Fraud continues to plague businesses at epidemic levels and internal control omissions and failures are a large reason fraud occurs. Using a case study approach, in this session you will learn about the pervasiveness of fraud, the control failures that contribute to fraud, and what you can do to mitigate fraud risk.
A specific focus of this course is the application of information technology general controls and information technology application controls. In this course, you will examine numerous reported fraud cases and identify the general control and application control failures that contributed to each of these frauds. By learning through these real-world case studies, you will be in a better position to reduce fraud risk.
- Detailed examination of many of the widely reported frauds of the past decade
- Examples of control failures and weaknesses that lead to fraud
- Identify key information technology general controls and application controls that should be in place to deter and prevent fraud
Upon successful completion of this course, participants will be able to:
- Define information technology general controls and information technology application controls and distinguish between the two
- List examples of key information technology controls
- Recognize control failures and weaknesses that can lead to fraud
- List recommendations for improving internal controls in an organization
Back to top