EVENT DESCRIPTION

NOTE: This is an on demand learning bundle. This course suite is available 24 hours a day, 7 days a week. Once registered, you can access the material at any time. However, you will only have access to the course for 30 days AFTER REGISTRATION closes.

Improve the security of your sensitive data, reduce the risk of fraud and stay informed about data protection laws.

This bundle includes three, online courses:

1. Implementing Security and Privacy Policies (2 hours)

Topics covered in this course include minimum security protections, examples of policies that comply with regulations, and security tips to share with others. Receive a suggested security strategy and checklist, as well as sample documents to use as models for policy updates.

Click to see the full course description for Implementing Security and Privacy Policies.

2. Case Studies in Fraud and Technology (4 hours)

Using a case study approach, examine the pervasiveness of fraud, the control failures that contribute to fraud, and how to mitigate fraud risk. A specific focus of this course is the application of information technology general controls and information technology application controls.

Click to see the full course description for Case Studies in Fraud and Technology.

3. The Perfect Storm – Data Governance and Privacy Regulations (2 hours)

Stay current with data protection laws and learn practical steps you can take to be compliant and avoid a fine and. Examine mandated regulations for business and learn how to create a governance strategy.

Click to see the full course description for The Perfect Storm – Data Governance and Privacy Regulations.

Please note, you must pass a final exam with a score of 70% or better within one year of registering for these courses. The final exam may be taken up to a maximum of 10 times.

PREREQUISITE KNOWLEDGE

Participants should have a fundamental knowledge of computer operations, internal controls and basic technological and security concepts.

KEY TAKEAWAYS

  • Understand minimum security protection strategies
  • Identify policies and security checklists that apply to your business
  • Recognize control failures and weaknesses that can lead to fraud
  • Explore recommendations for improving internal controls in an organization
  • Identify data governance risks
  • Differentiate between privacy and governance
  • Create a governance strategy to remain compliant with regulations for your business

WHO WILL BENEFIT

Business professionals and CPAs seeking to enhance the security and privacy of sensitive data, reduce fraud risk, and enhance organizational data governance.