Skip to main content

CPE Catalog

Note

AICPA On-Demand & Self-Study courses take up to 24 hours to process. 

Showing 17127 Webcasts & Webinars Results

Emerging Innovations in Forensic Data Analytics, Crypto Currencies and AI, ChatGPT

-

Online

2.00 Credits

In this course, participants will learn about key trends and innovations impacting the field of forensic data analytics.  From generative AI to ChatGPT, machine learning and transaction review, data sharing consortiums and cryptocurrency trends, this course is for the futurist who wants to be leading edge in compliance and anti-fraud technology innovation. 

KPI Bootcamp for Small Businesses

-

Online

5.00 Credits

Running or advising a small business? KPI Bootcamp can help you quickly find and deploy the right KPIs to achieve your, or your client's, goals. Delivered by Bernie Smith, KPI specialist and overloaded small business owner, this course will help you quickly select a handful of powerful measures that apply to your business. The step-by-step approach helps you sharpen your objectives and select the right KPIs to drive growth and profit. Every one of the 412 included KPIs (as free PDF download for every participant) includes a full plain-English definition and also covers business benefits, case-study examples and practical tips.

Employment Law 101

-

Online

1.00 Credits

Review of the major employment laws governing the workplace, when they are triggered, and key compliance aspects under each law. This presentation is designed to give viewers enough information to issue spot when matters arise in the workplace.   

2024 Best-In-Class Recruiting Strategies

-

Online

1.00 Credits

With over 4.3 employees leaving their jobs as of early 2022, The Great Resignation presents a huge challenge for companies as they attract and retain talent. During this course, you'll learn practical strategies you can implement immediately to ensure you have the right tools in your toolbox to win the war on talent. 

Top Employment Tools to Protect Your Business and Recommend to Business Clients

-

Online

1.00 Credits

Overview of the most important labor and employment policies and practices that every business should have. The review will go over confidentiality agreements, arbitration agreements, restrictive covenants, training, and severance agreements, as well as compliance issues related to each of them. 

Are Those Independent Contractors Really Independent Contractors?

-

Online

1.00 Credits

Various legal tests are used to evaluate whether a worker should be classified as an employee or an independent contractor. There is no uniform standard or bright-line rule for determining whether an individual is properly classified as an independent contractor. Instead, the inquiry is always fact-intensive, and the analysis can vary based what body is performing it, i.e. the Internal Revenue Service (“IRS”), Department of Labor (“DOL”), various state agencies, or the courts. This presentation will review the various tests and highlight some of the common, most important factors for consideration.   

Business Communication Essentials (Dynamic Communication in the Workplace)

-

Online

1.00 Credits

We know that effective communication is essential to growing a career and a business. But we often don't take time to think through, concsiously, about how we communicate and how small changes could change the trajectory of our messages. This workshop is designed to give you a survey of multiple communication strategies and mistakes to avoid. We start by discussing how people make decisions--which is important to understand in the context of business communication and communication in the workplace. We then transition into common communication mistakes and actionable tools and tactics that you can use to overcome and avoid these mishaps.

Maintaining a Harmonious Working Environment

-

Online

1.20 Credits

A harmonious working environment is one in which people feel safe, seen, heard, and respected.  Critical to maintaining it are that employees have high self-esteem, are treated with respect, and work in a safe, non-violent setting.  This course provides practical knowledge and scripts on how to take appropriate action and deal effectively with discriminatory comments, sexual harassment, and threats and acts of violence,such that personal and employer liability is avoided.

The Controllership Series - The Financial Close Process

-

Online

1.50 Credits

A common challenge for the controller role is in closing the month-end and period-end books in preparation to issue financial statements. This duty requires precision, timing and efficiency. In today’s digital world, many organizations have access to financial accounting software that will assist with the steps in the financial close. However, even with this aid it is critical the accountant understand the various steps for the close process and how they inter-relate to other accounting processes. This course gives you an insight into the inter-relationships between many processes that impact the financial close. The closing process has traditionally been a slow one with many companies taking two weeks to close its subsidiary’s books and another two to three weeks to roll up and consolidated the results. With the introduction of technology much has been done to help accelerate that process with integrated enterprise resource planning systems and general ledger and consolidate software. Within this segment we will discuss the elements of the financial close and also important concepts to assist the controller in accelerating their close timeline. This includes addressing all functional areas of the close including payroll, invoicing, payables, inventory, cash, and the general ledger. We will also discuss important concepts of ensuring your financial close is accurate by discussing bank reconciliations, overhead allocations, bad debt reserves, unpaid wages and accruals for vacation time, account reconciliations, deprecation and overall financial statement review. Note: This course does not address utilizing technology in the financial close. Its focus is to understand the varied procedures involved in the financial close whether or not technology is utilized.  

Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)

-

Online

1.60 Credits

This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved. There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software.  

