CPE Catalog & Events
Global Internal Audit Standards (GIAS) Domain II - Part 2
-
Online
2.0 Credits
Member Price: $79

The new Global Internal Audit Standards were released on January 9, 2024, and will become effective January 9, 2025. The previous version, the International Standards for the Professional Practice of Internal Auditing, released in 2017, remains approved for use during a one-year transition period. The Global Internal Audit Standards guide the worldwide professional practice of internal audit. They serve as a basis for evaluating and elevating the quality of the internal audit function. The Standards use 15 guiding principles with five separate domains that enable effective internal audit implementation and examples of evidence of conformance. The Global Standards are organized into five domains. Domain I: Purpose of Internal Auditing Domain II: Ethics and Professionalism Domain III: Governing the Internal Audit Function Domain IV: Managing the Internal Audit Function Domain V: Performing Internal Audit Service
Estate Planning for Today and Beyond
-
Online
8.0 Credits
Member Price: $225

Estate planning continues to evolve, and staying informed about the latest trends and strategies is crucial for professionals in the field. This forward-looking course delves into the intricacies of estate planning, with a specific focus on current issues. Participants will explore cutting-edge techniques, emerging legal considerations, and industry developments to ensure they are equipped with the knowledge and skills to create effective estate plans that withstand the test of time and safeguard their clients' legacies. *Please Note: If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Handouts Tab and submit to kori.herrera@acpen.com
Walkin', Talkin', Lookin' & Listenin' - Or Things Most of Us Don't Do Well
-
Online
2.0 Credits
Member Price: $79

You often can perform an audit in accordance with all of the standards, and still have a substandard audit IF you did not get out among the clients employees (let them know you are there and where you located), talk to as many people as you can regardless as to whether you may think that they may have any helpful information; constantly observe your surrounding where ever you are at (you never now what you might see) and lastly, listen to not only what people are saying to you but are also saying around you. This presentation is designed to illustrate the importance of making yourself available to your client’s employees, let them know that you are there and where you can be found. Talk with them because if there is a problem, somebody knows and they will often tell you all about it IF you just ask them. Look at your surrounding everywhere you go. What are you looking for? I don’t know but I’ll know it when I see it. Lastly, listen to what they have to say. Every word is important because they may say something that you had not asked about. Remember, you never want to discover something and go to an individual who you determined knew about it and ask, why didn’t you tell me about this and their response was, you never asked me!
How to Get a Better Return on Financial Statement Audits - Avoiding the Most Misapplied Risk-Based Audit Concepts
-
Online
8.0 Credits
Member Price: $225

By far, the biggest contributing factor that leads to a profitable, yet high quality, financial statement audit is the proper identification, evaluation, and response to assessed risk of material misstatement. When designing your detailed audit plan, how and where you decide to spend your time is largely a matter of professional judgment. The proven tips and techniques for critically rethinking how you plan and design your audit taught in this course will help auditors enhance audit quality and manage profitability in all engagements.
Hiring Remotely: Using Personality Assessments for Better Hiring Decisions
-
Online
1.0 Credits
Member Price: $39

This course explores the best practices for hiring remotely while leveraging personality assessments to make more informed decisions. Learn how to effectively integrate personality testing into your recruitment process to identify candidates who are the right fit for your team, even from a distance.
Revenue Recognition Topic 606 Contract with Customers - Identify the Contract Part 2
-
Online
1.0 Credits
Member Price: $39

This course is a continuation of discussion over Step One in the revenue recognition process of Identify the Contract. Specifically, this session delves further into the considerations surrounding contract modifications, change orders, unpriced change orders, cancelations, non-finalized changes and accounting treatment when a contract does not exist.
Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)
-
Online
1.5 Credits
Member Price: $59

This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved. There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software.
Just Ask Why - Searching for Answers: Generating Solutions
-
Online
4.0 Credits
Member Price: $129

