CPE Today
Season 2
Episodes

Monday Oct 17, 2022
Monday Oct 17, 2022
Get ready to make 2023 your best year ever! Do what other accounting professionals only talk about. You comfortably spend time working IN your business, doing the day-to-day operations. Working ON your business, to strategically grow your business, is an advanced move. A strategic plan puts you squarely in charge of your firm’s growth. Instead of your firm running you, you run your firm. With this framework, you achieve the high-value rewards. Whether you want to travel more, pay off your debt or fund your retirement plan, you’ll discover how your firm can raise your quality of life. Forget the traditional, boring business plan which you fill out and then shove into the back of your filing cabinet. Your strategic plan offers clarity about what to do, what to let go of and how to grow your bank account. Follow the Path to Profits Blueprint to build your dream firm.
Are you a CPA?? Are you a Financial Professional?? Earn CPE Credits for Today's Podcast. Check out https://cpe.cx/wmbfy/. Take a quick 5 question quiz and get your certificate today. Super Easy!
Presented by Stephen M. Yoss, CPA, MS (https://yoss.io)Produced by Alicia Yoss & Alanna RegalbutoGraphics By Flaticon.com and iStockMusic by Bensound.comEducation and Compliance By K2 Enterprises (https://k2e.com)
Copyright. All product names, logos, and brands are the property of their respective owners. All company, product, and service names used in this website are for identification purposes only. The use of these names, logos, and brands does not imply endorsement.
Educational Use Only. The information presented in this presentation is for educational use only. The presenter will make specific recommendations, but the participant is highly recommended to do their own due diligence before making any investment decision.

Tuesday Oct 11, 2022
Practical Tools for Protecting Data - Part 2
Tuesday Oct 11, 2022
Tuesday Oct 11, 2022
The security of your data is not something you should take lightly. The latest techniques in encryption, virus protection, and other technologies can help keep all the information on your computer safe from prying eyes - even if it's sensitive! This course will cover what tools are available for securing files with passwords or digital signatures and how best practices affect employees who work remotely (or have flexible hours). By tuning up these basics now rather than coming back later when needed; programs like secure communication apps make sure no one has access to company secrets while also keeping workers happy at their jobs by ensuring proper protocol regarding confidential materials
Are you a CPA?? Are you a Financial Professional?? Earn CPE Credits for Today's Podcast. Check out https://cpe.cx/ptfw2/. Take a quick 5 question quiz and get your certificate today. Super Easy!
Presented by Stephen M. Yoss, CPA, MS (https://yoss.io)Produced by Alicia Yoss & Alanna RegalbutoGraphics By Flaticon.com and iStockMusic by Bensound.comEducation and Compliance By K2 Enterprises (https://k2e.com)
Copyright. All product names, logos, and brands are the property of their respective owners. All company, product, and service names used in this website are for identification purposes only. The use of these names, logos, and brands does not imply endorsement.
Educational Use Only. The information presented in this presentation is for educational use only. The presenter will make specific recommendations, but the participant is highly recommended to do their own due diligence before making any investment decision.

Friday Oct 07, 2022
Practical Tools for Protecting Data - Part 1
Friday Oct 07, 2022
Friday Oct 07, 2022
The security of your data is not something you should take lightly. The latest techniques in encryption, virus protection, and other technologies can help keep all the information on your computer safe from prying eyes - even if it's sensitive! This course will cover what tools are available for securing files with passwords or digital signatures and how best practices affect employees who work remotely (or have flexible hours). By tuning up these basics now rather than coming back later when needed; programs like secure communication apps make sure no one has access to company secrets while also keeping workers happy at their jobs by ensuring proper protocol regarding confidential materials
Are you a CPA?? Are you a Financial Professional?? Earn CPE Credits for Today's Podcast. Check out https://cpe.cx/ptfw1/. Take a quick 5 question quiz and get your certificate today. Super Easy!
Presented by Stephen M. Yoss, CPA, MS (https://yoss.io)Produced by Alicia Yoss & Alanna RegalbutoGraphics By Flaticon.com and iStockMusic by Bensound.comEducation and Compliance By K2 Enterprises (https://k2e.com)
Copyright. All product names, logos, and brands are the property of their respective owners. All company, product, and service names used in this website are for identification purposes only. The use of these names, logos, and brands does not imply endorsement.
Educational Use Only. The information presented in this presentation is for educational use only. The presenter will make specific recommendations, but the participant is highly recommended to do their own due diligence before making any investment decision.

