2021 Technology Conference – Day 2

Description

The Technology Conference offers up to sixteen hours of fast-paced presentations designed to make you more productive and efficient when using technology. K2 Enterprises’ nationally recognized speakers provide you with practical solutions to the real-world issues faced by accounting, financial, and other business professionals. You will receive helpful tips and advanced techniques, along with the tools and skills necessary to keep up with the ever- increasing pace of changes in technology.

Learning Objectives

Upon completing this conference, participants should be able to:
* Determine how to utilize existing and future technologies to address the
needs of your organization
* Describe trends in hardware and software to make more informed decisions
for your business and your clients
* Develop and implement strategies for improving information security and
collaboration
* Utilize the most powerful features of Microsoft Office and other productivity
software

Provider
K2 Enterprises, LLC
Course Level
Update
CPE Field of Study
Information Technology
4
Computer Software & Applications
4
Who Should Attend

Busy accounting and financial professionals who want to improve their personal and organizational productivity

Instructor(s)
Various
Prerequisites

Fundamental knowledge of hardware, software, and technology trends

Advanced Preparation

None

Location
Webcast
Event Information
When
Sep 1, 2021
8:30 am - 4:30 pm MDT
Location
Webcast
Total CPE Credits
8
Format
Webcast

AGENDA

DAY 1 of 1 September 1, 2021
2 CREDITS 8:30 am - 10:10 am
Security Roundtable

Instructor(s): Mac McClelland, MBA JD and Randy Johnston

Security issues continue to plague businesses of all sizes and in virtually all industries. Unfortunately, for many professionals, there are more questions than answers. In the Security Roundtable discussion, you will learn how to address your security issues and concerns and, in turn, mitigate your risk of a data breach. In this roundtable discussion, you will learn from the K2 Enterprises instructional team’s collective experience, with all the instructors for your conference participating in this panel discussion. 

Major Topics Covered

  • Current trends in security risk
  • Leading technologies and best practices to mitigate risk
  • Assessing risk in your organization
  • Options for reducing risk

Learning Objectives
Upon completing this session, you should be able to:

  • Identify the most significant risks potentially impacting your business
  • List examples of security options to mitigate risk
  • Differentiate between options available for authentication
  • List examples of tools you can use to assess your risk-reduction strategies
10:10 am - 10:25 am
Break
2 CREDITS 10:25 am - 12:05 pm
Amazing Accounting Add‐ons

Instructor(s): Randy Johnston

A complete accounting software solution almost always includes additional add-on products. For example, it is hard to accurately calculate sales tax, do budgeting, or have adequate reporting without third-party add-ons. This session provides guidance on some of the best add-ons in the market. If you have needs that your current solution does not meet, you may not need to change it. You may just need the right add-on! Attend this session to discover the best of best extensions for accounting software.

Major Subjects Covered

  • Overview of third-party add-on solutions
  • Review add-ons for both traditional desktop and SaaS small business products
  • Shortfalls of specific add-on solutions
  • Strengths and weaknesses of various solutions

Learning Objectives
Upon completing this session, you should be able to:

  • List the three everyday needs for add-on products in the small business market
  • Identify shortfalls in common add-on solutions
  • Differentiate between products based on business needs
  • Create an add-on strategy for your business
Excel’s Best New Features

Instructor(s): Mac McClelland, MBA JD

With recent Excel updates provided through Microsoft 365/Office 365 subscriptions, Microsoft continues to pack new features into the popular spreadsheet tool. Enhancements to data analysis tools, new functions, and improved collaboration opportunities are available in more recent Excel versions. For those who know about these new features and apply them, exciting opportunities for improved productivity await. Take advantage of this opportunity to learn how you can put Excel’s best new features to work right away!

Major Topics Covered

  • New functions available in Excel 2016 and newer, including subscription-based Excel versions
  • How to collaborate more effectively in newer versions of Excel
  • The importance of Dynamic Arrays and related functions
  • The continued evolution of Power Query

Learning Objectives
Upon completing this session, you should be able to:

  • Apply primary new functions available in Excel, including STOCKHISTORY, SORT, and FILTER
  • Employ Excel’s co-authoring feature to collaborate in real-time with other users
  • List at least three new functions that capitalize on Excel’s Dynamic Arrays feature
  • Utilize Excel’s XLOOKUP and XMATCH functions to locate data in spreadsheets
12:05 pm - 12:50 pm
Lunch
1 CREDIT 12:50 pm - 1:40 pm
Technology Planning for a Post‐Pandemic Environment

Instructor(s): Randy Johnston

Strategic and tactical business planning contributes to short and long-term success. Your technology plan should follow your business plan. But what if your goals become disrupted in the short term, and these events have long-term effects? Think 9/11, smartphones, or COVID-19 and consider if things will go back the way they were.

This session will consider the impact of remote work, security risks, collaboration tools, VOIP, and other tools your team require. How do we manage our various applications and meet our business plan goals? Attend this session to consider how technology planning works in the new normal.

