Zombie SPACs and Blood Baths

By John Kahn, Partner, CFGI You may have heard about the massive spike in the popularity of SPACs, but have you heard about Zombie SPACs and Blood Baths? Writing this in Atlanta, Georgia, home of “The Walking Dead” TV show, makes it easier to appreciate that a “Zombie SPAC” is a SPAC without enough life… More

Meet Angela Barcelos: CFGI’s Risk Advisory Practice Leader

Through hard work and dedication, Angela Barcelos has made a name for herself at CFGI and in the broader financial industry.


4 Steps Management and Audit Committees Should Take to Address Coronavirus Concerns

Every day brings new developments regarding the novel coronavirus as the crisis worsens and reaches pandemic proportions.


Should You Insource, Outsource or Co-Source Your SOX Compliance Program?

The pros and cons of different SOX compliance program models Every publicly traded company is legally obligated to comply with the Sarbanes-Oxley (SOX) Act, and that compliance inevitably comes at a cost.


The Future Is Already Here, and CFOs Need to Transform Finance to Survive

Download the Whitepaper

Insight and Advice From 3 Seasoned SOX Specialists

CFGI recently rounded up a few of its top Sarbanes-Oxley specialists to discuss all things SOX compliance on camera.


eBook: The 6 Habits of a Highly Effective SOX Compliance Program

Every year, public companies can spend millions of dollars on their Sarbanes-Oxley (SOX) compliance programs.


CFO’s Guide to Significant Deficiencies and Material Weaknesses

The PCAOB defines a material weakness as, “a deficiency, or a combination of deficiencies, in internal control over financial reporting, such that there is a reasonable possibility that a material misstatement of the company’s annual or interim financial statements will not be prevented or detected on a timely basis.


Whitepaper: You’ve got mail – The Hidden Dangers of Phishing

In the past several years, it has been hard to miss the many stories of major businesses, politicians and public figures falling victim to malicious hacking and the release of confidential and sensitive personal or professional data.