Mastering Information Systems and Controls for Accounting ProfessionalsINSC 25

 

Mastering Information Systems and Controls for Accounting Professionals (INSC)

December 16th, 2025 - December 16th, 2025 @ 9:00 AM-4:30 PM

Member Price $309
Non-Member Price $339
If you are a member, please login to activate member pricing.

Credits

8

Description

Enhance your expertise in information systems and controls with this comprehensive course. Designed for experienced CPAs, CITP designation holders and aspirants, and accountants seeking a greater understanding of information systems and controls, the courses focus on key areas such as information systems and data management, IT governance, information security, and system and organization controls (SOC) engagements. The course incorporates interactive activities to engage participants and enhance their learning experience through online platforms. By the end of the course, participants will have a comprehensive understanding of the most important elements of information systems and controls, preparing them for their roles and certifications.

Objectives

Explain internal control concepts within accounting information systems, drawing on frameworks such as COSO and COBIT, to ensure accuracy in financial reporting and protect against unauthorized access Summarize key considerations for business resiliency, disaster recovery, continuity plans, system replication, impact analysis, and availability Understand data management processes, including data collection methods, storage types (data warehouse, data lake, data mart), and the data life cycle Explain the role of IT governance within an organization and describe key IT governance frameworks, including COBIT, ITIL, and ISO/IEC 27001 and 27002 Describe IT general controls and application controls Discuss business process management and change management Examine cybersecurity principles in the context of HIPAA, GDPR, and PCI DSS, and understand how they regulate the protection of sensitive data Summarize the NIST Cybersecurity Framework (CSF) and Privacy Framework Identify cybersecurity risks related to cloud environments, IoT, and mobile technologies Identify methods for the protection of confidential data during application development Understand the purpose of SOC reports, the roles of key players, and identify management assertions specific to different SOC engagement types Recall the intended users of SOC 1r, SOC 2r, and SOC 3r reports

Major Subjects

IT systems and data management IT governance and risk management Information security and privacy System and organization controls (SOC) engagements

Prerequisites

None