3000  |  Virtual Training  |  Intermediate  |  Scheduled

OSCPA's CyberTech Summit - VIRTUAL

Wednesday, October 20, 2021 8:30am - 4:25pm

Download to calendar

Pandemic Update: With all the changes this pandemic has brought, we understand you may have questions and concerns regarding continuing education offered by the Society. The safety of our attendees, discussion leaders and staff is always top of mind and our number one priority is to continue offering CPE options as safely as possible with the same quality and quantity you have come to expect. Please visit our Pandemic and OSCPA CPE: What to Expect page for more information.

Come learn with us at the OSCPA's CyberTech Summit - part of the OSCPA Summit Series.

New This Year: We have partnered with ACPEN to assemble a series of topics and national speakers at a price you'll love!

This virtual event is recommended for eight hours of CPE and will cover the following topics:

  • Current Tech Crimes - Ripped from the Headlines
  • Business Intelligence Analytics: Make Sense of Your Data
  • The Perfect Storm - Data Governance and Data Privacy 
  • TechnoEthics

Instructors


Designed For

CPAs interested in learning more about technology and cyber security


Your Price: $350.00

This is your base price and does not reflect any additional session fees, optional add-ons, or guest registrations.

Members log in and save $100.00 on this event. Not a member? join today.

Sessions

Wednesday, October 20, 2021

8:30am - 10:10am
$0.00

Security is a top concern for CPAs every year. Yet many hacks result from organizations not implementing effective internal controls over information technology. In this session, you will learn about critical IT-related controls using a case study approach with stories which are all new for 2020. More specifically, you will learn from real-world examples of breaches and security failures. Accordingly, you will understand better how to protect your company and its data. Attend this fast-paced session and learn more about IT-related controls you can use to prevent computer crimes such as identity and information theft, tax refund fraud, and more. In this session you will:  

  • List at least three major security incidents reported in the headlines in the last two years, and explain at least one major control design or operation flaws which allowed the hack to occur
  • Define the three factors used to authenticate someone to a system and explain why two-factor authentication is preferable to one-factor authentication
  • Explain why home-grade computer hardware and applications are inherently less secure than business and enterprise grade hardware and applications
  • List at least three best practices learned as a result of reviewing the incidents cited in the case studies
Credits: Information Technology 2
10:25am - 12:05pm
$0.00

Volatility and complexity are the new normal. Most organizations are drowning in data, but starving for information. The finance and accounting function has the opportunity to leverage Big Data and the continuum of analytics - descriptive, diagnostic, predictive, and prescriptive. All are useful for better decision making. Collecting, validating, and reporting data is not the same thing as analyzing information where we can glean valuable, actionable insights. In some ways the finance function is many years behind other disciplines such as marketing, sales, and supply chain managers, in applying analytics. How can the CFO's function catch up? In this session you will:

  • Understand how Business Intelligence (BI) and Business Analytics (BA) can help you make sense of your organization's data
Credits: Computer Software & Applications 2
Instructors:
12:50pm - 2:30pm
$0.00

How do you control the data you are responsible for? Consider the impact of the May 2018 General Data Protection Regulation (GDPR), as well as the December 11, 2019 introduction of a law in India giving authorities sweeping access to data and the most important piece of U.S. legislation, the California Consumer Privacy Act (CCPA) which is in force as of January 1, 2020. Companies like Microsoft and Apple not only claim they are ready, but plan to implement CCPA across the country. What about your business? Have you completed your implementation? Attend this session to learn practical steps you can take to be compliant with mandated regulations. In this session you will:

  • List the current fines for CCPA and GDPR
  • Identify data governance risks
  • Differentiate between privacy and governance
  • Create a governance strategy to remain compliant with regulations for your business
Credits: Computer Software & Applications 2
2:45pm - 4:25pm
$0.00

From the dawn of the Digital Age, ethical issues - with no easy solutions - have existed. These include questions relating to privacy, workers' rights, and intellectual property. And, as technology advances, more issues are sure to arise. In this session, you will learn about the emerging field of technoethics and what you can do to promote ethical behavior in your organization, particularly as it relates to technology. You will also learn about some of the more notable technoethics lapses that have occurred, the fallout resulting from them, and how they could have been prevented. In this session you will:

  • Promote behavior ethics within your organization
  • Examine key provisions of accountants’ Code of Ethics
  • Identify notable technoethics issues and cases
  • Learn how to create a culture that advances ethics
Credits: Behavioral Ethics 2

Instructors

Gary Cokins

Gary Cokins, MBA, CPIM is an internationally recognized author and speaker. He spent 30 years working with the consulting practices of Deloitte, KPMG, EDS and SAS. Gary has a BS in Industrial Engineering from Cornell University and an MBA from Northwestern University’s Kellogg School of Management. His most recent books are Performance Management: Integrating Strategy Execution, Methodologies, Risk, and Analytics and Predictive Business Analytics published by Wiley and Sons.

Randolph P. Johnston

Randy Johnston, MCP, CNA, executive vice president and partner of K2 Enterprises, a leading technology CPE provider in Hammond La., has more than 40 years experience Strategic Technology Planning, Accounting Software Selection, Paperless, Systems and Network Integration, Business Continuity and Disaster Recovery Planning, Business Development and Management, Process Engineering and outsourced managed services. Johnston was named one of Accounting Today’s Top 100 Most Influential People from 2004-2020 and Top 25 Thouhg Leader in the Accounting Industry 2011-2021.. His articles have been featured in CPA Technology Advisor, Journal of Accountancy and InfoWorld.

Thomas G. Stephens

Thomas G. (Tommy) Stephens Jr., CPA, CITP, CGMA, is an associate at K2 Enterprises. After working at BellSouth Corportation Mr. Stephens opened his public accounting practice in the metropolitan Atlanta area in 1994. In his practice, Mr. Stephens provided accounting, tax, and consulting services to individuals and a wide variety of small and emerging businesses. As part of his practice, he developed a successful consulting practice providing installation and support services on small business accounting software. Additionally, he began writing and presenting continuing professional education courses to accounting and finance professionals. In 2003, Mr. Stephens affiliated with K2 Enterprises, where he continues to develop and present educational programs to accounting and finance professionals.

Brian F. Tankersley

Brian F. Tankersley, CPA, CITP, CGMA, is the Technology Editor for The CPA Practice Advisor magazine. He has over 25 years of professional experience, including accounting, auditing, technology, and education. He teaches courses nationally through K2 Enterprises since 2005 and currently works with Yaeger CPA Review. Tankersley is a Certified Information Technology Professional, a Chartered Global Management Accountant and makes his home in Farragut, Tenn.


Register for this course