UltimateCPE, Inc. is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: NASBAregistry.org.
Author: Susan Harper
| CPE Credit: | 2 hours for CPAs |
|---|
Data theft and intellectual property crime present growing risks for organizations and the professionals who advise them. As cybercriminals, insiders, and foreign actors become more sophisticated, accountants, tax professionals, and financial advisors are increasingly expected to recognize data vulnerabilities, understand threat vectors, and help clients respond effectively to breaches and identity theft events. This online course delivers a practical, real-world overview of how sensitive data and intellectual property are targeted, stolen, and exploited along with actionable strategies to reduce exposure and risk.
Led by Susan Harper, Certified Fraud Examiner and retired IRS Internal Revenue Agent, this course examines common sources of intelligence, high-value targets, and the methods criminals use to steal information—including social engineering, insider threats, corporate espionage, and system vulnerabilities. Participants also explore preventative controls such as access management, encryption, surveillance awareness, and organizational safeguards, as well as response procedures for identity theft incidents. Designed to heighten awareness and improve risk mitigation, this course equips professionals to proactively protect themselves, their firms, and their clients in today’s data-driven environment.
Publication Date: April 2026
Designed For
This course is designed for professionals responsible for safeguarding sensitive financial, client, and operational information—or advising clients exposed to data and identity theft risks.
Topics Covered
- What constitutes data theft and intellectual property crime
- Sources of intelligence and high-value information targets
- Common data loss vectors and theft techniques
- Social engineering, insider threats, and corporate espionage
- Electronic counter-surveillance awareness
- Safeguarding information through policies, controls, and culture
- Identity theft response procedures
- Real-world case studies
Learning Objectives
- Identify common forms of data theft and intellectual property crimes affecting organizations and individuals
- Analyze primary sources of intelligence and typical targets sought by data thieves
- Evaluate the methods by which data and intellectual property are lost, stolen, or compromised
- Apply preventative controls and safeguards to reduce exposure to data theft risks
- Implement appropriate response procedures for data breaches and identity theft incidents
Level
Basic
Instructional Method
Self-Study
NASBA Field of Study
Taxes (2 hours)
Program Prerequisites
None
Advance Preparation
None
Additional Course Details
- Publisher: Wolters Kluwer
Write a review
Your Name:Your Review: Note: HTML is not translated!
Rating: Bad Good
Enter the code in the box below:

