Risky Business: Identifying and Managing Risk (Currently Unavailable)

Analyzing risk potential is a key component in preventing major financial issues. Businesses of all sizes need proper internal controls and strategies for measuring risk potential and possible outcomes should a breach occur.

This course is excluded from all subscription packages.

One question that every organization has to answer is “What can go wrong”. Risks can come from employee errors, fraud, natural disasters, or other sources. How does an organization identify risk and determine their risk appetite? Not all risks can be eliminated so how do we mitigate the negative effects of those risks. How do we manage risks to reduce the consequences the company may face from those risks?
The Institute of Internal Auditors (IIA) has done a tremendous job raising the profile of the internal auditing profession. Internal auditors strive to abide by the standards and guidelines promulgated by the profession within the International Professional Practice Framework (IPPF). But have you ever asked management within your company if they knew such standards existed? Do they truly understand the concepts of risk-based auditing, independence, and obligations to the board or charter requirements? It is surprising how so many of these basic concepts are taken for granted by auditors and that we assume management is aware.
This self-study course, presented by Dr. Minniti, will help you identify the need for internal controls in small businesses, differentiate types of internal controls and how they apply, recognize where a small business's compliance risks can stem from, and more. Dr. Minniti will discuss cost effective internal controls for small businesses as well as some of the reasons small business owners and bookkeepers resist formalized internal controls.
Key Internal Control and Risk Management Strategies for Today's Businesses
This course is designed for individuals who would like to obtain a basic understanding of data breaches and how their company could be affected. We will discuss various types of data breaches and how the criminals steal data from organizations. We will review some of the legal and ethical implications involved. Examples of real world cases will be provided to help develop and understanding of the risks involved. We will review policies, procedures, hardware, software, and internal controls that can be used to help prevent an organization from being a victim.
In today’s business world, all personnel must understand the concept of internal control, how they should be utilized in their individual day-to-day jobs and the benefits.
Total: 6 courses (12 CPE hours)

">
 Chat — Books Support