ComplianceOnline

Corporate Governance Regulatory Compliance Training - Live Webinars, Recordings & CDs

If you are seeking to learn how to manage the complex Governance, Regulatory, and Compliance challenges, ComplianceOnline is the right platform. Our training programs help you comply with corporate governance standards and uphold robust compliance management systems with greater levels of transparency, objectivity, and professionalism. Explore our range of courses that cover new laws and regulations, standards, and best practices.

Recorded/CD
Vendor Fraud - How to Prevent Them for Large scale Companies

Vendor Fraud - How to Prevent Them for Large scale Companies

  • Speaker: Peter Goldmann
  • Product ID: 703157
  • Duration: 90 Min
This training on detecting and preventing vendor fraud will help the attendees to identify the different types of vendor-related fraud schemes and implement best practice anti-fraud control strategies.
CD/Recorded
$249
Recorded/CD
Developing and Managing Effective AML/CTF Assurance Programs

Developing and Managing Effective AML/CTF Assurance Programs

  • Speaker: David Harley
  • Product ID: 705406
  • Duration: 60 Min
Learn the intricacies of developing an effective AML/CTF compliance assurance program and implementing it. Learn how to track the performance of each element of the program and remediate in case of risks.
CD/Recorded
$179
Recorded/CD
How to Effectively perform due diligence on outsourced vendors and Navigating SEC and Federal Regulations of Cybersecurity

How to Effectively perform due diligence on outsourced vendors and Navigating SEC and Federal Regulations of Cybersecurity

  • Speaker: Lisa Marsden
  • Product ID: 704154
  • Duration: 60 Min
This training program will equip attendees with basic everyday tools to keep cyber criminals at bay. The course will also emphasize the need for effective communication between team members of a financial firm.
CD/Recorded
$229
Recorded/CD
Overview of FinCEN’s Enforcement Against Money Services Businesses and Use of Geographic Targeting Orders

Overview of FinCEN’s Enforcement Against Money Services Businesses and Use of Geographic Targeting Orders

  • Speaker: Barbara Keller
  • Product ID: 705484
  • Duration: 60 Min
This webinar will cover the agency's current enforcement climate for NBFIs, provide detail on recent enforcement actions against MSBs including money transmitters, virtual currency exchanges, and individuals; and discuss FinCEN’s use of GTOs. This webinar will also provide lessons learned and key themes drawn from FinCEN's increase in enforcement actions against NBFIs and its use of GTOs.
CD/Recorded
$229
Recorded/CD
Evidence Gathering in a Fraud Investigation

Evidence Gathering in a Fraud Investigation

  • Speaker: H. David Kotz
  • Product ID: 703261
  • Duration: 75 Min
This training on fraud investigation will explain how to deal effectively with allegations of fraud and how to conduct internal investigations. It will provide the attendees tips on how to gather evidence in a fraud investigation.
CD/Recorded
$249
Recorded/CD
Preventative Medicine: Is it Time to Streamline Your Physician Enterprise Structure so it Stands the Test of Time

Preventative Medicine: Is it Time to Streamline Your Physician Enterprise Structure so it Stands the Test of Time

  • Speaker: Joseph Wolfe
  • Product ID: 705437
  • Duration: 60 Min
The webinar will focus on the path most health care organizations in the country have taken to integrate along with the internal fragmentation that often remains after the deals are over. It will also discuss emerging best practices to manage fragmentation and risk.
CD/Recorded
$0
Recorded/CD
Choosing and Using Key Risk Indicators

Choosing and Using Key Risk Indicators

  • Speaker: Mario Mosse
  • Product ID: 704948
  • Duration: 60 Min
This webinar will discuss the significance, nature and types of KRIs. The instructor will discuss how to develop, evaluate and implement KRIs in accordance with organization’s risk culture and create strategies for effective reporting of risk indicators that lead to management action.
CD/Recorded
$249
Recorded/CD
Structuring and Auditing Physician Employment Agreements:  Key Stark Law Considerations

Structuring and Auditing Physician Employment Agreements: Key Stark Law Considerations

  • Speaker: Joseph Wolfe
  • Product ID: 705436
  • Duration: 60 Min
This webinar will provide an overview of the Stark Law, including its 2016 changes. It will also discuss best practices for negotiating and drafting employment agreements on behalf of health systems, hospitals, medical groups and physician practices.
CD/Recorded
$0
Recorded/CD
Compliance Department Restructuring with the New Regulatory Demands

Compliance Department Restructuring with the New Regulatory Demands

  • Speaker: Carlo Chalhoub
  • Product ID: 705454
  • Duration: 60 Min
This webinar addresses recent changes in the compliance environment. It will also discuss the process for evaluating compliance department structure and the goals of compliance restructuring.
CD/Recorded
$0
Recorded/CD
Transaction Monitoring and Cybersecurity - DFS, SOC, Cybersecurity Framework and Many More

Transaction Monitoring and Cybersecurity - DFS, SOC, Cybersecurity Framework and Many More

