Skip to main content

CPE Catalog

Note

AICPA On-Demand & Self-Study courses take up to 24 hours to process. 

Showing 27898 All Results

Communicating in a Virtual and Live Environment - Numbers Matter But So Do Words

-

Online

2.00 Credits

People fear presenting more than they do “death”.  Communicating numbers is a scary proposition to overcome for both the presenter and the recipients. This course is designed to enhance the communication skills of CPAs and CFOs by emphasizing the importance of understanding and mastering the facts before delivering any presentation, understand the key elements of presenting a narrative, and provide examples to engage live and virtual teams in effective numbers presenting. The goal is to equip financial professionals with the tools needed to overcome fears and provide the best practices research on all types of presentations-from communicating complex financial information effectively to conducting a casual virtual meeting.   This is a fun session intended to be interactive with participation either live, virtual or both.  

Measuring Audit Risks

-

Online

3.00 Credits

In order not to perform an excessive number of audit procedures (over audit) auditors must perform procedures in order to determine in what areas are there weak internal controls that could result in a risk that the financial statements would be materially misstated and not be detected.  SAS No. 122, AU 300 – 499, Measuring Audit Risk provides guidance as well as required procedures that must be performed in every audit in order to determine the risk of material misstatement.  No longer can the auditor state that they assess the risk of material misstatement at maximum without having a basis for making such assessment.  As a result, the standards now require that the auditor make such an assessment of a material misstatement of the financial statement on every audit in order to have a basis for such assessment.  This program is an overview of the statement documentation requirements in assessing such a risk.

Awful Ethical Dilemmas - Bringing it to Life, featuring J. Michael Inzina and Don Minges

-

Online

1.00 Credits

Professional Codes of Conduct make Ethics seem easy and clear cut. However, this is not so in real life. This session discusses five cases where the ethics is not so clear cut.  What should be considered?  We will explain how you can be more diligent and maintain awareness of ethical issues to become more effective and enhance the reputation of the profession.    

Fraud Risk Management

-

Online

2.00 Credits

The ACFE/COSO Fraud Risk Management Guide (FRMG) was published in 2016 (and updated in 2023).  It has quickly gained acceptance as the set of best practices for preventing, detecting, and thus deterring fraud. The fraud landscape is constantly changing and evolving. The FRMG sets out a rigorous set of principles and leading practices for managing fraud risk for forward-thinking organizations to follow.  It covers: How to establish fraud risk management governance. How to conduct rigorous fraud risk assessments. How to design and implement fraud control activities. How to establish reporting mechanisms and investigative procedures. How to monitor the overall fraud risk management program. Fraud risk can be managed.  All anti-fraud and accountability professionals will benefit from this session's focus on effective fraud risk management.

Global Internal Audit Standards (GIAS) Domain II - Part 2

-

Online

2.00 Credits

The new Global Internal Audit Standards were released on January 9, 2024, and will become effective January 9, 2025. The previous version, the International Standards for the Professional Practice of Internal Auditing, released in 2017, remains approved for use during a one-year transition period. The Global Internal Audit Standards guide the worldwide professional practice of internal audit. They serve as a basis for evaluating and elevating the quality of the internal audit function. The Standards use 15 guiding principles with five separate domains that enable effective internal audit implementation and examples of evidence of conformance. The Global Standards are organized into five domains. Domain I: Purpose of Internal Auditing Domain II: Ethics and Professionalism Domain III: Governing the Internal Audit Function Domain IV: Managing the Internal Audit Function Domain V: Performing Internal Audit Service

Estate Planning for Today and Beyond

-

Online

8.00 Credits

Estate planning continues to evolve, and staying informed about the latest trends and strategies is crucial for professionals in the field. This forward-looking course delves into the intricacies of estate planning, with a specific focus on current issues. Participants will explore cutting-edge techniques, emerging legal considerations, and industry developments to ensure they are equipped with the knowledge and skills to create effective estate plans that withstand the test of time and safeguard their clients' legacies. *Please Note:  If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Handouts Tab and submit to kori.herrera@acpen.com  

Walkin', Talkin', Lookin' & Listenin' - Or Things Most of Us Don't Do Well

-

Online

2.00 Credits

You often can perform an audit in accordance with all of the standards, and still have a substandard audit IF you did not get out among the clients employees (let them know you are there and where you located), talk to as many people as you can regardless as to whether you may think that they may have any helpful information; constantly observe your surrounding where ever you are at (you never now what you might see) and lastly, listen to not only what people are saying to you but are also saying around you. This presentation is designed to illustrate the importance of making yourself available to your client’s employees, let them know that you are there and where you can be found. Talk with them because if there is a problem, somebody knows and they will often tell you all about it IF you just ask them.  Look at your surrounding everywhere you go.  What are you looking for?  I don’t know but I’ll know it when I see it. Lastly, listen to what they have to say.  Every word is important because they may say something that you had not asked about.  Remember, you never want to discover something and go to an individual who you determined knew about it and ask, why didn’t you tell me about this and their response was, you never asked me!

