CPE Catalog
Note
AICPA On-Demand & Self-Study courses take up to 24 hours to process.
Managing Your Money in Retirement
-
Online
3.00 Credits
You spent your life building retirement savings. Now you want to make sure your savings last the rest of your life and perhaps pass some on to the next generation. Come hear a veteran financial educator talk about money management and planning issues for this phase of your life.
A Culture of Regulatory Ethics: A Competitive Advantage
-
Online
4.00 Credits
In a competitive market, every company is looking for anyway to differentiate themselves from their competition. While we often look to new markets and data for a competitive advantage, ethics can be the factor that makes the biggest difference to customers, employees, and the public at large. Using surveys, research, case studies, and examples, this course will explore why the CPA credential and the AICPA Code of Professional Conduct is so different. We will discuss why CPA's are in a unique position of trust and how this can put their companies ahead. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
Internal Controls Over Compliance vs Compliance
-
Online
1.00 Credits
Accurately identifying and testing controls over compliance is critical, yet it remains a common deficiency highlighted in peer reviews. This course offers a comprehensive overview of internal controls over compliance, with a focus on their application to Single Audits. Participants will learn how to effectively align internal controls with specific compliance requirements. Additionally, we will address one of the most frequent findings in audits of governmental entities receiving federal grants: the misidentification of controls and the confusion between compliance and control processes. This course will help clarify the distinction, equipping you with the tools to enhance audit quality and ensure compliance effectiveness. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
Was It Fraud or Just Poor Audit Quality?
-
Online
1.60 Credits
This session describes a state agency's quality review of a not-for-profit organization's A-133 Single Audit. The case study describes the organization audited, its federally- and state-funded programs, and the CPA firm retained to do the audit. Various anomalies in the financial statements alerted state officials to potential problems, and a detailed quality review followed. Find out how the entity turned hundreds of thousands of dollars in bank overdrafts into hundreds of thousands of dollars of cash on its balance sheet. Explore other “creative” ways to deal with fixed assets, accounts receivable, and related-party transactions. Were the auditors just sloppy, ignorant, negligent? Or were they active participants in producing fraudulent financial statements? You be the judge.
The Controllership Series - The Controller's Skillset
-
Online
1.00 Credits
This another course in our series on the controllership function. The controller's role encompasses many traditional responsibilities. The breadth and depth of the controller skill set has expanded and will continue to expand as the business world evolves. The controller position will typically lead teams of financial and accounting experts. Recognizing that leadership and team management skills are must-haves; they need to be able to command their team's respect, inspire them to act, and ensure that such actions are aligned with your organization's overall vision. These skills, along with tactical knowledge will ensure the controller's success.
Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)
-
Online
1.60 Credits
This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved. There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software.
Fraud Unmasked: Understanding and Preventing White-Collar Crime with Dr. Richard G. Brody
-
Online
2.00 Credits
Fraud poses a significant risk to businesses, organizations, and individuals, leading to financial losses, reputational damage, and legal consequences. This comprehensive course, led by Dr. Richard G. Brody, an esteemed expert in forensic accounting and fraud prevention, explores the underlying mechanisms, motivations, and methods of fraudulent behavior. Through real-world case studies, expert analysis, and interactive discussions, participants will gain critical insights into the psychology of fraud, organizational vulnerabilities, and ethical breakdowns that enable misconduct. The course equips attendees with the latest fraud detection techniques, risk assessment strategies, and internal control best practices to proactively identify and mitigate fraud risks while fostering a culture of integrity and accountability.
Hot Topics Audit & Attest Update - 2026
-
Online
2.00 Credits
Many public accountants desire to have a quick overview of only the most current changes to professional and ethical requirements. This course will provide an executive summary of the major changes in audit and other attest requirements. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
Taxation of Business Entities
-
Online
2.50 Credits
This course will introduce you the different types of business entities and the tax implications of contributions, distributions and earnings, among other topics. **Please Note: If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Course Materials Tab and submit to kori.herrera@acpen.com
Entertainment, Meals & Travel Expenses: Review and Update
-
Online
2.00 Credits
This program reviews the statutory and regulatory guidance as they relate to fringe benefits. There will be an emphasis on entertainment, meals and business transportation expenses, including qualified employer-provided parking, with a focus on planning opportunities. Recent federal tax legislation, cases and rulings will also be addressed. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
Improve Spreadsheets by Building Controls in Excel
-
Online
2.00 Credits
In today's data-driven world, spreadsheets serve as the backbone of business and personal productivity. However, creating complex and error-prone spreadsheets can lead to critical mistakes and inefficiencies. This course aims to equip you with the knowledge and tools to build robust spreadsheets, implementing a range of controls and safeguards to ensure data integrity, streamline processes, and maximize accuracy. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
Why Auditors Fail To Detect Fraud
-
Online
2.00 Credits
Prior to the original SAS No. 82 on Consideration of Fraud In A Financial Statement Audit (now codified as SAS No. 122, AU 240), the word fraud never appeared in a single SAS, nor was it described anywhere. SAS No. 82 stated that auditors failed to detect fraud for two reasons: 1) They did not know what it looked like and 2) They had not been trained to look for it. Although the SASs did not provide any guidance, auditors have always been responsible for the detection of anything that would cause a material misstatement of the financial statements whether caused by error or irregularities. (They would not even say the word fraud until it appeared in SAS No. 82) The standards were replete with guidance on the detection of an error but silent on how to detect irregularities. Now auditors are required to document in every financial statement audit their process of determining the risk of financial misstatement due to fraud. This presentation is designed to focus on frauds that were missed by the auditors and, in some cases, why it was missed. There will also be discussion as to what the auditor must do in order to improve their track record on detecting fraud. As reported on the Association of Certified Fraud Examiners Occupational Fraud 2022: A Report to the Nations, only 4% of frauds were initially discovered by the external auditor. It was reported that more frauds were discovered by accident, (5%) then was discovered by the external auditor.