  • Speaker: William Akel
  • Product ID: 705365
  • Duration: 60 Min
Attend this webinar to understand the best ways to maintain annual compliance with DFS cybersecurity requirements through a strategic transformation of IT security monitoring to proactive cyber risk management; and to learn how a human-centric security orchestration model with people, process and technology will save and make you money.
CD/Recorded
$0
Recorded/CD
How to Build and Use a Risk Matrix

How to Build and Use a Risk Matrix

  • Speaker: Mario Mosse
  • Product ID: 704970
  • Duration: 60 Min
Risk matrices are used during risk assessment to define the various levels of risk as the product of the probability and impact categories. This webinar training will focus on this simple but powerful mechanism to increase visibility of risks and assist management decision making. Risk matrices are one of the most widespread tools for risk evaluation.
CD/Recorded
$179
Recorded/CD
Implementing the new standard for product recall: AS/ISO 10393

Implementing the new standard for product recall: AS/ISO 10393

  • Speaker: Steve Hather
  • Product ID: 705478
  • Duration: 60 Min
This webinar will help you how to improve the effectiveness of recalls and enhance consumer safety, as well as protecting the company’s reputation.
CD/Recorded
$0
Recorded/CD
NY State Procurement Overview

NY State Procurement Overview

  • Speaker: Kenneth Jones
  • Product ID: 705462
  • Duration: 90 Min
This webinar will provide an overview of New York State Procurement rules and vendor selection requirements. Attendees will learn best practices to draft procurement documents and comply with NY State Government procurement process.
CD/Recorded
$0
Recorded/CD
Conflicts of Interest in Financial Services; Identify, Eliminate, Mitigate and Disclose

Conflicts of Interest in Financial Services; Identify, Eliminate, Mitigate and Disclose

  • Speaker: Lisa Marsden
  • Product ID: 705466
  • Duration: 60 Min
Learn how best to identify, mitigate and make accurate disclosures of conflicts of interest.
CD/Recorded
$0
Recorded/CD
Managing Communication in a Crisis and Protecting Your Brand

Managing Communication in a Crisis and Protecting Your Brand

  • Speaker: Michael Barrio
  • Product ID: 705448
  • Duration: 60 Min
This webinar will focus on the effective crisis communication strategies. Attendees will learn best practices to protect their organization’s brand in the time of crisis.
CD/Recorded
$0
Recorded/CD
Effective and Proactive Strategic Risk Management - A Vital Element to Achieve Effective Enterprise-wide Governance, Risk Management and Compliance (GRC) Programs

Effective and Proactive Strategic Risk Management - A Vital Element to Achieve Effective Enterprise-wide Governance, Risk Management and Compliance (GRC) Programs

  • Speaker: Javier Kuong
  • Product ID: 705407
  • Duration: 120 Min
Learn an effective approach to practice risk management process that is proactive, strategic and top-down in nature to anticipate, avoid and mitigate potential losses from threats and risks that are present in the real world regardless of any organization’s wishes.
CD/Recorded
$0
Recorded/CD
Leading Through Downsizing:  Layoff Notification and Survivor Communication Best Practices

Leading Through Downsizing: Layoff Notification and Survivor Communication Best Practices

  • Speaker: Mary Gormandy White
  • Product ID: 705397
  • Duration: 60 Min
Learn how to effectively and appropriately structure layoff notification conversations and communicate and lead effectively through a reduction in workforce and beyond.
CD/Recorded
$0
Recorded/CD
Cybersecurity Policy and Controls Management with Root Cause Analysis (RCA)

Cybersecurity Policy and Controls Management with Root Cause Analysis (RCA)

  • Speaker: William Akel
  • Product ID: 705404
  • Duration: 60 Min
Learn corporate policy definition and assignment with ramifications for both. We'll discuss how to identify and document management review controls, why a fine tuned policy and procedure are critical to business operations and how to obtain the real root cause of cyber security incidents effectively.
CD/Recorded
$0
Recorded/CD
Data Security for Employers

Data Security for Employers

  • Speaker: Judith Bevis Langevin
  • Product ID: 705457
  • Duration: 60 Min
This webinar will focus on legal requirements related to personally identifiable information (PII) security as well as HR’s critical role in data security. It will also provide practical tips on PII security, vendor management, and planning your data breach response.
CD/Recorded
$0
Recorded/CD
Auditing the Cyber Security Program to Ensure the Company's Digital Crown Jewels are Safeguarded from Hackers

Auditing the Cyber Security Program to Ensure the Company's Digital Crown Jewels are Safeguarded from Hackers

  • Speaker: Barbara Gai
  • Product ID: 705426
  • Duration: 60 Min
This webinar will provide an overview of the ways to identify and assess security risks within the company. Attendees will learn to develop a robust audit program that will thoroughly assess existing controls in protecting the organizations’ data.
CD/Recorded
$179
Best Sellers
You Recently Viewed
    Loading