Skip to main content

Professional Development and Event Catalog

Showing 15193 All Results

Fraud Risk Management

Thursday, May 21
 3:00pm - 4:47pm

Online

2.00 Credits

Member Price: $79

See more dates

The ACFE/COSO Fraud Risk Management Guide (FRMG) was published in 2016 (and updated in 2023).  It has quickly gained acceptance as the set of best practices for preventing, detecting, and thus deterring fraud. The fraud landscape is constantly changing and evolving. The FRMG sets out a rigorous set of principles and leading practices for managing fraud risk for forward-thinking organizations to follow.  It covers: How to establish fraud risk management governance. How to conduct rigorous fraud risk assessments. How to design and implement fraud control activities. How to establish reporting mechanisms and investigative procedures. How to monitor the overall fraud risk management program. Fraud risk can be managed.  All anti-fraud and accountability professionals will benefit from this session's focus on effective fraud risk management.

More Dates

LLC's & S Corps -- A Comparative Analysis

Thursday, May 21
 3:00pm - 7:00pm

Online

4.00 Credits

Member Price: $129

See more dates

This course provides an in-depth comparative analysis of Limited Liability Companies (LLCs) and S Corporations, focusing on their tax implications, compliance requirements, and operational structures. Participants will explore key aspects of entity formation, tax treatment, and compliance with corporate formalities. Topics include electing Subchapter S status, mechanics of Form 2553, and relief options for late filings under Rev. Proc. 2022-19. The course also highlights entity-specific tax forms, accountable plans, taxable fringe benefits, officer reasonable compensation, estate planning, business continuation planning, and audit strategies. Additionally, participants will review Schedules K-1, K-2, K-3, and effectively connected income for both entity types. *Please Note:  If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Course Materials Tab and submit to kori.herrera@acpen.com

More Dates

K2's The How's And Why's Of Data Analytics

Thursday, May 21
 4:00pm - 5:55pm

Online

2.00 Credits

Member Price: $79

See more dates

Increasingly, accountants and auditors are called upon to use data analytics to understand and improve results. Yet, many professionals struggle with the concept of data analytics and remain unaware of how to obtain the results needed using tools they already own. In this session, you will learn about the four primary types of data analytics and when to use each. Further, you will learn how to generate meaningful analytical measurements using Excel, Power BI, and other tools and, more importantly, how to interpret the results. If you seek to use data analytics – and who isn’t – this session is for you.

More Dates

Assessing the Real Ethics of an Organization?, featuring Joe Oringel, MBA, CPA, CIA and Don Minges, MBA

Friday, May 22
 9:00am - 9:50am

Online

1.00 Credits

Member Price: $39

See more dates

Every organization claims to be ethical, but words and deeds do not always jibe. How do you assess the real Ethics of an organization?  What are the key factors and behaviors to be aware of? Many organizations lack prescriptive policies, but is that an excuse to deviate from the spirit of doing the right thing? How can professionals abuse ‘what is right’ and circumvent policies for their personal benefit. What are some egregious examples of violating policies? How allowing exceptions invites abuse. This seminar outlines steps to gauge the ethics of an organization.

More Dates

Global Internal Audit Standards (GIAS) Domain II - Part 2

Friday, May 22
 9:00am - 10:48am

Online

2.00 Credits

Member Price: $79

See more dates

The new Global Internal Audit Standards were released on January 9, 2024, and will become effective January 9, 2025. The previous version, the International Standards for the Professional Practice of Internal Auditing, released in 2017, remains approved for use during a one-year transition period. The Global Internal Audit Standards guide the worldwide professional practice of internal audit. They serve as a basis for evaluating and elevating the quality of the internal audit function. The Standards use 15 guiding principles with five separate domains that enable effective internal audit implementation and examples of evidence of conformance. The Global Standards are organized into five domains. Domain I: Purpose of Internal Auditing Domain II: Ethics and Professionalism Domain III: Governing the Internal Audit Function Domain IV: Managing the Internal Audit Function Domain V: Performing Internal Audit Service

