Skip to main content

CPE Catalog

Note

AICPA On-Demand & Self-Study courses take up to 24 hours to process. 

Showing 23768 Webcasts & Webinars Results

Walkin', Talkin', Lookin' & Listenin' - Or Things Most of Us Don't Do Well

-

Online

2.00 Credits

You often can perform an audit in accordance with all of the standards, and still have a substandard audit IF you did not get out among the clients employees (let them know you are there and where you located), talk to as many people as you can regardless as to whether you may think that they may have any helpful information; constantly observe your surrounding where ever you are at (you never now what you might see) and lastly, listen to not only what people are saying to you but are also saying around you. This presentation is designed to illustrate the importance of making yourself available to your client’s employees, let them know that you are there and where you can be found. Talk with them because if there is a problem, somebody knows and they will often tell you all about it IF you just ask them.  Look at your surrounding everywhere you go.  What are you looking for?  I don’t know but I’ll know it when I see it. Lastly, listen to what they have to say.  Every word is important because they may say something that you had not asked about.  Remember, you never want to discover something and go to an individual who you determined knew about it and ask, why didn’t you tell me about this and their response was, you never asked me!

Cash Management: Strategies for Long-Term Success

-

Online

2.00 Credits

Many finance departments spend considerable time managing cash, particularly if the organization is highly leveraged or cash rich.  Many opportunities exist to reduce your financing costs or increase short-term cash returns if you manage cash effectively.  This session will cover a wide variety of day-to-day cash management tools.  

Let's End Business Ethics

-

Online

2.00 Credits

Most ethics courses focus on unethical individuals and their terrible misdeeds. We don't need another course on lessons from Enron or individuals committing fraud. Most unethical failures result from unethical individuals. Instead, this session will focus on how good people can do better, why there is no such thing as business ethics and why we only need one rule to lead ethical lives.

Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)

-

Online

1.60 Credits

This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved. There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software.  

Fraud Unmasked: Understanding and Preventing White-Collar Crime with Dr. Richard G. Brody

-

Online

2.00 Credits

Fraud poses a significant risk to businesses, organizations, and individuals, leading to financial losses, reputational damage, and legal consequences. This comprehensive course, led by Dr. Richard G. Brody, an esteemed expert in forensic accounting and fraud prevention, explores the underlying mechanisms, motivations, and methods of fraudulent behavior. Through real-world case studies, expert analysis, and interactive discussions, participants will gain critical insights into the psychology of fraud, organizational vulnerabilities, and ethical breakdowns that enable misconduct. The course equips attendees with the latest fraud detection techniques, risk assessment strategies, and internal control best practices to proactively identify and mitigate fraud risks while fostering a culture of integrity and accountability.

Profitability Pricing: Boost your Bottom Line

-

Online

2.00 Credits

Two seemingly similar products can have very different costs, yet many companies are completely oblivious to these differences causing them to lose money or competitive bids.  When companies compete, those with good information win the “gravy” contracts and those with bad information lose money on “dog” jobs.  Attend this session to gain insights on how to win bids for the best opportunities and give the money-losers to your competitors.  Achieve your target profitability in the process.  

K2's AI - Security And Privacy Issues

-

Online

1.00 Credits

Security and privacy issues must be top-of-mind concerns for business professionals using AI. Yet, for far too many of these K2’s AI – Security And Privacy Issues professionals, no concern is given for the potential security and privacy risks associated with AI, setting the stage for potentially disastrous results! In this session, you will learn about AI security and privacy risks and how to manage them. This session includes discussions of the major AI companies’ security and privacy policies, how AI platforms might use your data, and how you can stay in control. Given how quickly AI is spreading, this is one session you simply cannot afford to miss.

K2's The ABCs of Automation With Microsoft's Power Platform

-

Online

2.00 Credits

Automation and standardization are two of the keys to productivity, but most people who are not programmers are unsure where to start. Microsoft’s Power Platform is a comprehensive platform for creating automated workflows, integrations, and data-driven reports. Components include Power BI, Power Apps, Power Automate, Power Pages, and Power Virtual Agents. Attend this session to learn about this platform and how everyone can use its low-code, no-code environment to solve process challenges.

Building Your Personal Net Worth: Invest in Your Future

-

Online

2.00 Credits

By the nature of our work and training, financial professionals have more personal finance knowledge than the general population. However, sometimes we spend so much time planning our company's future that we neglect or defer taking steps to build our own personal net worth. If you are dissatisfied about the speed that you are accumulating savings, this session will help put you on the right track. Even if you are meeting your goals, this session will provide insights and ideas which will add to and reinforce what you may already be doing.

