Course

Technology Conference

View All Professional Development

Event Details

Wednesday, November 7 – Thursday, November 8, 2018

8:00am – 4:00pm
(Registration: 7:30am)

Location

Hilton Garden Inn

2023 Commerce Way

Bozeman, MT 59715

406-582-9900

Field of Study

Specialized Knowledge

CPE Credit

16 hours CPE credit

Course Code

MCC-34

Level of Knowledge

Update

Vendor

K2 Enterprises LLC

Prerequisites

Fundamental knowledge of hardware, software and technology trends.

Description

Materials for this conference will be electronic only - no paper manuals will be available.

When registering for sessions, please make sure you only register for one concurrent session.

Not sure if this conference is for you - take this short 10 question self-assessment: click here

This Conference is filled with 16 hours of fast-paced presentations designed to maximize your time and enhance your learning. Nationally recognized speakers have extensive expertise in numerous software applications. They will share their knowledge with you in order to help you do your job with efficiency and ease. Participants will receive helpful tips and advanced techniques, along with the tools and skills necessary to keep up with the ever-increasing pace of changes in computer technology. All sessions feature high quality, full-color computer projection systems for clear viewing. This conference is designed for CPAs in public practice or industry who want to take better advantage of technology to improve efficiency and effectiveness.

Sessions & descriptions:

Wednesday, November 7

Tech Update (8:00 - 9:40am)
What to do? What to buy? What to watch for? What to avoid? Get your answers in Tech Update where you will learn about who offers reliable solutions and what is changing the market. Specific topics included in this session are:  technology trends, recommended hardware specifications, applications and licensing, and security. This session provides concentrated exposure to technology that may reveal ideas, trends, and options that you had not discovered through your normal channels.
Learning Objectives
Upon completing this session, you should be able to:
• Describe an optimum computer configuration for an accounting professional
• Identify a new Microsoft product that covers licensing for desktop operating systems and Office
• Specify a business case for data compliance
• List three protection tools to use while connected to the Internet

Data Analysis with Power Pivot (9:50 - 11:30am)
With Power Pivot, your PivotTable reports become even more powerful. Power Pivot connects directly to most data sources and works with Power Query for superior data imports and transformations. Further, DAX functions allow users to create sophisticated calculations, and the relational functionality of Power Pivot provides all the tools necessary for analyzing data from multiple sources. Participate in this session and realize superior reporting and analytical results by putting Power Pivot to use immediately.
Major Topics Covered
• Connecting to external data sources
• Relating multiple tables to create Data Models
• Summarizing and analyzing data 
• Using DAX to create user-defined calculations
Learning Objectives
Upon completing this session, you should be able to:
• Differentiate between ordinary PivotTables and those created with Power Pivot 
• Identify the advantages of working with Power Pivot
• List the steps for building a PivotTable using Power Pivot
• Define Data Models, Data Analysis Expressions, and Key Performance Indicators

Security – A Practical Guide (9:50 - 11:30am)
For many, security incidents are not a matter of “if” but a matter of “when.” Therefore, you should use an end-to-end approach for protecting your data and in this session, you will learn how to do just that. Specific topics covered include multi-factor authentication, password managers, encryption, mobile device management, anti-virus, firewalls, policies, and other tools that you can implement immediately. Remember, spending more does not make you more secure, but doing the right things can. 
Major Topics Covered
• Why security is no longer optional
• What is covered by each security tool
• Best practices for improving security
Learning Objectives
Upon completing this session, you should be able to:
• List three tools that enhance security
• Identify critical security risks
• Specify a business case for security training
• Differentiate between various tools that improve security

Evaluating Technology Controls (12:30 - 2:10pm)
Technology controls are more important than ever. In the absence of properly-functioning controls, entire systems and the data contained therein can quickly become infected, breached, or simply stop functioning. Auditors, business managers, and consultants all need to know how to evaluate critical technology controls and in this session, you will learn the best ways to evaluate essential information technology general controls and application controls.
Major Topics Covered
• Overview of technology controls
• Established requirements for technology controls
• Examples of critical technology controls 
• How to evaluate technology controls
Learning Objectives
Upon completing this session, you should be able to:
• Distinguish between information technology general controls and application controls
• Identify key information technology control risks within an organization
• Design and perform tests of information technology controls
• Create recommendations for improving technology controls in an organization

