CPE Catalog
Note
AICPA On-Demand & Self-Study courses take up to 24 hours to process.
Smarter Tax Services with Artificial Intelligence (AI) Tools
-
Online
2.00 Credits
There has never been a greater opportunity to leverage technology tools to automate your tax services. This course will provide specific examples of how you can use AI (artificial intelligence) based tools to complement your tax planning, research and compliance services. You will learn how to leverage AI to automate the collection and organization of client data, the engagement management process, tax research, and enhance client advisory services with AI too This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
Surgent's IT Governance and Risk Management
-
Online
2.00 Credits
This course covers the key components of IT governance and risk management through interactive discussions and hands-on activities. By the end of the course, participants will have a thorough understanding of the function of IT governance within an organization, including roles and responsibilities and key frameworks. In addition, participants will learn about IT risk identification and assessment methods and IT general and application controls. Business process management and change management will also be discussed.
ACPEN: World-Class Cost Accounting: A Practical Application Part 2
-
Online
4.00 Credits
Enhance your career with an invaluable skill set in cost accounting. This program presents a comprehensive cost system based on a real company, guiding you through the accurate classification of manufacturing overhead costs. Learn to distinguish between true variable and fluctuating variable costs, identify fixed overhead costs that are direct or directly assignable, and account for variances from standard costs. In this model, all manufacturing overhead costs are fully traced to products, providing practical insights you can apply directly in the workplace. It's highly recommended to take Part 1 before Part 2 as several foundational principles in Part 1 carry forward throughout Part 2. Presented by: Craig SobreroType: Live Webcast Replay
How SAS Nos. 134-145 Improve Risk-Based Audits
-
Online
4.00 Credits
Recent generally accepted auditing standards were written to improve the quality of risk-based financial statement audits, audit reporting, and required by-product communications. This course will discuss the important clarifications and enhancements intended to improve audit quality to ensure better compliance with requirements contained in SAS Nos. 134-145. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
AI & Accounting in Retail
-
Online
2.00 Credits
This course provides a concise overview of how artificial intelligence (AI) is transforming financial strategies, tax compliance, and audit practices in the global retail industry. As retailers deploy AI to personalize customer experiences, automate inventory, and optimize pricing, accounting professionals must adapt to new challenges in data integrity, regulatory compliance, and financial reporting. Drawing on real-world case studies from retail giants and small businesses alike, this course explores how AI technologies intersect with accounting workflows and outlines strategies to maintain accuracy, trust, and control in an AI-driven marketplace. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
ACPEN: Assessing the Real Ethics of an Organization?, featuring Joe Oringel, MBA, CPA, CIA and Don Minges, MBA
-
Online
1.00 Credits
Every organization claims to be ethical, but words and deeds do not always jibe. How do you assess the real Ethics of an organization? What are the key factors and behaviors to be aware of? Many organizations lack prescriptive policies, but is that an excuse to deviate from the spirit of doing the right thing? How can professionals abuse ‘what is right’ and circumvent policies for their personal benefit. What are some egregious examples of violating policies? How allowing exceptions invites abuse. This seminar outlines steps to gauge the ethics of an organization. Presented by: Joe Oringel, Don MingesType: Live Webcast Replay
ACPEN: Preparing to be a Forensic Accountant - Focus on Network Forensics
-
Online
1.50 Credits
Network forensics - defined as the investigation of network traffic patterns and data captured in transit between computing devices - can provide insight into the source and extent of an attack. It is used in forensic accounting and with the expansion of information technology it has become a growing field. Network forensics is a relatively new field of forensic science. Computing has become network centric. Data is now available outside of disk-based digital evidence. Network forensics can be performed as a standalone investigation or alongside a computer forensics analysis. When used alongside a computer forensic analysis it is used to reveal links between digital devices or reconstruct how a crime was committed. Network investigations deal with volatile and dynamic information and is a sub-branch of digital forensics. It relates to the monitoring and analysis of computer network traffic for information gathering, legal evidence, or intrusion detection. This course is a complement to our other courses in the series on becoming a forensic accountant. Presented by: Lynn FountainType: Live Webcast Replay
ACPEN: The Controllership Series - Sales, Collections and Customer Credit
-
Online
1.50 Credits
