Cybersecurity & Fraud Risks, Threats, and Solutions [ITC]


Jun 1, 2016
Time: 8:00 am-11:30 am

Credit Hours:



Member: $150.00
Non-member: $225.00

Discussion Leader:

Tommy Stephens

Thomas G. Stephens, Jr., received a Bachelor of Science in Business Administration degree (Major in Accounting) from Auburn University in 1985. Upon graduation, Mr. Stephens began working for an Atlanta-based public accounting firm.  After earning his designation as a Certified Public Accountant, Mr. Stephens worked for BellSouth Corporation in Atlanta as an Internal Auditor.  After two years as an auditor, he was promoted to Staff Manager and then Operations Manager of the Internal Audit Group.  In 1991, he transferred to the Comptrollers’ department of BellSouth and served as Manager of the Cost Accounting organization. While working full-time at BellSouth Corporation, Mr. Stephens also attended graduate school, earning a Masters of Science (Major in Finance) from Georgia State University in 1992.

Mr. Stephens left BellSouth in 1994 and opened his public accounting practice in the metropolitan Atlanta area.  In his practice, Mr. Stephens provided accounting, tax, and consulting services to individuals and a wide variety of small and emerging businesses.  As part of his practice, he developed a successful consulting practice providing installation and support services of small business accounting software.  Additionally, he began authoring and presenting continuing professional education courses to accounting and finance professionals.  In 2003, Mr. Stephens affiliated with K2 Enterprises and in 2007 he joined the firm as a partner. To date, he has lectured nationally on subjects such as internal controls for small businesses, technology strategies, computer hardware and software applications, tax strategies and compliance, and financial accounting standards and applications.  Over the past nineteen years, Mr. Stephens has presented in excess of 1,900 educational sessions to over 58,000 participants nationwide.

Presently, Mr. Stephens resides in Woodstock, Georgia where, in addition to his association with K2 Enterprises, he provides consulting services to small businesses and CPA firms.  In addition to an active professional career, Mr. Stephens enjoys an active personal life as well.  He and Michelle -- his wife of thirty years -- have two children.  His hobbies include snow skiing, fishing, and running.  Additionally, Mr. Stephens maintains professional memberships with the American Institute of Certified Public Accountants and the Georgia Society of Certified Public Accountants and is a past member of the Institute of Internal Auditors.

Full Description

Cybersecurity & Fraud Risks, Threats, and Solutions (ITC)

June 1, 2016 / Morning Session

Sheraton Anchorage Hotel & Spa Kuskokwim Ballroom
401 East 6th Avenue
Anchorage, AK

For registrations received less than 21 days from the course date will be charged a late fee of $50 for each 8 hour course and $25 for each 4 hour course.

Cybersecurity and the frauds resulting from security breaches are, and should be, on everyone's radar. Whether you control security choices or not, you can raise your awareness and ask the right questions to begin reducing risks by participating in this session.

Major Topics:
In this session, you will learn how changes in firewalls, anti-virus, encryption, and other technologies can help you to reduce the risk that your mission-critical data will become compromised. You will also learn about five common-sense steps that you can implement right away to all-but-eliminate security risk on your computer. Additionally, because cloud and mobile tools expand the footprint of your cybersecurity and fraud risk, you will learn what you need to do immediately to assess and manage the risk associated with these technologies. Finally, with identity theft growing at unprecedented levels, you will learn critical tips for avoiding identity theft.

In sum, if you are concerned about security and who isnt? participating in this session may be the best decision you make this year.

Learning Objectives:
Assess the relevant security risks in your organization;
Identify specific tools and techniques to protect sensitive data;
Define phishing and explain how it is used to gain access to systems and data;
List five methods to improve security on a personal computer;
Build an action plan to safeguard personal and organizational data from potential threats; and
Implement data security best practices for personal and organizational information.

Designed For: Business professionals seeking to secure sensitive data

CPE Credits: 4, Accounting - Specialized Knowledge and Applications

Level of Knowledge: Intermediate

Prerequisite: Basic understanding of computer operations

Acronym: ITC

Discussion Leader: Thomas G. Stephens, Jr., CPA.CITP, CGMA