Skip to main content

Professional Development and Event Catalog

Showing 11120 Partner Webinars Results

Budget Mastery: The Human Side of Budgeting-Navigating People's Issues with 360 Insight

Thursday, May 7
 2:00pm - 4:00pm

Online

2.00 Credits

Member Price: $79

See more dates

You have a fantastic budget, but certain players are not pleased. Financial plans have a technical component and human component.  We can resolve some of our budget issues by exploring the process’ human aspect.  Understanding what makes you and others operate can enhance your understanding of the entire organization and build upon the respect and influence needed to navigate and lead the budgeting cycle. This session includes a case study that measures an individual’s personality type and then explores how to use our strengths and weaknesses to create a better budget process and quite frankly maybe a better you.  This is a great and fun course on its own, but is also part three of a four part series on budget mastery.

More Dates

From Numbers to Narrative: Effectively Presenting Your Budget and Reporting

Thursday, May 7
 3:00pm - 5:00pm

Online

2.00 Credits

Member Price: $79

See more dates

Perhaps the most important element of the budget process is its communication.  If management does not understand the budget – there is an issue. Knowing the right ways to communicate at all levels is essential to stakeholders laying an ownership claim to successful budgets.  This session reveals several key guidelines in successful budget presentations and will identify key problems in how people often communicate financial plans. Presenting your budget and reporting is the final part of a four part series, but can easily stand on its own course that is intended to be fun, enjoyable and educational.

More Dates

Mental Illness & Depression: Understanding & Supporting Employees Under the ADA

Thursday, May 7
 4:00pm - 5:01pm

Online

1.00 Credits

Member Price: $39

See more dates

Productivity Hacks for Working Remote

Thursday, May 7
 4:00pm - 5:06pm

Online

1.20 Credits

Member Price: $39

See more dates

K2's Top Ten Productivity Booster Apps In Microsoft 365

Thursday, May 7
 5:00pm - 7:00pm

Online

2.00 Credits

Member Price: $79

See more dates

This two-hour CPE course is designed for accounting professionals and technology enthusiasts seeking to enhance productivity through Microsoft 365's versatile applications. Participants will explore ten key apps - including Shared Mailboxes, Planner, Lists, To Do, Stream, Viva Learning, Forms, Bookings, Approvals, and Places - and learn to integrate them effectively into their workflows. The course emphasizes practical applications within accounting contexts, aiming to streamline operations and foster collaboration.

More Dates

K2's Next Level Home Networking

Friday, May 8
 9:00am - 10:00am

Online

1.00 Credits

Member Price: $39

See more dates

In this two-hour course, accounting professionals and technology enthusiasts will explore advanced home networking concepts to support remote work and modern digital needs. Learn to select prosumer-grade hardware, configure multi-SSID networks, and integrate functionalities like VPNs, media servers, and remote file access to boost productivity and security. Discover cutting-edge technologies, including SPF+ (10G networking), to future-proof your setup for data-intensive workflows. With practical demonstrations and relevant use cases, this session equips you with the tools to optimize your home network for efficiency, security, and scalability.

More Dates

Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)

Friday, May 8
 9:00am - 10:27am

Online

1.60 Credits

Member Price: $59

See more dates

This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved. There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software.  

More Dates

Fraud Unmasked: Understanding and Preventing White-Collar Crime with Dr. Richard G. Brody

Friday, May 8
 9:00am - 10:38am

Online

2.00 Credits

Member Price: $79

See more dates

Fraud poses a significant risk to businesses, organizations, and individuals, leading to financial losses, reputational damage, and legal consequences. This comprehensive course, led by Dr. Richard G. Brody, an esteemed expert in forensic accounting and fraud prevention, explores the underlying mechanisms, motivations, and methods of fraudulent behavior. Through real-world case studies, expert analysis, and interactive discussions, participants will gain critical insights into the psychology of fraud, organizational vulnerabilities, and ethical breakdowns that enable misconduct. The course equips attendees with the latest fraud detection techniques, risk assessment strategies, and internal control best practices to proactively identify and mitigate fraud risks while fostering a culture of integrity and accountability.

More Dates

The Single Audit from Beginning to End Update

Friday, May 8
 9:00am - 5:00pm

Online

8.00 Credits

Member Price: $225

See more dates

This course is an updated overview of the single audit of state and local governments and not-for-profit organizations under the OMB Unified Circular, as well as the applicable AICPA standards for compliance audits. 

More Dates

The Ethics Hour: Dealing With Conflicts of Interest: Members in Business and Industry, featuring Don Minges

Friday, May 8
 10:00am - 11:00am

Online

1.00 Credits

Member Price: $39

See more dates

Often a simple situation may seem innocent, but it can lead to large complications quickly. Conflicts of interest are unavoidable and occur frequently for CPAs in business and industry. What will you do when they happen? Will you take the necessary steps to remain ethical and to protect your license? We will show you how in detail. You and I have a responsibility to our organizations and to the public to be ethical. If you do not follow the prescribed steps, as detailed in the Code of Professional Conduct, there will be problems. Do not forget your duty to the public.

