Skip to main content

WICPA CPE & Special Event Catalog

Showing 961-980 of 3149 Results (Page 49 of 158)

How Technology Controls Should Be Developed & Implemented 26-27

-

Online

8.00 Credits

Member Price: $329

This webinar gives CPAs a practical look at designing, implementing and maintaining effective internal controls. While many organizations are able to build a solid control framework, too often, the execution falls short'especially when it comes to testing, monitoring and keeping controls up to date. That weakens the entire structure. We'll walk through proven strategies to ensure controls aren't just created, but successfully embedded into day-to-day operations. You'll receive a set of customizable checklists to help maintain and improve your organization's policies and procedures. Most importantly, you'll develop a deeper understanding of why internal controls must evolve alongside changes in business tools and processes'and how to keep yours responsive, relevant and effective.

K2's Excel PivotTables For Accountants 26-27

-

Online

8.00 Credits

Member Price: $329

Isn't it time you learned about PivotTables — Excel's best feature" If so, participate in this session to learn PivotTables from A to Z to take full advantage of this terrific tool's many benefits.

KPI Bootcamp for Small Businesses

-

Online

5.00 Credits

Member Price: $159

Running or advising a small business? The KPI Bootcamp can help you rapidly identify and implement the right KPIs to achieve your or your client's goals. Delivered by Bernie Smith, KPI specialist and seasoned entrepreneur, this course will guide you through selecting a powerful set of measures tailored to your business. The structured approach helps you refine your objectives and choose KPIs that drive growth and profitability. The program includes access to over 400 pre-defined KPIs, each with a clear, jargon-free definition, business benefits, real-world examples and practical implementation tips.

Tax Power Ethics for Tax Professionals

-

Online

2.00 Credits

Member Price: $79

Award winning discussion leader, former state accountancy board chair and lifelong tax practitioner Mark Hugh will review ethics for tax professionals: the AICPA Code of Professional Conduct and interpretations; the Statements on Standards for Tax Services; tax preparer standards in the Internal Revenue Code; the rules for practice with and before the IRS, including IRS Circular 230; new developments; and discuss examples of best practices and case studies.

The Head & Heart of Ethics: Featuring Bob Mims & Don Minges

-

Online

1.00 Credits

Member Price: $39

There are multiple facets to ethical choices, including should you use your `head' or your `heart'? What are the pros and the cons? How can we balance these opposing views? This seminar outlines the value of; trust, courage, fairness, sensitivity, persistence, honesty and gracefulness: to help us make better ethical decisions.Note: This course qualifies to count toward the WICPA membership Ethics CPE requirement.

Like-Kind Exchanges

-

Online

2.20 Credits

Member Price: $79

Please join us for a discussion on like-kind exchanges (LKE), known as one of the last great tax legal "shelters" available to those buying and selling real property. We will be covering the basic structure of a LKE and ways a taxpayer can utilize qualified third party intermediaries (QI), tenancy-in-common structures including Delaware Statutory Trusts (DST). We will also explore creative solutions to sticky situations a taxpayer may find itself in obtaining replacement property. **Please Note: If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Course Materials Tab and submit to kori.herrera@acpen.com

Are You Ready for Your Peer Review?

-

Online

3.00 Credits

Member Price: $109

Be ready for your peer review! The peer review process is an effective way to monitor practice quality, ensuring that your firm meets high standards while protecting the public interest. Gain a better understanding of the overall peer review process and learn how to fully prepare for your triennial review. This webcast will help you: Understand and compare the system and engagement review processes Address recently issued peer review guidance and quality control requirements Learn how both guidance and requirements affect your firm You'll also discover the most common areas of noncompliance with professional standards and how to avoid them well before your review is due. Participants will leave this session with the resources and tools to enhance their firm's peer review quality.

Understand Yours & Other People's Styles: Meet Them in the Middle & Be More Effective in Generating Great Results!

-

Online

1.00 Credits

Member Price: $39

Understanding your own and the people style of others whom you are dealing with which can establish rapport more easily, help you become more persuasive and avoid miscommunication with the possibility of rubbing someone the wrong way. In our session, you will gain insights into your people style, ways to improve communication connectivity and how to understand your team's functionality (or more likely dysfunctionality).

Annual Update for Not-for-Profit Accountants & Auditors 2025

-

Online

6.00 Credits

Member Price: $189

Stay ahead of the curve with this essential training designed for not-for-profit accountants and auditors. This course provides a comprehensive update on the latest developments impacting nonprofit financial reporting and auditing. On the accounting side, we will review the latest FASB standard-setting activities affecting NFPs, including programmatic investments and their interplay with the CECL standard. Additionally, we will explore the IFR4NPO project, a global initiative aimed at establishing universal financial reporting standards for nonprofits. Transitioning to auditing, this course covers the 2024 Yellow Book updates, the shift from quality control to quality management and key audit matters with early adoption options. We'll also address Single Audit updates, GAO reports on improper payments and fraud, the Financial Data Transparency Act (FDTA) and recent Department of Education guidance on related parties.

Ethical Situations: What to do When?, featuring Allison McLeod & Don Minges

-

Online

1.00 Credits

Member Price: $39

What would you do when ___? Is would the same as should? Examples; Rashmi Airan-Pace and Yale Law School. What should you do when a vendor offers to give you tickets to the NCAA Final Four basketball tournament and your organization will permit it? Prepare for `situations' before they happen to you.Note: This course qualifies to count toward the WICPA membership Ethics CPE requirement.

