Breaking the Wall of blind acceptance; avoiding habitual complacency and Yoking the dots between cause and effect.
Common Audit and Financial Reporting Deficiencies in State and Local Governments, is a 2 hour webcast detailing many of the more common mistakes that auditors and accountants are...
Conflict is inevitable whenever you have more than one person working together. But conflict doesn't have to be a bad thing. In fact, it's through conflict that some of the most...
Please join us for an introductory course on the fundamentals of preparing and filing an individual federal income tax return. We will cover topics such as what the federal income...
During this presentation, the most common mistakes made by employee benefit plan auditors, as well as plan sponsors will be identified. Best practices for handling specific issues...
The world of work today has never before faced so many simultaneous changes. From rising turnover and rising employee disengagement to the changing psychology of the workforce, the...
This course explores the increasingly complex features of Excel that facilitate efficient data analysis. We will introduce numerous analytical methods and techniques by using...
Tax practitioners advising their business clients must be fully informed regarding the multiple loss limitation provisions that apply to individuals conducting businesses and pass...
How much can you contribute to a Roth IRA, Roth 401(k), SEP Roth IRA, or SIMPLE Roth IRA? How will a Roth distribution qualify to be tax-free? How did SECURE Act 1.0 and SECURE Act...
This course focuses on the main elements of financial education and will help accounting and finance professionals guide their clients, and their clients' children, through a...
AU-C Section 315 requires the auditor to gain an understanding of the entity and its environment and the entity's internal controls in order to design appropriate audit procedures...
This course will provide overview of key cybersecurity security domains that CPA's should evaluate in an audit. It will provide an overview of each security domain, and an...