Measuring and Managing Customer Profitability - From Growing Sales to 'Profitable' Sales
Gary Cokins
90 Min
Product Id: 704679
This training program will focus on how to shift the mindset from growing sales to growing profitable sales and to view customers as investments like in a stock portfolio to seek higher ROIs – return on customers (ROC). It will also look at how measuring forward-looking customer lifetime value (CLV) differs from calculating historical customer/consumer profitability for B2C industries.
CAMELS Methodology | Market Risk Identification, Evaluation and Managing Risk Conditions - CCAR and CLAR
Robert Geary
60 Min
Product Id: 704669
This training webinar discusses CAMELS components in terms of the regulators’ evaluation methodology. It covers how these considerations translate into the rating of each component and the formulation of a bank’s CAMELS composite rating. In addition, the instructor explains two related evaluations: CCARS which is a “Comprehensive Capital Assessment and Review”, and CLAR which is a “Comprehensive Liquidity Assessment and Review” and how to rate bank’s capital adequacy and liquidity adequacy.
Is Your Vendor Ripping You Off? Fraud Red Flags Corporate Executives Should Recognize
Anne M McFadden
90 Min
Product Id: 704015
This training program will primarily focus on analytical and accounting red flags in purchasing schemes, bid rigging, billing schemes, personal purchase schemes, product substitution and all other kinds of corporate fraud.
Building a Comprehensive Fraud Investigative Report
H. David Kotz
75 Min
Product Id: 704035
This training program will discuss how to ensure the credibility of a fraud investigative report. It will train attendees on conducting effective witness interviews, discuss fraud investigative techniques utilized in different situations, and offer tips to locate relevant documents in a fraud investigation.
Home Mortgage Disclosure Act (HMDA) Reports - Meeting Regulators: Expectations - Tools and technique to reduce errors
Jim George
60 Min
Product Id: 703743
Fraudsters are always looking for new opportunities and new weaknesses. The availability of customer data on the black-market gives them just the tools they need. A bank has responsibilities to its shareholders and customers to protect them from these ever-changing threats. This webinar will furnish attendees with a complete understanding of the changes in the fraud arena and the strategies needed to combat fraud.
Vendor Management Program - Risk Assessment, Effective Controls, Best Practices to Minimize 3PV Risk
Anne M McFadden
90 Min
Product Id: 704615
This vendor management training program will offer best practices for managing and minimizing third party vendor risk through strategies that help you focus resources with a risk based approach. It will explore the five elements of a successful vendor management program, including: vendor culture, vendor risk assessment, ensuring effective controls around vendor management, monitoring vendor programs, and vendor communication.
What Does the Foreign Corrupt Practices Act (FCPA) Mean to the Procure to Pay (P2P) Process
Chris Doxey
90 Min
Product Id: 704606
This webinar will discuss the Foreign Corrupt Practices Act (FCPA) and its implication on the pay-to-procure (P2P) process. Participants will learn the 15 step compliance roadmap for the FCPA and FCPA compliance programs and how to test for FCPA violations in the P2P process. The Instructor will share guidelines to help your company establish FCPA compliance for your P2P process.
Defending FCPA Claims and Minimizing FCPA Exposure
H. David Kotz
60 Min
Product Id: 704556
This training program will highlight how one can effectively manage risks resulting from Foreign Corrupt Practices Act (FCPA) claims. Presented by the former Inspector General of the SEC, who served in senior-level positions in several federal agencies, the webinar will provide practical lessons on how to manage FCPA claims, devise effective compliance programs, conduct internal investigations and achieve a culture of compliance in an organization.
Foreign Exchange Hedging for Corporations
Jonathan Wetreich
90 Min
Product Id: 704133
In this training program, attendees will learn the types of FX hedge programs typically utilized by corporations and the hedge instruments typically used by corporate hedgers such as forwards and collars. They will also gain an understanding of the concept of view-neutral hedging.
