Computer Fraud and Abuse ON DEMAND
Available Until
Your Desk
6.0 Credits
Member Price $98.00
Non-Member Price $113.00
Overview
In the digital era, computer fraud has emerged as a pervasive threat to organizations worldwide. With rapid technological advancements, hackers, fraudsters, and even foreign entities have become adept at exploiting vulnerabilities for illicit gain. This escalating problem exposes organizations to significant risks, including the loss of sensitive data, financial resources, and intellectual property. Traditional internal controls are often inadequate in the face of sophisticated cyber threats, leaving organizations vulnerable to attacks that can have devastating consequences. The challenge of ensuring cybersecurity is not just about technology; it’s about understanding the tactics used by criminals and implementing effective strategies to counter them. This course offers comprehensive training on combating computer fraud. It explores the most common techniques used by cybercriminals to target organizations, equipping participants with the knowledge and tools to safeguard their electronic environments effectively. Participants will learn to recognize reasons for inadequate data protection, understand the components of the fraud triangle, and identify different types of computer fraud and their current trends. The fraud CPE covers various social engineering tricks, malware attacks, and the effective use of internal controls to mitigate fraud risks. By understanding these elements and implementing robust countermeasures, participants will be empowered to protect their organizations from the growing threat of computer fraud, ensuring the security of their financial and intellectual assets.
Highlights
Computer fraud, attacks and abuse. Preventing and detecting computer fraud and abuse.
Prerequisites
None.
Designed For
CPAs, controllers, accountants, financing professionals, business owners, and managers.
Objectives
Recognize the reasons why organizations fail to adequately protect data and identify natural and political disasters, software errors and equipment, malfunctions, unintentional acts, and intentional acts of fraud and abuse. Cite the most common types of fraud and analyze the components of the fraud triangle. Identify computer fraud, current trends in computer fraud, and classifications of computer fraud using the data processing model. Recognize the common techniques used to commit computer fraud, and more.
Preparation
None.
Notice
None.
Leader(s):
Leader Bios
Marshall Romney, Marshall B Romney & Assoc
Marshall Romney, CPA, is a Professor of Accounting at Brigham Young University. He holds a Bachelor’s and Master’s degree from BYU and PhD from the University of Texas at Austin. He was an auditor with a national CPA firm. Marshall has published many articles and manuscripts in academic and professional journals and is the coauthor of eight books. He is the recipient of numerous research grants for CPA firms, the Institute of Internal Auditors, and the American Accounting Association. Marshall has presented papers at professional conferences and has given many speeches and radio and television interviews on the topic of fraud and white-collar crime. He has also developed computer training courses for CPA firms, IBM, the FBI, and several universities. Marshall is a member and past president of the Information Systems/Management Advisory Systems section of the American Accounting Association. He was an advisor to the National Commission on Fraudulent Financial Reporting.
Non-Member Price $113.00
Member Price $98.00