AccountantsWorld is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of Continuing Professional Education (CPE) on the National Registry of CPE Sponsors. Boards of Accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website:

The NASBA registry number for AccountantsWorld is 102985.

© Copyright 2020 AccountantsWorld

The 2020 Expert Webinar Series

The most significant security threat to businesses is far from being the exotic, technologically advanced attack vector so favored by Hollywood screenwriters and Sci-Fi novelists. These threats, often described as using highly competent code and advanced-scripting, may be more entertaining to watch or read about, but they aren’t the threat that’s been used to hack the Democratic National Committee, shut down industrial and manufacturing plants, or even breach the best-known symbol of American power – the White House.

The terrifying threat that actually has done these things all while costing U.S. businesses and organizations hundreds of millions of dollars each day is plain ole’, run-of-the-mill phishing.

In this session we’ll explain what phishing is, why it’s the most effective (and proliferated) of many techniques collectively classified as Social Engineering and how it is used by attackers to obtain either full or partial credentials (e.g. username & password).


Wed December 2 at 2 pm ET

Title TBD

By Michael Seip
Security Consultant & Project Manager, Withum Cyber


Register Now

What, Me Worry? Actions & Ideas to Help Minimize Cybersecurity Threats in a Post-COVID World

Webinar series main

Michael Seip
Security Consultant & Project Manager, Withum Cyber     

Michael is an experienced technical leader with experience in technology sector. He has 12 years of experience as a director of operations and senior program/project manager. He has extensive knowledge in PMO Ops, contracting operations, strategic planning and risk management. Michael gained leadership experience from over nine years if service as a US Navy Fighter/Attacker aviator.

Course of study: Information Technology

Credit: 1 CPE 

At the end of this session you will have a better understanding of:

  • Existing threat landscape in a post-COVID world

  • Continuous monitoring & automated vulnerability scanning: how/why your organization can improve overall network & system integrity

  • Security Assessment and penetration testing (i.e. ‘Pen Testing’) tactics which may highlight a network’s “weak-spots” and provide details regarding training deficiencies weakening a workforce’s front-line

  • Social Engineering gotchas – as actually observed “in the wild” by cybersecurity consultants & experts during operations throughout the COVID-19 pandemic timeline.