Forensic and Investigative Accounting (...
4, ba Forensic accounting is a specialty practice area where accounting, auditing and investigative skills are used to analyze and present information that is suitable for use in a court of law. Topics covered include fraud detection and fraud investigation techniques, valuation of closely held businesses, lost profits analyses, and various types of litigation support services. Fundamental legal concepts governing expert witness testimony are...
AFCEA DC Luncheon Series: Diversity, Eq...
In December 2020 the Secretary of Defense released a memo subject being Actions to Improve Racial and Ethnic Diversity and Inclusion in the military. Diversity and inclusion in the Department are moral imperatives - to ensure every member of the Total Force is treated with dignity and respect. Mission readiness and efficacy at strategic and tactical levels are increased when every member of the team is valued and afforded an opportunity to co...
Google Government Summit - Washington, DC
Government Summit - Washington DC Join the Google Government Summit to learn how technology is helping government leaders achieve mission outcomes and unleash human potential.Google Public Sector is bringing together government and industry leaders from federal, state, and local government from the United States and around the world. Speakers include Jeanette Manfra, MK Palmore, Thomas Kurian and others.Request a spot in person for the full da...
November 15, 2022
Organizer:
Google Cloud Location:
Washington, DC
Veterans In Business Network National C...
Join us IN-PERSON in San Diego The VIB Network is excited to welcome in-person attendees this year in beautiful San Diego, California - November 14-15, 2022. This conference is designed to help Veteran businesses build connections between Corporations, Government Agencies, and Primes looking to create partnerships for contracting opportunities. We have ALL missed building relationships through face-to-face meetings which is why this conferenc...
AFCEA DC Luncheon Series: Operationaliz...
The Defense Department (DoD) is committed to becoming a digital and artificial intelligence-enabled enterprise, capable of operating at the speed and scale necessary to preserve the United States’ military advantage. To that end, the Pentagon has created a new office to lead its artificial intelligence (AI) and Machine Learning (ML) efforts across the enterprise – the Chief Digital and Artificial int...
Texas Cyber Summit
Mission: To Serve Underserved and Women Communities in Cybersecurity. We do this through mentors, scholarships, training, conference access, exam and training vouchers, workshops and more. We want attendees to walk away with an expanded knowledge & capabilities to make them more valuable to themselves and their employers. Vision: Our Vision is to increase the number of persons of all demographics entering the cybersecurity field, particul...
Effective Use of the COSO Framework (16 CPEs)
4, ba Our approach for this in-person training event is to provide the relevant information which internal control professionals will need to fulfill the "Internal Control Life Cycle" using the "top-down, risk-based" approach. We provide the background knowledge sources, advice on how to conduct risk assessments, discuss scoping, and review how to plan the assessment of an internal control framework based on COSO. Risk management activities ar...
ITGC'S Audit Planning Thru Reporting (1...
4, ba Are your ITGC audits really helping to reduce your cybersecurity risks? This CPE internal auditor training event is designed for the financial auditor and IT auditor who need to improve their practical knowledge covering information technology general controls (ITGC). The attendees are walked through the concepts and frameworks that are important to the ITGC internal audit activities in order to create an added value for their organizati...
Auditing Cyber Security Programs (24 CPEs)
4, ba Cybersecurity is one of the biggest internal control areas that need executive attention. You just received an urgent call from the CEO. An e-mail was received demanding $10M Bitcoin to be paid as ransom to unencrypt the company's data. "Oh no! Maybe if we audited the organization's Cybersecurity program and controls before this happened, we might not be in this mess!" Sound familiar? Hundreds of Security, Compliance and Au...
Becoming an Awesome New Auditor! (24 CPEs)
4, ba So, you've accepted a new position as an Internal Auditor; congratulations, and welcome to our world! Internal Auditors provide an extremely important and unique function: to independently assess controls to balance risk that may impede the objectives of an organization. We are the "last line of defense" in organizations to report risk events. Please join us for this valuable in-person, interactive training and allow our expert instructo...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.