More Dates

Walkin', Talkin', Lookin' & Listenin' - Or Things Most of Us Don't Do Well

Friday, May 22
 10:00am - 11:47am

Online

2.00 Credits

Member Price: $79

See more dates

You often can perform an audit in accordance with all of the standards, and still have a substandard audit IF you did not get out among the clients employees (let them know you are there and where you located), talk to as many people as you can regardless as to whether you may think that they may have any helpful information; constantly observe your surrounding where ever you are at (you never now what you might see) and lastly, listen to not only what people are saying to you but are also saying around you. This presentation is designed to illustrate the importance of making yourself available to your client’s employees, let them know that you are there and where you can be found. Talk with them because if there is a problem, somebody knows and they will often tell you all about it IF you just ask them.  Look at your surrounding everywhere you go.  What are you looking for?  I don’t know but I’ll know it when I see it. Lastly, listen to what they have to say.  Every word is important because they may say something that you had not asked about.  Remember, you never want to discover something and go to an individual who you determined knew about it and ask, why didn’t you tell me about this and their response was, you never asked me!

More Dates

Common Peer Review Deficiencies and How to Avoid Them

Friday, May 22
 10:00am - 12:00pm

Online

2.00 Credits

Member Price: $79

See more dates

Required Peer Reviews are an important element for ensuring high quality audit and attest services are being offered by CPAs. This course will explore the most common deficiencies identified through the Peer Review program, so that CPAs know what potential problems to avoid.

More Dates

Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)

Friday, May 22
 11:00am - 12:27pm

Online

1.60 Credits

Member Price: $59

See more dates

This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved. There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software.  

More Dates

K2's AI - Security And Privacy Issues

Friday, May 22
 12:00pm - 12:58pm

Online

1.00 Credits

Member Price: $39

See more dates

Security and privacy issues must be top-of-mind concerns for business professionals using AI. Yet, for far too many of these K2’s AI – Security And Privacy Issues professionals, no concern is given for the potential security and privacy risks associated with AI, setting the stage for potentially disastrous results! In this session, you will learn about AI security and privacy risks and how to manage them. This session includes discussions of the major AI companies’ security and privacy policies, how AI platforms might use your data, and how you can stay in control. Given how quickly AI is spreading, this is one session you simply cannot afford to miss.

More Dates

Why Auditors Fail To Detect Fraud

Friday, May 22
 12:00pm - 1:50pm

Online

2.00 Credits

Member Price: $79

See more dates

Prior to the original SAS No. 82 on Consideration of Fraud In A Financial Statement Audit (now codified as SAS No. 122, AU 240), the word fraud never appeared in a single SAS, nor was it described anywhere.  SAS No. 82 stated that auditors failed to detect fraud for two reasons:  1) They did not know what it looked like and 2) They had not been trained to look for it.  Although the SASs did not provide any guidance, auditors have always been responsible for the detection of anything that would cause a material misstatement of the financial statements whether caused by error or irregularities.  (They would not even say the word fraud until it appeared in SAS No. 82) The standards were replete with guidance on the detection of an error but silent on how to detect irregularities.  Now auditors are required to document in every financial statement audit their process of determining the risk of financial misstatement due to fraud. This presentation is designed to focus on frauds that were missed by the auditors and, in some cases, why it was missed.  There will also be discussion as to what the auditor must do in order to improve their track record on detecting fraud.  As reported on the Association of Certified Fraud Examiners Occupational Fraud 2022: A Report to the Nations, only 4% of frauds were initially discovered by the external auditor.  It was reported that more frauds were discovered by accident, (5%) then was discovered by the external auditor.

More Dates

Better Forecasts: Be a Better Predictor

Friday, May 22
 12:00pm - 2:00pm

Online

2.00 Credits

Member Price: $79

See more dates

Imagine being able to see into the future with confidence. The ability to be a great forecaster is not innate but learned. By examining great forecasters, we can learn to improve our ability to predict the future. We will examine best practices and current research to improve our ability to predict events that will affect our business.  

More Dates

Communicate Financial Concepts to Non-Accountants

Friday, May 22
 12:00pm - 2:00pm

Online

2.00 Credits

Member Price: $79

See more dates

Do you ever get blank looks when you present your company's financial statements?  Does your board nod knowingly, during your presentation, but never seem to have any meaningful questions?  It could be that they have no idea what you are talking about and are just pretending to understand!  Learn how to connect with your CEO, board, fellow managers, and ordinary employees so they understand your message.

