
Intermediate

CPE Credits
6 Credits: Auditing
Course Description
Fraud continues to plague businesses at epidemic levels, and internal control weaknesses and failures contribute to fraud’s large presence in organizations today. In this session, you will learn about the pervasiveness of fraud, the control failures that contribute to fraud, and what you can do to mitigate fraud risk. Using a case study approach, you will learn using real-world examples of recent scams and identify the control weaknesses and failures that contributed to each crime.
The design and application of information technology general controls (ITGCs) and information technology application controls (ITACs) is a specific focus of this session. With strong IT controls in place, your business can reduce the risk of fraud substantially. Further, you can use IT-based controls to help overcome other control issues that your organization might face.
Participate in this session to learn how you can reduce the risk of fraud in your organization – the survival of the business might depend on it!
Highlights include:
• Detailed examination of many of the widely reported frauds of the past decade
• Examples of control failures and weaknesses that lead to fraud
• Identify critical information technology general controls and application controls that should be in place to deter and prevent fraud
Learning Objectives
Upon successful completion of this course, participants will be able to:
• Recognize control failures and weaknesses that can lead to fraud.
• Define information technology general controls and information technology application controls and distinguish between the two.
• Identify examples of critical internal controls, including information technology controls.
• List recommendations for improving internal controls in an organization.
Course Specifics
Course ID 22COrlando-LE22C278051 |
Prerequisites Fundamental understanding of internal controls |
Advanced Preparation None |
Compliance information
CFP Notice: Not all courses that qualify for CFP® credit are registered by Western CPE. If a course does not have a CFP registration number in the compliance section, the continuing education will need to be individually reported with the CFP Board. For more information on the reporting process, required documentation, processing fee, etc., contact the CFP Board. CFP Professionals must take each course in it’s entirety, the CFP Board DOES NOT accept partial credits for courses.
Course Instructor

K2’s goal is to produce and deliver the highest quality technology seminars and conferences available to business professionals. We make every effort to maintain a high level of integrity, family values, and friendship among all involved. Instructors: Randolph P. (Randy) Johnston, MCS Thomas G. (Tommy) Stephens, Jr., CPA, CITP, CGMA Val D. Steed, CPA, CITP, MA Brian F. Tankersley, CPA, CGMA, CITP Lawrence A. (Mac) McClelland, MBA, JD Ward Blatch
K2’s Case Studies in Fraud and Control Failures
$856.00
Availability: 55 in stock

Intermediate

CPE Credits
6 Credits: Auditing
Course Description
Fraud continues to plague businesses at epidemic levels, and internal control weaknesses and failures contribute to fraud’s large presence in organizations today. In this session, you will learn about the pervasiveness of fraud, the control failures that contribute to fraud, and what you can do to mitigate fraud risk. Using a case study approach, you will learn using real-world examples of recent scams and identify the control weaknesses and failures that contributed to each crime.
The design and application of information technology general controls (ITGCs) and information technology application controls (ITACs) is a specific focus of this session. With strong IT controls in place, your business can reduce the risk of fraud substantially. Further, you can use IT-based controls to help overcome other control issues that your organization might face.
Participate in this session to learn how you can reduce the risk of fraud in your organization – the survival of the business might depend on it!
Highlights include:
• Detailed examination of many of the widely reported frauds of the past decade
• Examples of control failures and weaknesses that lead to fraud
• Identify critical information technology general controls and application controls that should be in place to deter and prevent fraud
Learning Objectives
Upon successful completion of this course, participants will be able to:
• Recognize control failures and weaknesses that can lead to fraud.
• Define information technology general controls and information technology application controls and distinguish between the two.
• Identify examples of critical internal controls, including information technology controls.
• List recommendations for improving internal controls in an organization.
Course Specifics
Course ID 22COrlando-LE22C278051 |
Prerequisites Fundamental understanding of internal controls |
Advanced Preparation None |
Compliance information
CFP Notice: Not all courses that qualify for CFP® credit are registered by Western CPE. If a course does not have a CFP registration number in the compliance section, the continuing education will need to be individually reported with the CFP Board. For more information on the reporting process, required documentation, processing fee, etc., contact the CFP Board. CFP Professionals must take each course in it’s entirety, the CFP Board DOES NOT accept partial credits for courses.
Course Instructor

K2’s goal is to produce and deliver the highest quality technology seminars and conferences available to business professionals. We make every effort to maintain a high level of integrity, family values, and friendship among all involved. Instructors: Randolph P. (Randy) Johnston, MCS Thomas G. (Tommy) Stephens, Jr., CPA, CITP, CGMA Val D. Steed, CPA, CITP, MA Brian F. Tankersley, CPA, CGMA, CITP Lawrence A. (Mac) McClelland, MBA, JD Ward Blatch