Major Subjects Covered

  • Identify technologies that enable remote and stay-at-home work
  • List the critical security considerations for a virtual workforce
  • Differentiate between options to meet your needs
  • Enumerate technology options to include in your technology plans

Learning Objectives
Upon completing this session, you should be able to:

  • Select remote and stay at home technologies from a list
  • List critical security approaches for managing remote and work-from-home
    team members
  • Differentiate between essential options to meet your needs
  • Identify opportunities to improve your technology plan
Power Automate Your Approvals

Instructor(s): Mac McClelland, MBA JD

We live in a new normal: work-from-home. Applying this reality to our approval processes can be challenging. It requires a solution that functions regardless of location or device. What if I told you there was such a solution already available in many Office 365 / Microsoft 365 subscriptions?

In this session, we will introduce you to Power Automate. It is a wonderful service with hundreds of connectors that will allow you to automate a wide range of everyday approval actions. In this session, you will learn how to send documents from person-to-person, and review and approve them quickly and securely. 

Major Topics Covered

  • Power Automate connectors and actions
  • Types of flows available
  • Flow-building tips and tricks
  • Automated approval demonstration

Learning Objectives
Upon completing this session, you should be able to:

  • Identify commonly used Power Automate connectors
  • Identify commonly used Power Automate actions
  • Identify and understand types of flows available
  • List Power Automate benefits and challenges
1 CREDIT 1:45 pm - 2:35 pm
Backups Done Right

Instructor(s): Randy Johnston

Where is your data? Do you have it controlled and backed up? If all your information is in the cloud, how do you verify that the backup recovery is rapid? If your data is in various silos from your application providers, how do you ensure you have the necessary protection and disposal approaches?

This session will help you understand and guide your IT team and providers to take the right actions to protect your business. Backup considerations, including cloud, backup appliance, disaster recovery, and business continuity approaches, are included. If you are from the trust but verify school of thought, this session will help you ask the right questions.

Major Topics Covered

  • List the significant backup approaches
  • Identify areas of critical weakness or threats in your backup and recovery systems
  • List all critical and non-critical applications and establish their order of recovery
  • Differentiate between backup solutions based on their features and benefits

Learning Objectives
Upon completing this session, you should be able to:

  • Distinguish the differences in the top five methods for backup
  • Detect common backup deficiencies
  • Categorize backup priorities, including RPO and RTO
  • Create an implementation plan for your business
Turbocharging Small Business Reporting with Power Query

Instructor(s): Mac McClelland, MBA JD

Every small business accountant knows and accepts the reporting limitations associated with entry-level tools. Most of these same professionals periodically export data to Excel, text, or other file formats to create custom reports to manage their business.  The related data transformations required to utilize exported data can be automated using Microsoft’s Power Query tool in Excel. With Power Query, these professionals can perform simple and complex tasks almost instantly.  Participate in this session to learn how to use Power Query – a tool you already own – to create more accurate and timely reports for your small business.

Major Topics Covered

  • Tips and tricks for accessing, transforming, and combining data exported from small business applications into meaningful reports using Power Query
  • Methods of automating and enhancing report generation processes using templates and refreshing data from related applications
  • Advanced Power Query techniques

Learning Objectives
Upon completing this session, you should be able to:

  • Identify when you might utilize critical features available in Power Query, including getting data from tables, workbooks, text files, databases, web pages, and other sources
  • List the steps to export data from QuickBooks Desktop and QuickBooks Online, and identify key source reports that you can use to export data from Excel into Power Query
  • Define key terms associated with Power Query, such as DAX, ODBC, Power Pivot, Pivot Tables, and the M programming language
  • Identify an example of when you might want to use the “Open from Folder” tool in Power Query
2:35 pm - 2:50 pm
Break
2 CREDITS 2:50 pm - 4:30 pm
Tales of True Tech Crimes – Ripped from the Headlines

Instructor(s): Mac McClelland, MBA JD

2020 was an exceptional year for everyone, and like everyone, the hackers, scammers, and other technology criminals took advantage of new opportunities brought by COVID.  Criminals reportedly used innovative approaches to exploit weaknesses created by the pandemic.  You will learn tips and techniques from these events to help protect you, your company, and your data.  

Attend this session and learn more about how high-profile control failures occurred so you can be more effective at preventing crimes such as theft, malware, ransomware, phishing, and hacking.

Major Topics Covered

  • Common security weaknesses that occur with hardware and software at home and in the office
  • Malware, ransomware, data breach, and incident response tips
  • Internal control failures resulting in the theft of assets or unauthorized manipulation of data
  • User authentication and security awareness training

Learning Objectives
Upon completing this session, you should be able to:

  • List at least three major security incidents reported in the headlines in the last year and explain at least one primary control design or operation flaws that allowed the hack to occur
  • Select the correct definitions from a list of standard security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
  • Explain why home-grade computer hardware and applications are sometimes less secure than business and enterprise-grade hardware and applications
  • List at least three best practices learned because of reviewing the incidents cited in the case studies

MEMBER


$ (% off)
$375.00

NON-MEMBER


$ (% off)
$535.00
Become A Member

Register for this Event

2021 Technology Conference – Day 2


Your browser is out-of-date!

Update your browser to view this website correctly.

Update my browser now

×