Please join us for a discussion on Treasury Circular 230 and other ethical issues faced by enrolled agents and other tax preparers. In addition to covering the practice standards...
Unlike a traditional financial audit objective (Are the financial statements materially misstated), performance auditing can address a wide variety of objectives. Is this program...
In this comprehensive course, practitioners gain a deep understanding of strategic planning considerations and potential hurdles encountered when clients face difficult...
Audit Risk Assessment in Plain English, is a 2 hour webcast highlighting the AICPA’s clarified risk assessment standards, along with a new Statement on Auditing Standard (SAS 145)...
Using Outlook for email management is routine for most business professionals these days. But unfortunately, using this tool for so long may cause some to perpetuate bad practices...
This course corresponds to our Controllership series. This course is dedicated to exploring the traditional controller role and stepping out of the box to identify areas where the...
The Department of Justice updated guidance regarding their evaluations of Corporate Compliance Programs in March 2023: “Prosecutors should assess whether the company’s complaint...
Power Query and Power BI offer great opportunities for accessing your data and making it more useful in reporting scenarios. Learn how to benefit from these tools in this session.
Conflict is inevitable whenever you have more than one person working together. But conflict doesn't have to be a bad thing. In fact, it's through conflict that some of the most...
These are uncertain times. With constant economic fluctuation, geopolitical uncertainty and inflation pressures, corporations and their professionals are facing challenges at every...
Common Audit and Financial Reporting Deficiencies in State and Local Governments, is a 2 hour webcast detailing many of the more common mistakes that auditors and accountants are...
Protecting yourself from ransomware requires more than just anti-virus software. Additional technology protections are necessary. Further, business continuity, legal and regulatory...