Excel Financial Modeling Best Practices (12:30 - 2:10pm)
Excel remains the tool of choice for many professionals when building financial models, including forecasted financial statements and budgets. Yet many of these same professionals have never received any training on the best practices associated with generating financial modeling spreadsheets. Participate in this session to learn many amazing techniques that will not only help you save valuable time when building your Excel-based models, but will also improve the accuracy and quality of your results.
Major Topics Covered
• Design considerations for Excel-based models
• Advanced options for analyzing your models
• Troubleshooting your models
• Formatting reports for improved readability
Learning Objectives
Upon completing this session, you should be able to:
• Identify ten best practices for creating financial models in Excel
• Utilize Excel features and add-in services for sensitivity, trend, and discounted cash-flow analyses
• Create optimization models using Excel's Solver tool
• Implement procedures for eliminating errors in Excel-based financial models
• Incorporate various formatting techniques to improve the usefulness of reports

Office 365 – New Tools, New Tricks (2:20 - 4:00pm)
As part of the ever-changing nature of Office 365, Microsoft has added several new tools - including Teams, Flow, Planner, Stream, and PowerApps - to the suite and has also added many new collaborative features to Excel, Word, and other existing applications. Join us for this productivity-enhancing session in which you will learn about the new opportunities in Office 365 and how to improve your productivity by taking advantage of them.
Major Topics Covered
• Licensing options and update strategies for Office 365
• New apps available in Office 365
• New features in Excel, Word, PowerPoint, and Outlook
Learning Objectives
Upon completing this session, you should be able to:
• Differentiate Office 365 from traditional licenses of Microsoft Office and identify the license option that is best for you and your organization
• List the various update alternatives for Office 365 and determine which option is right for different team members and departments within your organization
• Identify new tools in Office 365 and how they might be useful to you or others in your organization
• Utilize new features in Office 365 applications to optimize productivity

Emerging Technologies (8:00 - 9:40am)
The next wave of technology is arriving now and you will need to choose from various technologies and tools to maintain and improve your productivity. Each emerging technology – among them Artificial Intelligence, Big Data, and Machine Learning – will be explained including why it is important and how it works. Additionally, actual products will be used as examples in each category to turn this discussion from a theoretical overview to a practical selection and how-to cookbook.
Major Topics Covered
• Why emerging technologies should be considered for business
• How each major emerging technology works
• What solutions are available for implementation now
Learning Objectives
Upon completing this session, you should be able to:
• Identify three major emerging technologies
• Manage the volume of Big Data
• Specify a business case for machine learning
• List a current use for artificial intelligence

Extending the Power of Excel with Useful Add-ins (9:50 - 11:30am)
There are many free or low-cost add-ins available to enhance Excel. Included are Microsoft’s Fuzzy Lookup add-in along with countless apps from the Office Store. Additionally, tools such as RiskAMP facilitate Monte Carlo simulations; ActiveData provides users with the means to perform sophisticated audit techniques; and the Analysis ToolPak streamlines a full range of statistical calculations. This session will identify and demonstrate useful add-ins to improve Excel functionality and your productivity.
Major Topics Covered
• Downloading free add-ins from Microsoft
• Using built-in add-ins for common tasks
• Identifying and using add-ins for sophisticated analysis
Learning Objectives
Upon completing this session, you should be able to:
• Identify five useful add-ins to extend the power and functionality of Excel
• Utilize the Fuzzy Lookup add-in to match inexact data
• Define Benford Analysis and why it is useful in fraud detection
• Utilize the Analysis ToolPak to create sophisticated, formula-free analysis
• Identify the processes associated with performing a Monte Carlo simulation on cash flow data

The Best Kept Secrets of Windows (10 9:50 - 11:30am)
Most Windows 10 users continue to use the Windows operating system as they did in prior versions of Windows, ignoring many new productivity and security features. In this session, you will learn the best kept secrets of Windows 10, including how you can use it to minimize the threat of ransomware, integrate with your mobile device, and track your activities. Join us in this session so that you can take full advantage of Windows 10.
Major Topics Covered
• Understanding Windows 10 updates
• Key new features in Windows 10
• Improving security with Windows
• Integrating your Windows 10 with your mobile device
Learning Objectives
Upon completing this session, you should be able to:
• Identify options for managing the update frequency of a Windows 10-based PC
• List at least five features for improving productivity in Windows 10
• Differentiate between key new features in Windows 10 for improving security
• Identify the process for integrating a Windows 10-based PC with an iOS or Android-powered device

