Skip to main content

The WSCPA will be closing early at 2:00pm on Friday, May 23 and remain closed through Monday, May 26 in observance of Memorial Day.

Computer Fraud and Abuse ON DEMAND

Available Until

Your Desk

6.0 Credits

Member Price $98.00

Non-Member Price $113.00

Overview

In the digital era, computer fraud has emerged as a pervasive threat to organizations worldwide. With rapid technological advancements, hackers, fraudsters, and even foreign entities have become adept at exploiting vulnerabilities for illicit gain. This escalating problem exposes organizations to significant risks, including the loss of sensitive data, financial resources, and intellectual property. Traditional internal controls are often inadequate in the face of sophisticated cyber threats, leaving organizations vulnerable to attacks that can have devastating consequences. The challenge of ensuring cybersecurity is not just about technology; it’s about understanding the tactics used by criminals and implementing effective strategies to counter them. This course offers comprehensive training on combating computer fraud. It explores the most common techniques used by cybercriminals to target organizations, equipping participants with the knowledge and tools to safeguard their electronic environments effectively. Participants will learn to recognize reasons for inadequate data protection, understand the components of the fraud triangle, and identify different types of computer fraud and their current trends. The fraud CPE covers various social engineering tricks, malware attacks, and the effective use of internal controls to mitigate fraud risks. By understanding these elements and implementing robust countermeasures, participants will be empowered to protect their organizations from the growing threat of computer fraud, ensuring the security of their financial and intellectual assets.

Highlights

Computer fraud, attacks and abuse. Preventing and detecting computer fraud and abuse.

Prerequisites

None.

Designed For

CPAs, controllers, accountants, financing professionals, business owners, and managers.

Objectives

Recognize the reasons why organizations fail to adequately protect data and identify natural and political disasters, software errors and equipment, malfunctions, unintentional acts, and intentional acts of fraud and abuse. Cite the most common types of fraud and analyze the components of the fraud triangle. Identify computer fraud, current trends in computer fraud, and classifications of computer fraud using the data processing model. Recognize the common techniques used to commit computer fraud, and more.

Preparation

None.

Notice

None.

Leader(s):

Leader Bios

Marshall Romney, Marshall B Romney & Assoc

Marshall Romney, CPA, is a Professor of Accounting at Brigham Young University. He holds a Bachelor’s and Master’s degree from BYU and PhD from the University of Texas at Austin. He was an auditor with a national CPA firm. Marshall has published many articles and manuscripts in academic and professional journals and is the coauthor of eight books. He is the recipient of numerous research grants for CPA firms, the Institute of Internal Auditors, and the American Accounting Association. Marshall has presented papers at professional conferences and has given many speeches and radio and television interviews on the topic of fraud and white-collar crime. He has also developed computer training courses for CPA firms, IBM, the FBI, and several universities. Marshall is a member and past president of the Information Systems/Management Advisory Systems section of the American Accounting Association. He was an advisor to the National Commission on Fraudulent Financial Reporting.

Return to Top

Non-Member Price $113.00

Member Price $98.00