2019 Georgia Society of CPAs Technology Conference

2019 Georgia CPA Technology Conference

Sponsored by The Georgia Society of CPA’s

GSCPA
THANKS TO EVERYONE WHO PARTICIPATED IN THE GEORGIA CONFERENCE AND MADE IT SUCH A GREAT EVENT! WE LOOK FORWARD TO SEEING YOU AT NEXT YEAR’S CONFERENCE AND, IN THE MEANTIME, PLEASE LET US KNOW HOW WE CAN SERVE YOU.
georgia society of cpa’s technology Conference Agenda

On-site Check-in and Registration

Opening Session (100 Minutes)

Technology continues to revolutionize how we work; those who ignore this fact do so at their own peril. To remain successful, business professionals must stay on top of technology trends, implement the best solutions, and seize opportunities as they appear.

In this session, you will learn about a wide variety of technology trends, solutions, and opportunities. Specifically, you will learn about spending trends, software licensing issues, leading-edge hardware, mobile and cloud strategies, and security risks. If you attend only one technology session this year, make sure it is this one so that you are well-positioned for what lies ahead!

Major Topics Covered
  • Hardware and software trends that affect your strategy
  • Purchase guidance on what to approve and avoid
  • Innovative applications for productivity and security
  • Interesting technology to consider
Learning Objectives

Upon completing this session, you should be able to:

  • List major hardware and software trends and identify their importance as it relates to purchasing these assets
  • Identify major updates, strategies, and opportunities emanating from leading software publishers
  • Differentiate between the most significant security risks and implement practical solutions to mitigate these risks
  • Assess the potential impact of implementing new generation hardware options
  • Identify leading cloud options available today and the importance of facilitating mobile use in your organization

Networking Break

Breakout Session (100 Minutes)

You have heard of the Dark Web, but have you experienced it? If not, buckle in for a scary ride through the underbelly of the Internet. Here many illicit and illegal activities occur every day, potentially affecting our personal and organizational security. In this session, you will experience first-hand the Dark Web and all that it entails – both positive and negative. Upon completing this session, you will understand why it is important to secure your information so that you do not become yet another victim of the Dark Web.

MAJOR TOPICS COVERED
  • The origin of the Dark Web and the Deep Web and their relationship to the “ordinary” Internet
  • How to connect to and browse the Dark Web
  • Security risks associated with accessing the Dark Web
  • Potentially useful sites and applications on the Dark Web
LEARNING OBJECTIVES

Upon completing this session, you should be able to:

  • Differentiate the Dark Web from the ordinary Internet and from the “Deep Web”
  • Identify the steps necessary to securely connect to and navigate the Dark Web
  • List examples of useful sites and uses of the Dark Web
  • Provide illustrations of how the Dark Web is used to facilitate potentially illegal activities, including those such as selling hacked data and identity theft

“Going virtual” has evolved beyond anywhere, anytime, any device access to full-service remote support. There are a wide variety of tools that help us work virtually. In this session you will learn about many of them, including multi-factor authentication, hosting, VOIP telephony, video conferencing, document management systems, portals, Microsoft Bookings/Teams/TimeTrade, and employee portals.

The goal, of course, is to have all team members effectively work wherever they are with a full complement of tools. Attend this session to learn the best ways to make these technologies work and how your business can execute a virtual employee strategy.

Major Topics Covered
  • Remote hardware and software trends that affect your ability to work anywhere anytime
  • Purchase guidance on what to expect, approve, and avoid
  • Key applications for productivity and security
  • Interesting technology to consider for remote work
Learning Objectives

Upon completing this session, you should be able to:

  • List major hardware and software trends and identify their importance as it relates to working remotely
  • Illustrate how remote integrations are changing the landscape of the workplace
  • Identify major updates, strategies, and opportunities emanating from leading providers of technology
  • Differentiate between the remote security risks and implement practical solutions to mitigate these risks
  • Assess the potential impact of implementing a virtual work environment to improve productivity
  • Identify leading remote tools available today and the importance of facilitating remote work in your organization

Lunch and Networking Break

Breakout Sessions (50 Minutes)

Charts and graphs are nothing new. However, many professionals struggle with building effective visualizations. If that statement describes you, take part in this session to improve your skills when building visualizations. As a result of doing so, you will be able to create visualizations that will enhance your communication skills. This is much more than just a session on fundamental charts.  Instead, in this session you will learn how to create advanced charts that are interactive, dynamic, and animated. If you are looking to improve your communication skills, this session is a must for you.