Tuesday Oct 04, 2022
2022 Biggest Security and Privacy Concerns - Part 4
Tuesday Oct 04, 2022
Tuesday Oct 04, 2022
Technology is a business-critical business capability in today’s day and age. Any interruption to an organization’s ability to use its information system poses a significant risk to the viability of the organization. Data breaches, cyber-attacks, and ransomware are examples of some of the biggest existential risks facing businesses today. There are threat actors all around the world that entirely focus on stealing organizational data, stealing economic resources, and disrupting the flow of business. They are using complex social engineering attacks, pervasive phishing messages, intricate malware, and other highly effective techniques. From recently released data breach reports, there were 100k data breaches publicly reported in 2020 alone. Resulting in the personal information of millions of people worldwide being released, billions of dollars of organizational assets, and putting countless people in harm’s way.
This course will go over recent major security breaches including breaches at Solarwinds, Ubiquity, Colonial Pipeline, Tecnimont SpA, Citrix, LabCorp, and others. It will discuss how these breaches occurred, why the breaches happened, and how organizations can prevent it from happening to them. Each case study will discuss a different form of security vulnerability and how to prevent it. The topics will include social engineering, auditing processes for IT Security systems, forensic accounting, password, two-factor authentication, and improvements for managerial oversight. Participants will gain real-world knowledge from the mistakes of other organizations and from that experience develop their own security best practices for their organizationsAre you a CPA?? Are you a Financial Professional?? Earn CPE Credits for Today's Podcast. Check out https://cpe.cx/22BSC4/. Take a quick 5 question quiz and get your certificate today. Super Easy!
Presented by Stephen M. Yoss, CPA, MS (https://yoss.io)Produced by Alicia Yoss & Alanna RegalbutoGraphics By Flaticon.com and iStockMusic by Bensound.comEducation and Compliance By K2 Enterprises (https://k2e.com)
Copyright. All product names, logos, and brands are the property of their respective owners. All company, product, and service names used in this website are for identification purposes only. The use of these names, logos, and brands does not imply endorsement.
Educational Use Only. The information presented in this presentation is for educational use only. The presenter will make specific recommendations, but the participant is highly recommended to do their own due diligence before making any investment decision.

Friday Sep 30, 2022
2022 Biggest Security and Privacy Concerns - Part 3
Friday Sep 30, 2022
Friday Sep 30, 2022
Technology is a business-critical business capability in today’s day and age. Any interruption to an organization’s ability to use its information system poses a significant risk to the viability of the organization. Data breaches, cyber-attacks, and ransomware are examples of some of the biggest existential risks facing businesses today. There are threat actors all around the world that entirely focus on stealing organizational data, stealing economic resources, and disrupting the flow of business. They are using complex social engineering attacks, pervasive phishing messages, intricate malware, and other highly effective techniques. From recently released data breach reports, there were 100k data breaches publicly reported in 2020 alone. Resulting in the personal information of millions of people worldwide being released, billions of dollars of organizational assets, and putting countless people in harm’s way.
This course will go over recent major security breaches including breaches at Solarwinds, Ubiquity, Colonial Pipeline, Tecnimont SpA, Citrix, LabCorp, and others. It will discuss how these breaches occurred, why the breaches happened, and how organizations can prevent it from happening to them. Each case study will discuss a different form of security vulnerability and how to prevent it. The topics will include social engineering, auditing processes for IT Security systems, forensic accounting, password, two-factor authentication, and improvements for managerial oversight. Participants will gain real-world knowledge from the mistakes of other organizations and from that experience develop their own security best practices for their organizations
Are you a CPA?? Are you a Financial Professional?? Earn CPE Credits for Today's Podcast. Check out https://cpe.cx/22BSC3/. Take a quick 5 question quiz and get your certificate today. Super Easy!
Presented by Stephen M. Yoss, CPA, MS (https://yoss.io)Produced by Alicia Yoss & Alanna RegalbutoGraphics By Flaticon.com and iStockMusic by Bensound.comEducation and Compliance By K2 Enterprises (https://k2e.com)
Copyright. All product names, logos, and brands are the property of their respective owners. All company, product, and service names used in this website are for identification purposes only. The use of these names, logos, and brands does not imply endorsement.
Educational Use Only. The information presented in this presentation is for educational use only. The presenter will make specific recommendations, but the participant is highly recommended to do their own due diligence before making any investment decision.

