Events

November 5, 2024
1:00 pm
Previously-broadcast session FOR INFORMATION ONLY (no CPE credit available for re-watching) Listen to Risk Advisory and NFP experts discuss risks facing NFP organizations. Learn how to avoid and mitigate these risks through an engaging discussion. Attendees will learn to identify...
November 7, 2024
1:00 pm
Previously-broadcast session FOR INFORMATION ONLY (no CPE credit available for re-watching) On April 4, 2024, the Office of Management and Budget (OMB) released an updated set of guidelines for federal awards issued on or after October 1, 2024.This release is...
December 4, 2024
8:00 am
In today’s rapidly evolving landscape, technology and artificial intelligence (AI) are transforming the way that internal controls are implemented and managed. Is your organization maximizing these resources? Join our experts as we discuss how recent innovations can enhance the effectiveness...
December 4, 2024
10:15 am
This session will provide an overview of common frauds that non-profit organizations have recently fallen victim to, real-life case studies highlighting the sophisticated techniques used by bad actors those perpetrate frauds, and best practices organizations can implement to protect themselves....
December 4, 2024
2:30 pm
In this session, we’ll break down the different federal grants compliance requirements and identify the specific “department” that they should fall under. It is important to establish a culture of compliance, and resource allocation is a critical piece. Even if...
December 4, 2024
2:30 pm
Join us for an insightful session where we will provide a comprehensive overview of the recent revisions to 2 CFR Part 200, also known as Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards (Uniform Guidance). This course...
December 4, 2024
4:30 pm
Fraud can encompass waste and abuse, improper payments, money laundering, terrorist financing, public security, cybersecurity issues as well as reputational risk. Fraud is often perpetrated through synthetic identities, customer account takeover, nefarious applications, digital payments and authentication, procurement policies, weak...