BEGIN:VCALENDAR
VERSION:2.0
CALSCALE:GREGORIAN
METHOD:PUBLISH
PRODID://NDCP//515807
BEGIN:VEVENT
DTSTAMP:20260429T131612
VTIMEZONE:America/Chicago
DTSTART:20270416T190000Z
DTEND:20270416T210000Z
UID:515807
SUMMARY:Surgent's System and Organization Controls (SOC) Engagements (SOC2)
LOCATION:Webinar
DESCRIPTION:Surgent's System and Organization Controls (SOC) Engagements (SOC2)\n\n04/16/27 02:00 PM CST\n - 04/16/27 04:00 PM CST\Description:\nIn todayâ€™s interconnected world, safeguarding information systems is crucial. This course will provide a comprehensive understanding of SOC engagements, exploring the types of reports (SOC 1Â®, SOC 2Â®, and SOC 3Â®) and the related management assertions. The use of the reports for internal controls over financial reporting (ICFR) and operations and compliance will be analyzed. This course equips accounting professionals with the knowledge to effectively lead in compliance reporting. Objectives:
 Explain the purpose of the Trust Services Criteria and its organization
 Understand the purpose of SOC reports and the roles of key players and identify management assertions specific to different SOC engagement types
 Recall the intended users of SOC 1®, SOC 2®, and SOC 3® reports
 Explain how materiality is determined and used in performing a SOC engagement
 Summarize the criteria for a vendor to be considered a subservice organization
 Explain the considerations for deciding between the inclusive and carve-out method for subservice organizations
 Define service commitments and system requirements in a SOC 2® engagement
 Determine the appropriate form and content of a report on the examination of controls at a service organization
 Presenters:Cory NgField of Study:Information Technology (2)Major Topics:
 Purpose and organization of the Trust Services Criteria
 Management assertions specific to different SOC engagement types
 Intended users of SOC 1®, SOC 2®, and SOC 3® reports
 Determination and use of materiality in SOC engagements
 Criteria for considering a vendor as a subservice organization
 Inclusive vs. carve-out method for subservice organizations
 Service commitments and system requirements in SOC 2® engagements
 Appropriate form and content of SOC reports
 \Location:\nWebinar\n\n,
X-ALT-DESC;FMTTYPE=text/html:Surgent's System and Organization Controls (SOC) Engagements (SOC2)<br /><br />04/16/27 02:00 PM CST - 04/16/27 04:00 PM CST<br />Description:<br />In todayâ€™s interconnected world, safeguarding information systems is crucial. This course will provide a comprehensive understanding of SOC engagements, exploring the types of reports (SOC 1Â®, SOC 2Â®, and SOC 3Â®) and the related management assertions. The use of the reports for internal controls over financial reporting (ICFR) and operations and compliance will be analyzed. This course equips accounting professionals with the knowledge to effectively lead in compliance reporting. <br><br><b>Objectives:</b><br><ul>
    <li>Explain the purpose of the Trust Services Criteria and its organization</li>
    <li>Understand the purpose of SOC reports and the roles of key players and identify management assertions specific to different SOC engagement types</li>
    <li>Recall the intended users of SOC 1&reg;, SOC 2&reg;, and SOC 3&reg; reports</li>
    <li>Explain how materiality is determined and used in performing a SOC engagement</li>
    <li>Summarize the criteria for a vendor to be considered a subservice organization</li>
    <li>Explain the considerations for deciding between the inclusive and carve-out method for subservice organizations</li>
    <li>Define service commitments and system requirements in a SOC 2&reg; engagement</li>
    <li>Determine the appropriate form and content of a report on the examination of controls at a service organization</li>
</ul><br><b>Presenters:</b><br>Cory Ng<br><br><b>Field of Study:</b><br>Information Technology (2)<br><br><b>Major Topics:</b><br><ul>
    <li>Purpose and organization of the Trust Services Criteria </li>
    <li>Management assertions specific to different SOC engagement types </li>
    <li>Intended users of SOC 1&reg;, SOC 2&reg;, and SOC 3&reg; reports </li>
    <li>Determination and use of materiality in SOC engagements </li>
    <li>Criteria for considering a vendor as a subservice organization </li>
    <li>Inclusive vs. carve-out method for subservice organizations </li>
    <li>Service commitments and system requirements in SOC 2&reg; engagements </li>
    <li>Appropriate form and content of SOC reports </li>
</ul><br />Location:<br />Webinar<br /><br />,  
PRIORITY:3
TRANSP:TRANSPARENT
BEGIN:VALARM
TRIGGER:-PT5M
ACTION:DISPLAY
DESCRIPTION:Reminder
END:VALARM
END:VEVENT
END:VCALENDAR
