Not Found
Live Webcast Replay

K2’s Securing Your Data – Practical Tools for Protecting Information

Total Credits: 4 including 4 Information Technology- Technical

Average Rating:
ACPEN Industry Institute |  Industry |  Technology
Thomas G. Stephens Jr., CPA.CITP, CGMA, Jr.
Course Levels:
4 hours
Product Type:
Live Webcast Replay
Access for 30 day(s) after program date.



Security is not optional and yesterday’s security techniques are not working to minimize today’s security threats. Therefore, now is the time for you to tune up what you know about protecting sensitive data.  In this program, you will learn about the latest tools and techniques for securing your data, including encryption, virus protection, secure communications, electronic signatures, secure authentication, and more.  You will also learn how to implement a very practical, five-step approach to securing your PC and the types of questions you should be asking of your staff to ensure server-based information remains protected. Extensive demonstrations will be used by your K2 instructor to teach the techniques and concepts presented.


Security failures, such as a breach of client or customer data, are costly – they can even drive your company out of business. What are the security tools you need and how do you use them to secure your sensitive data and systems? Can you afford to take the risk of attempting to manage today’s threats by using yesterday’s techniques? Participate in this program to learn how you can implement viable and practical solutions to mitigating today’s security threats.

Basic Course Information

Learning Objectives

Upon completing this course, you should be able to:

  • Assess the relevant security risks in your organization
  • Identify specific tools and techniques to protect sensitive data
  • List five specific steps to improve PC security
  • Implement security procedures to improve organizational security

Major Subjects
  • Information Technology
  • Security Techniques 

Course Materials


Thomas G. Stephens Jr., CPA.CITP, CGMA's Profile

Thomas G. Stephens Jr., CPA.CITP, CGMA Related seminars and products


K2 Enterprises

Tommy Stephens received a Bachelor of Science in Business Administration degree (Major in Accounting) from Auburn University in 1985. In 1992, he earned a Master of Science degree (Major in Finance) from Georgia State University in Atlanta. Presently, Tommy is a Certified Public Accountant, a Certified Information Technology Professional, and a Chartered Global Management Accountant.

During his professional career, Tommy has gained valuable experience in a variety of positions, including:

  • Working as an auditor and technology consultant for an Atlanta-based public accounting firm;
  • Leading an Internal Audit staff and managing a Cost Accounting team for a Fortune 500 company;
  • Serving as a Chief Financial Officer for an international engineering organization; and
  • Founding and managing his public accounting firm that provides accounting, tax, and consulting services to individuals and a variety of small and emerging businesses.

In 1995, Tommy began authoring and presenting continuing professional education courses to accounting and finance professionals. In 2003, he affiliated with K2 Enterprises, and in 2007, he joined the firm as a partner. To date, he has lectured internationally on subjects such as internal controls for small businesses, technology strategies, computer hardware and software applications, tax strategies and compliance, and financial accounting standards and applications. Over the past twenty-five years, Tommy has presented over 2,700 educational sessions to over 70,000 participants throughout the United States and Canada.

Presently, Tommy resides in Woodstock, Georgia, where he enjoys an active personal life with his wife. His hobbies include snow skiing, fishing, running, and other outdoor activities. Tommy maintains professional memberships with the American Institute of Certified Public Accountants and the Georgia Society of Certified Public Accountants. Additionally, he is a past member of the Institute of Internal Auditors.


Fri, May 21, 2021 - 01:00pm to 04:39pm CDT
Thu, Jun 03, 2021 - 08:00am to 11:39am CDT
Mon, Jun 21, 2021 - 01:00pm to 04:39pm CDT
Wed, Jul 07, 2021 - 08:00am to 11:39am CDT
Fri, Jul 16, 2021 - 01:00pm to 04:39pm CDT
Fri, Aug 13, 2021 - 08:00am to 11:39am CDT
Thu, Aug 26, 2021 - 01:00pm to 04:39pm CDT
Wed, Sep 08, 2021 - 08:00am to 11:39am CDT
Fri, Sep 24, 2021 - 01:00pm to 04:39pm CDT
Fri, Oct 01, 2021 - 08:00am to 11:39am CDT
Thu, Oct 21, 2021 - 01:00pm to 04:39pm CDT
Fri, Nov 05, 2021 - 08:00am to 11:39am CDT
Mon, Nov 15, 2021 - 01:00pm to 04:39pm CST
Tue, Dec 07, 2021 - 08:00am to 11:39am CST
Fri, Dec 17, 2021 - 01:00pm to 04:39pm CST

Additional Info

Basic Course Information

Original Recording Date 2020
Date Added to Catalog 8/19/2020
Prerequisites Basic understanding of computer operations
Advanced Preparation None
Designed For Business professionals seeking to secure sensitive data  
Course Developer K2 Enterprises
Yellow Book No

Additional Information

Instructional Delivery Method Group Internet Based
Complaint Resolution Policy Please contact Anne Taylor for any complaints., (972-377-8199).
Official Registry Statement Business Professionals' Network, Inc. is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website:
Refund/Cancellation Policy Please contact the ACPEN help desk 1-877-602-9877 or if you wish to cancel your attendance for a previously purchased webcast and are requesting a refund or transfer.
Course Registration Requirements Online Registration



Overall:      4.7

Total Reviews: 12


Adam K

"I enjoyed the content provided. I had a fine course with this same instructor last week. "

Please wait ...

Back to Top