Tuesday Sep 27, 2022
Driving Change in Audit – Digital and Data Technology
Tuesday Sep 27, 2022
Tuesday Sep 27, 2022
In the last 10 years technology has advanced at a relentless pace. Data is now everywhere. So why is it that audit engagement management software and methodologies have changed so little? Auditors feel held back. Frustrated wrestling with dated desktop applications creaking to support remote teams. Wasting time filling in mind-numbing forms.
In today's episode, we join Mark Edmondson, the CEO of Inflo, to discuss the benefits of performing data-driven audits and how you can apply new technology to efficiently complete your audits. Inflo provides many services that help automate your audit workflows and bring your company into the 21st century.
Are you a CPA?? Are you a Financial Professional?? Earn CPE Credits for Today's Podcast. Check out https://cpe.cx/inflo1/. Take a quick 5 question quiz and get your certificate today. Super Easy!
Presented by Stephen M. Yoss, CPA, MS (https://yoss.io)Produced by Alicia Yoss & Alanna RegalbutoGraphics By Flaticon.com and iStockMusic by Bensound.comEducation and Compliance By K2 Enterprises (https://k2e.com)
Copyright. All product names, logos, and brands are the property of their respective owners. All company, product, and service names used in this website are for identification purposes only. The use of these names, logos, and brands does not imply endorsement.
Educational Use Only. The information presented in this presentation is for educational use only. The presenter will make specific recommendations, but the participant is highly recommended to do their own due diligence before making any investment decision.

Friday Sep 23, 2022
2022 Biggest Security and Privacy Concerns - Part 2
Friday Sep 23, 2022
Friday Sep 23, 2022
Technology is a business-critical business capability in today’s day and age. Any interruption to an organization’s ability to use its information system poses a significant risk to the viability of the organization. Data breaches, cyber-attacks, and ransomware are examples of some of the biggest existential risks facing businesses today. There are threat actors all around the world that entirely focus on stealing organizational data, stealing economic resources, and disrupting the flow of business. They are using complex social engineering attacks, pervasive phishing messages, intricate malware, and other highly effective techniques. From recently released data breach reports, there were 100k data breaches publicly reported in 2020 alone. Resulting in the personal information of millions of people worldwide being released, billions of dollars of organizational assets, and putting countless people in harm’s way.
This course will go over recent major security breaches including breaches at Solarwinds, Ubiquity, Colonial Pipeline, Tecnimont SpA, Citrix, LabCorp, and others. It will discuss how these breaches occurred, why the breaches happened, and how organizations can prevent it from happening to them. Each case study will discuss a different form of security vulnerability and how to prevent it. The topics will include social engineering, auditing processes for IT Security systems, forensic accounting, password, two-factor authentication, and improvements for managerial oversight. Participants will gain real-world knowledge from the mistakes of other organizations and from that experience develop their own security best practices for their organizations
Are you a CPA?? Are you a Financial Professional?? Earn CPE Credits for Today's Podcast. Check out https://cpe.cx/22BSC2/. Take a quick 5 question quiz and get your certificate today. Super Easy!
Presented by Stephen M. Yoss, CPA, MS (https://yoss.io)Produced by Alicia Yoss & Alanna RegalbutoGraphics By Flaticon.com and iStockMusic by Bensound.comEducation and Compliance By K2 Enterprises (https://k2e.com)
Copyright. All product names, logos, and brands are the property of their respective owners. All company, product, and service names used in this website are for identification purposes only. The use of these names, logos, and brands does not imply endorsement.
Educational Use Only. The information presented in this presentation is for educational use only. The presenter will make specific recommendations, but the participant is highly recommended to do their own due diligence before making any investment decision.

Tuesday Sep 20, 2022
2022 Biggest Security and Privacy Concerns - Part 1
Tuesday Sep 20, 2022
Tuesday Sep 20, 2022
Technology is a business-critical business capability in today’s day and age. Any interruption to an organization’s ability to use its information system poses a significant risk to the viability of the organization. Data breaches, cyber-attacks, and ransomware are examples of some of the biggest existential risks facing businesses today. There are threat actors all around the world that entirely focus on stealing organizational data, stealing economic resources, and disrupting the flow of business. They are using complex social engineering attacks, pervasive phishing messages, intricate malware, and other highly effective techniques. From recently released data breach reports, there were 100k data breaches publicly reported in 2020 alone. Resulting in the personal information of millions of people worldwide being released, billions of dollars of organizational assets, and putting countless people in harm’s way.
This course will go over recent major security breaches including breaches at Solarwinds, Ubiquity, Colonial Pipeline, Tecnimont SpA, Citrix, LabCorp, and others. It will discuss how these breaches occurred, why the breaches happened, and how organizations can prevent it from happening to them. Each case study will discuss a different form of security vulnerability and how to prevent it. The topics will include social engineering, auditing processes for IT Security systems, forensic accounting, password, two-factor authentication, and improvements for managerial oversight. Participants will gain real-world knowledge from the mistakes of other organizations and from that experience develop their own security best practices for their organizations
Are you a CPA?? Are you a Financial Professional?? Earn CPE Credits for Today's Podcast. Check out https://cpe.cx/22BSC1/. Take a quick 5 question quiz and get your certificate today. Super Easy!
Presented by Stephen M. Yoss, CPA, MS (https://yoss.io)Produced by Alicia Yoss & Alanna RegalbutoGraphics By Flaticon.com and iStockMusic by Bensound.comEducation and Compliance By K2 Enterprises (https://k2e.com)
Copyright. All product names, logos, and brands are the property of their respective owners. All company, product, and service names used in this website are for identification purposes only. The use of these names, logos, and brands does not imply endorsement.
Educational Use Only. The information presented in this presentation is for educational use only. The presenter will make specific recommendations, but the participant is highly recommended to do their own due diligence before making any investment decision.

