NotebookLM Use Cases for Accountants
Availability
Registration Required
Online Meeting
May 22, 2026 12:30 PM - 2:30 PM CT
Cost
$89.00
Credit Offered
2 CPE Credits
Field of Study:
  • 2 Information Technology
This course provides a concise overview of how accountants can use Google NotebookLM (powered by Gemini) as a practical research, synthesis, and knowledge-management companion for high-trust work. You'll learn how to convert static financial statements, audit workpapers, client documents, and regulatory guidance into a structured, conversational knowledge base-so you can query, summarize, compare, and cross-reference sources with greater speed and clarity. This course emphasizes disciplined workflows such as source control, evidence-grounded outputs, and professional judgment so NotebookLM strengthens your analysis instead of replacing it. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
Accountants, auditors, tax professionals, and finance leaders who want faster, evidence-grounded research and better document synthesis without sacrificing professional judgment.

After attending this presentation, you will be able to...

  • Recognize NotebookLM’s core capabilities and accounting-relevant workflows
  • Apply structured sourcing to build reliable client and engagement notebooks
  • Analyze financial and regulatory texts to identify key issues and themes
  • Compare multiple documents to surface inconsistencies and gaps
  • Synthesize evidence into clear memos, summaries, and briefing notes
  • Evaluate output quality using professional skepticism and auditability tests
  • Design repeatable use-case templates for tax, audit, and advisory teams

The major topics that will be covered in this course include:

  • NotebookLM fundamentals: notebooks, sources, prompts, and outputs
  • Turning financial PDFs into searchable, conversational knowledge bases
  • Audit and assurance use cases: workpaper synthesis and issue tracking
  • Tax and regulatory research: comparing guidance across sources
  • Cross-referencing: tracing claims back to documents for defensibility
  • Drafting deliverables: memos, client notes, and executive summaries
  • Risk controls: confidentiality, data handling, and “trust-but-verify” habits
  • Information Technology
Group-Internet-Based
Garrett Wasny, MA, CMC, CITP/FIBP
Powered By