Q Sessions
Wednesday, November 19,
2:10 p.m. - 3:25 p.m.
Q1. Smarter Philanthropy: How to Leverage Donor-Advised Funds for Greater Impact
Speaker(s): David Bromelkamp
NASBA field of study: Specialized Knowledge - Technical (1.5)
Donor-advised funds (DAFs) are one of the most flexible and underutilized tools in tax-efficient charitable giving. Learn as a donor shares how decades of personal experience with multiple DAFs have shaped his philanthropic strategy — and how CPAs can use similar approaches to benefit clients. Gain practical insights on timing, tax planning, family involvement and how to turn charitable intent into long-term impact.
Author, speaker and MNCPA member David Bromelkamp is offering a free read of his book, AdvisorSmart, for Tax Conference attendees only. Download information will be shared at the event. Check out the book on Amazon
YP FriendlyQ2. Key Tax Changes Found in the One Big Beautiful Bill Act (OBBBA)
Speaker(s): Edward Zollars
NASBA field of study: Taxes - Technical (1.5)
2025 brought the long-awaited arrival of the bill that extended the expiring provisions in the Tax Cuts and Jobs Act. The OBBBA also contained provisions that the President promised to enact while on the campaign trail, such as the accelerated end to many energy related tax credits. Learn the major items in the bill, including the extension of a number of individual and business tax provisions from the TCJA, the new subtractions for qualified tips, qualified overtime and interest on new car loans, as well as the additional subtraction for those over 65. Also, review some of the energy incentives that expired or expire soon.
Q3. Protect Your Practice: Cybersecurity Made Simple for CPA Tax Firms
Speaker(s): Leah Donti
NASBA field of study: Information Technology - Technical (1.5)
In today’s digital age, cybersecurity is no longer optional, especially for small CPA tax firms handling sensitive client data. Learn practical, cost-effective strategies to safeguard your business from cyber threats. Understand how to protect client information, comply with regulations and build trust by implementing key best practices, from password management and secure file sharing to identifying phishing scams and managing system vulnerabilities.