Friday Sep 16, 2022
An Accountant’s Guide to Cryptocurrency and Blockchain - Part 4
Friday Sep 16, 2022
Friday Sep 16, 2022
Blockchain technology offers the promise of digital truth. When properly implemented is offers a transparent, permanent, immutable, and high-speed record-keeping system. The possibilities are endless, from managing the logistics of supply chain networks to facilitating international commerce. The adoption of this technology is growing with millions of new users every year. Organizations are adopting this technology every day to help improve their existing operations through its ledger capabilities or executing smart contracts. Cryptocurrency is one example of blockchain technology. Its growth and value have exploded to over $2 trillion in the last few years. This growth has helped to fuel widespread adoption amongst Wall Street and regular investors alike.
While more popular than ever, few business professionals understand these technologies, their capabilities, their risks, and their potential impacts on business operations and processes, such as contract execution, recording and maintaining real estate ownership records, and supply chains. This incredible technology is wrapped in mystery for most accounting professionals. This course will provide a detailed and in-depth look at this technology including a detailed overview of the underlying technology, the benefits, the risks, the major players, and many practical applications. Participants will gain a deeper understanding of the inner workings of this technology as well as recommendations on how to get started.
Are you a CPA?? Are you a Financial Professional?? Earn CPE Credits for Today's Podcast. Check out https://cpe.cx/abgc4/. Take a quick 5 question quiz and get your certificate today. Super Easy!
Presented by Stephen M. Yoss, CPA, MS (https://yoss.io)Produced by Alicia Yoss & Alanna RegalbutoGraphics By Flaticon.com and iStockMusic by Bensound.comEducation and Compliance By K2 Enterprises (https://k2e.com)
Copyright. All product names, logos, and brands are the property of their respective owners. All company, product, and service names used in this website are for identification purposes only. The use of these names, logos, and brands does not imply endorsement.
Educational Use Only. The information presented in this presentation is for educational use only. The presenter will make specific recommendations, but the participant is highly recommended to do their own due diligence before making any investment decision.

Tuesday Sep 13, 2022
An Accountant’s Guide to Cryptocurrency and Blockchain - Part 3
Tuesday Sep 13, 2022
Tuesday Sep 13, 2022
Blockchain technology offers the promise of digital truth. When properly implemented is offers a transparent, permanent, immutable, and high-speed record-keeping system. The possibilities are endless, from managing the logistics of supply chain networks to facilitating international commerce. The adoption of this technology is growing with millions of new users every year. Organizations are adopting this technology every day to help improve their existing operations through its ledger capabilities or executing smart contracts. Cryptocurrency is one example of blockchain technology. Its growth and value have exploded to over $2 trillion in the last few years. This growth has helped to fuel widespread adoption amongst Wall Street and regular investors alike.
While more popular than ever, few business professionals understand these technologies, their capabilities, their risks, and their potential impacts on business operations and processes, such as contract execution, recording and maintaining real estate ownership records, and supply chains. This incredible technology is wrapped in mystery for most accounting professionals. This course will provide a detailed and in-depth look at this technology including a detailed overview of the underlying technology, the benefits, the risks, the major players, and many practical applications. Participants will gain a deeper understanding of the inner workings of this technology as well as recommendations on how to get started.
Are you a CPA?? Are you a Financial Professional?? Earn CPE Credits for Today's Podcast. Check out https://cpe.cx/abgc3/. Take a quick 5 question quiz and get your certificate today. Super Easy!
Presented by Stephen M. Yoss, CPA, MS (https://yoss.io)Produced by Alicia Yoss & Alanna RegalbutoGraphics By Flaticon.com and iStockMusic by Bensound.comEducation and Compliance By K2 Enterprises (https://k2e.com)
Copyright. All product names, logos, and brands are the property of their respective owners. All company, product, and service names used in this website are for identification purposes only. The use of these names, logos, and brands does not imply endorsement.
Educational Use Only. The information presented in this presentation is for educational use only. The presenter will make specific recommendations, but the participant is highly recommended to do their own due diligence before making any investment decision.