This session will focus on the most common types of fraud in the procurement and contracting arena, with a focus on fraud in construction. The session will examine fraud...
Many organizations are successful as they create a system of internal controls, however some fail to properly implement the measures that are established. Moreover, entities...
Artificial intelligence (AI) and ChatGPT are hot topics in the news, but what exactly are they? How might AI enhance your accounting practice? What are some dangers it presents and...
We all make predictions in our personal and professional lives. We base our decisions to marry, buy a house, launch a new product or hire staff on expectations about the future. ...
Unlike a traditional financial audit objective (Are the financial statements materially misstated), performance auditing can address a wide variety of objectives. Is this program...
Enter the complex world of elder planning with this comprehensive course tailored for financial professionals. Gain invaluable insights into estate and financial strategies...
Using Outlook for email management is routine for most business professionals these days. But unfortunately, using this tool for so long may cause some to perpetuate bad practices...
When the leadership in any organizations carries out their responsibilities of establishing, maintaining and monitoring internal controls, it significantly reduces the possibility...
Cloud computing has become a source of cyber-crime. “Cloud forensics is the application of digital forensics in cloud computing as a subset of network forensics to gather and...
There is always too much to do and too little time to do it all. Fortunately, if you know the right ways to manage people, projects and your time, you can get on top of everything...
Specifically designed for preparation, compilation, and review practitioners, this course will provide you with a comprehensive review and hands-on application for performing...
Modern technology solutions have enabled people to operate more effectively from home using cloud-based technologies and services. This course will cover cybersecurity best...