Summary & Check Out (0)
The NJCPA and the NJCPA Education Foundation offer hundreds of seminars, conferences and events every year. Use the filter options below to search our upcoming CPE programs and events.
YOU'VE SELECTED
To provide additional learning opportunities, the NJCPA has partnered with several leading CPE providers. For your convenience, you can register for these events on njcpa.org. You will receive additional information and participation instructions directly from the provider.
This is a 2 hour webcast that will focus on the similarities between all three of these GASB accounting standards that deal with contractual arrangements such as leases, Subscription-Based Information Technology Arrangements (S...
This course provides a high-level overview and introduction into the world of the forensic accountant. Most accountants have an understanding of the concept of fraud and how it impacts companies, but many individuals do not hav...
Cloud computing has become a source of cyber-crime. “Cloud forensics is the application of digital forensics in cloud computing as a subset of network forensics to gather and preserve evidence in a way that is suitable fo...
The new Global Internal Audit Standards were released on January 9, 2024, and will become effective January 9, 2025. The previous version, the International Standards for the Professional Practice of Internal Auditing, released...
This session explores the importance of internal controls with an emphasis on best practices for small- and medium-sized entities. We will examine the roles of both preventive and detective controls and practical, cost-ef...
Stay informed and prepared with this comprehensive annual update on the latest developments in accounting and auditing. We'll begin with a deep dive into the Accounting Standards Updates (ASUs) effective in 2025, followed b...
In this course, participants will learn about key trends and innovations impacting the field of forensic data analytics. From generative AI to ChatGPT, machine learning and transaction review, data sharing consortiums and...
This is a continuing part of our series on forensic accounting. Within this segment we discuss the concepts that are part of computer forensics known as cryptology. The term cryptography is from Ancient Greek and means “h...
One of the three major forms of occupational fraud, along with corruption and asset misappropriation, is financial statement fraud. From improper asset valuation to fictitious revenues, this course will review financial stateme...
Network forensics - defined as the investigation of network traffic patterns and data captured in transit between computing devices - can provide insight into the source and extent of an attack. It is used in forensic accountin...
If sales increase, so should profits. Yet, the opposite result often leaves executive’s scratching their heads. When organizations work with inferior cost information, they make mistakes in four specific situa...
Building on Part 1, this course will review the application of sampling in financial statement audits with a focus on sampling for tests of controls. We'll also review the requirements for sampling in Single Audits with a focus...
Environmental, Social and Governance (ESG) has become a hot topic among standard setters. This session will look at the work of the FASB, GASB, and AICPA in the areas of ESG. We'll also look at the types of engagements CPAs can...