Information Technology in Today’s Digital World: General Controls Primer
Author: Lynn Fountain
CPE Credit: |
2 hours for CPAs |
Information technology and its role in today’s business environment is an important component for the success of today’s organization. Although organizations are staffed with experienced personnel who are skilled in the technicalities of data systems, personnel computer systems and data access methods, it is important that all personnel have a strong understanding of control procedures that comprise the complex nature of today’s digital world.
Advancements in technology have raised the level of acknowledgement of threats in the cyber age. These threats touch both the business world and personal lives. Information technology is no longer a “back-office†function. Once considered a process area that was solely part of the Chief Information Officer’s domain, companies must now acknowledge that whether the threats are internal or external, they are very real and can and will cause harm to many organizations in many ways. As a result, it is imperative that professionals across the company understand and be prepared to deal with the multitude of ever-growing cyber threats.
This training serves as a primer for understanding the many advancements of information technology and its uses in today’s business environment. These advancements and uses of information technology can relate to financial, operational or compliance reporting methods. We will discuss the critical tie to COSO 2013 and delve into understanding the variance between General Controls and Application Controls as well as cover important concepts related to information technology and cyber risks.
Publication Date: August 2019
Designed For
Professionals working with information technology, IT professionals, Accountants, Finance and internal audit professionals, Legal and Compliance professionals.
Topics Covered
- Explore the definition of IT Systems
- Internal control benefits/risks of IT systems.
- ITGC most prevalent controls
- COSO's link to IT and GC
- The cyber link to ITGC
- Meaning/impact of data breaches and the importance of internal control
- Actions professionals and organizations can take towards prevention of cyber threats
Learning Objectives
- Describe the definition of IT Systems
- Identify internal control benefits/risks of IT systems
- Recognize and explore ITGC most prevalent controls
- Describe COSO's link to IT and GC
- Recognize and explore the cyber link to ITGC
- Recognize and apply the meaning/impact of data breaches and the importance of internal control
- Recognize and apply actions professionals and organizations can take towards prevention of cyber threats
- Identify an example of a processing application control
- Identify the steps in the SDLC process
- Recognize a type of ITGC that includes the backup of files, programs, and documentation at a secure off-site location
- Describe best practices for preventing data breaches correlates with the proper identification of critical assets
- Differentiate types of controls applied to all systems components, processes, and data for an organization or IT environment
- Identify an example of an input application control
- Describe node analysis
Level
Basic
Instructional Method
Self-Study
NASBA Field of Study
Information Technology (2 hours)
Program Prerequisites
None
Advance Preparation
None