Designing Effective Controls, Security Safeguards and Governance by a Risk-Based Methodology
Javier Kuong
120 Min
Product Id: 704656
This training program will provide a practical and structured methodology for the design of governance, controls and security provisions. The methodology can be applied to participants’ real work environment immediately. Participants will also benefit from comparing their present governance and controls design practices with the structured, risk-based methodology presented in the webinar.
Pricing for Risk in Merchant Payments - Risk Metrics, Reserve Requirements, Pricing Models, Best Interchange Rates, EMV/NFC Guidelines
Armen Khachadourian
90 Min
Product Id: 704546
This training program will provide insight into fundamental underwriting and risk management guidelines, determining variables that constitute merchant risk, and on how to assign a dollar value and quantify exposure.
Measuring and Managing Customer Profitability - From Growing Sales to 'Profitable' Sales
Gary Cokins
90 Min
Product Id: 704679
This training program will focus on how to shift the mindset from growing sales to growing profitable sales and to view customers as investments like in a stock portfolio to seek higher ROIs – return on customers (ROC). It will also look at how measuring forward-looking customer lifetime value (CLV) differs from calculating historical customer/consumer profitability for B2C industries.
CAMELS Methodology | Market Risk Identification, Evaluation and Managing Risk Conditions - CCAR and CLAR
Robert Geary
60 Min
Product Id: 704669
This training webinar discusses CAMELS components in terms of the regulators’ evaluation methodology. It covers how these considerations translate into the rating of each component and the formulation of a bank’s CAMELS composite rating. In addition, the instructor explains two related evaluations: CCARS which is a “Comprehensive Capital Assessment and Review”, and CLAR which is a “Comprehensive Liquidity Assessment and Review” and how to rate bank’s capital adequacy and liquidity adequacy.
Writing Effective Email
Phil Vassallo
90 Min
Product Id: 704380
This training program will discuss best practices for managing your email system effectively and efficiently. It will guide attendees in composing purposeful, reader-focused emails and in employing strategies for creating a courteous tone.
What Does the Foreign Corrupt Practices Act (FCPA) Mean to the Procure to Pay (P2P) Process
Chris Doxey
90 Min
Product Id: 704606
This webinar will discuss the Foreign Corrupt Practices Act (FCPA) and its implication on the pay-to-procure (P2P) process. Participants will learn the 15 step compliance roadmap for the FCPA and FCPA compliance programs and how to test for FCPA violations in the P2P process. The Instructor will share guidelines to help your company establish FCPA compliance for your P2P process.
E-Compliance: Online Privacy, Harassment and Identity Theft in the Digital Age
Joseph Rosner
60 Min
Product Id: 704524
This webinar will discuss the bane of new technology and social media in regards to employers’ and employees’ privacy. The instructor will discuss e-compliances that employers need to adhere to avoid privacy suits. He will also cover the risks of information breach and defamation claims from electronic employee postings. Participants will know how to deal with online privacy and harassment claims and ways and limits of disciplining employees’ online presence. The course will also examine how to legally use Internet postings, profiles and other content in hiring decisions.
Marketing for Most of Us Today
Barney Kramer
90 Min
Product Id: 704287
This training program will focus on current marketing avenues such as outbound and inbound marketing, social media and its reach with consumers, content marketing and more. It will focus on the basics of marketing principles and guide attendees in developing target markets and segments for subsets of your strategic plan.
The Core of Program Management Across Sectors
Samir Penkar
60 Min
Product Id: 704402
This training program will lay emphasis on industry trends shaping the program management world. Course participants will learn the top three core program management concepts needed to shape and update your programs.
3-Hour Virtual Training: Guidelines for Performing a Corporate Wide Internal Audit Risk Assessment
Marna Steuart
180 Min
Product Id: 704386
This training program will detail key components of a risk assessment and management program, and include a fraud risk assessment discussion. Other training points in the program include analyzing the methodology for successful risk assessment process, understanding the steps involved in the risk assessment process, and fraud risk assessment.
Driver Performance-Based Budgeting and Rolling Financial Forecasts
Gary Cokins
90 Min
Product Id: 704391
This training program will help attendees understand the deficiencies with the traditional annual budget. Attendees will also learn how to apply unit-level consumption rates with forecasts to project operational expenses and how to include strategic projects and risk mitigation projects in expense projections.
Regulation V - Fair Credit Reporting Act
Kara Lamphere
60 Min
Product Id: 704290
This webinar will discuss the Regulation V – Fair Credit Reporting Act(FCRA) in details and explain attendees what types of marketing are allowed, requirements of affiliate marketing, and disclosures required with regard to consumer credit report. Speaker will discuss about consumer credit report alerts and identity theft protections, as well as what an institution must do with these alerts.
Sales Principles for Small and Medium Businesses
Barney Kramer
90 Min
Product Id: 704354
This training program will discuss the core process of selling with integrity and how it ties to the true definition of sales. Attendees will understand how sales will need to adapt a more collaborative role with marketing and why.
Fraud Red Flags All Corporate Executives Should Recognize
Anne M McFadden
60 Min
Product Id: 704347
This training program will provide an overview of the three main occupational fraud categories, including corruption, asset misappropriation and financial reporting. Attendees will learn how to minimize the impact of the fraud scheme by detecting red flags for fraud early.
Fraud and Cash Receipts: Common Frauds and Internal Controls
Toby Lawrence
60 Min
Product Id: 704301
This training program will enumerate the types of frauds that occur in the revenue cycle and cash receipts function. It will also highlight red flags or warning signs to look out for that may indicate someone is committing fraud. Further, attendees will learn to perform a cost benefit analysis to determine whether it makes business sense to correct a control deficiency.
Challenges to Relevant Financial Statements and Valuation
Kevin Chenoweth
90 Min
Product Id: 704309
This training program will analyze how ratio analysis applies to particular industries and will detail how a company’s current operations can be improved. The course will also deconstruct financial statements to understand key drivers to organic and inorganic growth.
Taking the Risk and Complexity out of Business Continuity (for Healthcare Organizations)
Ross A Leo
90 Min
Product Id: 702757
This webinar on business continuity planning for healthcare organizations will discuss the major drawbacks to business continuity planning projects as they are currently done, and describe a simpler, more efficient approach to getting them done and implemented.
Managing Corporate Risks with ISO 31000
Kelly Eisenhardt
60 Min
Product Id: 705083
ISO 31000 is a standard developed by the International Organization for Standardization (ISO) which provides a basic guideline and principles for the application of risk management. Companies that use risk management processes vary across industries in scope and magnitude and address a wide variety of challenges. This training program will offer an in depth look into the key components of the ISO 31000 guideline and best practices to implement and support a corporate risk management strategy or program.
Writing Effective Suspicious Activity Reports
Kenneth Barden
60 Min
Product Id: 700482
The keystone of AML compliance is the reporting to proper authorities of those transactions and activities considered to be suspicious
Auditing Business Continuity Plans According to ISO 22301
Michael C Redmond
Product Id: 704410
This training will cover the best practices for implementing and auditing a Business Continuity Plan. The speaker will discuss the lifecycle of a BCP program with specific emphasis on Risk Assessment and Business Impact Analysis, Designing a living BCP & Testing & Maintenance. The program will also detail the various standards from FFIEC to ISO. Participants will understand what’s involved in a full BCP program and have insights based upon field experience that can be applied to Internal Audit work and BCP. The session will provide you with tools that you can bring back to your company to improve upon BCP programs & ability to audit them to provide targeted recommendations.