Why do for profit organizations exist" To make money!!!!! What a great concept. But if the organization does not have the proper collections and credit procedures in place, they may not be able to access that money. Hence the importance of the credit and collection process.Credit and collections are critical areas for the financial statement controllers. Customer credit is a form of payment that allows small business customers to purchase a product or service before paying for it in full. The process works similarly to the way a credit card does - you procure something and pay it back later. Collections is a term used by a business when referring to money owed to that business by a customer. When a customer does not pay within the terms specified, the amount of the bill becomes past due and is sometimes submitted to a collection agency. The sales and collection process includes business activities related to selling products and services, maintaining customer records, billing customers, and recording payments from customers. It also includes activities necessary to manage accounts receivable, such as aging accounts and authorizing credit. This course delves into the topics that impact the sales, credit and collections process for management. We discuss strategic steps management can take to ensure their processes are efficient and that they are able to actually collect their revenue. Presented by: Lynn FountainType: Live Webcast Replay
ACPEN: K2’s Data Security And Privacy Issues And Solutions
-
Online
2.00 Credits
Data security and privacy issues persist as a significant concern for businesses of all sizes. No matter where you look, the numbers are bad - really bad! But that doesn't mean you can't take steps to reduce these risks. In this session, you will learn about the key security and privacy risks facing businesses today and the steps you can take to mitigate these risks. This session begins with a review of how cybercriminals target businesses of all sizes and the associated costs of these attacks. From there, you will progress to discussions of practical tools, policies, and other solutions that can be used to mitigate cybersecurity risks to prudently acceptable levels. This is a "must-see" session for all concerned about data security and how to mitigate threats to sensitive and confidential data. Presented by: Thomas StephensType: Live Webcast Replay
ACPEN: Internal Control Fundamentals
-
Online
2.00 Credits
AU-C Section 315 requires the auditor to gain an understanding of the entity and its environment and the entity's internal controls in order to design appropriate audit procedures. This course will review the key requirements of COSO which is one of the most widely used internal control frameworks. We'll also review the limitations of internal controls. Additionally, this course will introduce the risk assessment process and the various audit procedures to evaluate controls and to determine whether to test the operating effectiveness of controls. Presented by: Jaclyn VenoType: Live Webcast Replay
ACPEN: Listening to the Statement of Cash Flows
-
Online
2.00 Credits
This course will allow you to get reacquainted with the statement of cash flows. We will refresher your skills regarding both the preparation and utilization of the statement of cash flows. Significant emphasis will be placed on the informational role of the statement of cash flows and insights that can be obtained using the statement of cash flows in concert with the other elements of a company’s accrual-basis financial statements. Presented by: Dr. Chris HarperType: Live Webcast Replay
ACPEN: The Preparation of Form 709 – Line-by-Line
-
Online
2.00 Credits
Gift taxation is a critical component of estate planning, and Form 709 serves as the key reporting tool. This course provides a comprehensive line-by-line guide to preparing Form 709, ensuring accuracy and compliance. Participants will learn how to determine taxable gifts, apply exclusions, and utilize available deductions. Special attention will be given to valuation techniques, gift-splitting, and generation-skipping transfer tax (GSTT) considerations. Additionally, this course will examine any new legislative changes from the current administration and how they may impact gift tax planning and reporting. *Please Note: If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Course Materials Tab and submit to kori.herrera@acpen.com Presented by: Arthur WernerType: Live Webcast Replay
ACPEN: Forensic and Fraud Interviewing Techniques and Skills
-
Online
2.20 Credits
In forensic accounting, interviewing is used to obtain important information from witnesses and suspects. An important aspect is the ability of investigators to obtain accurate and reliable information from victims, witnesses and the suspects or any interviewee. The interview process is an essential part of information gathering for any investigation. The importance of improving the quality of the interviewing with the potential for visual recording of all interviews should be placed high on the agenda of all organizations across the globe. A properly conducted forensic interview can result in an extreme benefit regarding collection of information. The interviewer’s role is to develop a full understanding of the facts. There is a distinct difference between a forensic interview and a criminal interrogation. Typically, forensic auditors will not be involved in interrogations. The Canadian or U.S. forensic accounting profession does not have a standardized interview model to truly equip its professionals with the interview tools required to elicit confessions ethically. Majority of their skills are developed through experience, and not through a standardized model of training. This session focuses on various interview concepts and methods. Presented by: Lynn FountainType: Live Webcast Replay
Becoming a Fractional CFO: What to Do and How?
