When you're working with clients, it's not always smooth sailing (though we wish it was). Often we need to have difficult conversations. Whether it's to overcome objections...
In February 2016, FASB issued ASU 2016-02, Leases, which provides new guidelines that change the accounting for leasing arrangements. To be able to properly account for leases...
"Transforming Strategic & Financial Management with ChatGPT: Insights for CPAs, CFOs, and Controllers" is a comprehensive 2-hour CPE course designed by Jim Lindell of Thorsten...
Audit Risk Assessment in Plain English, is a 2 hour webcast highlighting the AICPA’s clarified risk assessment standards, along with a new Statement on Auditing Standard (SAS 145)...
Using Outlook for email management is routine for most business professionals these days. But unfortunately, using this tool for so long may cause some to perpetuate bad practices...
The AICPA issued new Quality Management Standards that require all accounting firms that perform audit, review, compilation, attestation, and agreed-upon procedures engagements to...
Award winning discussion leader, former state accountancy board chair, and lifelong tax practitioner Mark Hugh will review ethics for tax professionals: the AICPA Code of...
This course is one of the courses dedicated to our Controllership series. This series of courses is dedicated to exploring the traditional controller role and stepping out of the...
LinkedIn is considered by many to be one of the most impressive growth stories in the history of technology companies in Silicon Valley. In just 16 years it grew from nothing into...
Power Query and Power BI offer great opportunities for accessing your data and making it more useful in reporting scenarios. Learn how to benefit from these tools in this session.
Clients are living longer. Not only does that present challenges to the work we do with them to make sure that their money lasts, but it also brings into play additional issues and...
Protecting yourself from ransomware requires more than just anti-virus software. Additional technology protections are necessary. Further, business continuity, legal and regulatory...