Fraud continues to plague businesses at epidemic levels and technology control failures are a large reason fraud occurs. Using a case study approach, in this session, you will learn about the pervasiveness of fraud, the control failures that contribute to fraud, and what you can do to mitigate fraud risk.
A specific focus of this course is the application of information technology general controls and information technology application controls. In this course, you will examine numerous reported fraud cases and identify the general control and application control failures that contributed to each of these frauds. By learning through these real-world case studies, you will be in a better position to reduce fraud risk.
Are you a CPA?? Are you a Financial Professional?? Earn CPE Credits for Today's Podcast. Check out https://cpe.cx/csf2/. Take a quick 5 question quiz and get your certificate today. Super Easy!
Presented by Stephen M. Yoss, CPA, MS (https://yoss.io)
Produced by Alicia Yoss & Alanna Regalbuto
Graphics By Flaticon.com and iStock
Music by Bensound.com
Education and Compliance By K2 Enterprises (https://k2e.com)
Copyright. All product names, logos, and brands are the property of their respective owners. All company, product, and service names used in this website are for identification purposes only. The use of these names, logos, and brands does not imply endorsement.
Educational Use Only. The information presented in this presentation is for educational use only. The presenter will make specific recommendations, but the participant is highly recommended to do their own due diligence before making any investment decision.
How to Navigate Staff Shortages With Capacity Planning
Hands-on with QuickBooks Online Accountant for Public Accounting – Part 2
Hands-on with QuickBooks Online Accountant for Public Accounting – Part 1
Practical Tools for Protecting Data - Part 4
Practical Tools for Protecting Data - Part 3
How to Make 2023 Your Best Year Ever! Increase Your Market Share and Raise Your Profit Margin
Practical Tools for Protecting Data - Part 2
Practical Tools for Protecting Data - Part 1
2022 Biggest Security and Privacy Concerns - Part 4
2022 Biggest Security and Privacy Concerns - Part 3
Driving Change in Audit – Digital and Data Technology
2022 Biggest Security and Privacy Concerns - Part 2
2022 Biggest Security and Privacy Concerns - Part 1
An Accountant’s Guide to Cryptocurrency and Blockchain - Part 4
An Accountant’s Guide to Cryptocurrency and Blockchain - Part 3
An Accountant’s Guide to Cryptocurrency and Blockchain - Part 2
An Accountant’s Guide to Cryptocurrency and Blockchain - Part 1
Everything Google! Their Most Effective Tools, Apps & Services - Part 4
Everything Google! Their Most Effective Tools, Apps & Services - Part 3
Everything Google! Their Most Effective Tools, Apps & Services - Part 2
Create your
podcast in
minutes
It is Free
The Commercial Edge: Unleash the Power of People
The emPOWERed Half Hour
Reaching your Goals
Insights@work
The Ken Coleman Show
David Goggins Motivational Speech
Business Dad