2-Hr Virtual Seminar - Understanding FAR and Developing Compliance - Intellectual Property, CAS, DCAA Audit
JeFreda Brown
2 hrs
Product Id: 704644
This training program will outline business practices and conflicts of interest prohibited by FAR. Attendees will learn labor laws and requirements under FAR and FAR procedures and policies pertaining to intellectual property. They will also understand how contractors are required to apply Cost Accounting Standards (CAS) to negotiated contracts per FAR, and FAR cost principles and what types of costs contractors are not allowed to include.
The Credit Managers Toolbox - Free Cash Flow, Common-Sizing Financial Statements, Key Financial Ratios, DSO, Altman Z Score, Financial Reviews
Ronald Sereika
90 Min
Product Id: 704577
In this training program, the instructor will discuss how and where to find financial information and how to read a balance sheet, income statement and statement of cash flows. The program will also detail how to calculate DSO.
What Accounts Payable (A/P) Needs to Know About Payroll and Vice Versa 2016
Vicki M. Lambert
90 Min
Product Id: 704634
This webinar will discuss various types of payments and how to ensure that the information requested by payroll and provided by accounts payable is done in a professional and timely manner. The program will also concentrate on how payroll and accounts payable must work together to ensure compliance with taxation and reporting requirements.
Cyber Security Incident Response Program
Michael C Redmond
60 Min
Product Id: 704631
This cyber security training program will assess the strength of the procedures your organization has in place to deal with a breach, malware and more. It will highlight the risk you are vulnerable to and discuss adopting a systematic approach to risk tracking to enhance the effectiveness of your cyber security incident response program.
Home Mortgage Disclosure Act (HMDA) Reports - Meeting Regulators: Expectations - Tools and technique to reduce errors
Jim George
60 Min
Product Id: 703743
Fraudsters are always looking for new opportunities and new weaknesses. The availability of customer data on the black-market gives them just the tools they need. A bank has responsibilities to its shareholders and customers to protect them from these ever-changing threats. This webinar will furnish attendees with a complete understanding of the changes in the fraud arena and the strategies needed to combat fraud.
Writing an Effective Coverage Letter - Analyzing the Facts, the Law and the Insurance Policy
Marc Estrella
60 Min
Product Id: 704553
In this training program, attendees will understand the necessity of writing a coverage letter. Attendees will understand how to utilize the facts and communicate to the insured the need for more information when there is insufficient information to make a coverage determination. They will also learn to employ state mandated language in the coverage letter.
Vendor Management Program - Risk Assessment, Effective Controls, Best Practices to Minimize 3PV Risk
Anne M McFadden
90 Min
Product Id: 704615
This vendor management training program will offer best practices for managing and minimizing third party vendor risk through strategies that help you focus resources with a risk based approach. It will explore the five elements of a successful vendor management program, including: vendor culture, vendor risk assessment, ensuring effective controls around vendor management, monitoring vendor programs, and vendor communication.
What Does the Foreign Corrupt Practices Act (FCPA) Mean to the Procure to Pay (P2P) Process
Chris Doxey
90 Min
Product Id: 704606
This webinar will discuss the Foreign Corrupt Practices Act (FCPA) and its implication on the pay-to-procure (P2P) process. Participants will learn the 15 step compliance roadmap for the FCPA and FCPA compliance programs and how to test for FCPA violations in the P2P process. The Instructor will share guidelines to help your company establish FCPA compliance for your P2P process.
ACH Fraud - Detection and Prevention
Rayleen M Pirnie
90 Min
Product Id: 704369
This training program will discuss common forms of ACH fraud, including: social engineering, account takeover (consumer, corporate, and institution internal accounts), money mules and advance fee frauds, and embezzlement. Under each of these sections, the course will also discuss: ACH fraud detection, fraud mitigation, ACH Returns, sound business practices to thwart attempts, and education.
Payment Card Industry Data Security Standard (PCI DSS) and Your Company
Marc Perl
90 Min
Product Id: 704601
This training program will explore how development and deployment of PCI DSS (Payment Card Industry Data Security Standard) compliant networks can assist your business to secure those electronic assets that the business considers vital. The principles specified in PCI DSS, which the program will discuss, can be a guide for all organizations that wish to secure their data.
