Summary & Check Out (0)
The NJCPA and the NJCPA Education Foundation offer hundreds of seminars, conferences and events every year. Use the filter options below to search our upcoming CPE programs and events.
YOU'VE SELECTED
To provide additional learning opportunities, the NJCPA has partnered with several leading CPE providers. For your convenience, you can register for these events on njcpa.org. You will receive additional information and participation instructions directly from the provider.
Arthur Werner will provide financial professionals with the information their teams will need to successfully plan and execute mergers and acquisitions. For major topics covered, see below. This course may be customized or tail...
Sampling is often identified as a common audit deficiency in peer review. This course will review when is sampling applicable and basics of planning a sample. We'll then focus on the application of sampling in financial stateme...
This course is a continuation of our series on preparing to become a forensic accountant. Within this segment we focus on elements of computer forensics. This session is designed to delve into further investigative procedures u...
There is simply no denying that a sufficiently designed and effectively operating system of internal controls over reliable financial reporting is more important than ever. The primary objective of this course is to give partic...
Debt is typically a critical component of the financial statements, impacting the economic decisions of financial statement users. This course will address common issues that may impact the proper presentation and disclosure of...
AU-C Section 315 requires the auditor to gain an understanding of the entity and its environment and the entity's internal controls in order to design appropriate audit procedures. This course will review the key requirements o...
This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in suc...
This course provides a high-level overview and introduction into the world of the forensic accountant. Most accountants have an understanding of the concept of fraud and how it impacts companies, but many individuals do not hav...
Cloud computing has become a source of cyber-crime. “Cloud forensics is the application of digital forensics in cloud computing as a subset of network forensics to gather and preserve evidence in a way that is suitable fo...
The new Global Internal Audit Standards were released on January 9, 2024, and will become effective January 9, 2025. The previous version, the International Standards for the Professional Practice of Internal Auditing, released...