A significant amount of information is electronically initiated, recorded, processed, or reported, and information to be used as audit evidence may be available only in electronic...
Yellow Book and Single Audit engagements are considered must-select engagements for peer review. This course will review the common deficiencies noted by peer reviewers and federal...
Based on an AICPA Enhancing Audit Quality study, 23% of all single audits subject to enhanced oversight were materially non-conforming with professional standards due to failure to...
This is a two-part series that discuss new trends and concepts the financial controller should begin to execute in order to truly become a valued member of the senior leadership...
Excel remains a staple tool for virtually all accounting and financial professionals. In this session learn about many of the newer features in Excel, along with some you may have...
This program addresses the many complex financial and tax accounting issues that are common in S corporation transactions, with discussion of common pitfalls and the new AICPA...
Financial accounting for trusts and estates is one of the least understood branches of accounting. It is not particularly concerned with recording income and expenses but is...
By the nature of our work and training, financial professionals have more personal finance knowledge than the general population. However, sometimes we spend so much time planning...
This course focuses on recent FASB updates with an emphasis on implications for private entities. We will also explore significant elements of the FASB’s technical agenda.
Now more than ever, navigating loss, grief and crisis in the workplace is a skillset that leaders must possess. Keeping the heart in human resources is so important, especially in...
Most professionals routinely use Word, Outlook, and PowerPoint, but many are self-taught and, as a result, have not been exposed to the best features of these three applications...
Network forensics - defined as the investigation of network traffic patterns and data captured in transit between computing devices - can provide insight into the source and extent...