More Dates

K2's Excel Tips, Tricks, and Techniques for Accountants

Friday, May 8
 10:00am - 5:37pm

Online

8.00 Credits

Member Price: $225

See more dates

Excel is the accountant’s tool of choice for analyzing and reporting financial data, yet many use time-consuming and error-prone processes to complete everyday tasks. Regardless of your level of experience, if you use Excel, you need this course to learn more efficient and effective ways to work with Excel. In this course, you will discover countless tips, tricks, and techniques to improve your general level of productivity, reduce the amount of time you spend on mundane tasks, such as formatting, and customize Excel for greater accuracy and efficiency. You will also learn valuable formula-building skills, best practices for linking Excel data from other worksheets and workbooks, and how to streamline report generation and printing processes. Your K2 instructor will reinforce key learning points throughout the program with practical, real-world examples that will improve your understanding and comprehension of the topics presented. This highly acclaimed course draws on over twenty-five years of experience in delivering spreadsheet training to accounting and financial professionals, which assures you of the relevance and usefulness of the information and guidance provided during the program.

More Dates

Preparing and Reviewing Workpapers - Essential Tips for Avoiding Deficient Audit and Other Attest Engagements

Friday, May 8
 10:00am - 5:40pm

Online

8.00 Credits

Member Price: $225

See more dates

Workpapers are the primary support for findings, conclusions and opinions on any audit or other attest engagement.  This course will provide the essential tips and techniques for ensuring workpaper documentation is of a high quality, yet efficient, nature.

More Dates

K2's Microsoft Teams

Friday, May 8
 10:30am - 2:30pm

Online

4.00 Credits

Member Price: $129

See more dates

Microsoft Teams is one of the most exciting personal and organizationally productivity tools to ever appear on the business landscape. With Teams, you can communicate and collaborate easily and securely with others, including colleagues outside your organization. Further, you can extend the already-robust functionality in Teams by incorporating add-in solutions with just a few clicks of the mouse. Unfortunately, despite Teams’ power and relatively simple interface, many organizations struggle with deploying and using Teams.  In this session, you will learn how you can get up and running quickly in Teams so that you can take full advantage of this powerful tool. More specifically, you will learn how you can get started in Teams and critical decisions that will affect your deployment. Also, you will learn how to work in Teams, including how to take advantage of the chat, voice, and video call services and how to share documents securely with others. Moreover, you will learn how to extend your Teams platform to external organizations for improved communication and collaboration. Additionally, you will identify how you can add other applications into Teams and optimize Team's configuration for the best overall efficiency and security. If you are working with Teams or plan to do so, this is one CPE session you can’t afford to miss!

More Dates

Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 1

Friday, May 8
 11:00am - 12:11pm

Online

1.00 Credits

Member Price: $39

See more dates

Five Ways to Improve Your Leadership Skills

Friday, May 8
 12:00pm - 12:54pm

Online

1.00 Credits

Member Price: $39

See more dates

The Ethics Hour: Heartfelt Leadership: How Ethical Leaders Build Trust, featuring John F. Levy, MBA, CPA, CIA and Don Minges, MBA

Friday, May 8
 12:00pm - 1:00pm

Online

1.00 Credits

Member Price: $39

See more dates

The best leaders are always ethical. Every great leader has heart and readily shows that they care. What is the true value of a trustworthy leader? Why do we need trustworthy leaders? How do we examine ethical issues - what is the process? Trust provides a safety net that enables innovation to flourish. Be the best leader you can be by caring about others and remaining ethical. Ethics is fundamentally how we treat others. Do we measure up to that standard?

More Dates

Navigating Leaves of Absence

Friday, May 8
 12:00pm - 1:07pm

Online

1.00 Credits

Member Price: $39

See more dates

What obligations does an employer have when an employee needs to take a leave of absence? This presentation will provide an overview of the complicated, intertwined compliance obligations triggered when an employee requests a medical leave of absence (including for pregnancy, mental health, or addiction).  

More Dates

Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 2 (Cryptology)

Friday, May 8
 1:00pm - 1:56pm

Online

1.00 Credits

Member Price: $39

See more dates

This is a continuing part of our series on forensic accounting. Within this segment we discuss the concepts that are part of computer forensics known as cryptology. The term cryptography is from Ancient Greek and means “hidden secret”. It is the practice and study of techniques for secure communications in the presence of adversarial behavior. Cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Cryptography starts with secrets. Various aspects in information security such as data confidentiality, data integrity, authentication and non-repudiation (where a statement’s author cannot successfully dispute its authorship) are central to modern cryptography.

More Dates

K2's Ten PDF Tips You Need To Know

Friday, May 8
 1:00pm - 2:00pm

Online

1.00 Credits

Member Price: $39

See more dates

Portable Document Format (PDF) documents are everywhere! Yet few know how to work effectively with these documents. If you are interested in working more effectively and efficiently with PDFs, this session is for you. In this session, you will learn valuable tips you can use to assist you with creating, editing, and securing PDFs. You will also learn how to convert PDFs to fillable forms and secure PDFs, among other features. Don't miss this chance to learn ten PDF tips you need to know to increase your ROI on PDFs.

More Dates

Surgent's Lessons Learned from Successful Companies

Friday, May 8
 1:00pm - 3:00pm

Online

2.00 Credits

Member Price: $99

See more dates

Why do some companies fail while others grow and succeed for generations? Common perceptions often attribute organizational success to great leadership, timing, or unique ideas. Although these traits certainly play a role in helping companies grow, research shows that corporate success often hinges on whether a company is value driven. Such companies have core ideologies that drive almost every major decision. In this course, we look at empirical data on why some companies succeed while others fail. By looking at companies that were created prior to 1950 (e.g., Disney, Marriott, or 3M), we can understand why certain organizations have been able to grow and achieve exceptional success through many different eras in the American economy. The lessons learned from these visionary companies can be broadly applied to organizations of all sizes, including accounting and financial service firms.

More Dates