Breaking the Wall of blind acceptance; avoiding habitual complacency and Yoking the dots between cause and effect.
Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 1
-
Online
1.0 Credits
Member Price: $39

This course is a continuation of our series on preparing to become a forensic accountant. Within this segment we focus on elements of computer forensics. This session is designed to delve into further investigative procedures used in computer forensics.
The New Quality Management Standards - What Everyone Needs to Know
-
Online
2.0 Credits
Member Price: $79

The AICPA issued the new Quality Management Standards as a part of its overall quality improvement initiative. This course will highlight the foundational principles within the new approach that everyone in the CPA firm should know.
Navigating Leaves of Absence
-
Online
1.0 Credits
Member Price: $39

What obligations does an employer have when an employee needs to take a leave of absence? This presentation will provide an overview of the complicated, intertwined compliance obligations triggered when an employee requests a medical leave of absence (including for pregnancy, mental health, or addiction).
Ask Me No Questions and I Will Tell You No Lies - The Art of Interviewing & Interrogation
-
Online
3.0 Credits
Member Price: $99

When we verbally communicate with an individual, we must make a conscious decision as to whether we believe what we have heard. Little do we realize that we are not making a decision based on what we have heard; rather we make a subconscious decision based primarily on what we have seen, or how the body was behaving when the subject was speaking. We often walk away from a conversation with a gut feeling that the person was not telling the truth. That gut feeling is your subconscious. Yet we often have no idea as to why we have that feeling. This presentation is designed to provide the participant with the tools to identify those both verbal and nonverbal indicators that we all give off when we are under stress. Normally, telling the truth does not create stress. When we lie, we know that we are not supposed to and that creates stress, and it will manifest itself in some manner, and that is what a trained interviewer is looking to observe. When we observe indicators of deception, how do we deal with it? How do we get the subject to admit to a wrong-doing when it is not in their best interest to do so? That is one of the many things that will be addressed in this presentation. Whether you are a parent dealing with you kids; an employer dealing with employees or and investigation interviewing a suspect, this presentation will provide you with the tools to assist you in finding the truth.
Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 2 (Cryptology)
-
Online
1.0 Credits
Member Price: $39

This is a continuing part of our series on forensic accounting. Within this segment we discuss the concepts that are part of computer forensics known as cryptology. The term cryptography is from Ancient Greek and means “hidden secret”. It is the practice and study of techniques for secure communications in the presence of adversarial behavior. Cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Cryptography starts with secrets. Various aspects in information security such as data confidentiality, data integrity, authentication and non-repudiation (where a statement’s author cannot successfully dispute its authorship) are central to modern cryptography.
Revenue Recognition - Topic 606 Overview
-
Online
1.5 Credits
Member Price: $59

This session is the beginning in a series on the new revenue recognition standard. The standard outlines five steps for proper compliance. At the surface, these steps seem simplistic. However, there are many considerations that should be considered within each step based on your process and industry. This course is designed to provide an overview of the technical guidance and outline the five steps involved in the revenue recognition model. We also explore some concepts to consider within each step and then evaluate some challenges that specific industry's may have when complying with the standard. Future courses will further delve into each step and provide example and scenarios that should be considered to properly apply the step.
Revenue Recognition Topic 606 - Identify Performance Obligations Part 1
-
Online
1.0 Credits
Member Price: $39

This course is meant to complement the course that evaluates all aspects of the five steps to revenue recognition. The course "Understanding the new revenue recognition rules" examines the five-step model outlined in the standard that organizations must utilize when recognizing revenue. The new standard applies to all companies.
Global Internal Audit Standards (GIAS) Domain III - Part 2
-
Online
2.0 Credits
Member Price: $79

