Log In to Register

Please note that this course is from a third party vendor, K2 Enterprises. We strongly recommend registering no later than one-hour before the course begins. Please contact K2 if you do not receive your invitation via email at least 24 hours before the course begins: [email protected]. Thank you.

Date(s):

05/17/2024

Registration Open:

8:45 AM - 9:00 AM

Time:

9:00 AM - 4:30 PM

Facility:

Online

Meeting Type:

Courses

CPE Credit:

8.00

Field(s) Of Study:

Auditing (8.00)

Level of Knowledge:

Intermediate

Price:

Member: $335.00
Nonmember: $435.00

Individual Discounts:

Not Available

Group Discounts:

10+ Registrants - Discount: 5.00%
20+ Registrants - Discount: 10.00%

Overview

Fraud continues to plague businesses at epidemic levels, and technology control failures are a significant reason fraud occurs. Using a case study approach, in this session, you will learn about the pervasiveness of fraud, the control failures contributing to fraud, and what you can do to mitigate fraud risk.

 

A specific focus of this course is applying information technology general controls and information technology application controls. In this course, you will examine numerous reported fraud cases and identify the general and application control failures that contributed to each fraud. By learning through these real-world case studies, you will be positioned better to reduce fraud risk.

 

The fraud epidemic continues, creating billions in losses every year. Participate in this session to learn how most frauds occur and what controls you can and should implement to reduce fraud risks.

• Define information technology general controls and information technology application controls and distinguish between the two
• List examples of critical information technology controls
• Recognize control failures and weaknesses that can lead to fraud
• List recommendations for improving internal controls in an organization

 

This course is designed for CPAs and other accounting auditing, and business professionals who are seeking to reduce fraud risk.

 

Highlights

• Key fraud risks impacting businesses today

• Examples of fraud and the monetary impact on victims

• How to create, implement, and assess technology-based internal controls to reduce the probability of becoming a fraud victim

 

Prerequisites

Fundamental understanding of internal controls