Cyber Threat The Modern Day Fraud: Breaches and Actions
In this two-part series, we examine the landscape of cyber threats as they currently exist.

Advancements in technology have raised the level of acknowledgment of threats in the cyber age. These threats touch both the business world and personal lives. Information technology is no longer a “back-office” function. Once considered a process area that was solely part of the Chief Information Officer’s domain, companies must now acknowledge that whether the threats are internal or external, they are very real and can and will cause harm to many organizations in many ways. As a result, it is imperative that professionals across the company understand and be prepared to deal with the multitude of ever-growing cyber threats.
In this two-part series, we examine the landscape of cyber threats as they currently exist. We take a look at the biggest incidents related to cyber security of the 21st century (so far). We then delve into obtaining an understanding of the various threats that can impact our everyday lives, both business and personal.
Part two of this series will deal with a topic that has hit the boardroom and governance body agenda of almost all companies – Cyber Risk Management. In part two we discuss the various cyber risk management frameworks available and how your organization can utilize them to be prepared for the inevitable.
Field of Study: Information Technology
Features
Verifiable
Online
Anytime

1
Guide
2
Quiz
8
Video
Lynn Fountain has over 40 years of experience spanning public accounting, corporate accounting and consulting. 24 years of her experience has been working in the areas of internal and external auditing. She is a subject matter expert in multiple fields including internal audit, ethics, fraud evaluations, Sarbanes-Oxley, enterprise risk management, governance, financial manageme...
Read More