IT security threats are constantly evolving, so an organization’s response must also evolve and stay ahead of the game. In this interview, David Ciesl...
In this episode, Ron Box, CPA, CITP, CFF, CISSP, Chief Financial Officer and Chief Information Officer at Joe Money Machinery Co. and Joel Lanz, CPA, ...
In this episode, Daniel Schroeder, CPA, CITP, MBA, CISA, CIA, CISM, partner at Habif, Arogeti & Wynne, LLP, and Tommie W. Singleton, CPA, CITP, CMA, C...
Featured speaker, Nancy A. Cohen, CPA.CITP, CIPP discusses the considerations for safeguarding personally identifiable information. As systems and pro...
The implementation of an Enterprise Business Intelligence (BI) framework provides value, insight and reliability of numbers to an entire organization....
The implementation of an Enterprise Business Intelligence (BI) framework provides value, insight and reliability of numbers to an entire organization....
CPAs' Five Key Steps toward effective advisement of a Disaster Recovery Plan and Business Continuity Management James C. Bourke, CPA.CITP and Chair of...
In this episode, Randolph (Randy) P. Johnston and Mary R. MacBain, CPA/CITP discuss the value and necessity of Training and Competency within the acco...
In this episode, David M. Cieslak, CPA/CITP, GSEC discusses the value of the AICPA Top Technology Initiatives program and presents the story behind th...
In Episode 8, AICPA/CICA Privacy Taskforce members, Ev Johnson, CPA (Chair) and Sagi Leizerov continue a 4-part podcast on privacy, by discussing the ...