How to Conduct High Quality Risk Assessments
Mario Mosse
90 Min
Product Id: 704994
This training program will help articulate your business objectives and define the scope of your risk assessment. It will guide attendees in identifying the most appropriate risk assessment technique and plan and facilitate a risk assessment. Further, the session will help tailor a risk matrix to enable you to rate your risks.
Operational Risk Scenario Analysis
Mario Mosse
90 Min
Product Id: 703751
Scenario analysis complements the risk assessment process, which often overlooks material events that only happen infrequently, such as natural disasters, acts of terrorism, and data breaches. This webinar will highlight the importance of scenario analysis, its objectives and expected benefits, and the ideal methodology for quantifying and reporting operational risk scenarios.
Time Extension Requests - A Checklist
Jim Zack
90 Min
Product Id: 704345
This training program may well change the way in which you prepare or analyze the very next time extension request you have to deal with. It will discuss rules concerning time extension requests, arguments about waiver and apportionment of liquidated damages, concurrent delay issues and who has to prove concurrent delay, and more.
Bank Director Training - Directing from a Strategic and Tactical Perspective
David L Osburn
60 Min
Product Id: 704759
This training program will review the three keys to success for any bank: marketing, financing, and management. The webinar will also include how to correctly interpret the bank’s financial statements including analyzing key numbers and ratios. Additionally, attendees will be exposed to how a bank’s overall success is measured including the CAMELS rating, Baurer Financial Rating, and Texas Ratio. Furthermore, various bank HR issues and the risk of cyber security threats will be outlined.
The Board of Directors Role in Cybersecurity
Rayleen M Pirnie
60 Min
Product Id: 705117
This webinar will break down the Board’s role in effective cybersecurity oversight, the 12 questions a board member should be knowing to answer, key principles of oversight, tips and resources for board.
How to Build and Use a Risk Matrix
Mario Mosse
60 Min
Product Id: 704970
Risk matrices are used during risk assessment to define the various levels of risk as the product of the probability and impact categories. This webinar training will focus on this simple but powerful mechanism to increase visibility of risks and assist management decision making. Risk matrices are one of the most widespread tools for risk evaluation.
Effective and Proactive Strategic Risk Management - A Vital Element to Achieve Effective Enterprise-wide Governance, Risk Management and Compliance (GRC) Programs
Javier Kuong
120 Min
Product Id: 705407
Learn an effective approach to practice risk management process that is proactive, strategic and top-down in nature to anticipate, avoid and mitigate potential losses from threats and risks that are present in the real world regardless of any organization’s wishes.
Exclusive Cyber Security Incident Management Program 2017
William Akel
60 Min
Product Id: 705380
Gain a better understanding of cyber security incident management that is proactive versus reactive, learn methods to minimize business disruption and damages, and the impact and urgency on customers and the business for risk and costs.
Impact and Control of RFIs on Construction Projects
Jim Zack
90 Min
Product Id: 704288
This webinar discusses the genesis of RFIs and their development and the use and abuse of RFIs on construction projects including ways to mitigate the potential adverse impact of RFIs. Speaker discusses a number of contractual mechanisms to control the RFI process and mitigate potential impact damage claims based on the number of RFIs. The webinar also sets forth best management practices concerning the RFI process.
COSO Integrated Guidance: Effective Internal Control for Successful Corporate Management
Lynn Fountain
90 Min
Product Id: 704696
This training program will highlight the importance of management’s role in instilling proper internal controls within their processes. Although the Sarbanes-Oxley Act made it abundantly clear that internal controls is the responsibility of management, many companies still view those processes as the responsibility of the auditors or quality assurance individuals. The impending release of the new COSO Framework clearly outlines the importance of understanding all aspects of internal control and ensuring those elements are properly working together in an effective manner.
Business Email Compromise and Ransomware - Red Flags and Mitigation
Rayleen M Pirnie
60 Min
Product Id: 705038
The Internet Crime Complaint Center (IC3) reports that U.S. victims alone lost $18 million in 15 months to just a single form of ransomware. This training program will review the risks associated with various types of cyber fraud, and in particular, business email compromise (BEC) and ransomware. The session will also discuss documenting sound business practices to minimize exposure and loss and list what to present to your board of directors before an incident.
Procurement and Contract Fraud - Detection and Prevention
John E Grimes
90 Min
Product Id: 704334
This training program will examine the fraud vulnerabilities in the procurement of materials and services in the private sector. In addition, it will explore the many procurement and contract fraud schemes and at what point in the procurement and contract process they occur.
How to Manage Reputational Risk
Mario Mosse
90 Min
Product Id: 705012
Reputation risk is the risk of loss resulting from damages to a firm's reputation, in lost revenue; increased operating, capital or regulatory costs; or destruction of shareholder value, due to an adverse or potentially criminal event even if the company is not found guilty. This training program will explore the hidden danger behind reputational risk that can pose a threat to the survival of the biggest and best-run companies, often wiping out millions or billions of dollars in market capitalization or future revenues and occasionally resulting in a change at the uppermost levels of management.
How to Develop an Effective Risk Register
Mario Mosse
90 Min
Product Id: 704969
A risk register, also known as a risk log, serves as a central repository for the organization's risk information. This training program will discuss its key function, i.e., to provide management, the board, and key stakeholders with significant information on the main risks faced by the organization. The program will also delve into designing and using your own ‘fit-for-purpose’ risk register.
Preparing for Year End 2016 and Year Beginning 2017
Vicki M. Lambert
90 Min
Product Id: 704943
This webinar concentrates on preparing the department for the end of the calendar tax year and the New Year processing. Topics include reconciling, completing and submitting Form W-2, 941 federal and state; update to annual changes from the IRS, SSA, DOL and on the state level; and best practices that will help make the year-end and year beginning go smoother.
FCPA and Anti-Bribery Cases and Trends in the US, China and Russia
Grant Smith
60 Min
Product Id: 704332
This training program will highlight the practices prohibited by the FCPA. It will help determine if your current travel and entertainment policy is in compliance and discuss what accounting and anti-bribery violations are covered.
Sensitive Business Audits and Potential Criminal Risks: Tax Fraud and IRS compliance
Travis A Greaves,T Joshua Wu
60 Min
Product Id: 704897
This presentation will provide tax and compliance professionals with an understanding of the stages of an audit with potential criminal exposure. Panelists will discuss the sources of criminal tax cases and the evaluation and investigation involved in an “eggshell audit”. The panelists will also cover the coordination between the IRS civil team and IRS criminal investigation division.
Develop and Upgrade Sound Business Continuity Plans | New and Potential Threats
Javier Kuong
120 Min
Product Id: 704908
This webinar will offer guidelines on how organizations should take a short-, medium-, and long-term vision of their enterprise-wide contingency and business continuity plan preparation. It will also offer best practices to upgrade your Business Continuality Plan (BCP) to cope with a whole variety of new current and forecast threats, with uncertain times of occurrence, in a dynamic business and global threat panorama.
Achieving Enterprise Information Security Goals - Creating Right Teams
Rich Devlin,Joe Grannemon
60 Min
Product Id: 704863
This webinar will involve a high-level discussion on how you can create effective teams for achieving your Information Security goals and addressing complex threats such as Ransomware. Learn how to create a Information Security plan and align your goals with objectives, strategies and tactics across teams.
Fitting the Concepts of Enterprise Risk Management to Your Organization
Lynn Fountain
90 Min
Product Id: 704763
This training program will explore standard stated benefits of ERM including increased competitive advantage, increased likelihood of achieving strategic objectives and ability to meet increased stakeholder expectations, improved governance and increased likelihood of meeting regulatory and compliance expectations.