4-hr Virtual Seminar: Financial Controller Job - Roles, Responsibilities and Skills for Success
Miles Hutchinson
4 hrs
Product Id: 704024
This training program will guide attendees on what it takes to become a successful controller. The program will help identify the primary functions and responsibilities of the controller and how your role will change as you move into this position.
How to Build and Use a Risk Bow Tie
Mario Mosse
90 Min
Product Id: 705009
This training program will define and discuss the bowtie risk assessment method used to analyze and establish causal relationships in high risk scenarios. Named after the shape of the diagram created, bowties provide an excellent visual representation of the potential causes and consequences of a risk scenario and help ensure that all relevant information is identified and properly assessed.
The Fraud Risk Mitigation Cycle: Powerful Detection and Prevention Framework
Peter Goldmann
90 Min
Product Id: 703154
This training program will facilitate participants’ understanding of fraud risks, detecting fraud indicators, gathering evidence to substantiate suspicions of actual wrongdoing and eliminating control weaknesses in all pertinent business functions.
Understanding International ACH Transaction
Jane Hennessy
60 Min
Product Id: 703432
This webinar will explain concept of ACH, how it works, rationale for choosing it and how it differs from US domestic ACH. It will also discuss what International Payments Framework Association (IPFA) is and how does it address International ACH issues. Instructor will cover the relevance of Customer benefits and value proposition regarding ACH and why it should be preferred over wire transfers.
BSA/ AML - Following the Money, the Difference between Money Laundering and Terrorist Financing and How to Combat Both
Jason Simpson
60 Min
Product Id: 703055
This AML training will provide you the tools to identify the differences between money laundering and terrorist financing and how to protect your financial institute against potential criminal activity. It will also highlight the complexities of modern day proactive compliance departments.
Red Flags and EDD for Non-Bank Financial Institutions
Vicki Landon
60 Min
Product Id: 703536
This webinar will address the red flags that may indicate money laundering and fraud in non-bank financial institutions. It will also provide guidelines for conducting enhanced due diligence (EDD).
Record Retention and Destruction Compliance
David Sanders
90 Min
Product Id: 704445
This training program will offer attendees an understanding of record schedule defensibility and best practices to take steps toward improvements. The IRS states entities need to be fully informed of the code relating to Record Retention and Destruction to determine what records are necessary to stay in compliance or face fines. According to IRS and state statistics of the entities audited over the past three years, 82% could not supply adequate records to pass an audit - resulting in substantial fines for non-compliance.
Time Extension Requests - A Checklist
Jim Zack
90 Min
Product Id: 704345
This training program may well change the way in which you prepare or analyze the very next time extension request you have to deal with. It will discuss rules concerning time extension requests, arguments about waiver and apportionment of liquidated damages, concurrent delay issues and who has to prove concurrent delay, and more.
EDD what are the auditors looking for?
Vicki Landon
90 Min
Product Id: 703455
This webinar will explain the concept of Enhanced Due Diligence (EDD), including EDD time tables and checklist. Attendees will learn how to conduct Enhanced Due Diligence (EDD) that will satisfy the auditors.
How to Conduct an Internal Audit to Avoid an External One
Vicki M. Lambert
90 Min
Product Id: 703353
Attend this webinar to learn the strategies for conducting an internal audit and discover whether or not you have been subject to fraud plus help you to prevent internal fraud in the future. It will provide best practices for payroll departments to avoid external audits.
Constructing an Effective Argument
Daniel Clark
60 Min
Product Id: 703844
The ability to construct and present a winning argument by those without direct control over business processes or organizations is the key requirement to excel in today’s risk and auditing environment. This webinar will provide participants with tools and strategies that will improve the quality of your argument thereby improving your chances for providing positive, substantial and effective advice.
Procure to Pay (P2P) Fraud: Critical Controls, Risk Mitigation and Case Studies for Analyzing What Went Wrong
Chris Doxey
60 Min
Product Id: 703859
This unique and interactive workshop will analyze real time case studies from all components of the procure to pay (P2P) process that include: procurement, T&E, P-Card, AP, and disbursements. Attendees will have an opportunity to discuss what went wrong and will determine the key internal controls that were missing. The instructor will highlight the three critical corporate controls, the standards of internal control for P2P, and the top twenty controls for AP.
Internal Controls - What Every Manager Needs to Know
Lynn Fountain
90 Min
Product Id: 703148
This webinar highlights the importance of management’s role in instilling proper internal controls within their processes. In this session, instructor will explore methods to educate management on their individual responsibilities for control processes and the variance between a control malfunction and control design issues. Participants will be provided with tools to help management better understand their role in internal control and effectively execute their obligations. The session will also review the impending COSO changes and examine how they may impact your organization.
Detecting and Preventing Embezzlement in Your Organization
Peter Goldmann
90 Min
Product Id: 703763
While there are innumerable ways to detect, prevent and investigate embezzlement, it is not always easy to organize a consistently effective anti-embezzlement strategy. This webinar will guide you through the common and not-so-common forms of embezzlement—with uniquely instructional case studies. It will emphasize the red flags of each and go on to highlight best practices in embezzlement risk mitigation.
The Board of Directors Role in Cybersecurity
Rayleen M Pirnie
60 Min
Product Id: 705117
This webinar will break down the Board’s role in effective cybersecurity oversight, the 12 questions a board member should be knowing to answer, key principles of oversight, tips and resources for board.
Bank Secrecy Act (BSA), Title 31, Compliance
Armen Khachadourian
60 Min
Product Id: 703574
This webinar will review current requirements of the Bank Secrecy Act, why to comply, how to comply, reporting techniques and current positions by the IRS and FinCEN.
Becoming a Chief Audit Executive - Leading the Internal Audit Function
Lynn Fountain
90 Min
Product Id: 704614
This training program will enumerate the IIA Standards and the auditor’s responsibility to abide by the standards. The program will also look at management’s expectations of internal audit and detail skills required for internal audit management. It will provide real-world examples and challenges facing today’s internal audit.
Practical Risk Appetite and Risk Tolerance
Mario Mosse
90 Min
Product Id: 704949
This webinar will discuss how to implement and monitor risk policy. The instructor will explain the challenges and opportunities involved in developing and implementing an effective risk appetite statement, which is supported by risk limits, and the determination of actual exposure against those limits and risk tolerance.
Writing Effective Audit Observations
Jonnie T Keith
90 Min
Product Id: 703740
This webinar will provide the principles for writing an effective audit report. The audit report represents the end result of weeks of reviews, analyses, interviews and discussions. It is used to provide information to management on the areas you reviewed. And, more importantly, the report brings issues to their attention that needs to be addressed. How well you communicate that information is critical to getting the results you are seeking.
Conducting Internal Investigations: Insights from Former SEC Inspector General
H. David Kotz
90 Min
Product Id: 703339
This training will provide the attendees simple but powerful tools and tips to conduct credible and thorough internal investigations. Attendees will learn how to perform effective witness interviews.