Fraud Risk Management

-

Online

2.00 Credits

Member Price: $79

The ACFE/COSO Fraud Risk Management Guide (FRMG) was published in 2016 (and updated in 2023). It has quickly gained acceptance as the set of best practices for preventing, detecting and thus deterring fraud. The fraud landscape is constantly changing and evolving. The FRMG sets out a rigorous set of principles and leading practices for managing fraud risk for forward-thinking organizations to follow. It covers: How to establish fraud risk management governance. How to conduct rigorous fraud risk assessments. How to design and implement fraud control activities. How to establish reporting mechanisms and investigative procedures. How to monitor the overall fraud risk management program. Fraud risk can be managed. All anti-fraud and accountability professionals will benefit from this session's focus on effective fraud risk management.

Quality Management: My System is Set Up -- Now What?

-

Online

2.00 Credits

Member Price: $89

With the design and implementation of your firm's system of quality management complete, the firm now focuses on operating, maintaining, and continuously improving that system. This webcast explores the ongoing post-implementation requirements of SQMS No. 1, including: Understanding engagement performance responsibilities Performing and documenting monitoring activities Identifying and evaluating findings and deficiencies Implementing, evaluating, and tracking remediation Conducting the required annual evaluation of the system and periodic performance evaluations of those assigned ultimate and operational responsibility for the system Learn how to keep your firm's system responsive, current, and effective in maintaining and promoting quality.

LLC's & S Corps: A Comparative Analysis

-

Online

4.50 Credits

Member Price: $129

This course provides an in-depth comparative analysis of Limited Liability Companies (LLCs) and S Corporations, focusing on their tax implications, compliance requirements and operational structures. Participants will explore key aspects of entity formation, tax treatment and compliance with corporate formalities. Topics include electing Subchapter S status, mechanics of Form 2553 and relief options for late filings under Rev. Proc. 2022-19. The course also highlights entity-specific tax forms, accountable plans, taxable fringe benefits, officer reasonable compensation, estate planning, business continuation planning and audit strategies. Additionally, participants will review Schedules K-1, K-2, K-3 and effectively connected income for both entity types. *Please Note: If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Course Materials Tab and submit to kori.herrera@acpen.com

Spring Tax Update for Business With Steve Dilley

-

Online

4.00 Credits

Member Price: $129

This program provides an update to the latest tax developments, rules and regulations impacting and business taxpayers, with a review and integration of 2024/25 legislation. *Please Note: If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Course Materials Tab and submit to kori.herrera@acpen.com

Preparing to be a Forensic Accountant: Focus on Computer Forensics: Part II (Cryptology)

-

Online

1.00 Credits

Member Price: $39

This is a continuing part of our series on forensic accounting. Within this segment we discuss the concepts that are part of computer forensics known as cryptology. The term cryptography is from Ancient Greek and means "hidden secret". It is the practice and study of techniques for secure communications in the presence of adversarial behavior. Cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Cryptography starts with secrets. Various aspects in information security such as data confidentiality, data integrity, authentication and non-repudiation (where a statement's author cannot successfully dispute its authorship) are central to modern cryptography.

Dashboard & Report Design Principles Using Excel

-

Online

4.00 Credits

Member Price: $129

Transform your data presentation skills with our comprehensive course on creating impactful dashboards and reports using Excel. This workshop is tailored for professionals who: Regularly produce or update dashboards and reports Struggle with confusing or overly complex reporting tools Seek to streamline varied reporting styles across their organization Aim to establish a consistent, replicable "house style" for reporting Want to impress stakeholders with clear, user-friendly data presentations Through a combination of theory and hands-on practice, you'll learn the fundamental principles that make reports and dashboards easy to understand. We'll distill these concepts into a set of practical rules and guide you through their application in Excel.

Avoiding Legal Liability & Peer Review Deficiencies in Nonaudit Services, Including Bookkeeping & Preparing Financial Statements

-

Online

4.00 Credits

Member Price: $129

The majority of peer review deficiencies and malpractice claims result from nonaudit services. This course will provide best practices for avoiding legal liability and quality control concerns.

Walkin', Talkin', Lookin' & Listenin' or Things Most of Us Don't Do Well

-

Online

2.00 Credits

Member Price: $79

You often can perform an audit in accordance with all of the standards and still have a substandard audit IF you did not get out among the clients employees (let them know you are there and where you located), talk to as many people as you can regardless as to whether you may think that they may have any helpful information; constantly observe your surrounding where ever you are at (you never now what you might see) and lastly, listen to not only what people are saying to you but are also saying around you. This presentation is designed to illustrate the importance of making yourself available to your client's employees, let them know that you are there and where you can be found. Talk with them because if there is a problem, somebody knows and they will often tell you all about it IF you just ask them. Look at your surrounding everywhere you go. What are you looking for? I don't know but I'll know it when I see it. Lastly, listen to what they have to say. Every word is important because they may say something that you had not asked about. Remember, you never want to discover something and go to an individual who you determined knew about it and ask, why didn't you tell me about this and their response was, you never asked me!

Cash Management: Strategies for Long-Term Success

-

Online

2.00 Credits

Member Price: $79

Many finance departments spend considerable time managing cash, particularly if the organization is highly leveraged or cash rich. Many opportunities exist to reduce your financing costs or increase short-term cash returns if you manage cash effectively. This session will cover a wide variety of day-to-day cash management tools.

Preparing to be a Forensic Accountant: Focus on Computer Forensics: Part III (Steganography)

-

Online

1.60 Credits

Member Price: $59

This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it's no surprise that numerous methods of protecting that data have evolved. There are various types of steganography: Text Steganography: Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography: Process of hiding text in an image without distorting the picture. Video Steganography: Technique to hide any kind of files into a cover video file. Audio Steganography: The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography: The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software.