Selecting the right KPIs for your organization can be complex and stressful. Rather than resorting to brainstorming and internet searches, there is a better way to discover the...
When asked, most people would say they are an ethical person. So why is it that every month there are reports of ethical breaches at major companies? The concept of ethics is easy...
During this presentation, the most common mistakes made by employee benefit plan auditors, as well as, plan sponsors will be identified. Best practices for handling specific issues...
Excel remains a staple tool for virtually all accounting and financial professionals. In this session learn about many of the newer features in Excel, along with some you may have...
Network forensics - defined as the investigation of network traffic patterns and data captured in transit between computing devices - can provide insight into the source and extent...
Imagine being able to see into the future with confidence. The ability to be a great forecaster is not innate but learned. By examining great forecasters, we can learn to improve...
This course explores the increasingly complex features of Excel that facilitate efficient data analysis. We will introduce numerous analytical methods and techniques by using...
Most professionals routinely use Word, Outlook, and PowerPoint, but many are self-taught and, as a result, have not been exposed to the best features of these three applications...
Cloud computing has become a source of cyber-crime. “Cloud forensics is the application of digital forensics in cloud computing as a subset of network forensics to gather and...
A significant amount of information is electronically initiated, recorded, processed, or reported, and information to be used as audit evidence may be available only in electronic...
The budgeting process can be a time consuming and frustrating process for accountants. The constraints and pressures can lead to poor decisions in both the technical and human...
This course is a continuation of our series on preparing to become a forensic accountant. Within this segment we focus on elements of computer forensics. This session is designed...