Summary & Check Out (0)
The NJCPA and the NJCPA Education Foundation offer hundreds of seminars, conferences and events every year. Use the filter options below to search our upcoming CPE programs and events.
YOU'VE SELECTED
Sorry, no events were found with your selected filters. Please try a different set of filters.
To provide additional learning opportunities, the NJCPA has partnered with several leading CPE providers. For your convenience, you can register for these events on njcpa.org. You will receive additional information and participation instructions directly from the provider.
The Sarbanes Oxley Act (SOX) continues to pose challenges with compliance. Companies must continue to evaluate whether they have designed and implemented an adequate system of internal controls over financial reporting (ICFR). ...
This program explores the role of client internal controls for balancing efficiency and effectiveness in a risk-based audit. We offer practical insights regarding an auditor's assessment of the risk of material misstatement...
The new Global Internal Audit Standards were released on January 9, 2024, and will become effective January 9, 2025. The previous version, the International Standards for the Professional Practice of Internal Auditing, released...
Forensic accounting, forensic accountancy or financial forensics is the specialty practice area of accounting that investigates whether firms engage in financial reporting misconduct. Forensic accountants apply a range of skill...
Network forensics - defined as the investigation of network traffic patterns and data captured in transit between computing devices - can provide insight into the source and extent of an attack. It is used in forensic accountin...
Building on Part 1, this course will review the application of sampling in financial statement audits with a focus on sampling for tests of controls. We'll also review the requirements for sampling in Single Audits with a focus...
This course provides a high-level overview and introduction into the world of the forensic accountant. Most accountants have an understanding of the concept of fraud and how it impacts companies, but many individuals do not hav...
Cloud computing has become a source of cyber-crime. “Cloud forensics is the application of digital forensics in cloud computing as a subset of network forensics to gather and preserve evidence in a way that is suitable fo...
One of the three major forms of occupational fraud, along with corruption and asset misappropriation, is financial statement fraud. From improper asset valuation to fictitious revenues, this course will review financial stateme...
In this course, participants will learn about the five principals of COSO's Fraud Risk Management Guide and the linkages each principal has to the use of forensic data analytics to measurably demonstrate effectiveness and R...
This course is a continuation of our series on preparing to become a forensic accountant. Within this segment we focus on elements of computer forensics. This session is designed to delve into further investigative procedures u...
AU-C Section 315 requires the auditor to gain an understanding of the entity and its environment and the entity's internal controls in order to design appropriate audit procedures. This course will review the key requirements o...
This is a continuing part of our series on forensic accounting. Within this segment we discuss the concepts that are part of computer forensics known as cryptology. The term cryptography is from Ancient Greek and means “h...
Organizations of all sizes often fail to successfully install needed foundational components of an internal control system. Whether large or small, entities must view policies, procedures, and all controls in a wholistic manner...