Ask Me No Questions and I Will Tell You No Lies - The Art of Interviewing & Interrogation

-

Online

3.00 Credits

When we verbally communicate with an individual, we must make a conscious decision as to whether we believe what we have heard.  Little do we realize that we are not making a decision based on what we have heard; rather we make a subconscious decision based primarily on what we have seen, or how the body was behaving when the subject was speaking.  We often walk away from a conversation with a gut feeling that the person was not telling the truth.  That gut feeling is your subconscious.  Yet we often have no idea as to why we have that feeling. This presentation is designed to provide the participant with the tools to identify those both verbal and nonverbal indicators that we all give off when we are under stress.  Normally, telling the truth does not create stress.  When we lie, we know that we are not supposed to and that creates stress, and it will manifest itself in some manner, and that is what a trained interviewer is looking to observe. When we observe indicators of deception, how do we deal with it?  How do we get the subject to admit to a wrong-doing when it is not in their best interest to do so?  That is one of the many things that will be addressed in this presentation.  Whether you are a parent dealing with you kids; an employer dealing with employees or and investigation interviewing a suspect, this presentation will provide you with the tools to assist you in finding the truth.

K2's 2023 Understanding Your Ransomware Risk

-

Online

1.00 Credits

Protecting yourself from ransomware requires more than just anti-virus software. Additional technology protections are necessary. Further, business continuity, legal and regulatory, and cybersecurity insurance considerations should all be a part of your risk abatement strategy. Attend this session to determine if your current level of ransomware protection reduces your risk to an acceptable and identify ways to ensure that you are protected.

Modernized Bookkeeping for the CPA

-

Online

1.00 Credits

CPAs get a bad rep regarding bookkeeping services. Walk through how to overhaul your offering by reviewing your client expectations, tech stack, and workflows.

Combatting Sexual Harassment in the Workplace

-

Online

1.00 Credits

This presentation will review what sex harassment is under the law, company compliance obligations, and describe how promoting a positive company culture can prevent sexual harassment in the workplace.   

Navigating Leaves of Absence

-

Online

1.00 Credits

What obligations does an employer have when an employee needs to take a leave of absence? This presentation will provide an overview of the complicated, intertwined compliance obligations triggered when an employee requests a medical leave of absence (including for pregnancy, mental health, or addiction).  

2024 Performance Auditing Made Easy

-

Online

1.50 Credits

Unlike a traditional financial audit objective (Are the financial statements materially misstated), performance auditing can address a wide variety of objectives.  Is this program working? Can it be improved? Where can we save money? How can we operate more efficiently and effectively? Are management’s assertions supported? And so forth.  This session will explain what a performance audit is, describe the applicable standards, and provide examples that indicate the value of a performance audit.  Performance audits can add value to any entity and practitioners can profit from adding these assurance services to their practices.

Data Extraction, Transformation, Validation the Right Data Sources for Analysis

-

Online

2.00 Credits

In this course, we will explore the various types of data - both structured and unstructured - used in conducting fraud risk investigations and proactive monitoring. We will explore the various tools available on the market and techniques to confirm completeness and accuracy of the data before the analysis begins.  The course will cover the process for selecting the right data sources to align with the various risks as well as pitfalls to avoid when preparing the data for analysis. 

Dashboard and Report Design Principles Using Excel

-

Online

4.00 Credits

If you... - Produce or revise dashboards and reports - Find your current reports and dashboards confusing - Are frustrated by the length, complexity and structure of your existing reports - Have many different styles of dashboards and reports in use and want to simplify things - Need to create a consistent “house style” that can be replicated by different teams - Want to look like a star by creating reports and dashboards that your internal customers love ... this workshop can help. In this session we explore the principles of what makes reports and dashboards easy, or hard, to understand, distil this into a simple set of rules and show you how to apply these rules using Excel.

Forensic Data Analytics Supercourse for Fraud Prevention and Detection

-

Online

8.00 Credits

In this five part master series, class participants will gain a comprehensive view into the world of forensic data analytics (FDA). From understanding practical use cases of FDA in the audit, internal audit, investigations and proactive monitoring to understanding necessary data sources, validation proceudres, success factors and pitfalls to avoid. We will also explore hundreds of leading anti-fraud tests around corruption, conflicts of interest, fake vendor schemes, segregation of duties, revenue recognition and sales abuse, among dozens of other schemes.  Participants will develop their own library of anti-fraud tests from various open source locations and apply them in relevant contexts such as the COSO Fraud Risk Management Guide. Finally, participants will also peek into future innovations in FDA and how technologies such as ChatGPT, data visualization, machine learning, AI and cryptocurrencies are all impacting the discipline.  We can't promise you'll be a programmer after this course, but you will certainly be armed with the information needed to project manage an FDA project and "direct" the programmers to accomplish your fraud risk / FDA objectives.  

Mastering The Three Pillars of Cybersecurity: Exploring the Technology Pillar

-

Online

1.00 Credits

Are you  looking to fortify your practice against the ever-growing threats in the digital landscape? Join us for the second installment of our exclusive webinar series, "Mastering Cybersecurity," brought to you by Practice Protect. In today's digitally connected world, the need for comprehensive cybersecurity is paramount. With cyberattacks becoming more sophisticated, it's crucial to stay ahead of the curve in protecting your sensitive client data.  This webinar series is designed to equip CPAs with the knowledge and tools needed to secure their practices and client information effectively.