The Accountant role is evolving from data aggregation to knowledge extraction, with a significant emphasis on understanding and leveraging technological advancements. In this era...
Fraud continues to plague businesses at epidemic levels, and technology control failures are a significant reason fraud occurs. Using a case study approach, in this session, you...
The AICPA has determined that one in ten audit firms are not compliant with the risk assessment standards. This course will discuss how to properly identify risks and assess risk...
Small businesses have better options now than ever before in the market of accounting solutions. Participate in this session to learn more about these options and which might be...
By 2025, millennials will represent 75% of the workforce. Whether you are an owner of a small practice or manager in a multinational corporation, it is important to understand...
There is always too much to do and too little time to do it all. Fortunately, if you know the right ways to manage people, projects and your time, you can get on top of everything...
Based on an AICPA Enhancing Audit Quality study, 23% of all single audits subject to enhanced oversight were materially non-conforming with professional standards due to failure to...
OneNote is rapidly becoming one of the most popular applications in the Microsoft Office and Office 365 product suites. The reason for this becomes pretty evident when you learn...
If you are familiar with the Office 365 Teams app, you know it is an extremely powerful tool to transform the way you communicate, collaborate and share knowledge. What you may not...
Seismic changes in tax legislation is currently taking place, and the well-informed tax practitioner will want to attend this two hour monthly program in order to stay abreast of...
Trusts are old entities and go as far back as the Crusades when we were an agrarian society, and the only asset of any value was the land and what was produced on the land...
The greatest cybersecurity risks your organization faces are breaches due to accidental, negligent or malicious activities of an organizational insider. Together, these represent...