![](/images/products/large/704392.jpg)
Excel 2013 PivotTable Secrets: Analyze Lists in a Flash with PivotTables
Dennis Taylor
60 Min
Product Id: 704392
In this training program, participants will learn the best ways to create PivotTables and Pivot Charts by comparing two or more fields in a variety of layout styles, performing ad-hoc grouping of information, creating a Pivot Chart that is in sync with a PivotTable, and more.
![](/images/products/large/704521.jpg)
Investment Advisors' Investment Policy Statement (IPS) - Rules, Regulations and Best Practices
Lisa Marsden
60 Min
Product Id: 704521
This training program will analyze best practices for the investment policy statement (IPS), elements of the IPS, the significant areas of the firm that should be involved in the development of the IPS, creating and maintaining the IPS, and compliance testing of the IPS.
![](/images/products/large/704822.jpg)
And the Answer is...Researching Payroll Questions
Vicki M. Lambert
90 Min
Product Id: 704822
This training program will focus on payroll research and how to find the information necessary to answer complex questions that arise in the payroll department. By using actual website examples, the webinar will examine the basics of researching the IRS and Department of Labor websites and the intricacies of using the state statutes provided on the legislative websites.
![](/images/products/large/703906.jpg)
Payroll Record Keeping: Who Requires What, for How Long and in What Format
Vicki M. Lambert
90 Min
Product Id: 703906
This training program will focus on the retention requirements of payroll records for the Fair Labor Standards Act, the Internal Revenue Code, and Child Support Enforcement. It will detail record keeping requirements and formats as well as review data security requirements.
![](/images/products/large/704777.jpg)
Dealing with the Weingarten Ruling (Interviewing Public Sector and Private Sector Union Employees)
John E Grimes
90 Min
Product Id: 704777
This training program will explore the rationale behind the Weingarten Decision and other similar court decisions. It will also examine the union employee’s responsibilities when subject to an investigative interview and the union representative’s role in an investigative interview, along with sanctions and remedies for violation of Weingarten Rights.
![](/images/products/large/704817.jpg)
Protect Your Organization from the Growing Internal Cyber Threat
Peter Goldmann
60 Min
Product Id: 704817
With the constant tide of data breaches and hacker threats, cybersecurity is a critical element in an organization’s policies. This training program will explore the common and not-so-common insider threats to your organization’s information security and help identify the red flags of potential or actual insider cyber crime.
![](/images/products/large/704573.jpg)
A2Z of ACH - Pre-Notifications, Returns and Reversals - Part 3
Rayleen M Pirnie
90 Min
Product Id: 704573
This three-part webinar series is designed specifically for businesses who either currently process ACH credits and/or debits, or those exploring the network for use in the future. Each session will focus on niche areas of ACH essentials. This course in the series will explore ACH pre-notifications, returns and reversals from the perspective of how each affects a business originator.
![](/images/products/large/704802.jpg)
Conducting a Shrink Investigation - How to Determine the Source of Your Inventory Discrepancy
John E Grimes
90 Min
Product Id: 704802
Small business failures are particularly vulnerable to going out of business as a result of uncontrolled and unidentified losses. If you are small business retail owner, manager, or loss prevention consultant, this training program will teach you how to conduct a full shrink (loss) investigation. If you are contemplating opening a small retail business, this webinar will give you a head start on understanding the complexities and importance of controlling losses.
![](/images/products/large/704808.jpg)
Block Chain for Risk Management /Data Security | Emerging Technological Approach for KYC and Secure Transactions
Shaun Miller
120 Min
Product Id: 704808
A block chain is a transaction database shared by all nodes participating in a system based on the Bitcoin protocol. This course describes the Bitcoin concept, what Blockchain is and its financial applications to creating secure KYC and payment data sets. This course explains a Blockchain concept where the Blockchain itself is a shared single source of truth.
![](/images/products/large/704449.jpg)
Let’s Upgrade to Excel 2016
David H Ringstrom
60 Min
Product Id: 704449
This training program will help attendees identify the differences in Excel 2016 from previous versions. Attendees will also learn which worksheet functions are available in Excel 2016 but not in other earlier versions of Excel. Understand the nuance involved between the 32-bit and 64-bit versions of Excel.
