Summary & Check Out (0)
The NJCPA and the NJCPA Education Foundation offer hundreds of seminars, conferences and events every year. Use the filter options below to search our upcoming CPE programs and events.
YOU'VE SELECTED
To provide additional learning opportunities, the NJCPA has partnered with several leading CPE providers. For your convenience, you can register for these events on njcpa.org. You will receive additional information and participation instructions directly from the provider.
This course is designed to provide learners with an understanding of the Internal Revenue Service (IRS) Cybersecurity Checklist and how it can be used to protect taxpayer data. The course will cover the basics of cybersecurity,...
Fraud continues to plague businesses at epidemic levels, and technology control failures are a big reason fraud occurs. Using a case study approach, in this session, you will learn about the pervasiveness of fraud, the control ...
Periodic FASB checkups are critical for accountants who deal with financial statements prepared in accordance with U.S. GAAP. This course introduces recent FASB pronouncements and revisits selected existing standards that are l...
This course is an updated overview of the single audit of state and local governments and not-for-profit organizations under the OMB Unified Circular, as well as the applicable AICPA standards for compliance audits.
On May 28, 2014, the Financial Accounting Standards Board (FASB) and International Accounting Standards Board (IASB) issued converged guidance on recognizing revenue in contracts with customers (ASC 606). The objective of the g...
This hands-on workshop offers an analytical approach for designing, executing, and communicating results of a comprehensive financial statement analysis. We will explore numerous techniques and approaches that facilitate in-dep...
Just about every company, no matter its size or the types of activities it undertakes, is at greater risk because of all the types of fraud that can be be carried out electronically. Potential perpetrators can be operating inte...