2580  |  In Person Training  |  Update  |  Scheduled

Technology Conference

Monday, October 29, 2018 8:30am - Tuesday, October 30, 2018 4:30pm

Download to calendar

It is no longer an option but a requirement that CPAs are knowledgeable on a wide variety of technology used in the profession today. This year's K2 Technology Conference will address how to utilize existing and future technologies, allowing you to tackle the needs of your organization. Earn up to 16 hours of recommended CPE credit via sessions that have been carefully designed to meet the practical needs of accountants and other business professionals.

HOTEL ACCOMODATIONS: Sleeping rooms are available at the Sheraton Midwest City Hotel at the Reed Conference Center. Rooms are available through October 7 for a special rate of $114 per night. To make your reservation, click here or call the Sheraton at (800) 325-3535 and mention you are with the Oklahoma Society of CPAs' event.

PARKING: Self-parking is available at no charge to all attendees and hotel guests.

Instructors


Designed For

Busy accounting and financial professionals who want to improve their personal and organizational productivity


Your Price: $570.00

This is your base price and does not reflect any additional session fees, optional add-ons, or guest registrations. This price excludes the early-bird discount. Early-bird registration ended October 7, 2018.

Members log in and save $100.00 on this event. Not a member? join today.

Sessions

Monday, October 29, 2018

8:30am - 10:10am
$0.00
  • Describe an optimum computer configuration for an accounting professional.
  • Identify a new Microsoft product that covers licensing for desktop operating systems and Office.
  • Specify a business case for data compliance.
  • List three protection tools to use while connected to the Internet.
Credits: Information Technology 2
Select One and Only One
10:25am - 12:05pm
$0.00
  • List three applications required for running a public practice firm.
  • Differentiate between cloud opportunities.
  • Identify niche opportunities for your practice.
  • List examples of technologies that reduce firm risk.
Credits: Computer Software & Applications 2
10:25am - 12:05pm
$0.00
  • Differentiate between ordinary PivotTables and those created with Power Pivot.
  • Identify the advantages of working with Power Pivot.
  • List the steps for building a PivotTable using Power Pivot.
  • Define Data Models, Data Analysis Expressions and Key Performance Indicators.
Credits: Accounting 2
Instructors:
10:25am - 12:05pm
$0.00
  • List three tools that enhance security.
  • Identify critical security risks.
  • Specify a business case for security training.
  • Differentiate between various tools that improve security.
Credits: Information Technology 2
Instructors:
Select One and Only One
12:05pm - 1:00pm
$0.00
12:05pm - 1:00pm
$0.00
Select One and Only One
1:00pm - 2:40pm
$0.00
  • Distinguish between information technology general controls and application controls.
  • Identify key information technology control risks within an organization.
  • Design and perform tests of information technology controls.
  • Create recommendations for improving technology controls in an organization.
Credits: Auditing 2
Instructors:
1:00pm - 2:40pm
$0.00
  • Identify ten best practices for creating financial models in Excel.
  • Utilize Excel features and add-in services for sensitivity, trend, and discounted cash-flow analyses.
  • Create optimization models using Excel's Solver tool.
  • Implement procedures for eliminating errors in Excel-based financial models.
  • Incorporate various formatting techniques to improve the usefulness of reports.
Credits: Finance 2
Instructors:
1:00pm - 2:40pm
$0.00
  • Identify key hardware options for improved personal productivity.
  • List examples of how to securely synchronize data.
  • Identify how audio-visual technologies are an important consideration in today's business climate.
  • List examples of apps that can have a positive impact at both a personal and a professional level.
Credits: Information Technology 2
2:50pm - 4:30pm
$0.00
  • Differentiate Office 365 from traditional licenses of Microsoft Office and identify the license option that is best for you and your organization.
  • List the various update alternatives for Office 365 and determine which option is right for different team members and departments within your organization.
  • Identify new tools in Office 365 and how they might be useful to you or others in your organization.
  • Utilize new features in Office 365 applications to optimize productivity.
Credits: Computer Software & Applications 2