Advanced Consumer Lending - Process, Best Practices, 6Cs of Credit, Loan Structuring and Pricing
Robert D Hawkins
60 Min
Product Id: 704502
This training program will introduce the consumer lending process from the initial application to closing and documentation. Proper analysis of consumer loan requests is more important today than any time in the history of banking as a result of the current economic environment worldwide which has left many consumers in a weaker financial condition than in the past. For this reason and the need for banks to continue growing the consumer loan portfolio safely, it is important for bankers to adjust their lending practices to insure the next consumer applicant is not becoming overextended and unable to meet their obligations.
Effective Credit Memo - Reporting Effectively in the Credit Memorandum
Robert D Hawkins
60 Min
Product Id: 704504
This training program will explore the underwriting and reporting on commercial real estate, construction loans, acquisition and development loans and multi-family unit loans. In doing so, several samples of proven credit memos will be examined to insure bankers are covering the areas required by the banking regulators.
eXtensible Business Reporting Language(XBRL)-Tagging levels, Terms and Taxonomy, SEC Viewer-Calculations and common errors
Lynn Fountain
90 Min
Product Id: 704589
This webinar will discuss the XBRL basis, terms and taxonomies. XBRL, eXtensible Business Reporting Language, a global electronic information format designed to transmit and store business information in a machine readable format, is now mandated by U.S. securities and exchange commission. Instructor will discuss the functioning of XBRL, why it is needed, tagging levels and definitions and help understand the XBRL SEC Viewer.
Defending FCPA Claims and Minimizing FCPA Exposure
H. David Kotz
60 Min
Product Id: 704556
This training program will highlight how one can effectively manage risks resulting from Foreign Corrupt Practices Act (FCPA) claims. Presented by the former Inspector General of the SEC, who served in senior-level positions in several federal agencies, the webinar will provide practical lessons on how to manage FCPA claims, devise effective compliance programs, conduct internal investigations and achieve a culture of compliance in an organization.
10 Best Practices to Improve Your Fiscal Closing Process
Chris Doxey
90 Min
Product Id: 704580
Regardless of company size or complexity, all successful financial close processes require continuous communication, comprehensive documentation and a flexible, responsive organization. This training program will focus on 10 critical methods that you can use to dramatically improve your Record to Report (R2R) process. The R2R or Financial Closing Process is the centerpiece of the controllership function. This program will examine the process that ranges from transaction processing through internal and external reporting, and it incorporates everything from internal controls, the corporate organizational hierarchy - its people, processes, and technology.
Seven Habits of an Effective Loan Committee
Robert D Hawkins
60 Min
Product Id: 704570
This training program will list and discuss documents required to complete the five steps in the documentation process. On completion of the program, attendees will be able to provide a broad overview of the loan documents’ provisions to borrowers and loan processing management techniques.
Foreign Exchange Hedging for Corporations
Jonathan Wetreich
90 Min
Product Id: 704133
In this training program, attendees will learn the types of FX hedge programs typically utilized by corporations and the hedge instruments typically used by corporate hedgers such as forwards and collars. They will also gain an understanding of the concept of view-neutral hedging.
ATM & POS Skimming Fraud Losses - Detection and Prevention
Rayleen M Pirnie
90 Min
Product Id: 704512
This training program will classify common forms of ATM skimming fraud, POS skimmers, and POS malware, and also identify appropriate mitigation strategies. The course will further analyze why EMV will not stop ATM fraud and POS skimming fraud.
Cyber Incident Response: The Payments Perspective - Threat Intelligence and Best Practices to Manage Threats
Rayleen M Pirnie
90 Min
Product Id: 704443
This training program will discuss how cyber-attacks affect payment processing. It will highlight to attendees how best to record appropriate sound business practices for managing operational risk due to a cyber-attack. Attendees will also learn to identify critical operational communications, from internal staff to customers and institutions to vendor support.
Strategies to Pass the Certified Internal Auditor's (CIA) Exam
Jonnie T Keith
90 Min
Product Id: 704487
This training program will discuss the many advantages in obtaining a CIA designation. In addition to the vast audit and business knowledge you are exposed to, it can lead to promotions and pay increases. You become a valuable asset to your organization. And while the test is difficult, it is not impossible. It is meant to make sure that when you carry the CIA designation, people know that you have an excellent grasp of audit and business knowledge.