Red Flags of Internal Fraud, Asset Misappropriation, and Corruption
H. David Kotz
75 Min
Product Id: 704865
This webinar highlights how one can identify red flags of frauds, asset misappropriation and corruption. Presented by the former Inspector General of the SEC, the webinar provides specific and concrete tips to identify potential red flags before there is significant exposure.
Conflict of Interest in the Business Environment: Address Workplace Ethics
John E Grimes
90 Min
Product Id: 704936
This webinar will help in identifying the existence of a conflict of interest. Understand the levels at which potential conflicts can exist, and the various ways in which a conflict can harm an organization. The instructor will explain the correlation between a conflict of interest and corruption, including bribery, kickbacks, and illegal or unauthorized gratuities and discuss proactive preventive and detection measures to combat this fraud hazard.
Complying with the Rules and Regulations Pertaining to Letters of Credit: OFAC, Anti-Boycott, and the USA PATRIOT Act
Buddy Baker
90 Min
Product Id: 702639
This international trade compliance training will provide an overview and introduction to rules and regulations governing international trade and take an in-depth look at US sanctions enforced by the Office of Foreign Assets Control (OFAC), Anti-Boycott regulations maintained by the US Department of Commerce, and section 326 of the USA PATRIOT Act (“Know Your Customer”).
Fitting the Concepts of Enterprise Risk Management to Your Organization
Lynn Fountain
90 Min
Product Id: 704763
This training program will explore standard stated benefits of ERM including increased competitive advantage, increased likelihood of achieving strategic objectives and ability to meet increased stakeholder expectations, improved governance and increased likelihood of meeting regulatory and compliance expectations.
Designing Effective Controls, Security Safeguards and Governance by a Risk-Based Methodology
Javier Kuong
120 Min
Product Id: 704656
This training program will provide a practical and structured methodology for the design of governance, controls and security provisions. The methodology can be applied to participants’ real work environment immediately. Participants will also benefit from comparing their present governance and controls design practices with the structured, risk-based methodology presented in the webinar.
Pricing for Risk in Merchant Payments - Risk Metrics, Reserve Requirements, Pricing Models, Best Interchange Rates, EMV/NFC Guidelines
Armen Khachadourian
90 Min
Product Id: 704546
This training program will provide insight into fundamental underwriting and risk management guidelines, determining variables that constitute merchant risk, and on how to assign a dollar value and quantify exposure.
Is Your Vendor Ripping You Off? Fraud Red Flags Corporate Executives Should Recognize
Anne M McFadden
90 Min
Product Id: 704015
This training program will primarily focus on analytical and accounting red flags in purchasing schemes, bid rigging, billing schemes, personal purchase schemes, product substitution and all other kinds of corporate fraud.
Building a Comprehensive Fraud Investigative Report
H. David Kotz
75 Min
Product Id: 704035
This training program will discuss how to ensure the credibility of a fraud investigative report. It will train attendees on conducting effective witness interviews, discuss fraud investigative techniques utilized in different situations, and offer tips to locate relevant documents in a fraud investigation.
Home Mortgage Disclosure Act (HMDA) Reports - Meeting Regulators: Expectations - Tools and technique to reduce errors
Jim George
60 Min
Product Id: 703743
Fraudsters are always looking for new opportunities and new weaknesses. The availability of customer data on the black-market gives them just the tools they need. A bank has responsibilities to its shareholders and customers to protect them from these ever-changing threats. This webinar will furnish attendees with a complete understanding of the changes in the fraud arena and the strategies needed to combat fraud.
What Does the Foreign Corrupt Practices Act (FCPA) Mean to the Procure to Pay (P2P) Process
Chris Doxey
90 Min
Product Id: 704606
This webinar will discuss the Foreign Corrupt Practices Act (FCPA) and its implication on the pay-to-procure (P2P) process. Participants will learn the 15 step compliance roadmap for the FCPA and FCPA compliance programs and how to test for FCPA violations in the P2P process. The Instructor will share guidelines to help your company establish FCPA compliance for your P2P process.