Why Auditors Fail To Detect Fraud

-

Online

2.00 Credits

Prior to the original SAS No. 82 on Consideration of Fraud In A Financial Statement Audit (now codified as SAS No. 122, AU 240), the word fraud never appeared in a single SAS, nor was it described anywhere.  SAS No. 82 stated that auditors failed to detect fraud for two reasons:  1) They did not know what it looked like and 2) They had not been trained to look for it.  Although the SASs did not provide any guidance, auditors have always been responsible for the detection of anything that would cause a material misstatement of the financial statements whether caused by error or irregularities.  (They would not even say the word fraud until it appeared in SAS No. 82) The standards were replete with guidance on the detection of an error but silent on how to detect irregularities.  Now auditors are required to document in every financial statement audit their process of determining the risk of financial misstatement due to fraud. This presentation is designed to focus on frauds that were missed by the auditors and, in some cases, why it was missed.  There will also be discussion as to what the auditor must do in order to improve their track record on detecting fraud.  As reported on the Association of Certified Fraud Examiners Occupational Fraud 2022: A Report to the Nations, only 4% of frauds were initially discovered by the external auditor.  It was reported that more frauds were discovered by accident, (5%) then was discovered by the external auditor.

Better Forecasts: Be a Better Predictor

-

Online

2.00 Credits

Imagine being able to see into the future with confidence. The ability to be a great forecaster is not innate but learned. By examining great forecasters, we can learn to improve our ability to predict the future. We will examine best practices and current research to improve our ability to predict events that will affect our business.  

CPAs and Addictions: Finding Hope and Healing

-

Online

2.00 Credits

Substance abuse and mental health issues among CPAs has become of great concern among many state boards and the AICPA in recent years. This program will cover the factors that push CPAs to unhealthy behaviors, the prevalence of drug and alcohol abuse, and possible options in addressing the situation.  We will also discuss steps that friends and family can take to support their struggling CPA find hope and healing.

Communicate Financial Concepts to Non-Accountants

-

Online

2.00 Credits

Do you ever get blank looks when you present your company's financial statements?  Does your board nod knowingly, during your presentation, but never seem to have any meaningful questions?  It could be that they have no idea what you are talking about and are just pretending to understand!  Learn how to connect with your CEO, board, fellow managers, and ordinary employees so they understand your message.

Critical "Soft" Skills for CFOs and Controllers

-

Online

4.00 Credits

Accounting and finance managers and executives must demonstrate sound soft skills necessary for personal growth and organizational success.  This course will provide insights into the most crtical  personal skills critical for CFOs and Controllers - or those that want to be!

Estate Planning for Today and Beyond

-

Online

8.00 Credits

Estate planning continues to evolve, and staying informed about the latest trends and strategies is crucial for professionals in the field. This forward-looking course delves into the intricacies of estate planning, with a specific focus on current issues. Participants will explore cutting-edge techniques, emerging legal considerations, and industry developments to ensure they are equipped with the knowledge and skills to create effective estate plans that withstand the test of time and safeguard their clients' legacies. *Please Note:  If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Handouts Tab and submit to kori.herrera@acpen.com  

Everyday Ethics: Ethics is Everywhere, All the Time! featuring Richard A. Karwic and Don Minges

-

Online

1.00 Credits

Ethical situations occur more often than many realize. We must stay vigilant. Sometimes a seemingly simple situation may seem innocuous at first, but it can lead to large complications in the near future. In today’s competitive environment, one error posted on social media can damage a reputation forever. Social media posts can cause havoc. 

Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 1

-

Online

1.00 Credits

This course is a continuation of our series on preparing to become a forensic accountant. Within this segment we focus on elements of computer forensics. This session is designed to delve into further investigative procedures used in computer forensics.  

The Role of Internal Audit in Enterprise-Wide Risk Management

-

Online

8.00 Credits

Those charged with governance, with the assistance of internal audit,  are responsible for overseeing the strategic direction of the organization, and ensuring value is delivered to the entity's stakeholders. This course will provide guidance on fulfilling the responsibility for challenging how much risk and uncertainty to accept through the application of COSO's Enterprise Risk Management Framework.

There is NO Such Thing as `Business Ethics' featuring John Levy and Don Minges

-

Online

1.00 Credits

What happens when businesspeople think they can lie and cheat at work, as long as it makes a profit? Some believe that business is like war, and there are no rules!  Do you really want to behave differently in business than in your personal life? Can, or should, ethics be ‘switched on’ or off?

Navigating Leaves of Absence

-

Online

1.00 Credits

What obligations does an employer have when an employee needs to take a leave of absence? This presentation will provide an overview of the complicated, intertwined compliance obligations triggered when an employee requests a medical leave of absence (including for pregnancy, mental health, or addiction).  

SunMonTueWedThuFriSat
123456789101112131415161718192021222324252627282930123456789101112