Summary & Check Out (0)
The NJCPA and the NJCPA Education Foundation offer hundreds of seminars, conferences and events every year. Use the filter options below to search our upcoming CPE programs and events.
YOU'VE SELECTED
Sorry, no events were found with your selected filters. Please try a different set of filters.
To provide additional learning opportunities, the NJCPA has partnered with several leading CPE providers. For your convenience, you can register for these events on njcpa.org. You will receive additional information and participation instructions directly from the provider.
Accurately identifying and testing controls over compliance is critical, yet it remains a common deficiency highlighted in peer reviews. This course offers a comprehensive overview of internal controls over compliance, with a f...
The new Standards emphasize that quality performance requires conformance to the Standards. Each standard within Domain III specifically identifies the responsibilities of the CAE and the board, as well as joint responsibilitie...
This course examines actual fraud circumstances through the lens of potential prevention. We will examine how selected frauds were accomplished and consider what internal controls may have prevented fraudsters' ability to accom...
Sampling is often identified as a common audit deficiency in peer review. This course will review when is sampling applicable and basics of planning a sample. We'll then focus on the application of sampling in financial stateme...
The new Global Internal Audit Standards were released on January 9, 2024, and will become effective January 9, 2025. The previous version, the International Standards for the Professional Practice of Internal Auditing, released...
Cloud computing has become a source of cyber-crime. “Cloud forensics is the application of digital forensics in cloud computing as a subset of network forensics to gather and preserve evidence in a way that is suitable fo...
This course provides a high-level overview and introduction into the world of the forensic accountant. Most accountants have an understanding of the concept of fraud and how it impacts companies, but many individuals do not hav...
Workpapers are the primary support for findings, conclusions and opinions on any audit or other attest engagement. This course will provide the essential tips and techniques for ensuring workpaper documentation is of a hi...
This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in suc...
Quality management is important. Every CPA firm that provides audit and other attest services must undergo a third-party quality control review. This session will provide you with the tips on how to avoid common qua...
This is a continuing part of our series on forensic accounting. Within this segment we discuss the concepts that are part of computer forensics known as cryptology. The term cryptography is from Ancient Greek and means “h...
An operational audit is a method of examining how an organization conducts business. It identifies areas where an entity can improve to be more effective and efficient. This course will focus on how to plan and perform operatio...
One of the three major forms of occupational fraud, along with corruption and asset misappropriation, is financial statement fraud. From improper asset valuation to fictitious revenues, this course will review financial stateme...