The new Standards emphasize that quality performance requires conformance to the Standards. Each standard within Domain III specifically identifies the responsibilities of the CAE and the board, as well as joint responsibilities. The new Global Internal Audit Standards were released on January 9, 2024, and will become effective January 9, 2025. The previous version, the International Standards for the Professional Practice of Internal Auditing, released in 2017, remains approved for use during a one-year transition period. The Global Internal Audit Standards guide the worldwide professional practice of internal audit. They serve as a basis for evaluating and elevating the quality of the internal audit function. The Standards use 15 guiding principles with five separate domains that enable effective internal audit implementation and examples of evidence of conformance. The Global Standards are organized into five domains. Domain I: Purpose of Internal Auditing Domain II: Ethics and Professionalism Domain III: Governing the Internal Audit Function Domain IV: Managing the Internal Audit Function Domain V: Performing Internal Audit Service
Why Auditors Fail To Detect Fraud
-
Online
2.0 Credits
Member Price: $79

Prior to the original SAS No. 82 on Consideration of Fraud In A Financial Statement Audit (now codified as SAS No. 122, AU 240), the word fraud never appeared in a single SAS, nor was it described anywhere. SAS No. 82 stated that auditors failed to detect fraud for two reasons: 1) They did not know what it looked like and 2) They had not been trained to look for it. Although the SASs did not provide any guidance, auditors have always been responsible for the detection of anything that would cause a material misstatement of the financial statements whether caused by error or irregularities. (They would not even say the word fraud until it appeared in SAS No. 82) The standards were replete with guidance on the detection of an error but silent on how to detect irregularities. Now auditors are required to document in every financial statement audit their process of determining the risk of financial misstatement due to fraud. This presentation is designed to focus on frauds that were missed by the auditors and, in some cases, why it was missed. There will also be discussion as to what the auditor must do in order to improve their track record on detecting fraud. As reported on the Association of Certified Fraud Examiners Occupational Fraud 2022: A Report to the Nations, only 4% of frauds were initially discovered by the external auditor. It was reported that more frauds were discovered by accident, (5%) then was discovered by the external auditor.
The Controllership Series - The Controllers Role in Procurement Function
-
Online
1.0 Credits
Member Price: $39

The procurement function is a critical area of organizations where spend is a top priority. The Controllership function is involved in spend management. It is logical that the Controller should take a role in working with the procurement function. The procurement function may report to various areas within an organization including the Chief Operating Officer (COO), Chief Procurement Officer (CPO), Chief Executive Officer (CEO) and the Chief Financial (CFO) or Accounting Officer (CAO). Regardless of the reporting line of the function, the accounting and controllership functions must have an integral understanding of all processes involved within procurement. This understanding assists the controller and accounting area in properly optimizing and controlling costs associated with the process.
The Controllership Series - The Role of the Controller in ESG
-
Online
1.5 Credits
Member Price: $59

Why do for profit organizations exist??? To make money!!!!! What a great concept. But if the organization does not have the proper collections and credit procedures in place, they may not be able to access that money. Hence the importance of the credit and collection process. Credit and collections are critical areas for the financial statement controllers. Customer credit is a form of payment that allows small business customers to purchase a product or service before paying for it in full. The process works similarly to the way a credit card does - you procure something and pay it back later. Collections is a term used by a business when referring to money owed to that business by a customer. When a customer does not pay within the terms specified, the amount of the bill becomes past due and is sometimes submitted to a collection agency. The sales and collection process includes business activities related to selling products and services, maintaining customer records, billing customers, and recording payments from customers. It also includes activities necessary to manage accounts receivable, such as aging accounts and authorizing credit. This course delves into the topics that impact the sales, credit and collections process for management. We discuss strategic steps management can take to ensure their processes are efficient and that they are able to actually collect their revenue.
Conducting Human Resource Investigations
-
Online
1.0 Credits
Member Price: $39

Human Resources professionals are often tasked with investigating allegations of employee misconduct, discrimination, and others. Investigation training is traditionally presented from the position of an outsider looking in, such as a governmental agency, law firm, or private investigator. HR investigations require similar skills, but the environment and the approach are quite different. This session explores these differences and provides best practices for planning, executing, documenting, and reporting the results of an HR investigation. Attendees will end the session with takeaways to immediately implement in future HR investigations.