![](/images/products/large/704741.jpg)
Application for Investor Advisor Registration - ADV Part 1, Part 2A, Part 2B and More
Lisa Marsden
60 Min
Product Id: 704741
This training program will analyze ADV Part 1, ADV Part 2 A, ADV Part 2 B, and offer a breakdown of each section of the ADV. It will discuss annual filing requirements and offer best practices for reporting accurately.
![](/images/products/large/704765.jpg)
2016 Financial Regulator Priorities - SEC, FINRA, and State Regulators
Lisa Marsden
60 Min
Product Id: 704765
In this training program, attendees will learn how to gain access to the financial regulators priorities and understand how to apply those priorities to their firm. The program will also discuss incorporating the priorities into your annual review and identifying priorities that need to become part of the compliance manual/code of ethics.
![](/images/products/large/704764.jpg)
Community Reinvestment Act (CRA) - Understanding High Risk Lending and Compliance Issues
Vidia Ramdeen
60 Min
Product Id: 704764
This training program will address important compliance issues and high risk lending issues of the Community Reinvestment Act (CRA). It will help attendees in understanding why community bank lending is important for achieving goals underlying successful community reinvestment and focus on the basics of risk management for community bank lending.
![](/images/products/large/704763.jpg)
Fitting the Concepts of Enterprise Risk Management to Your Organization
Lynn Fountain
90 Min
Product Id: 704763
This training program will explore standard stated benefits of ERM including increased competitive advantage, increased likelihood of achieving strategic objectives and ability to meet increased stakeholder expectations, improved governance and increased likelihood of meeting regulatory and compliance expectations.
![](/images/products/large/704605.jpg)
SEC Examinations - Practical Tips on How to Defend Yourself
H. David Kotz
60 Min
Product Id: 704605
This webinar provides practical information on how companies may defend themselves during SEC examinations. The webinar highlights the newest initiatives arising from the SEC’s examination program. Presented by the former Inspector General of the SEC, the webinar provides valuable insider information about SEC exams.
![](/images/products/large/704656.jpg)
Designing Effective Controls, Security Safeguards and Governance by a Risk-Based Methodology
Javier Kuong
120 Min
Product Id: 704656
This training program will provide a practical and structured methodology for the design of governance, controls and security provisions. The methodology can be applied to participants’ real work environment immediately. Participants will also benefit from comparing their present governance and controls design practices with the structured, risk-based methodology presented in the webinar.
![](/images/products/large/704619.jpg)
3-Hr Virtual Seminar - Understanding DFAR and Developing Compliance - DCAA Audit, Labor Records, Penalties, Policies & Procedures
JeFreda Brown
3 hrs
Product Id: 704619
This training program will demonstrate why companies planning to do business with the government should be prepared to be audited by the Defense Contract Audit Agency (DCAA). DCAA performs all needed contract audits for the Department of Defense (DoD). The focus of this program is to offer attendees a strong knowledge of DFARS (Defense Federal Acquisition Regulation Supplement) and help understand what is required when pricing proposals, developing a compliant accounting system, and maintaining contracts.
![](/images/products/large/704736.jpg)
Dos & Don'ts Related to Information Security and Data Privacy
Marc Perl
60 Min
Product Id: 704736
This training program will prepare your organization to understand the need for data security, the steps that can be taken to institute or augment your data security policies/procedures, and the implementation of the needed controls. This webinar will introduce attendees to a set of known and respected data security standards that can be employed by your organization to improve your security. Attendees will walk away with ideas to leverage the curriculum with their existing security infrastructure.
![](/images/products/large/704709.jpg)
How to Establish & Review Your Risk Metrics Effectively
Robert Geary
90 Min
Product Id: 704709
This webinar training provides an in depth understanding and applicability of the risk metrics. The instructor helps in establishing the purpose they serve and reviewing the methodology for creating a set of risk metrics. He will also discuss the sampling of forms of risk metrics to be employed and review the risk metric management process.
![](/images/products/large/704707.jpg)
Detecting and Preventing Corporate Card Fraud - Travel and Entertainment Expenses
Chris Doxey
90 Min
Product Id: 704707
This webcast will discuss the policies, procedures, and controls that will help your company detect and prevent corporate card fraud. The Instructor will discuss the type of corporate credit cards and best practices for developing your travel and entertainment expense (T&E) policy. Participants will learn the T&E standards of internal control and how to automate their T&E Process.