Cybersecurity: A Guide for Accountants

9 Credits: Information Technology


Webcasts are available for viewing Monday – Saturday, 8am – 8pm ET.
Without FlexCast, you must start with enough time to finish. (1 Hr/Credit)

 Secure Transaction

Cybersecurity: A Guide for Accountants

Course Level
CPE Credits

9 Credits: Information Technology

Course Description

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This course is designed to help you navigate the complexities of this field. It is divided into four parts:


Part I: Adopt A Security Mindset – Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.


Part II: Create A Security-Conscious Culture – Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.


Part III: Apply Security Countermeasures – Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance – Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Show More
Show Less

Learning Objectives

After completing Part I of this course, you will be able to:

  • Recognize common cybersecurity misconceptions;
  • Identify the five functions of the NIST Cybersecurity Framework;
  • Recognize the five stages of the ITIL Framework;
  • Identify the main causes for the rise of cyberattacks;
  • Recognize common types of cyberattacks;
  • Identify different kinds of cyber threat actors; and
  • Identify ways to protect yourself against cybercrime.

After completing Part II of this course, you should be able to:

  • Identify the objectives of IT governance;
  • Recognize the role of the board in cybersecurity;
  • Identify management activities associated with IT governance;
  • Recognize the key principles of the COBIT Framework; and
  • Identify must-have security policies for every organization.

After completing Part III of this course, you should be able to:

  • Identify the essential physical security measures;
  • Recognize the essential information security measures;
  • Identify cloud computing security measures; and
  • Recognize mobile device security best practices.

After completing Part IV of this course, you should be able to:

  • Identify the significant federal regulations of data privacy and protection;
  • Recognize the key provisions of state privacy laws;
  • Identify the key provisions of the HIPAA; and
  • Recognize the key requirements of the GLBA.
Show More
Show Less

Course Specifics

Course ID
Revision Date
April 11, 2023

There are no prerequisites.

Advanced Preparation


Number of Pages

Compliance Information

NASBA Provider Number: 103220

CFP Notice: Not all courses that qualify for CFP® credit are registered by Western CPE. If a course does not have a CFP registration number in the compliance section, the continuing education will need to be individually reported with the CFP Board. For more information on the reporting process, required documentation, processing fee, etc., contact the CFP Board. CFP Professionals must take each course in it’s entirety, the CFP Board DOES NOT accept partial credits for courses.

Meet The Experts

For many years, Delta CPE LLC has offered a wide variety of continuing education courses for financial professionals. Topics covered by Delta’s courses include accounting, financial management, budgeting, investments, financial statement reporting, business management, IFRS, ethics, valuations, real estate, and business writing. The diversity and breadth of Delta’s course offerings make the company a prolific and unique contributor to the CPE world. Delta’s well-credentialed authors and contributors have also been published in numerous academic and professional journals and quoted by some of the leading financial media outlets.