8301-B W. Commercial
Tamarac, FL 33351
Phone: (954) 343-1327
Fax: (954) 343-1360
March 06, 2015 7:00 PM
Known for its music in the late 1960s and 1970s Three Dog Night is a soul/rock band from Los Angeles. Formed in 1968 with three lead vocalists, Danny Hutton, Chuck Negron and Cory Wells, the band has three number one singles in the US: "Mama Told Me (Not to Come)," "Joy to the World" and "Black & White," each song featuring a different lead singer. Starting off with its 1968 self-titled debut, the band has released a total 13 gold albums and over 20 Billboard Top 40 Hits. Despite playing a farewell show in 1976, Three Dog Night reunited and dropped its single "It's a Jungle," its first single in seven years, in 1983 and continues to perform and release new music.
March 06, 2015 8:00 PM
March 06, 2015 8:00 PM
Motown the Musical has been highly appraised by critics, being a four time Tony Award Nominee, tells the story of the life of music mogul, Berry Gordy and his part in the spreading of Motown taking place in 1959. The plot of the musical draws upon the the autobiography of Berry Gordy. The Musical is a look at the back-story of many of the greatest Motown artists' careers and celebrates how Motown changed American culture forever-the music breaking barriers that segregation had created. Gordy was an extremely prominent actor in the movement having started the careers of some of the greatest Motown stars including, Smokey Robinson, Micheal Jackson, Diana Ross and the Supremes,Stevie Wonder, and Marvin Gaye, amongst many more. The show tunes are classic Motown hits, featuring songs by many of the artists he produced. The Musical was premiered on Broadway in 2011.
March 06, 2015 7:30 PM
The high-stakes world of middle school spelling competitions takes center stage in "The 25th Annual Putnam County Spelling Bee". This hit musical comedy follows six overachieving would-be wordsmiths and their neurotic parents, using hilarious original songs like "Woe Is Me" and "Chip's Lament" to display teenage troubles at their worst. In the end, the contest teaches the valuable lesson that winning isn't the only definition of success. With music and lyrics by William Finn and book by Rachel Sheinkin, "The 25th Annual Putnam County Spelling Bee" was nominated for Best Musical and five other Tony Awards in its original run, winning two, including Best Book. See why "The New York Times" calls it "Irresistible! Riotously funny!" -- and maybe even get invited up on stage to compete alongside the teens in the spelling bee.
March 06, 2015 7:30 PM
Aesop Rock is an American hip hop artist and a front-runner of the alternative hip hop movement resurgence of the late 90s and 2000s. His lyrics are layered and complex, allowing multiple interpretations that make his music worth listening to twice. Born and raised in Long Island, Aesop Rock (or Ian Matthias Bavitz) was noticed by El-P, a growing presence on the underground hip hop scene, who signed Bavitz to his label. Since then, the talented rapper has provided guest vocals on multiple tracks for prominent artists and produced a 45-minute track for a Nike-sponsored iPod distributed through Apple. With these collaborations, Aesop Rock might not exactly be considered an underground hip hop artist anymore, but his music by no means demonstrates an artist that has "sold out," but instead an artist that has stuck to his original style through his growing fame.
March 06, 2015
Listen to a live jazz band while you cruise the smooth and scenic waters. Enjoy fine dining with a sumptuous choice of entrees, prepared fresh to order while large picture windows offer stunning views.
March 06, 2015 6:30 PM
March 06, 2015 8:00 PM
March 06, 2015 10:30 PM
March 06, 2015
Surrounded by sights and sounds of jousting knights, court jesters, displays of weapons, games of chance and feasts fit for a king, you will be taken back to days of chivalry, hearty friars and ladies and knights in armor. It will take all day to enjoy the variety of food vendors, 10 stages of entertainment and hundreds of craftsmen.
