Webcast: Controls to Protect Your Technology Footprint (XCCPTFW117)
Register Tell a Friend About This EventTell a Friend
 

Technology is now a very important component of the business landscape for organizations of all types and size. A significant technology system failure could result in the loss of important data, limit the ability for an organization to conduct business, and may even create very real going concern questions. Because of this risk, controls should be in place to protect the sizable technology footprint that exists for most entities. This session looks at technology tools in use, internet/cloud-bas

 Export to Your Calendar 7/25/2017
When: 07/25/2017
12:00 PM until 2:00 PM
Where: Webcast
CALCPA
4173376Z
United States
Presenter: Karl Egnatoff, CPA


Online registration is available until: 7/23/2017
« Go to Upcoming Event List  

Acronym XCCPTFW117
CPE 2 hours
Vendor CalCPA
Category
Management
Level Beginning
Prerequisite None
Adv Prep None
Yellow Book? No
Designed for Accounting and other business professionals that need an understanding of risks and controls for business technology tools
Registration
Member $60
CPA Non-Member $94

The Member rate applies to LCPA members, other state society members, and non-CPA staff of LCPA members. To register online, use the ‘Register’ button above. To register by phone, call the LCPA Member Service Center at 800.288.5272 or 504.464.1040, Monday through Friday, 8am to 5pm.

Course Description

 Technology is now a very important component of the business landscape for organizations of all types and size. A significant technology system failure could result in the loss of important data, limit the ability for an organization to conduct business, and may even create very real going concern questions. Because of this risk, controls should be in place to protect the sizable technology footprint that exists for most entities. This session looks at technology tools in use, internet/cloud-based storage and applications, mobile tools, and the large amount of electronically stored information owned by business, and shows methods available to help mitigate technology based risk. Those that take this session will have an advantage as they address security issues related to the ever-expanding technology footprint of business.

Objectives

 Once participants have completed this session they should be able to:

  • List some of the security risks that affect electronic information
  • Develop vetting and selection processes for cloud storage providers
  • Understand the steps to effectively set up and control cloud storage
  • List ways to add security to individual electronic documents

Major Topics

  •  Important “First Line” technology security measures
  •  Securing individual documents
  •  Protecting information resident in the Cloud