Filtering the World – Spam, Virus, and Malware Protection (12:20 - 1:10pm)
Bad actors want inside your systems and want to steal your data. They can attack your systems directly or they can use your email inbox to facilitate their attacks. In this session, you will learn about various protection options for spam, viruses, and malware. Top tools and techniques will be discussed with multiple solutions discussed in each area.
Major Topics Covered
• Explain the threat in each major area
• Understand tools that offer varying levels of protection
• Common errors to avoid
Learning Objectives
Upon completing this session, you should be able to:
• Identify threats requiring mitigation
• Differentiate among various protection methods
• List protection options that you can use
• Utilize the knowledge to protect your systems

Microsoft Power BI – Power Reporting for Free! (12:20 - 1:10pm)
Microsoft’s Power BI Desktop puts business intelligence in your hands! Offered as a free tool, Power BI allows you to create compelling reports in mere minutes. Participate in this session to embark upon a guided tour of linking data into Power BI, creating stunning and powerful visualizations, and building interactive reports, all with the free version of Power BI. Additionally, you will learn how you can extend these capabilities with a Power BI Pro subscription.
Major Topics Covered
• Understanding the Power BI platform and family of services
• Linking and importing data into Power BI
• Creating visualizations in Power BI
• How to integrate Excel into Power BI
Learning Objectives
Upon completing this session, you should be able to:
• Distinguish between various levels of Power BI
• Differentiate between tiles, reports, and dashboards in Power BI 
• List the steps for creating a Power BI report
• Identify options for sharing Power BI components with others

Blockchain and Cryptocurrencies (1:20 - 2:10pm)

Blockchain and cryptocurrencies such as Bitcoin and Ethereum are two of the hottest technology topics today. Yet few business professionals understand these technologies, their capabilities, their risks, and their potential impacts on business operations and processes, such as contract execution, recording and maintaining real estate ownership records, and supply chains. To learn more about these disruptive technologies – including potential effects on the accounting profession – make plans to participate in this fast-paced and highly informative session.
Major Topics Covered
• How blockchain works
• Transforming business processes with blockchain-based applications
• Cryptocurrencies, including Bitcoin and Ethereum, and their potential role in the economy
Learning Objectives
Upon completing this session, you should be able to:
• Define blockchain and identify an example of blockchain technology currently in use
• List examples of how blockchain uses encryption to make the resulting ledger tamper-resistant
• Identify at least four possible uses for blockchain-based ledgers
• Define cryptocurrency and list the major cryptocurrencies in use today
• List examples of benefits and risks associated with using cryptocurrencies

Ransomware – Reducing Your Risks (1:20 - 2:10pm)
Ransomware continues to plague individuals and businesses and represents one of today’s biggest security threats. Yet few are taking the steps necessary to reduce the risk associated with ransomware, including the potential loss of data and the risk of an attack being considered a security breach. In this session, you will learn how you can implement an effective system of control to mitigate the risk that you will become yet another victim of ransomware.
Major Topics Covered
• How ransomware works
• Methods by which ransomware infects your computer
• How to reduce your risks
• You're a victim - what next?
Learning Objectives
Upon completing this session, you should be able to:
• Define ransomware and identify the risks it poses to you professionally and personally
• List the top methods by which ransomware infects an individual computer or a network
• Implement control methods to help reduce your risk of becoming another victim of ransomware

Tales of True Tech Crimes – Ripped from the Headlines (2:20 - 4:00pm)
Security is a top concern for CPAs every year, yet many hacks result from organizations failing to implement effective information technology controls. In this session, you will learn about critical controls by using case studies from recent security incidents. This strategy helps you understand risks and appropriate responses.  Participate in this session to learn how to reduce your risk associated with unauthorized access, theft of information, identity theft, data exfiltration, tax refund fraud, and more.
Major Topics Covered
• Common security failures
• The importance of user authentication
• Security vulnerabilities embedded in hardware and software
• Best practices to facilitating secure environments
Learning Objectives
Upon completing this session, you should be able to:
• List examples of major security incidents reported in the last two years and the related security weaknesses that allowed each breach to occur
• Define the three methods used to authenticate a user to a system
• Differentiate between the security in home-grade technology and business-grade technology
• Identify three security best practices to help mitigate risk

Highlights

Due to rapid changes in technology, agendas and specific topics are determined prior to the conference.

Objectives

After participating in the series of sessions offered, participants should be able to: 

  • Determine how to utilize existing and future technologies to address the needs of your organization
  • Describe trends in hardware and software in order to make more informed decisions for your business and your clients
  • Develop and implement strategies for Windows 10, mobility and information security
  • Utilize Microsoft Office's most powerful features

Designed For

Busy accounting and financial professionals who want to improve their personal and organizational productivity.

View All Professional Development