Tuesday, October 30, 2018

8:30am - 10:10am
$0.00
  • Identify three major emerging technologies.
  • Manage the volume of big data.
  • Specify a business case for machine learning.
  • List a current use for artificial intelligence.
Credits: Information Technology 2
Select One and Only One
10:25am - 12:05pm
$0.00
  • Identify bottlenecks in traditional small business accounting operations.
  • Specify examples of applied technology to improve accounting efficacy.
  • List examples of various small business accounting solutions, including key characteristics.
  • Differentiate between various small business accounting solutions based on feature set.
Credits: Computer Software & Applications 2
10:25am - 12:05pm
$0.00
  • Identify five useful add-ins to extend the power and functionality of Excel.
  • Utilize the Fuzzy Lookup add-in to match inexact data.
  • Define Benford Analysis and why it is useful in fraud detection.
  • Utilize the Analysis ToolPak to create sophisticated, formula-free analysis.
  • Identify the processes associated with performing a Monte Carlo simulation on cash flow data.
Credits: Computer Software & Applications 2
Instructors:
10:25am - 12:05pm
$0.00
  • Identify options for managing the update frequency of a Windows 10-based PC.
  • List at least five features for improving productivity in Windows 10.
  • Differentiate between key new features in Windows 10 for improving security.
  • Identify the process for integrating a Windows 10-based PC with an iOS or Android-powered device.
Credits: Information Technology 2
Instructors:
Select One and Only One
12:05pm - 1:00pm
$0.00
12:05pm - 1:00pm
$0.00
Select One and Only One
1:00pm - 1:50pm
$0.00
  • Differentiate between various accounting solutions.
  • Identify key requirements of your accounting/ERP solution.
  • List solutions that potentially fit your specific needs.
Credits: Computer Software & Applications 1
1:00pm - 1:50pm
$0.00
  • Distinguish between various levels of Power BI.
  • Differentiate between tiles, reports, and dashboards in Power BI.
  • List the steps for creating a Power BI report.
  • Identify options for sharing Power BI components with others.
Credits: Information Technology 1
Instructors:
1:00pm - 1:50pm
$0.00
  • Identify threats requiring mitigation.
  • Differentiate among various protection methods.
  • List protection options that you can use.
  • Utilize the knowledge to protect your systems.
Credits: Information Technology 1
Instructors:
Select One and Only One
2:00pm - 2:50pm
$0.00
  • Define blockchain and identify an example of blockchain technology currently in use.
  • List examples of how blockchain uses encryption to make the resulting ledger tamper-resistant.
  • Identify at least four possible uses for blockchain-based ledgers.
  • Define cryptocurrency and list the major cryptocurrencies in use today.
  • List examples of benefits and risks associated with using cryptocurrencies.
Credits: Information Technology 1
Instructors:
2:00pm - 2:50pm
$0.00
  • Identify questions to ask of your IT team.
  • Differentiate IT approaches and responsibilities.
  • List the options that you can use for IT.
Credits: Information Technology 1
2:00pm - 2:50pm
$0.00
  • Define ransomware and identify the risks it poses to you professionally and personally.
  • List the top methods by which ransomware infects an individual computer or a network.
  • Implement control methods to help reduce your risk of becoming another victim of ransomware.
Credits: Information Technology 1
Instructors:
3:00pm - 4:40pm
$0.00
  • List examples of major security incidents reported in the last two years and the related security weaknesses that allowed each breach to occur.
  • Define the three methods used to authenticate a user to a system.
  • Differentiate between the security in home-grade technology and business-grade technology.
  • Identify three security best practices to help mitigate risk.
Credits: Information Technology 2
Instructors:
$50.00
You can optionally select to receive printed materials in addition to electronic materials.

Instructors

Steven M. Phelan

Steven M. Phelan, CPA, CITP, manages an accounting practice based in Oklahoma City. His areas of practice include taxation, accounting, business advisory and technology consulting services. He is a national speaker for K2 Enterprises and covers a variety of computer software and technology related topics.

Thomas G. Stephens

Thomas G. (Tommy) Stephens Jr., CPA, CITP, is an associate at K2 Enterprises. After working at BellSouth Corportation Mr. Stephens opened his public accounting practice in the metropolitan Atlanta area in 1994. In his practice, Mr. Stephens provided accounting, tax, and consulting services to individuals and a wide variety of small and emerging businesses. As part of his practice, he developed a successful consulting practice providing installation and support services on small business accounting software. Additionally, he began writing and presenting continuing professional education courses to accounting and finance professionals. In 2003, Mr. Stephens affiliated with K2 Enterprises, where he continues to develop and present educational programs to accounting and finance professionals.

Stephen M. Yoss

Stephen M. Yoss, Jr., CPA, is a senior technology strategist and principal of MantisPRO, a company that focuses on helping organizations develop a technology strategy to streamline their business operations. Stephen has consulted with several companies on how to lower overhead, personnel and compliance costs by investing in technology and reengineering their business practices. He teaches his clients to embrace technology at every opportunity in order to increase efficiency and productivity.

Stephen began working with technology at age ten, and started his first IT company at age 13, designing web applications for local businesses. He has presented to thousands of practitioners nationwide on topics such as cloud computing, mobile technology, spreadsheet design and best practices, information security, identity theft prevention and many more.


Register for this course