Enhance your expertise in information systems and controls with this comprehensive course. Designed for experienced CPAs, CITP designation holders and aspirants, and accountants seeking a greater understanding of information systems and controls, the courses focus on key areas such as information systems and data management, IT governance, information security, and system and organization controls (SOC) engagements. The course incorporates interactive activities to engage participants and enhance their learning experience through online platforms. By the end of the course, participants will have a comprehensive understanding of the most important elements of information systems and controls, preparing them for their roles and certifications.
This course features a live instructor and has been specifically designed for the NJCPA.
DESIGNED FOR
Experienced CPAs, CITP designation holders and aspirants, and accountants seeking a greater understanding of information systems and controls.
BENEFITS
- Explain internal control concepts within accounting information systems, drawing on frameworks such as COSO and COBIT, to ensure accuracy in financial reporting and protect against unauthorized access
- Summarize key considerations for business resiliency, disaster recovery, continuity plans, system replication, impact analysis, and availability
- Understand data management processes, including data collection methods, storage types (data warehouse, data lake, data mart), and the data life cycle
- Explain the role of IT governance within an organization and describe key IT governance frameworks, including COBIT, ITIL, and ISO/IEC 27001 and 27002
- Describe IT general controls and application controls
- Discuss business process management and change management
- Examine cybersecurity principles in the context of HIPAA, GDPR, and PCI DSS, and understand how they regulate the protection of sensitive data
- Summarize the NIST Cybersecurity Framework (CSF) and Privacy Framework
- Identify cybersecurity risks related to cloud environments, IoT, and mobile technologies
- Identify methods for the protection of confidential data during application development
- Understand the purpose of SOC reports, the roles of key players, and identify management assertions specific to different SOC engagement types
- Recall the intended users of SOC 1®, SOC 2®, and SOC 3® reports
HIGHLIGHTS
- IT systems and data management
- IT governance and risk management
- Information security and privacy
- System and organization controls (SOC) engagements
COURSE LEVEL
Basic
PREREQUISITES
None
ADVANCE PREPARATION
None