Developing and Managing Effective AML/CTF Assurance Programs
David Harley
60 Min
Product Id: 705406
Learn the intricacies of developing an effective AML/CTF compliance assurance program and implementing it. Learn how to track the performance of each element of the program and remediate in case of risks.
How to Effectively perform due diligence on outsourced vendors and Navigating SEC and Federal Regulations of Cybersecurity
Lisa Marsden
60 Min
Product Id: 704154
This training program will equip attendees with basic everyday tools to keep cyber criminals at bay. The course will also emphasize the need for effective communication between team members of a financial firm.
Overview of FinCEN’s Enforcement Against Money Services Businesses and Use of Geographic Targeting Orders
Barbara Keller
60 Min
Product Id: 705484
This webinar will cover the agency's current enforcement climate for NBFIs, provide detail on recent enforcement actions against MSBs including money transmitters, virtual currency exchanges, and individuals; and discuss FinCEN’s use of GTOs. This webinar will also provide lessons learned and key themes drawn from FinCEN's increase in enforcement actions against NBFIs and its use of GTOs.
Evidence Gathering in a Fraud Investigation
H. David Kotz
75 Min
Product Id: 703261
This training on fraud investigation will explain how to deal effectively with allegations of fraud and how to conduct internal investigations. It will provide the attendees tips on how to gather evidence in a fraud investigation.
Preventative Medicine: Is it Time to Streamline Your Physician Enterprise Structure so it Stands the Test of Time
Joseph Wolfe
60 Min
Product Id: 705437
The webinar will focus on the path most health care organizations in the country have taken to integrate along with the internal fragmentation that often remains after the deals are over. It will also discuss emerging best practices to manage fragmentation and risk.
Choosing and Using Key Risk Indicators
Mario Mosse
60 Min
Product Id: 704948
This webinar will discuss the significance, nature and types of KRIs. The instructor will discuss how to develop, evaluate and implement KRIs in accordance with organization’s risk culture and create strategies for effective reporting of risk indicators that lead to management action.
Structuring and Auditing Physician Employment Agreements: Key Stark Law Considerations
Joseph Wolfe
60 Min
Product Id: 705436
This webinar will provide an overview of the Stark Law, including its 2016 changes. It will also discuss best practices for negotiating and drafting employment agreements on behalf of health systems, hospitals, medical groups and physician practices.
Compliance Department Restructuring with the New Regulatory Demands
Carlo Chalhoub
60 Min
Product Id: 705454
This webinar addresses recent changes in the compliance environment. It will also discuss the process for evaluating compliance department structure and the goals of compliance restructuring.
Transaction Monitoring and Cybersecurity - DFS, SOC, Cybersecurity Framework and Many More
William Akel
60 Min
Product Id: 705365
Attend this webinar to understand the best ways to maintain annual compliance with DFS cybersecurity requirements through a strategic transformation of IT security monitoring to proactive cyber risk management; and to learn how a human-centric security orchestration model with people, process and technology will save and make you money.
How to Build and Use a Risk Matrix
Mario Mosse
60 Min
Product Id: 704970
Risk matrices are used during risk assessment to define the various levels of risk as the product of the probability and impact categories. This webinar training will focus on this simple but powerful mechanism to increase visibility of risks and assist management decision making. Risk matrices are one of the most widespread tools for risk evaluation.
Implementing the new standard for product recall: AS/ISO 10393
Steve Hather
60 Min
Product Id: 705478
This webinar will help you how to improve the effectiveness of recalls and enhance consumer safety, as well as protecting the company’s reputation.
NY State Procurement Overview
Kenneth Jones
90 Min
Product Id: 705462
This webinar will provide an overview of New York State Procurement rules and vendor selection requirements. Attendees will learn best practices to draft procurement documents and comply with NY State Government procurement process.
Conflicts of Interest in Financial Services; Identify, Eliminate, Mitigate and Disclose
Lisa Marsden
60 Min
Product Id: 705466
Learn how best to identify, mitigate and make accurate disclosures of conflicts of interest.
Managing Communication in a Crisis and Protecting Your Brand
Michael Barrio
60 Min
Product Id: 705448
This webinar will focus on the effective crisis communication strategies. Attendees will learn best practices to protect their organization’s brand in the time of crisis.
Effective and Proactive Strategic Risk Management - A Vital Element to Achieve Effective Enterprise-wide Governance, Risk Management and Compliance (GRC) Programs
Javier Kuong
120 Min
Product Id: 705407
Learn an effective approach to practice risk management process that is proactive, strategic and top-down in nature to anticipate, avoid and mitigate potential losses from threats and risks that are present in the real world regardless of any organization’s wishes.
Leading Through Downsizing: Layoff Notification and Survivor Communication Best Practices
Mary Gormandy White
60 Min
Product Id: 705397
Learn how to effectively and appropriately structure layoff notification conversations and communicate and lead effectively through a reduction in workforce and beyond.
Cybersecurity Policy and Controls Management with Root Cause Analysis (RCA)
William Akel
60 Min
Product Id: 705404
Learn corporate policy definition and assignment with ramifications for both. We'll discuss how to identify and document management review controls, why a fine tuned policy and procedure are critical to business operations and how to obtain the real root cause of cyber security incidents effectively.
Data Security for Employers
Judith Bevis Langevin
60 Min
Product Id: 705457
This webinar will focus on legal requirements related to personally identifiable information (PII) security as well as HR’s critical role in data security. It will also provide practical tips on PII security, vendor management, and planning your data breach response.
Auditing the Cyber Security Program to Ensure the Company's Digital Crown Jewels are Safeguarded from Hackers
Barbara Gai
60 Min
Product Id: 705426
This webinar will provide an overview of the ways to identify and assess security risks within the company. Attendees will learn to develop a robust audit program that will thoroughly assess existing controls in protecting the organizations’ data.
Academia is a Workplace Too: Workplace Harassment Prevention Not Working - Harassment Continues to be a Problem
Dr. Susan Strauss
60 Min
Product Id: 705366
Educational organizations will benefit from increased knowledge about workplace harassment laws, and prevention and intervention strategies to diminish harassment on their campus. This webinar will outline a list of prevention and intervention strategies, distinguish between psychological harassment and illegal harassment, and detail the results of EEOC study on harassment and what it means for all workplaces.