Key Cybersecurity Controls for CPAs

Friday, January 10, 2025
Webcast or Webinar, Online
10:30AM - 12:30PM (opens at 10:00AM) EST
2Credits
Technical Business

Registration is Open

Members
$89.00 Regular Price
Non-Members
$119.00 Regular Price

CPE PowerPass Users

Click the "Apply PowerPass" button to use your PowerPass for the applicable course below.
$40.00 Members / $56.00 Non-Members
Course Type: Webcast
Course Code: 24/CX45049
Level: Intermediate
Vendor: CPA Crossings, LLC
Field of Study: Information Technology

Overview:

This course will provide overview of key cybersecurity security domains that CPA's should evaluate in an audit. It will provide an overview of each security domain, and an overview of how to evaluate and assess the sufficiency of the cybersecurity control. Examples of security domains that will be covered include: Change management Access management Data integrity This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.

Objectives:

After attending this presentation you will be able to...

  • Understand how to scope an audit from a cybersecurity perspective
  • Understand the cybersecurity controls that reside in key security domains
  • Understand the cybersecurity controls that have significant implications to an audit

Major Topics:

The major topics that will be covered in this class include:

  • The five key tenets of cybersecurity: Identify, Detect, Protect, Respond, Recover
  • Review specific cybersecurity controls within each of the five cybersecurity tenets
  • How to appropriately assess key cybersecurity controls

Major Topics:

The major topics that will be covered in this class include:

  • The five key tenets of cybersecurity: Identify, Detect, Protect, Respond, Recover
  • Review specific cybersecurity controls within each of the five cybersecurity tenets
  • How to appropriately assess key cybersecurity controls

Designed For:

Anyone who is interested in understanding how to assess and evaluate cybersecurity controls.

Prerequisites:

General understanding of IT environments and technology