Professional Development and Event Catalog
Businesses Receiving Government Assistance
12:00pm - 1:49pm
Online
2.00 Credits
Member Price: $79


Many for-profit entities receive government assistance or are required to have financial statement or compliance audits due to law or regulation. This course will discuss the requirements under Generally Accepted Auditing Standards relevant to for-profit entity audits.
The Controllership Series - The Treasury Function Part 1 - Cash and Investing
1:00pm - 2:50pm
Online
2.00 Credits
Member Price: $79


This course corresponds to our Controllership series. This course is dedicated to exploring the traditional controller role and stepping out of the box to identify areas where the controller can continue to add strategic value to their organizations. Within this segment of our controllership series, we discuss the area of cash and investments and explore how the controller can move these responsibilities into more of a strategic role. In today’s world, the role of cash management is often a pivotal role in the organization. In economically difficult times, controllers may find that they spend a great deal of their time on understanding and managing the organizations' cash position. This is certainly important and, in some areas, can be seen as a staple of the lifeblood of the organization’s ongoing viability. This course takes a look at some of the typical objectives involved in Cash management and then evaluates how those objectives can be further stretched into strategic pillars of the organization.
Ethics Aren't for the Byrdes in Ozark
2:00pm - 3:02pm
Online
1.00 Credits
Member Price: $39

Professional codes of ethics provide guidance to professionals who are frequently required to choose between doing the right thing and the wrong thing. Sometimes, professionals violate their ethical code and do the wrong thing for what they rationalize is the right reason. This session uses the popular television show "Ozark" and its multiple examples of seemingly good people doing bad things for the right reason to define ethics as well as explore why people make unethical choices and how they justify those choices.
Leveraging Analytical Procedures to the Fullest on Audits - Case Studies in Strengthening Audit Evidence
2:00pm - 3:46pm
Online
2.00 Credits
Member Price: $79


Peer review deficiencies commonly relate to the design, documentation, and evaluation of the results of analytical procedures. This course will provide examples of how to strengthen evidence resulting from preliminary, substantive, and final analytics. It will reinforce the elements of strong analytical procedures that may enhance the quality of audits.
A Fox in the Henhouse/Courthouse
3:00pm - 3:57pm
Online
1.00 Credits
Member Price: $39

The ancient Romans had a saying about using caution when appointing someone to a position of trust, "don't set a wolf to watch the sheep". That saying is in use today and has changed to include "don't put a fox to guard the henhouses";. The thought is similar, but the wolf and fox are vastly different animals. Wolves rely upon their strength to survive while foxes rely on their cunning. Like foxes, fraudsters rely upon their cunning to defeat or circumvent internal controls. This session reviews the investigation of a deputy court clerk who exploited a weakness in internal controls and committed fraud in the courthouse.
Sampling - Avoiding Common Mistakes on Financial Statement and Compliance Audits
4:00pm - 5:48pm
Online
2.00 Credits
Member Price: $79


Sampling is an important method for determining the extent of testing controls, testing compliance, and tests of substantive details. It allows the auditor to apply procedures to less than 100% of the population yet extend results to project likely conclusions about the entire population. This module will describe the proper process for both attribute testing and variable sampling in financial statement and compliance audits.
MBAexpress: Effective Change Management - V 2.0
9:00am - 10:00am
Online
1.00 Credits
Member Price: $75

How do you react to change? (bold) Change can be difficult, even when it's good and for the right reasons. In this webcast, you'll learn: How varying personality traits respond to change The five change management principles Kotter's eight step change model
Global IIA Standards (GIAS) Fundamentals and Domain I and II - PART 1
9:00am - 11:01am
Online
2.20 Credits
Member Price: $79

In May 2023, the IIA released a draft of the new Global Internal Audit Standards. The intent was to provide more effective standards for Internal Audit globally. The new Global Internal Audit Standards were released on January 9, 2024, and will become effective January 9, 2025. The previous version, the International Standards for the Professional Practice of Internal Auditing, released in 2017, remains approved for use during a one-year transition period. The Global Internal Audit Standards guide the worldwide professional practice of internal audit. They serve as a basis for evaluating and elevating the quality of the internal audit function. The Standards use 15 guiding principles with five separate domains that enable effective internal audit implementation and examples of evidence of conformance. The Global Standards are organized into five domains. Domain I: Purpose of Internal Auditing Domain II: Ethics and Professionalism Domain III: Governing the Internal Audit Function Domain IV: Managing the Internal Audit Function Domain V: Performing Internal Audit Service
FAQ Related to the Most Recent Audit Standards SAS Nos. 142-149
10:00am - 11:49am
Online
2.00 Credits
Member Price: $79


Recently issued generally accepted auditing standards were designed to enhance audit quality. This course will address the most commonly misapplied concepts and FAQ in properly implementing the new requirements in the way intended to achieve that goal.
Communicate Financial Concepts to Non-Accountants
10:00am - 12:00pm
Online
2.00 Credits
Member Price: $79


Do you ever get blank looks when you present your company's financial statements? Does your board nod knowingly, during your presentation, but never seem to have any meaningful questions? It could be that they have no idea what you are talking about and are just pretending to understand! Learn how to connect with your CEO, board, fellow managers, and ordinary employees so they understand your message.
Measuring Audit Risks
10:00am - 12:49pm
Online
3.00 Credits
Member Price: $99

