K2's Ripped from the Headlines: Lessons from Notable Tech Crimes 26-27

Technological advancements facilitate new forms of cybercrime and fraud. In this session, you will learn how the crooks used technology to reap the...

2/22/2027 12:00pm - 2:00pm  |  Online  |  CalCPA

Members: $99.00, Non-members: $129.00

CPE Categories: Specialized Knowledge & Applications (2 CPE)

Sign In / Register


Description

Technological advancements facilitate new forms of cybercrime and fraud. In this session, you will learn how the crooks used technology to reap their ill-gotten rewards.

Course Objectives

• Identify at least three major security incidents reported in the headlines in the last year, and explain at least one major internal control design or operation flaw that allowed the hack to occur

• Select the correct definitions for common security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)

• Identify at least three best practices learned by reviewing the control failures cited in the case studies

Subjects

• Common security weaknesses that occur with hardware and software at home and in the office

• Malware, ransomware, data breach, and incident response tips

• Internal control failures that result in the theft of assets or unauthorized manipulation of data

Prerequisites

Basic understanding of common business technologies and related risks