CPE Catalog
Note
AICPA On-Demand & Self-Study courses take up to 24 hours to process.
Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)
-
Online
1.60 Credits
This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved. There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software.
Just Ask Why - Searching for Answers: Generating Solutions
-
Online
4.00 Credits
Breaking the Wall of blind acceptance; avoiding habitual complacency and Yoking the dots between cause and effect.
The Head and Heart of Ethics - Featuring Bob Mims and Don Minges
-
Online
1.00 Credits
There are multiple facets to ethical choices, including should you use your ‘head’ or your ‘heart’? What are the pros and the cons? How can we balance these opposing views? This seminar outlines the value of; trust, courage, fairness, sensitivity, persistence, honesty and gracefulness – to help us make better ethical decisions.
Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 1
-
Online
1.00 Credits
This course is a continuation of our series on preparing to become a forensic accountant. Within this segment we focus on elements of computer forensics. This session is designed to delve into further investigative procedures used in computer forensics.
Revenue Recognition Topic 606 - Identify the Contract Part 1
-
Online
1.20 Credits
On May 28, 2014, the Financial Accounting Standards Board (FASB) and International Accounting Standards Board (IASB) issued converged guidance on recognizing revenue in contracts with customers (ASC 606). The objective of the guidance is to establish principles to report useful information to users of financial statements about the nature, amount, timing and uncertainty of revenue from contracts with customers. The new guidance provides several benefits to financial statement users. This is one in a series of courses that outline the updated revenue recognition standard.
The New Quality Management Standards - What Everyone Needs to Know
-
Online
2.00 Credits
The AICPA issued the new Quality Management Standards as a part of its overall quality improvement initiative. This course will highlight the foundational principles within the new approach that everyone in the CPA firm should know.
Navigating Leaves of Absence
-
Online
1.00 Credits
What obligations does an employer have when an employee needs to take a leave of absence? This presentation will provide an overview of the complicated, intertwined compliance obligations triggered when an employee requests a medical leave of absence (including for pregnancy, mental health, or addiction).
Ask Me No Questions and I Will Tell You No Lies - The Art of Interviewing & Interrogation
-
Online
3.00 Credits
When we verbally communicate with an individual, we must make a conscious decision as to whether we believe what we have heard. Little do we realize that we are not making a decision based on what we have heard; rather we make a subconscious decision based primarily on what we have seen, or how the body was behaving when the subject was speaking. We often walk away from a conversation with a gut feeling that the person was not telling the truth. That gut feeling is your subconscious. Yet we often have no idea as to why we have that feeling. This presentation is designed to provide the participant with the tools to identify those both verbal and nonverbal indicators that we all give off when we are under stress. Normally, telling the truth does not create stress. When we lie, we know that we are not supposed to and that creates stress, and it will manifest itself in some manner, and that is what a trained interviewer is looking to observe. When we observe indicators of deception, how do we deal with it? How do we get the subject to admit to a wrong-doing when it is not in their best interest to do so? That is one of the many things that will be addressed in this presentation. Whether you are a parent dealing with you kids; an employer dealing with employees or and investigation interviewing a suspect, this presentation will provide you with the tools to assist you in finding the truth.
Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 2 (Cryptology)
-
Online
1.00 Credits
This is a continuing part of our series on forensic accounting. Within this segment we discuss the concepts that are part of computer forensics known as cryptology. The term cryptography is from Ancient Greek and means “hidden secret”. It is the practice and study of techniques for secure communications in the presence of adversarial behavior. Cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Cryptography starts with secrets. Various aspects in information security such as data confidentiality, data integrity, authentication and non-repudiation (where a statement’s author cannot successfully dispute its authorship) are central to modern cryptography.
Ethical Situations - What to do When?, featuring Allison McLeod and Don Minges
-
Online
1.00 Credits
What would you do when ___? Is would the same as should? Examples; Rashmi Airan-Pace and Yale Law School. What should you do when a vendor offers to give you tickets to the NCAA Final Four basketball tournament and your organization will permit it? Prepare for ‘situations’ before they happen to you.
Revenue Recognition - Topic 606 Overview
-
Online
1.50 Credits
This session is the beginning in a series on the new revenue recognition standard. The standard outlines five steps for proper compliance. At the surface, these steps seem simplistic. However, there are many considerations that should be considered within each step based on your process and industry. This course is designed to provide an overview of the technical guidance and outline the five steps involved in the revenue recognition model. We also explore some concepts to consider within each step and then evaluate some challenges that specific industry's may have when complying with the standard. Future courses will further delve into each step and provide example and scenarios that should be considered to properly apply the step.
Be the Sun, Not the Salt, featuring Harry Cohen and John Daly
-
Online
1.00 Credits
What if being nice, or specifically being a positive best version of yourself, made you a more effective leader? Ethical leadership, is effective leadership. That’s what Dr. Cohen, noted psychologist, transformational speaker, executive coach, and author of Be The Sun, Not The Salt, has been teaching organizations to do for years. Dr. Cohen’s work is based on scientific studies of human behavior broken down into simple, easily digestible pillars structured around the Heliotropic Effect. In this webcast we will discuss Dr. Cohen’s path to this work, what the Heliotropic Effect is, and how Be The Sun, Not The Salt is the perfect reminder to Do More of That every day.
Revenue Recognition Topic 606 - Identify Performance Obligations Part 1
-
Online
1.20 Credits
This course is meant to complement the course that evaluates all aspects of the five steps to revenue recognition. The course "Understanding the new revenue recognition rules" examines the five-step model outlined in the standard that organizations must utilize when recognizing revenue. The new standard applies to all companies.