How to Get a Better Return on Financial Statement Audits - Avoiding the Most Misapplied Risk-Based Audit Conce

-

Online

8.00 Credits

By far, the biggest contributing factor that leads to a profitable, yet high quality, financial statement audit is the proper identification, evaluation, and response to assessed risk of material misstatement. When designing your detailed audit plan, how and where you decide to spend your time is largely a matter of professional judgment. The proven tips and techniques for critically rethinking how you plan and design your audit taught in this course will help auditors enhance audit quality and manage profitability in all engagements.

Hiring Remotely: Using Personality Assessments for Better Hiring Decisions

-

Online

1.00 Credits

This course explores the best practices for hiring remotely while leveraging personality assessments to make more informed decisions. Learn how to effectively integrate personality testing into your recruitment process to identify candidates who are the right fit for your team, even from a distance.

Revenue Recognition Topic 606 Contract with Customers - Identify the Contract Part 2

-

Online

1.20 Credits

This course is a continuation of discussion over Step One in the revenue recognition process of Identify the Contract. Specifically, this session delves further into the considerations surrounding contract modifications, change orders, unpriced change orders, cancelations, non-finalized changes and accounting treatment when a contract does not exist.

Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)

-

Online

1.60 Credits

This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved. There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software.  

Just Ask Why - Searching for Answers: Generating Solutions

-

Online

4.00 Credits

Breaking the Wall of blind acceptance; avoiding habitual complacency and Yoking the dots between cause and effect.

The Head and Heart of Ethics - Featuring Bob Mims and Don Minges

-

Online

1.00 Credits

There are multiple facets to ethical choices, including should you use your ‘head’ or your ‘heart’? What are the pros and the cons?  How can we balance these opposing views?  This seminar outlines the value of; trust, courage, fairness, sensitivity, persistence, honesty and gracefulness – to help us make better ethical decisions.

Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 1

-

Online

1.00 Credits

This course is a continuation of our series on preparing to become a forensic accountant. Within this segment we focus on elements of computer forensics. This session is designed to delve into further investigative procedures used in computer forensics.  

Revenue Recognition Topic 606 - Identify the Contract Part 1

-

Online

1.20 Credits

On May 28, 2014, the Financial Accounting Standards Board (FASB) and International Accounting Standards Board (IASB) issued converged guidance on recognizing revenue in contracts with customers (ASC 606). The objective of the guidance is to establish principles to report useful information to users of financial statements about the nature, amount, timing and uncertainty of revenue from contracts with customers. The new guidance provides several benefits to financial statement users.   This is one in a series of courses that outline the updated revenue recognition standard.

The New Quality Management Standards - What Everyone Needs to Know

-

Online

2.00 Credits

The AICPA issued the new Quality Management Standards as a part of its overall quality improvement initiative.  This course will highlight the foundational principles within the new approach that everyone in the CPA firm should know. 

Navigating Leaves of Absence

-

Online

1.00 Credits

What obligations does an employer have when an employee needs to take a leave of absence? This presentation will provide an overview of the complicated, intertwined compliance obligations triggered when an employee requests a medical leave of absence (including for pregnancy, mental health, or addiction).  

Ask Me No Questions and I Will Tell You No Lies - The Art of Interviewing & Interrogation

-

Online

3.00 Credits

When we verbally communicate with an individual, we must make a conscious decision as to whether we believe what we have heard.  Little do we realize that we are not making a decision based on what we have heard; rather we make a subconscious decision based primarily on what we have seen, or how the body was behaving when the subject was speaking.  We often walk away from a conversation with a gut feeling that the person was not telling the truth.  That gut feeling is your subconscious.  Yet we often have no idea as to why we have that feeling. This presentation is designed to provide the participant with the tools to identify those both verbal and nonverbal indicators that we all give off when we are under stress.  Normally, telling the truth does not create stress.  When we lie, we know that we are not supposed to and that creates stress, and it will manifest itself in some manner, and that is what a trained interviewer is looking to observe. When we observe indicators of deception, how do we deal with it?  How do we get the subject to admit to a wrong-doing when it is not in their best interest to do so?  That is one of the many things that will be addressed in this presentation.  Whether you are a parent dealing with you kids; an employer dealing with employees or and investigation interviewing a suspect, this presentation will provide you with the tools to assist you in finding the truth.

Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 2 (Cryptology)

-

Online

1.00 Credits

This is a continuing part of our series on forensic accounting. Within this segment we discuss the concepts that are part of computer forensics known as cryptology. The term cryptography is from Ancient Greek and means “hidden secret”. It is the practice and study of techniques for secure communications in the presence of adversarial behavior. Cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Cryptography starts with secrets. Various aspects in information security such as data confidentiality, data integrity, authentication and non-repudiation (where a statement’s author cannot successfully dispute its authorship) are central to modern cryptography.

Ethical Situations - What to do When?, featuring Allison McLeod and Don Minges

-

Online

1.00 Credits

What would you do when ___? Is would the same as should? Examples; Rashmi Airan-Pace and Yale Law School. What should you do when a vendor offers to give you tickets to the NCAA Final Four basketball tournament and your organization will permit it? Prepare for ‘situations’ before they happen to you.