U.S. Department of Treasury’s Financial Crimes Enforcement Network (FinCEN) imposed a new reporting requirement that went into effect on January 1, 2024. Millions of businesses...
This session describes a state agency's quality review of a not-for-profit organization's A-133 Single Audit. The case study describes the organization audited, its federally- and...
This is a two-part series that discuss new trends and concepts the financial controller should begin to execute in order to truly become a valued member of the senior leadership...
Imagine being able to see into the future with confidence. The ability to be a great forecaster is not innate but learned. By examining great forecasters, we can learn to improve...
Based on an AICPA Enhancing Audit Quality study, 23% of all single audits subject to enhanced oversight were materially non-conforming with professional standards due to failure to...
This course corresponds to our Controllership series.Within this course, we specifically address the Controllers role and pro-active potentials in organization Strategic and Annual...
The AICPA has determined that one in ten audit firms are not compliant with the risk assessment standards. This course will discuss how to properly identify risks and assess risk...
Power Query and Power BI offer great opportunities for accessing your data and making it more useful in reporting scenarios. Learn how to benefit from these tools in this session.
This workshop explores how each of us can play a part in helping to make the world a more fair and gentler place. This one-hour webinar includes an overview of Aristotle's virtue...
The well-informed tax practitioner will want to attend this two hour program in order to stay current on recent updates on partnership tax! Content includes recent court decisions...
Your home is now the digital center of your world, and even if you go to an office every day, you have more options to help you manage everything from shopping lists to email...
Network forensics - defined as the investigation of network traffic patterns and data captured in transit between computing devices - can provide insight into the source and extent...