Cyber Incident Response: The Payments Perspective - Threat Intelligence and Best Practices to Manage Threats
Rayleen M Pirnie
90 Min
Product Id: 704443
This training program will discuss how cyber-attacks affect payment processing. It will highlight to attendees how best to record appropriate sound business practices for managing operational risk due to a cyber-attack. Attendees will also learn to identify critical operational communications, from internal staff to customers and institutions to vendor support.
E-Compliance: Online Privacy, Harassment and Identity Theft in the Digital Age
Joseph Rosner
60 Min
Product Id: 704524
This webinar will discuss the bane of new technology and social media in regards to employers’ and employees’ privacy. The instructor will discuss e-compliances that employers need to adhere to avoid privacy suits. He will also cover the risks of information breach and defamation claims from electronic employee postings. Participants will know how to deal with online privacy and harassment claims and ways and limits of disciplining employees’ online presence. The course will also examine how to legally use Internet postings, profiles and other content in hiring decisions.
Risk Management - Best Practices, Roles and Responsibilities, Types and Preventives, Case Studies
Robert Geary
90 Min
Product Id: 703689
This webinar will demonstrate a conceptual framework and thought process to address risk management. It will discuss the significance of risk management processes with emphasis on causes of risk and risk preventives. The instructor will explain the best practices, roles and responsibilities, risk types and how to prevent them.
A Risk-Based Methodology to Develop and Prepare an Effective Service Level Agreement (SLA) Package to Improve Service and Security Quality
Javier Kuong
90 Min
Product Id: 703999
This training program will illustrate a structured methodology to develop effective service level agreements based on a top-down, risk-based approach, summarized in a matrix that documents the whole development process for specific SLAs that respond to business objectives.
3-Hour Virtual Training: Guidelines for Performing a Corporate Wide Internal Audit Risk Assessment
Marna Steuart
180 Min
Product Id: 704386
This training program will detail key components of a risk assessment and management program, and include a fraud risk assessment discussion. Other training points in the program include analyzing the methodology for successful risk assessment process, understanding the steps involved in the risk assessment process, and fraud risk assessment.
Driver Performance-Based Budgeting and Rolling Financial Forecasts
Gary Cokins
90 Min
Product Id: 704391
This training program will help attendees understand the deficiencies with the traditional annual budget. Attendees will also learn how to apply unit-level consumption rates with forecasts to project operational expenses and how to include strategic projects and risk mitigation projects in expense projections.
Fraud Red Flags All Corporate Executives Should Recognize
Anne M McFadden
60 Min
Product Id: 704347
This training program will provide an overview of the three main occupational fraud categories, including corruption, asset misappropriation and financial reporting. Attendees will learn how to minimize the impact of the fraud scheme by detecting red flags for fraud early.
Fraud and Cash Receipts: Common Frauds and Internal Controls
Toby Lawrence
60 Min
Product Id: 704301
This training program will enumerate the types of frauds that occur in the revenue cycle and cash receipts function. It will also highlight red flags or warning signs to look out for that may indicate someone is committing fraud. Further, attendees will learn to perform a cost benefit analysis to determine whether it makes business sense to correct a control deficiency.
Out in the Open: Protecting Your Privacy and Identity in the Digital Age on the Internet
Joseph Rosner
60 Min
Product Id: 704256
This privacy protection in the digital age training program will detail what the Internet of Things is and how it collects data and tracks you. It will further examine the risks attached to personal information and more.
Challenges to Relevant Financial Statements and Valuation
Kevin Chenoweth
90 Min
Product Id: 704309
This training program will analyze how ratio analysis applies to particular industries and will detail how a company’s current operations can be improved. The course will also deconstruct financial statements to understand key drivers to organic and inorganic growth.
Quantitative Analysis of Individual Borrower Credit Risk
Joseph M. Pimbley
90 Min
Product Id: 704326
This training program will detail the development and use of credit ratings for credit risk assessment; development of financial statement regression techniques as embodied in the Altman Z score for credit risk assessment; differences in quantitative tools for differing loan type; importance of data quality for quantitative tools, and more.