As reported in the Association of Certified Fraud Examiners Occupational Fraud 2022: A Report to the Nations, on average, small businesses lose 5% of their revenue due to fraud. ...
In trying to achieve life balance, various internal and external obstacles arise. In this course we will look at these obstacles and provide specific ways to overcome them. In...
Is your tech stack aligned with your organizational goals? Is there duplication among software titles? Is your hardware where it needs to be? Get answers to these and other...
This workshop explores how each of us can play a part in helping to make the world a more fair and gentler place. This one-hour webinar includes an overview of Aristotle's virtue...
OneNote is a fantastic application included in your Microsoft 365 subscription. Yet, it is underutilized and misunderstood most of the time. If you genuinely want to change how you...
Following on Part 1 of this course, in Part 2 you will learn advanced ways to solve problems without bruising egos, how to create profound trust quickly, and how to motivate...
This is a two-part series that discuss new trends and concepts the financial controller should begin to execute in order to truly become a valued member of the senior leadership...
'Whether your organization is developing a new control framework or seeking to strengthen its current controls; practical development and implementation is critical. This course...
This course will serve as an introduction to conducting effective walkthroughs to gain an understanding of the client's transaction processes as well as identify internal controls...
This is a two-part series that discuss new trends and concepts the financial controller should begin to execute in order to truly become a valued member of the senior leadership...
This course corresponds to our Controllership series.Within this course, we specifically address the Controllers role and pro-active potentials in organization Strategic and Annual...
Network forensics - defined as the investigation of network traffic patterns and data captured in transit between computing devices - can provide insight into the source and extent...