ACH Fraud - Detection and Prevention
Rayleen M Pirnie
90 Min
Product Id: 704369
This training program will discuss common forms of ACH fraud, including: social engineering, account takeover (consumer, corporate, and institution internal accounts), money mules and advance fee frauds, and embezzlement. Under each of these sections, the course will also discuss: ACH fraud detection, fraud mitigation, ACH Returns, sound business practices to thwart attempts, and education.
Defending FCPA Claims and Minimizing FCPA Exposure
H. David Kotz
60 Min
Product Id: 704556
This training program will highlight how one can effectively manage risks resulting from Foreign Corrupt Practices Act (FCPA) claims. Presented by the former Inspector General of the SEC, who served in senior-level positions in several federal agencies, the webinar will provide practical lessons on how to manage FCPA claims, devise effective compliance programs, conduct internal investigations and achieve a culture of compliance in an organization.
Foreign Exchange Hedging for Corporations
Jonathan Wetreich
90 Min
Product Id: 704133
In this training program, attendees will learn the types of FX hedge programs typically utilized by corporations and the hedge instruments typically used by corporate hedgers such as forwards and collars. They will also gain an understanding of the concept of view-neutral hedging.
E-Compliance: Online Privacy, Harassment and Identity Theft in the Digital Age
Joseph Rosner
60 Min
Product Id: 704524
This webinar will discuss the bane of new technology and social media in regards to employers’ and employees’ privacy. The instructor will discuss e-compliances that employers need to adhere to avoid privacy suits. He will also cover the risks of information breach and defamation claims from electronic employee postings. Participants will know how to deal with online privacy and harassment claims and ways and limits of disciplining employees’ online presence. The course will also examine how to legally use Internet postings, profiles and other content in hiring decisions.
Risk Management - Best Practices, Roles and Responsibilities, Types and Preventives, Case Studies
Robert Geary
90 Min
Product Id: 703689
This webinar will demonstrate a conceptual framework and thought process to address risk management. It will discuss the significance of risk management processes with emphasis on causes of risk and risk preventives. The instructor will explain the best practices, roles and responsibilities, risk types and how to prevent them.
3-Hour Virtual Training: Guidelines for Performing a Corporate Wide Internal Audit Risk Assessment
Marna Steuart
180 Min
Product Id: 704386
This training program will detail key components of a risk assessment and management program, and include a fraud risk assessment discussion. Other training points in the program include analyzing the methodology for successful risk assessment process, understanding the steps involved in the risk assessment process, and fraud risk assessment.
Regulation V - Fair Credit Reporting Act
Kara Lamphere
60 Min
Product Id: 704290
This webinar will discuss the Regulation V – Fair Credit Reporting Act(FCRA) in details and explain attendees what types of marketing are allowed, requirements of affiliate marketing, and disclosures required with regard to consumer credit report. Speaker will discuss about consumer credit report alerts and identity theft protections, as well as what an institution must do with these alerts.
Fraud Red Flags All Corporate Executives Should Recognize
Anne M McFadden
60 Min
Product Id: 704347
This training program will provide an overview of the three main occupational fraud categories, including corruption, asset misappropriation and financial reporting. Attendees will learn how to minimize the impact of the fraud scheme by detecting red flags for fraud early.
Fraud and Cash Receipts: Common Frauds and Internal Controls
Toby Lawrence
60 Min
Product Id: 704301
This training program will enumerate the types of frauds that occur in the revenue cycle and cash receipts function. It will also highlight red flags or warning signs to look out for that may indicate someone is committing fraud. Further, attendees will learn to perform a cost benefit analysis to determine whether it makes business sense to correct a control deficiency.
Establishing an Effective Internal Controls System: AP, COSO, COBIT, SAS, SAC
David Sanders
90 Min
Product Id: 704266
This training program will help find the dots relating to AP internal controls and connect them. The course will include: processes of formulation and implementation; how to develop steps for internal controls; how to develop tools for internal controls; how to benefit from these tools and more.