Theft of Data & Intellectual Property (Completed)
Date: Friday, April 10, 2026
Instructor: Susan Harper
| Begin Time: |
9:00am Pacific Time 10:00am Mountain Time 11:00am Central Time 12:00pm Eastern Time |
| CPE Credit: |
2 hours for CPAs 2 hours Federal Tax Related for EAs and OTRPs 2 hours Federal Tax Law for CTEC |
|
NOTE: Go to My Professional Profile in your CCH CPELink account settings to ensure your name, and PTIN number; matches your PTIN card
Data theft and intellectual property crime present growing risks for organizations and the professionals who advise them. As cybercriminals, insiders, and foreign actors become more sophisticated, accountants, tax professionals, and financial advisors are increasingly expected to recognize data vulnerabilities, understand threat vectors, and help clients respond effectively to breaches and identity theft events. This online course delivers a practical, real-world overview of how sensitive data and intellectual property are targeted, stolen, and exploited along with actionable strategies to reduce exposure and risk.
Led by Susan Harper, Certified Fraud Examiner and retired IRS Internal Revenue Agent, this course examines common sources of intelligence, high-value targets, and the methods criminals use to steal information—including social engineering, insider threats, corporate espionage, and system vulnerabilities. Participants also explore preventative controls such as access management, encryption, surveillance awareness, and organizational safeguards, as well as response procedures for identity theft incidents. Designed to heighten awareness and improve risk mitigation, this webinar equips professionals to proactively protect themselves, their firms, and their clients in today’s data-driven environment.
Who Should Attend
This course is designed for professionals responsible for safeguarding sensitive financial, client, and operational information—or advising clients exposed to data and identity theft risks.
Topics Covered
- What constitutes data theft and intellectual property crime
- Sources of intelligence and high-value information targets
- Common data loss vectors and theft techniques
- Social engineering, insider threats, and corporate espionage
- Electronic counter-surveillance awareness
- Safeguarding information through policies, controls, and culture
- Identity theft response procedures
- Real-world case studies
Learning Objectives
- Identify common forms of data theft and intellectual property crimes affecting organizations and individuals
- Analyze primary sources of intelligence and typical targets sought by data thieves
- Evaluate the methods by which data and intellectual property are lost, stolen, or compromised
- Apply preventative controls and safeguards to reduce exposure to data theft risks
- Implement appropriate response procedures for data breaches and identity theft incidents
Level
Basic
Instructional Method
Group: Internet-based
NASBA Field of Study
Taxes (2 hours)
Program Prerequisites
None
Advance Preparation
None