Skip to main content

Professional Development and Event Catalog

Showing 14447 All Results

A Fox in the Henhouse/Courthouse

Wednesday, Jun. 3
 3:00pm - 3:57pm

Online

1.00 Credits

Member Price: $39

See more dates

The ancient Romans had a saying about using caution when appointing someone to a position of trust, "don't set a wolf to watch the sheep". That saying is in use today and has changed to include "don't put a fox to guard the henhouses";. The thought is similar, but the wolf and fox are vastly different animals. Wolves rely upon their strength to survive while foxes rely on their cunning. Like foxes, fraudsters rely upon their cunning to defeat or circumvent internal controls. This session reviews the investigation of a deputy court clerk who exploited a weakness in internal controls and committed fraud in the courthouse.

More Dates

Sampling - Avoiding Common Mistakes on Financial Statement and Compliance Audits

Wednesday, Jun. 3
 4:00pm - 5:48pm

Online

2.00 Credits

Member Price: $79

See more dates

Sampling is an important method for determining the extent of testing controls, testing compliance, and tests of substantive details. It allows the auditor to apply procedures to less than 100% of the population yet extend results to project likely conclusions about the entire population. This module will describe the proper process for both attribute testing and variable sampling in financial statement and compliance audits.

More Dates

MBAexpress: Effective Change Management - V 2.0

Thursday, Jun. 4
 9:00am - 10:00am

Online

1.00 Credits

Member Price: $75

See more dates

How do you react to change? (bold) Change can be difficult, even when it's good and for the right reasons. In this webcast, you'll learn: How varying personality traits respond to change The five change management principles Kotter's eight step change model

More Dates

Global IIA Standards (GIAS) Fundamentals and Domain I and II - PART 1

Thursday, Jun. 4
 9:00am - 11:01am

Online

2.20 Credits

Member Price: $79

See more dates

In May 2023, the IIA released a draft of the new Global Internal Audit Standards. The intent was to provide more effective standards for Internal Audit globally. The new Global Internal Audit Standards were released on January 9, 2024, and will become effective January 9, 2025. The previous version, the International Standards for the Professional Practice of Internal Auditing, released in 2017, remains approved for use during a one-year transition period. The Global Internal Audit Standards guide the worldwide professional practice of internal audit. They serve as a basis for evaluating and elevating the quality of the internal audit function. The Standards use 15 guiding principles with five separate domains that enable effective internal audit implementation and examples of evidence of conformance. The Global Standards are organized into five domains. Domain I: Purpose of Internal Auditing Domain II: Ethics and Professionalism Domain III: Governing the Internal Audit Function Domain IV: Managing the Internal Audit Function Domain V: Performing Internal Audit Service

More Dates

FAQ Related to the Most Recent Audit Standards SAS Nos. 142-149

Thursday, Jun. 4
 10:00am - 11:49am

Online

2.00 Credits

Member Price: $79

See more dates

Recently issued generally accepted auditing standards were designed to enhance audit quality.  This course will address the most commonly misapplied concepts and FAQ in properly implementing the new requirements in the way intended to achieve that goal.

More Dates

Communicate Financial Concepts to Non-Accountants

Thursday, Jun. 4
 10:00am - 12:00pm

Online

2.00 Credits

Member Price: $79

See more dates

Do you ever get blank looks when you present your company's financial statements?  Does your board nod knowingly, during your presentation, but never seem to have any meaningful questions?  It could be that they have no idea what you are talking about and are just pretending to understand!  Learn how to connect with your CEO, board, fellow managers, and ordinary employees so they understand your message.

More Dates

Measuring Audit Risks

Thursday, Jun. 4
 10:00am - 12:49pm

Online

3.00 Credits

Member Price: $99

See more dates

In order not to perform an excessive number of audit procedures (over audit) auditors must perform procedures in order to determine in what areas are there weak internal controls that could result in a risk that the financial statements would be materially misstated and not be detected.  SAS No. 122, AU 300 – 499, Measuring Audit Risk provides guidance as well as required procedures that must be performed in every audit in order to determine the risk of material misstatement.  No longer can the auditor state that they assess the risk of material misstatement at maximum without having a basis for making such assessment.  As a result, the standards now require that the auditor make such an assessment of a material misstatement of the financial statement on every audit in order to have a basis for such assessment.  This program is an overview of the statement documentation requirements in assessing such a risk.

More Dates

Global Internal Audit Standards (GIAS) Domain II - Part 2

Thursday, Jun. 4
 11:00am - 12:48pm

Online

2.00 Credits

Member Price: $79

See more dates

The new Global Internal Audit Standards were released on January 9, 2024, and will become effective January 9, 2025. The previous version, the International Standards for the Professional Practice of Internal Auditing, released in 2017, remains approved for use during a one-year transition period. The Global Internal Audit Standards guide the worldwide professional practice of internal audit. They serve as a basis for evaluating and elevating the quality of the internal audit function. The Standards use 15 guiding principles with five separate domains that enable effective internal audit implementation and examples of evidence of conformance. The Global Standards are organized into five domains. Domain I: Purpose of Internal Auditing Domain II: Ethics and Professionalism Domain III: Governing the Internal Audit Function Domain IV: Managing the Internal Audit Function Domain V: Performing Internal Audit Service

