Dates and location
Pricing
Hours
Dates and location
Pricing
Hours
Description
This course centres on the idea that modern cybersecurity threats are no longer purely technical problems but human‑centered risks that exploit trust, routine, and the speed of digital communication. It emphasizes how attackers in 2026 increasingly rely on artificial intelligence to craft convincing phishing messages, generate deepfake audio and video, and personalize social engineering attempts that target individuals based on their roles and responsibilities.
A major theme is the growing sophistication of identity‑based attacks, including credential theft, MFA fatigue, and account takeover, which makes strong authentication practices and vigilant user behavior essential. The course also highlights the expanding attack surface created by cloud platforms, remote work, and mobile devices.
Ransomware remains a critical threat, and the training explains how these attacks unfold, how early warning signs can be recognized, and why rapid reporting is vital to containment.
Another key theme is the importance of understanding psychological manipulation, as attackers increasingly exploit urgency, authority, fear, and helpfulness to bypass technical controls.
Throughout the course, participants learn that cybersecurity is a shared responsibility: every employee plays a role in protecting organizational data, maintaining compliance, and preventing financial or reputational damage. The training reinforces a security‑first mindset—one that questions unexpected requests, verifies identities, uses approved tools, and reports suspicious activity without hesitation. This mindset is especially important for professionals who handle sensitive financial information, such as CPAs, because they are prime targets for fraud, impersonation, and data theft. By understanding the evolving threat landscape and adopting consistent protective behaviors, learners become a critical line of defense against attacks that increasingly blend technology, psychology, and opportunity.
Note: Registration for this seminar closes July 13, 2026 at 3:00 p.m. (EDT).
Key Takeaways
Participants will leave the course able to:
- Identify and respond to phishing, deepfakes, and social engineering attempts.
- Apply secure practices across devices, networks, and cloud platforms.
- Protect sensitive data through proper handling and authentication.
- Recognize early signs of ransomware or account compromise.
- Understand their responsibility in preventing breaches and reporting incidents.
- Build a security‑first mindset that reduces organizational risk.
Who Will Benefit
This course will benefit:
- All employees handling digital information.
- Managers and team leads responsible for approving financial or operational requests.
- Remote and hybrid workers using personal devices.
- IT, finance, HR, and operations teams exposed to sensitive data.
- Executives and board members who are high‑value targets for social engineering.
- New hires needing baseline cyber hygiene training.
How to Access the Course
This course is a live webinar. You must attend the live course to receive verifiable CPD hours. We recommend you join five minutes prior to the scheduled starting time. To get the full experience of this interactive course, use a computer that has video and microphone capabilities.
If available, course materials can be accessed 2 business days prior to the course and should be downloaded in advance.
Registration, cancellation, withdrawal and all other CPA Ontario PD policies can be found here.
Speaker(s)
David Greenham is a Vice President in Richter’s Risk, Performance and Technology practice. He has been advising organizations on mitigating cybersecurity risks for over 25 years. With extensive experience in leading security assessments and consulting engagements, David has become a trusted advisor in the areas of cybersecurity, Payment Card Industry (PCI) compliance, ISO 27001 certification, Threat and Risk Assessment (TRA), as well as developing and improving information security programs.