-
Online
2.00 Credits
Are you considering becoming a fractional CFO, or possibly a public CPA firm or consulting practice that wants to offer fractional CFO services or advisory services? Either way, do you truly know what to do and how? Are you aware of the many pitfalls? Becoming a successful fractional CFO is complicated and it is not a trivial career change! Review the lessons learned from experienced fractional CFOs on how to enter, engage and run a thriving fractional CFO practice. Whether you are in public practice, a consultant, or in industry - be prepared for this as a possibility. Many fractional CFOs do not execute their practice as they could, and that is why they are not very successful. This discussion includes over fifty (50) recommendations to strengthen your fractional CFO practice. What do clients typically need? Are you better as a solo practitioner or should you join a firm? How to manage the relationship(s)? Every effective organizations make plans and if you want a winning fractional CFO business, come join us and learn how. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
Accounting & Attestation for ESG
-
Online
2.00 Credits
Environmental, Social, and Governance (ESG) reporting has become an increasingly important area of focus for standard setters, regulators, and stakeholders. This course provides an overview of how ESG considerations intersect with accounting and attestation services, with attention to developments affecting both preparers and assurance providers. Participants will review current ESG-related initiatives and projects underway at the Financial Accounting Standards Board, Governmental Accounting Standards Board, and the AICPA. The course also explores the types of services CPAs may provide in connection with ESG reporting, including advisory and attestation engagements, and discusses how these engagements differ in scope and responsibility. Designed for CPAs seeking to understand the evolving ESG landscape, this course helps participants recognize where ESG fits within existing professional standards and how CPAs can support organizations seeking credibility and assurance over ESG information. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
ACPEN: The Controllership Series – The Controller’s Skillset
-
Online
1.00 Credits
This another course in our series on the controllership function. The controller's role encompasses many traditional responsibilities. The breadth and depth of the controller skill set has expanded and will continue to expand as the business world evolves. The controller position will typically lead teams of financial and accounting experts. Recognizing that leadership and team management skills are must-haves; they need to be able to command their team's respect, inspire them to act, and ensure that such actions are aligned with your organization's overall vision. These skills, along with tactical knowledge will ensure the controller's success. Presented by: Lynn FountainType: Live Webcast Replay
ACPEN: Understanding the Tax Implications of Retirement Plan Distributions
-
Online
1.00 Credits
This session will address the complex rules of retirement distributions, review key provisions of the SECURE Act 2.0, and provide practical strategies of maximizing tax benefits for your client. **Please Note: If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Course Materials Tab and submit to kori.herrera@acpen.com. Presented by: Steven DilleyType: Live Webcast Replay
ACPEN: The Radar Phenomenon
-
Online
1.00 Credits
This session reviews the three elements of fraud, how fraudsters think, how proper internal controls can prevent and detect fraud, and the red flags to look for to identify fraud. It looks at Radar O'Reilly, one of the most beloved characters of the TV show M*A*S*H. He was trusted by his boss to run the administrative side of the US Army medical unit. Were there red flags all around Radar? Did he have the opportunity to steal? Was he a fraudster? We'll find out? Attendees learn to recognize the traits of this type fraudster that are present in many organization. Case studies of various Radars are included. Presented by: Daniel PorterType: Live Webcast Replay
ACPEN: Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)
-
Online
1.60 Credits
This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved. There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software. Presented by: Lynn FountainType: Live Webcast Replay
ACPEN: Businesses Receiving Government Assistance
-
Online
2.00 Credits
Many for-profit entities receive government assistance or are required to have financial statement or compliance audits due to law or regulation. This course will discuss the requirements under Generally Accepted Auditing Standards relevant to for-profit entity audits. Presented by: Jennifer LouisType: Live Webcast Replay