professionals / Bookkeepers / Accountants

Course Description

In this tech CPE webinar for CPAs, you will learn a fail-proof methodology for implementing an Information Security Program (“ISP”) over 12 months starting from a business case until the first management review. This methodology is applicable to all organizations of all sizes, and industries. 

This webinar will be helpful to gain knowledge on the essential topics if you are planning to implement ISP:

  • Understand how to prepare for your ISP and assess the context in which you’re working, 
  • How to manage your project over time, include the right individuals, 
  • Schedule compliance requirements and 
  • Managing your compliance back-end through appropriate tools. 

This is a must tech CPE webinar if you are planning to employ an in-house or consultancy source in implementing ISP. The webinar will also be able to assist technical experts in the selection and validation of security controls and ensure that appropriate processes are implemented. 

Some of the topics that will be covered include:

  • Identify and assess internal and external factors relevant to the ISP;
  • Assign roles and responsibilities for information security;
  • Identify, set-up and establish governance and reporting structure;
  • Obtain management’s support through a business case;
  • Manage an ISP implementation project using best practices;
  • Establish governance documents, such as policies and procedures;
  • Identify information security objectives and related measures;
  • Ensure compliance with governing requirements;
  • Establish processes for managing security risks for products, services, departments, or even at the organization-level, and for such information to feed into meaningful decision-making tools;
  • Report effectively to executives and boards of directors to obtain resources for the ISP.

Recommended for: 

This online tech CPE webinar for CPAs is recommended for CPAs, business owners and technology professionals. The live webinar will also provide the opportunity to ask questions specific to industries, sectors or services; validate your understanding through interactive features, and network with your peers who are facing similar challenges.

Learning Objectives

  • To explore the requirements for developing an ISP
  • To establishing appropriate security metrics and reporting structures for the ISP
  • To appreciate the requirements for implementing an ISP
  • To identify ways to ensure the continual improvement of an ISP

Who Should Attend?

  • CPA - Mid Size Firm
  • Cybersecurity Pros
  • IT Managers
  • Young CPA