Advanced Training for Accounting Professionals
Technology is a business-critical business capability in today’s day and age. Any interruption to an organization’s ability to use its information system poses a significant risk to its viability. Data breaches, cyber-attacks, and ransomware are examples of the most significant existential risks facing businesses today. There are threat actors worldwide that entirely focus on stealing organizational data, stealing economic resources, and disrupting commerce. They use complex social engineering attacks, pervasive phishing messages, intricate malware, and other highly effective techniques. For example, publically reported data breaches now exceed 100k annually. These breaches resulted in releasing the personal information of millions of people worldwide, billions of dollars of compromised organizational assets, and putting countless people in harm’s way.
This course covers recent major security breaches, including Solarwinds, Ubiquity, Colonial Pipeline, Tecnimont SpA, Citrix, and LabCorp. It will discuss how these breaches occurred, why they occurred, and how organizations can prevent similar incidents from impacting them. Each case study examines a different form of security vulnerability and how to avoid it. The topics will include social engineering, auditing processes for IT Security systems, forensic accounting, password, two-factor authentication, and improvements for managerial oversight. Participants will gain real-world knowledge from the mistakes of other organizations and, from that experience, develop their own security best practices for their organizations.
Learning Objectives
Upon completing this course, you should be able to:
...read more
Would you like to find important documents in 10 seconds or less? Would you like to ensure that all your digital information is safe and secure? Would you like to improve workflow efficiency? Of course, you would, and with a bit of planning and guidance, you will be on your way to realizing these and other benefits of a paperless office. Of course, no one expects a completely “paperless” office, but reducing the amount of paper we shuffle can offer tremendous rewards. This course will teach you best practices and proven processes for effective document management.
Participating in this session will teach you how to implement simple, inexpensive document management systems at an individual, workgroup, or small business level. You will also learn about sophisticated and comprehensive document management systems appropriate for larger offices and organizations, including systems with automated workflow processing. Your instructor will guide you through issues such as digitizing paper files, exporting and importing data from specialized applications into a document management system, essential hardware and software considerations, and the policies necessary to facilitate a successful office. Upon completing this course, you will have a comprehensive understanding of your options and a clear direction for implementing your version of the Paperless Office.
Learning Objectives
Upon completing this course, you should be able to:
...read more
© 2022 Woodard Events, LLC All Rights Reserved. Woodard, Tech Makeover and Woodard Institute are trademarks of Woodard Events, LLC. All rights reserved. Scaling New Heights is a registered trademark owned by Woodard Events, LLC. Woodard Network and Woodard Groups are trademarks of National Advisor Network, LLC. All rights reserved. Woodard Consulting is a trademark of Woodard Consulting Group, Inc. All rights reserved.