Professional Development and Event Catalog
More Money: Strategic Ways to Improve Cash Flow
1:30pm - 5:30pm
Online
4.00 Credits
Member Price: $149


See more dates
Cash flow management is often the most important task of any CFO or financial leader. Regardless of whether one works in start-ups or established companies, non-profit or for-profit entities, cash flow makes our organizations run. Have you ever wondered whether you are optimizing your company's cash flow? In this course, we will explore how to improve your company's cash flow using analysis and financial theories in the context of real-world situations. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
More Dates
Controller Series: Insightful Financial Analysis
2:00pm - 3:00pm
Online
1.00 Credits
Member Price: $75

See more dates
Anyone can "crunch numbers" but it takes special skills to make them meaningful to the user. Financial statements and ratios need to be interpreted correctly using a process that sets the context, identifies the right analysis tools, and makes recommendations in an understandable format. This course will help you present your insights in a way that is insightful and impactful to your client.
More Dates
Embracing Neurodiversity in the Workplace
2:00pm - 3:03pm
Online
1.00 Credits
Member Price: $39

See more dates
This webinar will explore embracing and supporting neurodiversity in the workplace, promoting inclusivity, and creating a more diverse and dynamic environment.
More Dates
Contract Accounting, Lease Accounting, and their Impact on Construction Contractors
2:00pm - 3:30pm
Online
1.50 Credits
Member Price: $99

See more dates
Construction accounting is not just about revenue, but it is a lot about revenue. Leases too. Diving deep into the five-step approach for revenue recognition in the construction industry, this course has all of the rules and interpretations that you might need. Further, practical examples help to drive home the learning. Additionally, leases are critical for contractors. From equipment to warehouse space, leases appear prominently on many contractors' book. Review the current guidance and begin to understand the new guidance under ASC 842. Program features: Detailed discussion of the guidance under FASB ASC 606, Revenue from Contracts with Customers. Examples and exercises to understand the five-step recognition process. Detailed discussion of the guidance under FASB ASC 842, Leases. Reasons why leases are so important to contractors. A walkthrough of both current and future lease guidance.
More Dates
ProActive Response: Active Shooter Training - Recognize. Respond. Survive.
2:00pm - 3:47pm
Online
2.00 Credits
Member Price: $79


See more dates
ProActive Response Group's Active Shooter Response Training course educates participants in current trends of active shooter incidents, how to recognize early warning signs of violence, appropriate actions to increase chances of survival in an active shooter event, and how to use basic medical equipment to save the lives of victims. *****(Warning: This video contains simulated graphic scenes that some viewers may find disturbing)*****
More Dates
Accounting for the Gig Economy
2:00pm - 4:00pm
Online
2.00 Credits
Member Price: $89


See more dates
Freelance work and other non-permanent employment arrangements are becoming increasingly popular ways for people to earn a living. Although these non-traditional activities offer novel, flexible ways to earn income from diverse sources, they also introduce nuanced recordkeeping, reporting, and attestation issues. We investigate characteristics of the gig economy, employee-versus-contractor considerations, bookkeeping, regulatory compliance, and external reporting considerations. We also explore best practices for CPAs who fulfill the role of trusted advisor for gig economy clients. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
More Dates
K2's Taking Another Look At PDFs
2:00pm - 4:00pm
Online
2.00 Credits
Member Price: $79


See more dates
We’re all familiar with PDF documents. However, it’s safe to say that most professionals use only a tiny fraction of their features. This circumstance is unfortunate, considering all you can do with PDF documents. Therefore, isn’t it time to take another look at PDF K2’s Taking Another Look At PDFs documents and all you can do with them? Participate in this session to learn more about PDFs and how and why they should be a cornerstone technology in most organizations. Collaboration options, long-term storage and archival, and fillable forms are just a few features you will learn about in this session. If you’re ready to elevate your PDF productivity, this session is for you!
More Dates
Surgent's Understanding Partnership Taxation: PTE Elections, 754 Elections, and Selling a Partnership Interest
2:00pm - 4:00pm
Online
2.00 Credits
Member Price: $99


See more dates
Partnership tax law is always difficult. However, when certain transactions come up, not knowing how to handle them can be costly to clients and practitioners. In this course, we discuss several of these types of situations. We will explore the tax impacts of a PTE election and how a 754 election affects the inside basis of partnership assets. We will then examine those tricky look-through provisions on the sale of a partnership interest in order to properly calculate the tax implications.
More Dates
The New AICPA Statements on Standards for Tax Services
2:00pm - 4:00pm
Online
2.00 Credits
Member Price: $79


See more dates
The SSTS are tax standards that apply to all members who provide tax services and provide the framework for the AICPA ethical guidance for tax practitioners. This program explores the revised AICPA Statements on Standards for Tax Services, effective January 1, 2024.
More Dates
Measuring Audit Risks
2:00pm - 4:49pm
Online
3.00 Credits
Member Price: $99

See more dates
In order not to perform an excessive number of audit procedures (over audit) auditors must perform procedures in order to determine in what areas are there weak internal controls that could result in a risk that the financial statements would be materially misstated and not be detected. SAS No. 122, AU 300 – 499, Measuring Audit Risk provides guidance as well as required procedures that must be performed in every audit in order to determine the risk of material misstatement. No longer can the auditor state that they assess the risk of material misstatement at maximum without having a basis for making such assessment. As a result, the standards now require that the auditor make such an assessment of a material misstatement of the financial statement on every audit in order to have a basis for such assessment. This program is an overview of the statement documentation requirements in assessing such a risk.
More Dates
How Recent Auditing Standards Improve Risk-Based Audits
2:00pm - 6:00pm
Online
4.00 Credits
Member Price: $149