March 06, 2015 10:30 AM
This 1.5 mile walk starts at the Ranger Station (front entrance) and guides guests past the Gopher Tortoise habitat, through the Pavilion 1 & 2 area, and into the parks extensive mangrove habitat. Guests will receive a historical overview of Hugh Taylor Birch State Park and an introduction to mangrove habitats. They will also learn about the species of plants and animals that populate this ecosystem. The walk concludes along the intracoastal waterway and wraps back around toward the parks main entrance. The walk will take approximately 1.5 hours. Please wear comfortable walking shoes for the outdoors; bring water and any protective gear you might need according to the season.
March 06, 2015 8:00 AM
Program Overview: Organizations of all kinds and sizes are increasingly threatened by fraud. Embezzlement, kickbacks, check fraud, financial statement fraud and vendor billing schemes are just a few of the countless economic crimes committed by employees and outsiders throughout the world. This training session will provide financial professionals with a strong foundation of practical knowledge about how common frauds are committed using a combination of lecture, exercises and group breakout sessions. Course Objectives: Key goals of the conference will include learning: Common and uncommon internal and external fraud schemes threatening organizations today Who commits internal and external (and collusive) fraud Why employees commit fraud How to detect the red flags of common schemes Essential fraud detection tools and techniques Software tools for auditing for fraud Best practices for developing and implementing anti-fraud controls Learning Objectives: Understand the fraud problem Identify the red flags of fraud How to detect and investigate fraud Building an anti-fraud control environment Who Should Attend: Internal auditors External auditors Accountants Bookkeepers Loss prevention managers Controllers/Treasurers Compliance officers Security managers Fraud examiners Accounts payable managers Procurement managers Course Description & Agenda Day 1 8:00 - 8:30Registration8:30 - 09:30Introduction: The fraud ProblemStatistical overview of the fraud problemExternal versus Internal Fraudshort overview of differencesWho commits fraud -- (ACFE data on women versus men, age groups, etc)Why employees commit fraud (The Fraud Triangle)Lessons from fraudsters: (Examples of real-life frauds that can and do affect organizations across industries.PART 1: Common Types of External and Internal Fraud TodayLesson 1: External FraudVendor fraud (Case studies that show ways vendor/billing/sham corporation fraud can be committed)Wire transfer fraud latest external cyber-schemesCyber-crime (hacking/information theft, system sabotage, viruses, etc)Social engineering to commit fraud (Phishing, spear-phishing, smishing, pretexting)Bid-pooling10:00 - 10:15Break10:15 - 12:00Lesson 2: Internal FraudEmbezzlement (General definition; Koss Corp. embezzlement case)T&E fraud/Misuse of company credit cards/P-cardsCollusion w/ domestic or international vendors (kickbacks, bribery)Collusion: Bid-rigging, bribery, kickbacks and other forms of corruption throughout the US and overseas (with statistics and case studiesex: Siemens, Wal-Mart, etc)Theft/falsification of confidential information (Example: Sony Playstation breach or other case)Identity fraud (Graphic description of ways internal ID theft/fraud is committed; pretexting, using co-workers credentials to commit fraud; theft of customer ID)Theft of assets (laptops, physical equipment, software piracy)Procure-to-Pay fraud (Procurement ReceivingAccounts Payable Cycle)Financial reporting fraud (Case study: Enrons accounting scheme in Nigeria, and more recent if available)Internal risk of cyber/information theft and crimeTheft/falsification of confidential informationTheft of assets (laptops, physical equipment, software piracy)Payroll Fraud (Manipulating payroll systems; ghost employees)Counterfeiting and piracy12:00 - 01:00Lunch01:00 - 4:00PART 2: Recognizing the All-Important Red Flags of Internal Fraud and Conducting a Fraud Risk AssessmentLesson 1: Fraud Risk Mitigation Cycle & Red FlagImplementing a Company-Wide System for Detecting, Preventing and Investigating FraudSteps