An Introduction to Green Finance and Ethical Investment
|
CIA (2) | CMA (2) | CPA (US) (2) |
Financial Accounting
Accounting
Accounting
|
On Demand (video) |
Architecting Financial Documents: Essential Components for Presentation and Navigation
|
CIA (2) | CMA (2) | CPA (US) (2) |
Financial Accounting
Accounting
Accounting
|
On Demand (video) |
Artificial Intelligence: What Internal Audit and Cyber Professionals Need to Know
|
CIA (2) | CMA (2) | CPA (US) (2) |
Information Technology
Information Technology
Information Technology
|
On Demand (video) |
Balancing the Books: Navigating the Nuances of Debt and Goodwill Calculation
|
CIA (2) | CMA (2) | CPA (US) (2) |
Financial Accounting
Accounting
Accounting
|
On Demand (video) |
Critical Cyber Governance in an Era of Increasing Threats
|
CIA (1) | CMA (1) | CPA (US) (1) |
Information Technology
Information Technology
Information Technology
|
On Demand (video) |
Current Cybersecurity Risk Management Trends
|
CIA (2) | CMA (2) | CPA (US) (2) |
Cybersecurity
Information Technology
Information Technology
|
On Demand (video) |
Ethics for Certified Internal Auditors (CIA)
|
CIA (2) | CMA (2) | CPA (US) (2) |
Ethics
Not eligible for CMA
Not eligible for CPA (US)
|
Ebook Webinar |
Foundations for a Strong Internal Audit Department
|
CIA (2) | CMA (2) | CPA (US) (2) |
Internal Auditing
Auditing
Auditing
|
On Demand (video) |
How to Complete a Data Protection Impact Assessment
|
CIA (1) | CMA (1) | CPA (US) (1) |
Information Technology
Information Technology
Information Technology
|
On Demand (video) |
Keys to Managing an Effective Internal Audit Function
|
CIA (2) | CMA (2) | CPA (US) (2) |
Internal Auditing
Auditing
Auditing
|
On Demand (video) |
Management Internal Control Essentials
|
CIA (2) | CMA (2) | CPA (US) (2) |
Internal control concepts and types of controls
Auditing
Auditing
|
On Demand (video) |
Managing the Internal Audit Function in Line with GIAS - Part 1
|
CIA (1) | CMA (1) | CPA (US) (1) |
Internal Auditing
Auditing
Auditing
|
On Demand (video) |
Managing the Internal Audit Function in Line with GIAS - Part 2
|
CIA (2) | CMA (2) | CPA (US) (2) |
Internal Auditing
Auditing
Auditing
|
On Demand (video) |
Managing the Internal Audit Function in Line with GIAS - Part 3
|
CIA (2) | CMA (2) | CPA (US) (2) |
Internal Auditing
Auditing
Auditing
|
On Demand (video) |
Professional Ethics for Accountants
|
CIA (3) | CMA (3) | CPA (US) (3) |
Not eligible for CIA
Professional Ethics
Not eligible for CPA (US)
|
On Demand (video) |
Projected Financials: Crafting and Analyzing Pro Forma Statements
|
CIA (1) | CMA (1) | CPA (US) (1) |
Financial Accounting
Accounting
Accounting
|
On Demand (video) |
Proper Documentation of Internal Controls
|
CIA (2) | CMA (2) | CPA (US) (2) |
Internal Auditing
Auditing
Auditing
|
On Demand (video) |
Risks and Internal Controls for Employees Working from Home
|
CIA (2) | CMA (2) | CPA (US) (2) |
Internal Auditing
Auditing
Auditing
|
On Demand (video) |
Understanding and Applying the AICPA Code of Professional Conduct
|
CIA (2) | CMA (2) | CPA (US) (2) |
Not eligible for CIA
Not eligible for CMA
Regulatory Ethics
|
Ebook Webinar |
Understanding, Detecting And Preventing Payroll Fraud
|
CIA (2) | CMA (2) | CPA (US) (2) |
Fraud risks
Auditing
Auditing
|
On Demand (video) |
Using AI in a Fraud Investigation
|
CIA (2) | CMA (2) | CPA (US) (2) |
Forensic auditing
Auditing
Auditing
|
On Demand (video) |
Using AI in an Audit
|
CIA (2) | CMA (2) | CPA (US) (2) |
Information Technology
Information Technology
Information Technology
|
On Demand (video) |
What is a SOC Audit and When Do You Need a SOC Report
|
CIA (2) | CMA (2) | CPA (US) (2) |
Internal Auditing
Auditing
Auditing
|
On Demand (video) |
What’s a Data Protection Impact Assessment
|
CIA (1) | CMA (1) | CPA (US) (1) |
Information Technology
Information Technology
Information Technology
|
On Demand (video) |
When Bots Attack: Safeguarding Against AI Cyber Threats
|
CIA (1) | CMA (1) | CPA (US) (1) |
Information Technology
Information Technology
Information Technology
|
On Demand (video) |