3000  |  Virtual Training  |  Intermediate  |  Scheduled

OSCPA's CyberTech Summit - VIRTUAL

Wednesday, October 20, 2021 8:30am - 4:25pm

Download to calendar

Pandemic Update: With all the changes this pandemic has brought, we understand you may have questions and concerns regarding continuing education offered by the Society. The safety of our attendees, discussion leaders and staff is always top of mind and our number one priority is to continue offering CPE options as safely as possible with the same quality and quantity you have come to expect. Please visit our Pandemic and OSCPA CPE: What to Expect page for more information.

Come learn with us at the OSCPA's CyberTech Summit - part of the OSCPA Summit Series.

New This Year: We have partnered with ACPEN to assemble a series of topics and national speakers at a price you'll love!

This virtual event is recommended for eight hours of CPE and will cover the following topics:

  • Current Tech Crimes - Ripped from the Headlines
  • Business Intelligence Analytics: Make Sense of Your Data
  • The Perfect Storm - Data Governance and Data Privacy 
  • TechnoEthics


Designed For

CPAs interested in learning more about technology and cyber security

Your Price: $350.00

This is your base price and does not reflect any additional session fees, optional add-ons, or guest registrations.

Members log in and save $100.00 on this event. Not a member? Join today.


Wednesday, October 20, 2021

8:30am - 10:10am

2020 was an exceptional year for everyone, and like everyone, the hackers, scammers, and other technology criminals took advantage of new opportunities brought by COVID. Criminals reportedly used innovative approaches to exploit weaknesses created by the pandemic. You will learn tips and techniques from these events to help protect you, your company, and your data. Attend this session and learn more about how high-profile control failures occurred so you can be more effective at preventing crimes such as theft, malware, ransomware, phishing, and hacking. In this session, you will also:

  • List at least three major security incidents reported in the headlines in the last year and explain at least one primary control design or operation flaws that allowed the hack to occur
  • Select the correct definitions from a list of standard security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
  • Explain why home-grade computer hardware and applications are sometimes less secure than business and enterprise-grade hardware and applications
  • List at least three best practices learned because of reviewing the incidents cited in the case studies
Credits: Information Technology 2
10:25am - 12:05pm

Volatility and complexity are the new normal. Most organizations are drowning in data, but starving for information. The finance and accounting function has the opportunity to leverage Big Data and the continuum of analytics - descriptive, diagnostic, predictive, and prescriptive. All are useful for better decision making. Collecting, validating, and reporting data is not the same thing as analyzing information where we can glean valuable, actionable insights. In some ways the finance function is many years behind other disciplines such as marketing, sales, and supply chain managers, in applying analytics. How can the CFO's function catch up? In this session you will:

  • Understand how Business Intelligence (BI) and Business Analytics (BA) can help you make sense of your organization's data
Credits: Computer Software & Applications 2
12:50pm - 2:30pm

How do you control the data you are responsible for? Consider the impact of the May 2018 General Data Protection Regulation (GDPR), as well as the December 11, 2019 introduction of a law in India giving authorities sweeping access to data and the most important piece of U.S. legislation, the California Consumer Privacy Act (CCPA) which is in force as of January 1, 2020. Companies like Microsoft and Apple not only claim they are ready, but plan to implement CCPA across the country. What about your business? Have you completed your implementation? Attend this session to learn practical steps you can take to be compliant with mandated regulations. In this session you will:

  • List the current fines for CCPA and GDPR
  • Identify data governance risks
  • Differentiate between privacy and governance
  • Create a governance strategy to remain compliant with regulations for your business
Credits: Computer Software & Applications 2
2:45pm - 4:25pm

From the dawn of the Digital Age, ethical issues - with no easy solutions - have existed. These include questions relating to privacy, workers' rights, and intellectual property. And, as technology advances, more issues are sure to arise. In this session, you will learn about the emerging field of technoethics and what you can do to promote ethical behavior in your organization, particularly as it relates to technology. You will also learn about some of the more notable technoethics lapses that have occurred, the fallout resulting from them, and how they could have been prevented. In this session you will:

  • Promote behavior ethics within your organization
  • Examine key provisions of accountants’ Code of Ethics
  • Identify notable technoethics issues and cases
  • Learn how to create a culture that advances ethics
Credits: Behavioral Ethics 2


Gary Cokins

Gary Cokins, MBA, CPIM is an internationally recognized author and speaker. He spent 30 years working with the consulting practices of Deloitte, KPMG, EDS and SAS. Gary has a BS in Industrial Engineering from Cornell University and an MBA from Northwestern University’s Kellogg School of Management. His most recent books are Performance Management: Integrating Strategy Execution, Methodologies, Risk, and Analytics and Predictive Business Analytics published by Wiley and Sons.

Randolph P. Johnston

Randy Johnston, MCP, CNA, executive vice president and partner of K2 Enterprises, a leading technology CPE provider in Hammond La., has more than 40 years experience Strategic Technology Planning, Accounting Software Selection, Paperless, Systems and Network Integration, Business Continuity and Disaster Recovery Planning, Business Development and Management, Process Engineering and outsourced managed services. Johnston was named one of Accounting Today’s Top 100 Most Influential People from 2004-2020 and Top 25 Thouhg Leader in the Accounting Industry 2011-2021.. His articles have been featured in CPA Technology Advisor, Journal of Accountancy and InfoWorld.

Thomas G. Stephens

Thomas G. (Tommy) Stephens Jr., CPA, CITP, CGMA, is an associate at K2 Enterprises. After working at BellSouth Corportation Mr. Stephens opened his public accounting practice in the metropolitan Atlanta area in 1994. In his practice, Mr. Stephens provided accounting, tax, and consulting services to individuals and a wide variety of small and emerging businesses. As part of his practice, he developed a successful consulting practice providing installation and support services on small business accounting software. Additionally, he began writing and presenting continuing professional education courses to accounting and finance professionals. In 2003, Mr. Stephens affiliated with K2 Enterprises, where he continues to develop and present educational programs to accounting and finance professionals.

Brian F. Tankersley

Brian F. Tankersley, CPA, CITP, CGMA, is the Technology Editor for The CPA Practice Advisor magazine. He has over 25 years of professional experience, including accounting, auditing, technology, and education. He teaches courses nationally through K2 Enterprises since 2005 and currently works with Yaeger CPA Review. Tankersley is a Certified Information Technology Professional, a Chartered Global Management Accountant and makes his home in Farragut, Tenn.

Register for this course