to Conducting a Successful Fraud Risk AssessmentEmbezzlement red flags (Behavioral changes, accounting anomalies)Cash theft red flags (anomalies in daily reconciliations, check-for-cash indicators, etc)2:15 - 2:30Break2.30 - 4:00T&E fraud red flags (Unusually high expense claims; photocopies of receipts, etc) frequent switches in vendors; vendor address is a P.O. box)Collusion/kickback/bribery red flags (long-time vendor suddenly replaced, pricing anomalies, etc)Identity fraud red flags (internal) (Employees complain of ID theft problems, customer complaints)Theft of confidential information (Example: Scientific fraud/fraudulent scientific research)Theft of assets/industrial equipment (laptops, software piracy, construction materials, equipment, gasoline, confidential/proprietary information)Payroll fraud (terminated employees still receiving checks; payroll amounts fluctuate)P2P fraud red flags (Suddenly higher costs of supplies or services; low quality of delivered merchandise)Financial reporting fraud red flags (Unusually high revenues, odd patterns in receivables, etc)Counterfeiting and piracy (Graphic samples of red flags)Internet/cyber-fraud red flags4:00 PMEnd of day 1 SessionDay 2 8:30 - 10:00Lesson 2: Fraud DetectionSAS 99 and Current IIA Practice Guides re: Fraud responsibilityHow frauds are most often detected (General ways: ACFE Chart)Additional general detection methodsWhistleblower hotlines: How to set them up and manage them (detailed discussion of dos and donts). Detailed instruction on best practices and mistakes to avoidMonitor Employee Email, other activitiesSurprise Internal AuditRegular internal audits, incorporating fraud audit testingRatio analysisManual review of all vendors (to ensure absence of sham vendors)10:00 - 10:15Break10:15 - 12:00Data analytics (is both detective and investigative. I/A can use D-A to screen for red flags) Basic steps and techniques and how to gather required data.Specific operational fraud detection A: Procure-to-Pay Auditing (List of Procurement and AP fraud-audit/detection measures)Specific operational fraud detection B: Payroll Fraud Auditing (List of payroll fraud-audit/detection measures)Digging deeper where red flags are detected: Data analyticsReporting findings to management12:00 - 01:00Lunch01:00 - 03:00PART 3: IMPLEMENTING AND MONITORING ANTI-FRAUD CONTROLSInternal Controls and Other Fraud Prevention Measures:Who Should Manage Anti Fraud ActivitiesInternal Controls: Dos and DontsBest Practices in Anti-Fraud Controls.COSO Revised (5/13). Overview of COSO and how to use it specifically to mitigate FRAUD risk.General controls: Segregation of Duties, Delegation of Authority, Background investigationSpecific operations-level controls for each fraud categoryContinuous controls monitoring/Continuous Auditing (CCM/CA)Employee fraud awareness trainingHow to implement and manage a whistleblower hotline3:30Q&AInstructor Peter Goldman has 25 years of experience as a business journalist and trainer, having launched, edited and published numerous business trade periodicals covering small business, international trade, management strategy, banking and personal finance. Mr. Goldman is a Certified Fraud Examiner (CFE) and a member of the Editorial Advisory Committee of the Association of Certified Fraud Examiners (ACFE) as well as an active member of the Institute of Internal Auditors, the High-Tech Crime Investigation Association and the IOFM Controller Certification Advisory Board. He is a regular columnist for the ACFEs newsletter, The Fraud Examiner and is a frequent contributor to other leading industry publications on anti-fraud topics. He has appeared on Fox Business News, The Wall Street Journal This Morning, The New York Times and Internal Auditor magazine. He is president of White-Collar Crime 101 LLC, the publisher of White-Collar Crime Fighter, a widely read monthly newsletter for internal auditors, controllers, corporate counsel, financial operations managers and fraud investigators. He is the author of Fraud in the Markets: Why it Happens and How to Fight It, published by John Wiley & Sons, as well as four other anti-fraud books. He also developed Fraud Aware, a leading fraud awareness-training program. Also please add who should attend this program.