K2’s Case Studies in Fraud and Control Failures

6 Credits: Auditing
Event Date: August 3, 2021 7:30 am


Availability: 24 in stock

Webcasts are available for viewing Monday – Saturday, 8am – 8pm ET.
Without FlexCast, you must start with enough time to finish. (1 Hr/Credit)

 Secure Transaction

K2’s Case Studies in Fraud and Control Failures

Course Level
CPE Credits

6 Credits: Auditing
Event Date: August 3, 2021 7:30 am

Course Description

Fraud continues to plague businesses at epidemic levels, and internal control weaknesses and failures contribute to fraud’s large presence in organizations today. In this session, you will learn about the pervasiveness of fraud, the control failures that contribute to fraud, and what you can do to mitigate fraud risk. Using a case study approach, you will learn using real-world examples of recent scams and identify the control weaknesses and failures that contributed to each crime.

The design and application of information technology general controls (ITGCs) and information technology application controls (ITACs) is a specific focus of this session. With strong IT controls in place, your business can reduce the risk of fraud substantially. Further, you can use IT-based controls to help overcome other control issues that your organization might face.

Participate in this session to learn how you can reduce the risk of fraud in your organization – the survival of the business might depend on it!

Major topics include:

  • Detailed examination of many of the widely reported frauds of the past decade
  • Examples of control failures and weaknesses that lead to fraud
  • Identify critical information technology general controls and application controls that should be in place to deter and prevent fraud
Show More
Show Less

Learning Objectives

Upon completing this course, you should be able to:

  • Recognize control failures and weaknesses that can lead to fraud
  • Define information technology general controls and information technology application controls and distinguish between the two
  • Identify examples of critical internal controls, including information technology controls
  • List recommendations for improving internal controls in an organization
Show More
Show Less

Course Specifics

Course ID


Advanced Preparation


Compliance Information

NASBA Provider Number: 103220

CFP Notice: Not all courses that qualify for CFP® credit are registered by Western CPE. If a course does not have a CFP registration number in the compliance section, the continuing education will need to be individually reported with the CFP Board. For more information on the reporting process, required documentation, processing fee, etc., contact the CFP Board. CFP Professionals must take each course in it’s entirety, the CFP Board DOES NOT accept partial credits for courses.

Meet The Experts

Stephen M. Yoss Headshot

Stephen M. Yoss, Jr., CPA, MSIST, is a certified public accountant, the senior technology strategist and principal of Yossio, a continuing education instructor for financial professionals, and a licensed pyrotechnician. While his interests and skills are varied, they all share a common thread—his love for and skill in finding technology-based solutions. At age 10, Stephen began working with technology; he started his first IT company at just 13, which focused on designing web applications for local businesses. At 15, he began writing original computer code and has been designing and implementing technological solutions continuously since then. Stephen is a graduate …

K2 Enterprises (Stephen M. Yoss, Jr., CPA) Read More »

Related Courses

No items found