Fraud Unmasked: Understanding and Preventing White-Collar Crime with Dr. Richard G. Brody
-
Online
2.00 Credits
Fraud poses a significant risk to businesses, organizations, and individuals, leading to financial losses, reputational damage, and legal consequences. This comprehensive course, led by Dr. Richard G. Brody, an esteemed expert in forensic accounting and fraud prevention, explores the underlying mechanisms, motivations, and methods of fraudulent behavior. Through real-world case studies, expert analysis, and interactive discussions, participants will gain critical insights into the psychology of fraud, organizational vulnerabilities, and ethical breakdowns that enable misconduct. The course equips attendees with the latest fraud detection techniques, risk assessment strategies, and internal control best practices to proactively identify and mitigate fraud risks while fostering a culture of integrity and accountability.
Global Internal Audit Standards (GIAS) Domain III - Part 2
-
Online
2.00 Credits
The new Standards emphasize that quality performance requires conformance to the Standards. Each standard within Domain III specifically identifies the responsibilities of the CAE and the board, as well as joint responsibilities. The new Global Internal Audit Standards were released on January 9, 2024, and will become effective January 9, 2025. The previous version, the International Standards for the Professional Practice of Internal Auditing, released in 2017, remains approved for use during a one-year transition period. The Global Internal Audit Standards guide the worldwide professional practice of internal audit. They serve as a basis for evaluating and elevating the quality of the internal audit function. The Standards use 15 guiding principles with five separate domains that enable effective internal audit implementation and examples of evidence of conformance. The Global Standards are organized into five domains. Domain I: Purpose of Internal Auditing Domain II: Ethics and Professionalism Domain III: Governing the Internal Audit Function Domain IV: Managing the Internal Audit Function Domain V: Performing Internal Audit Service
Why Auditors Fail To Detect Fraud
-
Online
2.00 Credits
Prior to the original SAS No. 82 on Consideration of Fraud In A Financial Statement Audit (now codified as SAS No. 122, AU 240), the word fraud never appeared in a single SAS, nor was it described anywhere. SAS No. 82 stated that auditors failed to detect fraud for two reasons: 1) They did not know what it looked like and 2) They had not been trained to look for it. Although the SASs did not provide any guidance, auditors have always been responsible for the detection of anything that would cause a material misstatement of the financial statements whether caused by error or irregularities. (They would not even say the word fraud until it appeared in SAS No. 82) The standards were replete with guidance on the detection of an error but silent on how to detect irregularities. Now auditors are required to document in every financial statement audit their process of determining the risk of financial misstatement due to fraud. This presentation is designed to focus on frauds that were missed by the auditors and, in some cases, why it was missed. There will also be discussion as to what the auditor must do in order to improve their track record on detecting fraud. As reported on the Association of Certified Fraud Examiners Occupational Fraud 2022: A Report to the Nations, only 4% of frauds were initially discovered by the external auditor. It was reported that more frauds were discovered by accident, (5%) then was discovered by the external auditor.
The Controllership Series - The Controllers Role in Procurement Function
-
Online
1.20 Credits
The procurement function is a critical area of organizations where spend is a top priority. The Controllership function is involved in spend management. It is logical that the Controller should take a role in working with the procurement function. The procurement function may report to various areas within an organization including the Chief Operating Officer (COO), Chief Procurement Officer (CPO), Chief Executive Officer (CEO) and the Chief Financial (CFO) or Accounting Officer (CAO). Regardless of the reporting line of the function, the accounting and controllership functions must have an integral understanding of all processes involved within procurement. This understanding assists the controller and accounting area in properly optimizing and controlling costs associated with the process.
The Controllership Series - The Role of the Controller in ESG
-
Online
1.50 Credits
Why do for profit organizations exist??? To make money!!!!! What a great concept. But if the organization does not have the proper collections and credit procedures in place, they may not be able to access that money. Hence the importance of the credit and collection process. Credit and collections are critical areas for the financial statement controllers. Customer credit is a form of payment that allows small business customers to purchase a product or service before paying for it in full. The process works similarly to the way a credit card does - you procure something and pay it back later. Collections is a term used by a business when referring to money owed to that business by a customer. When a customer does not pay within the terms specified, the amount of the bill becomes past due and is sometimes submitted to a collection agency. The sales and collection process includes business activities related to selling products and services, maintaining customer records, billing customers, and recording payments from customers. It also includes activities necessary to manage accounts receivable, such as aging accounts and authorizing credit. This course delves into the topics that impact the sales, credit and collections process for management. We discuss strategic steps management can take to ensure their processes are efficient and that they are able to actually collect their revenue.
Conducting Human Resource Investigations
-
Online
1.00 Credits
Human Resources professionals are often tasked with investigating allegations of employee misconduct, discrimination, and others. Investigation training is traditionally presented from the position of an outsider looking in, such as a governmental agency, law firm, or private investigator. HR investigations require similar skills, but the environment and the approach are quite different. This session explores these differences and provides best practices for planning, executing, documenting, and reporting the results of an HR investigation. Attendees will end the session with takeaways to immediately implement in future HR investigations.
Performance Auditing Made Easy
-
Online
1.50 Credits
Unlike a traditional financial audit objective (Are the financial statements materially misstated), performance auditing can address a wide variety of objectives. Is this program working? Can it be improved? Where can we save money? How can we operate more efficiently and effectively? Are management’s assertions supported? And so forth. This session will explain what a performance audit is, describe the applicable standards, and provide examples that indicate the value of a performance audit. Performance audits can add value to any entity and practitioners can profit from adding these assurance services to their practices.