See more dates
Recent generally accepted auditing standards were written to improve the quality of risk-based financial statement audits, audit reporting, and required by-product communications. This course will discuss the important clarifications and enhancements intended to improve audit quality to ensure better compliance with requirements contained in the SASs. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
More Dates
ACPEN Signature 2025: The Risk of Fraud in State & Local Government
2:00pm - 10:00pm
Online
8.00 Credits
Member Price: $250


See more dates
This comprehensive 8-hour course explores the pervasive issue of fraud in State and Local governments. Our panel of experts from inside and outside government will provide participants with the tools and knowledge necessary to identify, prevent, and respond to fraudulent activities in State and local governments. The course begins by examining the types of fraud commonly encountered in governmental settings, including financial fraud, procurement fraud, and abuse of power. With our experienced panelists, participants will delve into real-world case studies to understand the tactics used by fraudsters and the impact on public trust, resources, and governance. Special emphasis will be placed on understanding regulatory frameworks and compliance measures designed to mitigate fraud risks.
More Dates
Taking Advantage of Array Formulas in Excel
2:30pm - 4:30pm
Online
2.00 Credits
Member Price: $89


See more dates
This intensive 2-hour course is designed to unlock the potential of array formulas in Microsoft Excel. Array formulas are a vital tool in Excel for their unique ability to perform multiple calculations on one or more items within an array, making them indispensable for complex data analysis and calculations. They enable users to write fewer, more powerful formulas, leading to cleaner and more efficient spreadsheets. This course is tailored to enhance your data analysis and spreadsheet management skills by delving into the advanced aspects of array functions. Through a combination of theoretical knowledge and practical exercises, you will learn to streamline your work and improve efficiency in Excel. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
More Dates
Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)
3:00pm - 4:27pm
Online
1.60 Credits
Member Price: $59

See more dates
This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved. There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software.
More Dates
Partnerships: How to Calculate Partner Basis
3:00pm - 4:51pm
Online
2.00 Credits
Member Price: $79


See more dates
This program provides a detailed analysis of the calculations related to determining tax basis for a partnership interest. Illustrated examples with filled in forms will demonstrate how the processes works and their many potential pitfalls. *Please Note: If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Course Materials Tab and submit to kori.herrera@acpen.com
More Dates
Accounting for digital assets under US GAAP: Derivatives and mining
3:00pm - 5:00pm
Online
2.00 Credits
Member Price: $125


See more dates
Derivatives, embedded derivatives and mining (Bold) Complexities with digital assets increase when you move away from the fundamentals and start evaluating contracts to determine if they involve derivatives or have embedded derivatives. In addition, recording mining revenue has many unique considerations, especially if you have questions about differences related to transaction fees and block rewards or if you or your client are mining independently or within a mining pool. Part three of a series (bold) This webcast is part three of a series that will bring to life the content incorporated in the AICPA practice aid Accounting for and Auditing of Digital Assets. This webcast will walk you through: A specific fact pattern when evaluating whether or not there is an embedded derivative within the contract The difference between recording revenue for transaction fees and block rewards A flow chart for determining how to recognize revenue when participating in a mining pool Add more value (bold) Whether you're a CPA working with clients or an industry accountant responsible for corporate accounting policy, this webcast will give you a clear path to help your clients or entity by applying the appropriate accounting standards to your digital asset derivative and mining activities. Detailed examples and use cases will demonstrate the real-world application of this guidance. Note: FASB issued ASU No. 2023-08, Intangibles-Goodwill and Other-Crypto Assets (Subtopic 350-60): Accounting for and Disclosure of Crypto Assets, which is effective for all entities for fiscal years beginning after December 15, 2024. This ASU is not yet reflected in this webcast.
More Dates
Fiduciary Accounting: Fundamentals & Rules
3:00pm - 5:00pm
Online
2.00 Credits
Member Price: $79


See more dates
This course will dive into the fundamentals of fiduciary accounting and provide a reporting guide for determining whether receipts and expenditures are assigned to income or principal/corpus.
More Dates
Fraud Busters: Controls to Prevent and Detect Fraud
3:00pm - 5:00pm
Online
2.00 Credits
Member Price: $89


See more dates
This course investigates actual real-world fraud schemes and discusses what controls could have prevented the fraud from occurring, and what controls could detect and curtail the fraud scheme. The instructor speaks from experience, finding multiple frauds very early in her career leading to a career-long focus on fraud prevention and detection. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
More Dates
K2's Backups Done Right
3:00pm - 5:00pm
Online
2.00 Credits
Member Price: $79


See more dates
Where is your data? Do you have it controlled and backed up? If all your data is in the Cloud, how do you verify that the backup recovery is rapid? If your data is in various silos from your application providers, how do you ensure you have the protection and disposal approaches needed? This session will help you understand and guide your IT team and providers to take the right actions to protect your business. Backup considerations, including Cloud, backup appliance, disaster recovery, and business continuity approaches, are included. If you are from the "trust but verify" school of thought, this session will help you ask the right questions.
More Dates
Schedule C of Form 1040
3:00pm - 5:00pm
Online
2.00 Credits
Member Price: $79


See more dates
Many self-employed or sole proprietors find themselves having to navigate Schedule C in reporting business income. While this attachment to Form 1040 seems straightforward on the surface, there are many traps for the unwary. This course is ideal for CPAs, EAs, or other tax professionals. **Please Note: If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Course Materials Tab and submit to kori.herrera@acpen.com.