Summary & Check Out (0)
The NJCPA and the NJCPA Education Foundation offer hundreds of seminars, conferences and events every year. Use the filter options below to search our upcoming CPE programs and events.
YOU'VE SELECTED
To provide additional learning opportunities, the NJCPA has partnered with several leading CPE providers. For your convenience, you can register for these events on njcpa.org. You will receive additional information and participation instructions directly from the provider.
Fraud continues to plague businesses at epidemic levels, and technology control failures are a big reason fraud occurs. Using a case study approach, in this session, you will learn about the pervasiveness of fraud, the control ...
Those charged with governance, with the assistance of internal audit, are responsible for overseeing the strategic direction of the organization, and ensuring value is delivered to the entity's stakeholders. This course w...
The QuickBooks ecosystem of accounting tools remains the most widely-used set of accounting applications used by small businesses. Yet, many of these organizations struggle because of inadequate internal controls. In this semin...
This course will allow you to get reacquainted with the statement of cash flows. We will refresher your skills regarding both the preparation and utilization of the statement of cash flows. Significant emphasis will be placed o...
Explore the transformative impact of technology on the audit profession in this forward-looking course. Gain practical insights into cutting-edge tools and trends, including data analytics, artificial intelligence (AI), and aut...
Accounting and finance managers and executives must demonstrate sound technical and analytical necessary for personal growth and organizational success. This course will provide insights into the most critical technical and ana...
Just about every company, no matter its size or the types of activities it undertakes, is at greater risk because of all the types of fraud that can be be carried out electronically. Potential perpetrators can be operating inte...