ChatGPT and Advanced Financial Analysis for Accountants
-
Online
2.00 Credits
This course provides a concise overview of how to utilize ChatGPT for advanced financial analysis in accounting. The session reveals how to combine sophisticated evaluation and interpretation of financial data with the cutting-edge AI capabilities of ChatGPT. Aimed at enhancing the understanding of an entity's performance, predicting future financial health, and aiding in informed business decision-making, this course goes beyond basic financial statement analysis to include a wide array of techniques and tools. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
Profiles in Fraud
-
Online
2.00 Credits
Nobody is immune to fraud risk. This course opens with stories of real fraud perpetrators then examines the similarities between the fraud perpetrators, discovering that they all have many common traits. It finishes with techniques accountants can use to deter these behaviors. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
Tax Implications of Retirement Plan Distributions
-
Online
1.00 Credits
This session will address the complex rules of retirement distributions, review key provisions of the SECURE Act 2.0, and provide practical strategies of maximizing tax benefits for your client. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 1
-
Online
1.00 Credits
This course is a continuation of our series on preparing to become a forensic accountant. Within this segment we focus on elements of computer forensics. This session is designed to delve into further investigative procedures used in computer forensics.
Preparing to be a Forensic Accountant - Focus on Digital Forensics
-
Online
1.80 Credits
Forensic accounting, forensic accountancy or financial forensics is the specialty practice area of accounting that investigates whether firms engage in financial reporting misconduct. Forensic accountants apply a range of skills and methods to determine whether there has been financial reporting misconduct. Financial forensic engagements may fall into several categories. For example: Economic damages calculations, whether suffered through tort or breach of contract. Post-acquisition disputes such as earnouts or breaches of warranties Bankruptcy, insolvency and reorganization Securities and tax fraud Money laundering Business valuation Computer forensics/e-discovery This session is designed to delve into further investigative procedures used including digital forensics. Future sessions will focus on computer forensics, network forensics and mobile forensics.
Behavioral Finance Biases
-
Online
1.00 Credits
If you have been a practitioner for any length of time, you know that there is often a difference between what clients should do and what they actually do. Have you ever wondered why that is? In this course, we will explore how we make decisions with less-than-perfect information. Through real-life examples and case studies, we will examine common behavioral biases and how to deal with them. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
Global Internal Audit Standards (GIAS) Domain III - Part 2
-
Online
2.00 Credits
The new Standards emphasize that quality performance requires conformance to the Standards. Each standard within Domain III specifically identifies the responsibilities of the CAE and the board, as well as joint responsibilities. The new Global Internal Audit Standards were released on January 9, 2024, and will become effective January 9, 2025. The previous version, the International Standards for the Professional Practice of Internal Auditing, released in 2017, remains approved for use during a one-year transition period. The Global Internal Audit Standards guide the worldwide professional practice of internal audit. They serve as a basis for evaluating and elevating the quality of the internal audit function. The Standards use 15 guiding principles with five separate domains that enable effective internal audit implementation and examples of evidence of conformance. The Global Standards are organized into five domains. Domain I: Purpose of Internal Auditing Domain II: Ethics and Professionalism Domain III: Governing the Internal Audit Function Domain IV: Managing the Internal Audit Function Domain V: Performing Internal Audit Service
Internal Control Changes for Remote Workers
-
Online
2.00 Credits
For the past two decades the trend has been to move away from brick and mortar offices and have a greater number of people work or telecommute from home. Because of the upheaval caused by recent events, the rate of this move has been accelerated. This has and will continue to create control challenges and organizations must work to address these. Such things as moving from time based employee value to task completion based measurement and the ability to drive needed inter-company communication are just a sample of the issues with which entities must contend. This session looks at the benefits and pitfalls of workers that telecommute. It then discusses important risks and controls to consider as this trend continues and evolves in the business world. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.