Skip to main content
Live Webcast Replay

K2’s 2022’s Biggest Security And Privacy Concerns


Total Credits: 4.6 including 4.6 Information Technology - Technical

Average Rating:
   16
Categories:
ACPEN Industry Institute |  Industry |  Technology
Faculty:
Steven M. Yoss, Jr., CPA
Course Levels:
Basic
Duration:
4.6 Hours
License:
Product Setting: Expires 30 day(s) after program date.

Dates
Please Note: Programs with a ☾ insignia begin after 5pm or air on the weekend.


Description

Technology is a business-critical business capability in today’s day and age. Any interruption to an organization’s ability to use its information system poses a significant risk to its viability. Data breaches, cyber-attacks, and ransomware are examples of the most significant existential risks facing businesses today. There are threat actors worldwide that entirely focus on stealing organizational data, stealing economic resources, and disrupting commerce. They use complex social engineering attacks, pervasive phishing messages, intricate malware, and other highly effective techniques. For example, publically reported data breaches now exceed 100k annually. These breaches resulted in releasing the personal information of millions of people worldwide, billions of dollars of compromised organizational assets, and putting countless people in harm’s way. This course covers recent major security breaches, including Solarwinds, Ubiquity, Colonial Pipeline, Tecnimont SpA, Citrix, and LabCorp. It will discuss how these breaches occurred, why they occurred, and how organizations can prevent similar incidents from impacting them. Each case study examines a different form of security vulnerability and how to avoid it. The topics will include social engineering, auditing processes for IT Security systems, forensic accounting, password, two-factor authentication, and improvements for managerial oversight. Participants will gain real-world knowledge from the mistakes of other organizations and, from that experience, develop their own security best practices for their organizations.

 

Basic Course Information

Learning Objectives
  • Define social engineering and identify how to avoid becoming a victim of this threat
  • List examples of password management procedures and identify related best practices
  • Identify examples of best practices for securing technology assets, including Windows
  • List examples of tactics that can minimize risks associated with ransomware and phishing

Major Subjects
  • Information Technology
  • Cyber Security

Course Materials

Faculty

Steven M. Yoss, Jr., CPA's Profile

Steven M. Yoss, Jr., CPA Related Seminars and Products

Associate

K2 Enterprises


Stephen M. Yoss, Jr., CPA, MS, is a certified public accountant, the senior technology strategist and partner of Devmatics, a continuing education instructor for financial professionals, and a licensed pyrotechnician. While his interests and skills are varied, they all share a common thread—his love for and skill in finding technology-based solutions.

At age 10, Stephen began working with technology; he started his first IT company at just 13, which focused on designing web applications for local businesses. At 15, he began writing original computer code and has been designing and implementing technological solutions continuously since then.

Stephen is a graduate of Loyola Marymount University, with degrees in Accountancy and International Business. While at Loyola, he served the campus as student body president and as the student representative to the Board of Trustees. He has a Master’s of Science degree in Information Systems and Technology from Claremont Graduate University with a concentration in Geographic Information Systems.

In 2017, Stephen formed Devmatics, a company focused on helping organizations develop technology strategies to streamline their business operations. He specializes in taking on high-difficulty, mission-critical organizational issues that require technological expertise and an ability to find solutions to problems that no one else can answer. With all of his clients, he emphasizes the need to embrace technology at every opportunity and utilize the latest technological trends and breakthroughs in order to gain a competitive advantage while increasing efficiency and productivity.

Prior to starting Devmatics, Stephen worked as an accountant in his family’s practice, Yoss & Allen. At Yoss & Allen, he completely redesigned the firm’s technology practices and instituted a technological infrastructure to streamline the firm’s practices and allow them strategic flexibility. Many of the technologies, strategies, and concepts that Stephen uses himself (and consults companies on how to use) were designed, perfected, and implemented to help his family’s business and their clients. In addition to his time with Yoss & Allen, Stephen worked in New Zealand as a management accountant.

Since 2009, Stephen has also been teaching continuing professional education, providing written, webcast, in-house, and live instruction. He has presented to thousands of practitioners worldwide on topics such as cloud computing, mobile technology, Excel tips and best practices, data modeling and analysis, big data, information security, identity theft prevention, and more.

Stephen is also a professionally licensed pyrotechnician and works on major fireworks displays throughout the nation for Pyro Spectaculars, North America’s largest full-service fireworks display production company. He’s proud to have helped produce incredible displays, including the Macy’s July 4th Spectacular in New York City, the 75th Anniversary of the Golden Gate Bridge in San Francisco, KGB Skyshow in San Diego, and many more.

Whether it’s teaching in the classroom, consulting clients in a boardroom, or shooting a fireworks display, Stephen brings passion, hard work, value—and above all else—technological expertise to each of his clients. With an open, honest approach, he creates a unique strategy for each client specifically designed to benefit their needs and streamline their operations in order to create efficiency and maximize their financial potential.

Stephen calls Big Bear Lake, CA, home; when he’s not at the desk, in a boardroom, at the podium, or producing a fireworks display, he spends as much time as he can pursuing his other passions. He is an avid music lover and attends multiple festivals each year. At the Burning Man, Stephen helps setup and produce pyrotechnic displays for the city. In Big Bear Lake, he regularly volunteers his time to perform various community services. He’s also an avid outdoorsman and regularly carves out time to scuba dive, camp, hike, and photograph both close to home with family and friends and on his many travels.


Dates

Tue, Apr 23, 2024 - 08:00am to 12:33pm AKDT
Tue, May 14, 2024 - 08:00am to 12:33pm AKDT
Sat, May 18, 2024 - 07:30am to 12:03pm AKDT
Tue, Jun 04, 2024 - 08:00am to 12:33pm AKDT
Tue, Jun 25, 2024 - 08:00am to 12:33pm AKDT
Sat, Jun 29, 2024 - 07:30am to 12:03pm AKDT

Additional Info

Basic Course Information

Prerequisites None
Advanced Preparation None
Designed For Professionals who are interested in improving security procedures
Original Recording Date 2022
Course Developer K2 Enterprises 
Date Added to Catalog

03/18/2022


Yellow Book No

Additional Information

Complaint Resolution Policy

Please contact Anne Taylor for any complaints. anne.taylor@acpen.com, (972-377-8199). 


Official Registry Statement

Business Professionals' Network, Inc. is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org


Instructional Delivery Method

Group Internet Based


Course Registration Requirements

Online Registration


Refund/Cancellation Policy

Please contact the ACPEN help desk 1-877-602-9877 or help@acpen.com if you wish to cancel your attendance for a previously purchased webcast and are requesting a refund or transfer. 


Reviews

5
4
3
2
1

Overall:      4.8

Total Reviews: 16

Comments

Randy S

"I liked listening to Steve very much. Will look for more presentations by him in the future."