Summary & Check Out (0)
The NJCPA and the NJCPA Education Foundation offer hundreds of seminars, conferences and events every year. Use the filter options below to search our upcoming CPE programs and events.
YOU'VE SELECTED
To provide additional learning opportunities, the NJCPA has partnered with several leading CPE providers. For your convenience, you can register for these events on njcpa.org. You will receive additional information and participation instructions directly from the provider.
Building on Part 1, this course will review the application of sampling in financial statement audits with a focus on sampling for tests of controls. We'll also review the requirements for sampling in Single Audits with a focus...
This course provides a high-level overview and introduction into the world of the forensic accountant. Most accountants have an understanding of the concept of fraud and how it impacts companies, but many individuals do not hav...
Environmental, Social and Governance (ESG) has become a hot topic among standard setters. This session will look at the work of the FASB, GASB, and AICPA in the areas of ESG. We'll also look at the types of engagements CPAs can...
Cloud computing has become a source of cyber-crime. “Cloud forensics is the application of digital forensics in cloud computing as a subset of network forensics to gather and preserve evidence in a way that is suitable fo...
One of the three major forms of occupational fraud, along with corruption and asset misappropriation, is financial statement fraud. From improper asset valuation to fictitious revenues, this course will review financial stateme...
In this course, participants will learn about the five principals of COSO's Fraud Risk Management Guide and the linkages each principal has to the use of forensic data analytics to measurably demonstrate effectiveness and R...
This course is a continuation of our series on preparing to become a forensic accountant. Within this segment we focus on elements of computer forensics. This session is designed to delve into further investigative procedures u...
AU-C Section 315 requires the auditor to gain an understanding of the entity and its environment and the entity's internal controls in order to design appropriate audit procedures. This course will review the key requirements o...
This is a continuing part of our series on forensic accounting. Within this segment we discuss the concepts that are part of computer forensics known as cryptology. The term cryptography is from Ancient Greek and means “h...
This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in suc...
An operational audit is a method of examining how an organization conducts business. It identifies areas where an entity can improve to be more effective and efficient. This course will focus on how to plan and perform operatio...
Quality management is important. Every CPA firm that provides audit and other attest services must undergo a third-party quality control review. This session will provide you with the tips on how to avoid common qua...
Organizations of all sizes often fail to successfully install needed foundational components of an internal control system. Whether large or small, entities must view policies, procedures, and all controls in a wholistic manner...