Constructing an Effective Argument
Daniel Clark
60 Min
Product Id: 703844
The ability to construct and present a winning argument by those without direct control over business processes or organizations is the key requirement to excel in today’s risk and auditing environment. This webinar will provide participants with tools and strategies that will improve the quality of your argument thereby improving your chances for providing positive, substantial and effective advice.
BSA/AML - What is Old is New Again?
Armen Khachadourian
90 Min
Product Id: 703352
This webinar will provide attendees a clear understanding of the compliance department of the future. Attendees will learn the best practices to ensure BSA and AML compliance and avoid failure and fines.
Procure to Pay (P2P) Fraud: Critical Controls, Risk Mitigation and Case Studies for Analyzing What Went Wrong
Chris Doxey
60 Min
Product Id: 703859
This unique and interactive workshop will analyze real time case studies from all components of the procure to pay (P2P) process that include: procurement, T&E, P-Card, AP, and disbursements. Attendees will have an opportunity to discuss what went wrong and will determine the key internal controls that were missing. The instructor will highlight the three critical corporate controls, the standards of internal control for P2P, and the top twenty controls for AP.
Internal Controls - What Every Manager Needs to Know
Lynn Fountain
90 Min
Product Id: 703148
This webinar highlights the importance of management’s role in instilling proper internal controls within their processes. In this session, instructor will explore methods to educate management on their individual responsibilities for control processes and the variance between a control malfunction and control design issues. Participants will be provided with tools to help management better understand their role in internal control and effectively execute their obligations. The session will also review the impending COSO changes and examine how they may impact your organization.
Detecting and Preventing Embezzlement in Your Organization
Peter Goldmann
90 Min
Product Id: 703763
While there are innumerable ways to detect, prevent and investigate embezzlement, it is not always easy to organize a consistently effective anti-embezzlement strategy. This webinar will guide you through the common and not-so-common forms of embezzlement—with uniquely instructional case studies. It will emphasize the red flags of each and go on to highlight best practices in embezzlement risk mitigation.
The Board of Directors Role in Cybersecurity
Rayleen M Pirnie
60 Min
Product Id: 705117
This webinar will break down the Board’s role in effective cybersecurity oversight, the 12 questions a board member should be knowing to answer, key principles of oversight, tips and resources for board.
Bank Secrecy Act (BSA), Title 31, Compliance
Armen Khachadourian
60 Min
Product Id: 703574
This webinar will review current requirements of the Bank Secrecy Act, why to comply, how to comply, reporting techniques and current positions by the IRS and FinCEN.
Becoming a Chief Audit Executive - Leading the Internal Audit Function
Lynn Fountain
90 Min
Product Id: 704614
This training program will enumerate the IIA Standards and the auditor’s responsibility to abide by the standards. The program will also look at management’s expectations of internal audit and detail skills required for internal audit management. It will provide real-world examples and challenges facing today’s internal audit.
Practical Risk Appetite and Risk Tolerance
Mario Mosse
90 Min
Product Id: 704949
This webinar will discuss how to implement and monitor risk policy. The instructor will explain the challenges and opportunities involved in developing and implementing an effective risk appetite statement, which is supported by risk limits, and the determination of actual exposure against those limits and risk tolerance.
BSA/AML Recent Developments and Compliance
Jim George
90 Min
Product Id: 703457
This AML compliance webinar will discuss recent developments in Bank Secrecy Act including various forms such as Currency Transaction Report (CTR), money log and Suspicious Activity Report (SAR).Attendees will learn best practices to ensure compliance with BSA regulations and avoid violations and fines.
Transform from Operations Laggard to Operations Leader
Robert Sabath
60 Min
Product Id: 705724
This operational efficiency webinar will describe the various aspects of improving your operation by comparing what operational laggards and leaders do through examples in the from of eight mini case studies covering basic metals, electric equipment, medical specialties, food & distribution etc.
Developing an Operational Risk Appetite Statement
Mario Mosse
90 Min
Product Id: 703661
This webinar will discuss the challenges and opportunities involved in developing and implementing an operational risk appetite statement, which is supported by operational risk limits, and the determination of actual exposure against those limits.
Paying Health Care Providers for Quality and Value: Key Trends and Stark Law Considerations
Joseph Wolfe
60 Min
Product Id: 705434
This webinar will provide an overview of new quality and value based payment trends including CMS’s new quality payment program. Attendees will get a better understanding of the legal issues surrounding paying for quality and value so they can refine their current strategy and can identify new delivery models and potential opportunities.
Transgender Employees in the Workplace
Kristin Robinson
60 Min
Product Id: 705465
Learn how best to manage workplace issues surrounding an employee's gender transition.
The Compliance Officer's Toolkit: Best Practices for Compensating and Contracting With Physicians
Joseph Wolfe
60 Min
Product Id: 705435
This webinar will provide an overview of the technical requirements of the health care laws such as Stark Law, Anti-Kickback Statute, Civil Monetary Penalties Law, False Claims Act, etc. It will also discuss best practices that health care organizations can follow to avoid compliance traps related to these laws.
Writing Effective Audit Observations
Jonnie T Keith
90 Min
Product Id: 703740
This webinar will provide the principles for writing an effective audit report. The audit report represents the end result of weeks of reviews, analyses, interviews and discussions. It is used to provide information to management on the areas you reviewed. And, more importantly, the report brings issues to their attention that needs to be addressed. How well you communicate that information is critical to getting the results you are seeking.
Risk Based Internal Auditing - Establishing the Methodology
Lynn Fountain
90 Min
Product Id: 704819
True RBIA incorporates cascading the process through to each individual audit as well as the audit reporting process. The training program will focus on the establishment of a framework or methodology for RBIA and examine how to utilize risk based questions within the process steps.
Conducting Internal Investigations: Insights from Former SEC Inspector General
H. David Kotz
90 Min
Product Id: 703339
This training will provide the attendees simple but powerful tools and tips to conduct credible and thorough internal investigations. Attendees will learn how to perform effective witness interviews.
Understanding HIPAA Risk Mitigation
Jay Hodes
90 Min
Product Id: 705327
This webinar will focus on requirements of the HIPAA Security and Privacy rules including administrative, technical and physical safeguards, and policies and procedures that needs to be in place for a HIPAA compliance program. It will further cover case examples of HIPAA breaches and explain how to avoid them.
Vendor Fraud - How to Prevent Them for Large scale Companies
Peter Goldmann
90 Min
Product Id: 703157
This training on detecting and preventing vendor fraud will help the attendees to identify the different types of vendor-related fraud schemes and implement best practice anti-fraud control strategies.