Major Topics Covered
  • Understanding the importance of visualizations in Microsoft Office and other applications
  • Best practices associated with creating charts, graphs, and other visualizations
  • How to add interactivity and animations to your charts and graphs
  • Common mistakes to avoid when building visualizations
Learning Objectives

Upon completing this session, you should be able to:

  • Identify the types of visualizations that should be used to communicate specific messages
  • Build effective visualizations in Office applications
  • Create interactive visualizations
  • Utilize Sparklines and Conditional Formatting to enhance visualizations in Excel

Security is a top concern for CPAs every year. Yet many hacks result from organizations not implementing effective internal controls over information technology.  In this session, you will learn about critical IT-related controls using a case study approach. More specifically, you will learn from real-world examples of breaches and security failures. Accordingly, you will understand better how to protect your company and its data.  Attend this fast-paced session and learn more about IT-related controls you can use to prevent computer crimes such as identity and information theft, tax refund fraud, and more. 

Major Topics Covered
  • Data breach and computer security tips
  • Security awareness training
  • Learn more about current events and improve your security knowledge at the same time
Learning Objectives

Upon completing this session, you should be able to:

  • List at least three major security incidents reported in the headlines in the last two years, and explain at least one major control design or operation flaws which allowed the hack to occur
  • Define the three factors used to authenticate someone to a system and explain why two-factor authentication is preferable to one-factor authentication
  • Explain why home-grade computer hardware and applications are inherently less secure than business and enterprise grade hardware and applications
  • List at least three best practices learned as a result of reviewing the incidents cited in the case studies

Networking Break

Breakout Session (50 Minutes)

The Supreme Court’s Wayfair decision changes the game with respect to sales tax compliance. Now, many states are rushing to implement laws requiring even small businesses to charge, collect, and remit sales taxes on transactions that cross state lines. As a result, sales tax compliance just became infinitely more complex and many businesses could be looking at substantial fines and penalties for not complying. In this session, you will learn about your new compliance requirements and about tools that you can use to meet these requirements.

Major Topics Covered
  • Reviewing the Wayfair decision and its impact on businesses
  • Understanding tools embedded in many accounting applications and services to facilitate sales tax compliance
  • Identifying third-party tools that are useful in multi-jurisdiction compliance efforts
Learning Objectives

Upon completing this session, you should be able to:

  • Identify key components of the Wayfair decision that impact your organization
  • List examples of tools already embedded in many accounting applications that can help you satisfy your compliance objectives and how to activate these tools
  • Name at least three tools built specifically for sales tax compliance and provide examples of how these tools can streamline compliance processes

No doubt, personal technologies are now mainstream. But can we automate our homes – and businesses– for convenience and security? What about connecting smart speakers like Amazon Alexa or Google Home units into our lighting systems or our surround sound TV systems? Can we automate these and other tasks to provide even more convenience, security, and privacy?

In this session, you will learn the options available to tie various systems together. For more sophisticated needs, you will learn the fundamentals of using integration tools like “If This, Then That (IFTTT)” to handle the task. Tune up your world at home and office with a little bit of effort.

Major Topics Covered
  • Hardware and software trends for personal use
  • Purchase guidance on what to buy and what to avoid
  • Innovative tools for convenience and security
  • Interesting technology to consider for integration into your home
Learning Objectives

Upon completing this session, you should be able to:

  • List major hardware and software trends and identify their importance as it relates to home and small business use
  • Illustrate how streaming feeds, security cameras and similar integrations are changing the landscape of traditional home automation
  • Identify major updates, strategies, and opportunities emanating from leading home automation providers
  • Differentiate between the most significant security risks and implement practical solutions to mitigate these risks
  • Assess the potential impact of implementing a security application to improve home safety
  • Identify leading integration tools available today and the importance of integrating home systems

Networking Break

Closing Session (100 Minutes)

With the release of Excel 2019 and updates in Excel provided through Office 365 subscriptions, Microsoft continues to pack new features into the popular spreadsheet tool. Enhancements to Power Query, new functions, and improved collaboration opportunities are all available in newer versions of Excel. For those who know about these new features and how to apply them, exciting opportunities for improved productivity await. Take advantage of this opportunity to learn how you can put Excel’s best new features to work right away!

Major Topics Covered
  • New functions available in Excel such as IFS, SWITCH, and FORECAST.ETS
  • Creating Data Models and the importance of doing so
  • Enhanced collaboration tools in Excel
  • How to take advantage of Power Query
Learning Objectives

Upon completing this session, you should be able to:

  • List major new features added to recent releases of Excel
  • Apply new functions and features to improve productivity when working with Excel
  • Use Excel to collaborate in real-time with other users
  • Link data from external data sources into Excel using Power Query
Conference Location