More Dates

Critical "Soft" Skills for CFOs and Controllers

Friday, May 22
 12:00pm - 3:38pm

Online

4.00 Credits

Member Price: $129

See more dates

Ethics and Professional Conduct

Friday, May 22
 1:00pm - 3:00pm

Online

2.00 Credits

Member Price: $125

See more dates

By revisiting these fundamental principles, you will reinforce your knowledge and ensure that your professional conduct aligns with the industry's best practices. Furthermore, this seminar will equip you with the necessary skills to apply the independence rules to common situations that arise in your day-to-day work. By exploring practical scenarios, you will learn how to navigate complex ethical dilemmas, safeguarding the trust and confidence of your clients.

More Dates

Navigating Leaves of Absence

Friday, May 22
 2:00pm - 3:07pm

Online

1.00 Credits

Member Price: $39

See more dates

Ask Me No Questions and I Will Tell You No Lies - The Art of Interviewing & Interrogation

Friday, May 22
 2:00pm - 4:51pm

Online

3.00 Credits

Member Price: $99

See more dates

When we verbally communicate with an individual, we must make a conscious decision as to whether we believe what we have heard.  Little do we realize that we are not making a decision based on what we have heard; rather we make a subconscious decision based primarily on what we have seen, or how the body was behaving when the subject was speaking.  We often walk away from a conversation with a gut feeling that the person was not telling the truth.  That gut feeling is your subconscious.  Yet we often have no idea as to why we have that feeling. This presentation is designed to provide the participant with the tools to identify those both verbal and nonverbal indicators that we all give off when we are under stress.  Normally, telling the truth does not create stress.  When we lie, we know that we are not supposed to and that creates stress, and it will manifest itself in some manner, and that is what a trained interviewer is looking to observe. When we observe indicators of deception, how do we deal with it?  How do we get the subject to admit to a wrong-doing when it is not in their best interest to do so?  That is one of the many things that will be addressed in this presentation.  Whether you are a parent dealing with you kids; an employer dealing with employees or and investigation interviewing a suspect, this presentation will provide you with the tools to assist you in finding the truth.

More Dates

Critical Technical Skills for CFOs and Controllers

Friday, May 22
 2:00pm - 5:37pm

Online

4.00 Credits

Member Price: $129

See more dates

Accounting and finance managers and executives must demonstrate sound technical and analytical necessary for personal growth and organizational success. This course will provide insights into the most critical technical and analytical skills needed by CFOs and Controllers - or those that want to be!

More Dates

Sticky Ethical Choices, featuring Bob Mims and Don Minges

Friday, May 22
 3:00pm - 3:50pm

Online

1.00 Credits

Member Price: $39

See more dates

If ethics were easy, then why do so many professionals have a Code of Conduct? Some Ethical decisions are easy, others are not. We will discuss several thorny ethical issues and the ramifications.  What are the considerations and evaluation criteria to use? The need to carefully deliberate alternatives – is paramount. Be aware. 

More Dates

IRS Cybersecurity Checklist

Friday, May 22
 3:00pm - 4:52pm

Online

2.00 Credits

Member Price: $79

See more dates

This course is designed to provide learners with an understanding of the Internal Revenue Service (IRS) Cybersecurity Checklist and how it can be used to protect taxpayer data. The course will cover the basics of cybersecurity, including threats, risks, and vulnerabilities. Learners will be introduced to the IRS Cybersecurity Checklist, which provides a framework for organizations to assess and enhance their cybersecurity practices. The course will cover the various elements of the IRS Cybersecurity Checklist, including access control, data protection, and employee training. Learners will gain an understanding of the importance of each element and how it contributes to the overall security of taxpayer data. The course will also cover best practices for implementing each element of the IRS Cybersecurity Checklist. Throughout the course, learners will be presented with real-world examples of cybersecurity threats and breaches, highlighting the importance of effective cybersecurity practices. Learners will also be given practical exercises and assessments to reinforce their understanding of the IRS Cybersecurity Checklist. *Please Note:  If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Course Materials Tab and submit to Kori.herrera@acpen.com.

More Dates