More Dates

Estate Planning for Today and Beyond

Thursday, Jun. 4
 11:00am - 6:42pm

Online

8.00 Credits

Member Price: $225

See more dates

Estate planning continues to evolve, and staying informed about the latest trends and strategies is crucial for professionals in the field. This forward-looking course delves into the intricacies of estate planning, with a specific focus on current issues. Participants will explore cutting-edge techniques, emerging legal considerations, and industry developments to ensure they are equipped with the knowledge and skills to create effective estate plans that withstand the test of time and safeguard their clients' legacies. *Please Note:  If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Handouts Tab and submit to kori.herrera@acpen.com  

More Dates

Walkin', Talkin', Lookin' & Listenin' - Or Things Most of Us Don't Do Well

Thursday, Jun. 4
 12:00pm - 1:47pm

Online

2.00 Credits

Member Price: $79

See more dates

You often can perform an audit in accordance with all of the standards, and still have a substandard audit IF you did not get out among the clients employees (let them know you are there and where you located), talk to as many people as you can regardless as to whether you may think that they may have any helpful information; constantly observe your surrounding where ever you are at (you never now what you might see) and lastly, listen to not only what people are saying to you but are also saying around you. This presentation is designed to illustrate the importance of making yourself available to your client’s employees, let them know that you are there and where you can be found. Talk with them because if there is a problem, somebody knows and they will often tell you all about it IF you just ask them.  Look at your surrounding everywhere you go.  What are you looking for?  I don’t know but I’ll know it when I see it. Lastly, listen to what they have to say.  Every word is important because they may say something that you had not asked about.  Remember, you never want to discover something and go to an individual who you determined knew about it and ask, why didn’t you tell me about this and their response was, you never asked me!

More Dates

Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)

Thursday, Jun. 4
 1:00pm - 2:27pm

Online

1.60 Credits

Member Price: $59

See more dates

This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved. There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software.  

More Dates

Revenue Recognition Topic 606 - Identify the Contract Part 1

Thursday, Jun. 4
 3:00pm - 4:14pm

Online

1.20 Credits

Member Price: $39

See more dates

On May 28, 2014, the Financial Accounting Standards Board (FASB) and International Accounting Standards Board (IASB) issued converged guidance on recognizing revenue in contracts with customers (ASC 606). The objective of the guidance is to establish principles to report useful information to users of financial statements about the nature, amount, timing and uncertainty of revenue from contracts with customers. The new guidance provides several benefits to financial statement users.   This is one in a series of courses that outline the updated revenue recognition standard.

More Dates

The New Quality Management Standards - What Everyone Needs to Know

Thursday, Jun. 4
 3:00pm - 4:48pm

Online

2.00 Credits

Member Price: $79

See more dates

Navigating Leaves of Absence

Thursday, Jun. 4
 4:00pm - 5:07pm

Online

1.00 Credits

Member Price: $39

See more dates

Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 2 (Cryptology)

Thursday, Jun. 4
 5:00pm - 5:56pm

Online

1.00 Credits

Member Price: $39

See more dates

This is a continuing part of our series on forensic accounting. Within this segment we discuss the concepts that are part of computer forensics known as cryptology. The term cryptography is from Ancient Greek and means “hidden secret”. It is the practice and study of techniques for secure communications in the presence of adversarial behavior. Cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Cryptography starts with secrets. Various aspects in information security such as data confidentiality, data integrity, authentication and non-repudiation (where a statement’s author cannot successfully dispute its authorship) are central to modern cryptography.

More Dates

Conducting Human Resource Investigations

Friday, Jun. 5
 10:00am - 11:11am

Online

1.00 Credits

Member Price: $39

See more dates

Human Resources professionals are often tasked with investigating allegations of employee misconduct, discrimination, and others. Investigation training is traditionally presented from the position of an outsider looking in, such as a governmental agency, law firm, or private investigator. HR investigations require similar skills, but the environment and the approach are quite different. This session explores these differences and provides best practices for planning, executing, documenting, and reporting the results of an HR investigation. Attendees will end the session with takeaways to immediately implement in future HR investigations. 

More Dates

Performance Auditing Made Easy

Friday, Jun. 5
 10:00am - 11:24am

Online

1.50 Credits

Member Price: $59

See more dates

Unlike a traditional financial audit objective (Are the financial statements materially misstated), performance auditing can address a wide variety of objectives.  Is this program working? Can it be improved? Where can we save money? How can we operate more efficiently and effectively? Are management’s assertions supported? And so forth.  This session will explain what a performance audit is, describe the applicable standards, and provide examples that indicate the value of a performance audit.  Performance audits can add value to any entity and practitioners can profit from adding these assurance services to their practices.

More Dates

Group Audits: Who is Responsible for What?

Friday, Jun. 5
 10:00am - 11:47am

Online

2.00 Credits

Member Price: $79

See more dates

Financial statement audits often involve audits of components of a larger entity. This course will focus on the responsibilities for both the group auditor and component auditor, including implementation of SAS No. 149 relate to group audits.

More Dates

Taxation of Non-fungible Tokens (NFTs)

Friday, Jun. 5
 10:00am - 11:52am

Online

2.00 Credits

Member Price: $79

See more dates

Non-fungible Tokens (NFTs), unique, identifiable digital assets based on blockchain technologies, have become a fast-growing industry. This course will provide a background on how NFTs came into the mainstream marketplace.  These materials will assist the practitioner to understand the tax implications of the creation, purchase and sale of these assets.  **Please Note:  If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Course Materials Tab and submit to kori.herrera@acpen.com.

More Dates