In order not to perform an excessive number of audit procedures (over audit) auditors must perform procedures in order to determine in what areas are there weak internal controls that could result in a risk that the financial statements would be materially misstated and not be detected. SAS No. 122, AU 300 – 499, Measuring Audit Risk provides guidance as well as required procedures that must be performed in every audit in order to determine the risk of material misstatement. No longer can the auditor state that they assess the risk of material misstatement at maximum without having a basis for making such assessment. As a result, the standards now require that the auditor make such an assessment of a material misstatement of the financial statement on every audit in order to have a basis for such assessment. This program is an overview of the statement documentation requirements in assessing such a risk.
Global Internal Audit Standards (GIAS) Domain II - Part 2
11:00am - 12:48pm
Online
2.00 Credits
Member Price: $79


The new Global Internal Audit Standards were released on January 9, 2024, and will become effective January 9, 2025. The previous version, the International Standards for the Professional Practice of Internal Auditing, released in 2017, remains approved for use during a one-year transition period. The Global Internal Audit Standards guide the worldwide professional practice of internal audit. They serve as a basis for evaluating and elevating the quality of the internal audit function. The Standards use 15 guiding principles with five separate domains that enable effective internal audit implementation and examples of evidence of conformance. The Global Standards are organized into five domains. Domain I: Purpose of Internal Auditing Domain II: Ethics and Professionalism Domain III: Governing the Internal Audit Function Domain IV: Managing the Internal Audit Function Domain V: Performing Internal Audit Service
Estate Planning for Today and Beyond
11:00am - 6:42pm
Online
8.00 Credits
Member Price: $225


Estate planning continues to evolve, and staying informed about the latest trends and strategies is crucial for professionals in the field. This forward-looking course delves into the intricacies of estate planning, with a specific focus on current issues. Participants will explore cutting-edge techniques, emerging legal considerations, and industry developments to ensure they are equipped with the knowledge and skills to create effective estate plans that withstand the test of time and safeguard their clients' legacies. *Please Note: If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Handouts Tab and submit to kori.herrera@acpen.com
Walkin', Talkin', Lookin' & Listenin' - Or Things Most of Us Don't Do Well
12:00pm - 1:47pm
Online
2.00 Credits
Member Price: $79


You often can perform an audit in accordance with all of the standards, and still have a substandard audit IF you did not get out among the clients employees (let them know you are there and where you located), talk to as many people as you can regardless as to whether you may think that they may have any helpful information; constantly observe your surrounding where ever you are at (you never now what you might see) and lastly, listen to not only what people are saying to you but are also saying around you. This presentation is designed to illustrate the importance of making yourself available to your client’s employees, let them know that you are there and where you can be found. Talk with them because if there is a problem, somebody knows and they will often tell you all about it IF you just ask them. Look at your surrounding everywhere you go. What are you looking for? I don’t know but I’ll know it when I see it. Lastly, listen to what they have to say. Every word is important because they may say something that you had not asked about. Remember, you never want to discover something and go to an individual who you determined knew about it and ask, why didn’t you tell me about this and their response was, you never asked me!
Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)
1:00pm - 2:27pm
Online
1.60 Credits
Member Price: $59

This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved. There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software.
Just Ask Why - Searching for Answers: Generating Solutions
2:30pm - 6:04pm
Online
4.00 Credits
Member Price: $129


Breaking the Wall of blind acceptance; avoiding habitual complacency and Yoking the dots between cause and effect.
Revenue Recognition Topic 606 - Identify the Contract Part 1
3:00pm - 4:14pm
Online
1.20 Credits
Member Price: $39

On May 28, 2014, the Financial Accounting Standards Board (FASB) and International Accounting Standards Board (IASB) issued converged guidance on recognizing revenue in contracts with customers (ASC 606). The objective of the guidance is to establish principles to report useful information to users of financial statements about the nature, amount, timing and uncertainty of revenue from contracts with customers. The new guidance provides several benefits to financial statement users. This is one in a series of courses that outline the updated revenue recognition standard.
The New Quality Management Standards - What Everyone Needs to Know
3:00pm - 4:48pm
Online
2.00 Credits
Member Price: $79


The AICPA issued the new Quality Management Standards as a part of its overall quality improvement initiative. This course will highlight the foundational principles within the new approach that everyone in the CPA firm should know.
Navigating Leaves of Absence
4:00pm - 5:07pm
Online
1.00 Credits
Member Price: $39

What obligations does an employer have when an employee needs to take a leave of absence? This presentation will provide an overview of the complicated, intertwined compliance obligations triggered when an employee requests a medical leave of absence (including for pregnancy, mental health, or addiction).
Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 2 (Cryptology)
5:00pm - 5:56pm
Online
1.00 Credits
Member Price: $39

This is a continuing part of our series on forensic accounting. Within this segment we discuss the concepts that are part of computer forensics known as cryptology. The term cryptography is from Ancient Greek and means “hidden secret”. It is the practice and study of techniques for secure communications in the presence of adversarial behavior. Cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Cryptography starts with secrets. Various aspects in information security such as data confidentiality, data integrity, authentication and non-repudiation (where a statement’s author cannot successfully dispute its authorship) are central to modern cryptography.