Compliance Department Restructuring with the New Regulatory Demands
Carlo Chalhoub
60 Min
Product Id: 705454
This webinar addresses recent changes in the compliance environment. It will also discuss the process for evaluating compliance department structure and the goals of compliance restructuring.
How to Build and Use a Risk Matrix
Mario Mosse
60 Min
Product Id: 704970
Risk matrices are used during risk assessment to define the various levels of risk as the product of the probability and impact categories. This webinar training will focus on this simple but powerful mechanism to increase visibility of risks and assist management decision making. Risk matrices are one of the most widespread tools for risk evaluation.
Effective and Proactive Strategic Risk Management - A Vital Element to Achieve Effective Enterprise-wide Governance, Risk Management and Compliance (GRC) Programs
Javier Kuong
120 Min
Product Id: 705407
Learn an effective approach to practice risk management process that is proactive, strategic and top-down in nature to anticipate, avoid and mitigate potential losses from threats and risks that are present in the real world regardless of any organization’s wishes.
Cybersecurity Policy and Controls Management with Root Cause Analysis (RCA)
William Akel
60 Min
Product Id: 705404
Learn corporate policy definition and assignment with ramifications for both. We'll discuss how to identify and document management review controls, why a fine tuned policy and procedure are critical to business operations and how to obtain the real root cause of cyber security incidents effectively.
Auditing the Cyber Security Program to Ensure the Company's Digital Crown Jewels are Safeguarded from Hackers
Barbara Gai
60 Min
Product Id: 705426
This webinar will provide an overview of the ways to identify and assess security risks within the company. Attendees will learn to develop a robust audit program that will thoroughly assess existing controls in protecting the organizations’ data.
The Affordable Care Act: Key Compliance Issues for Employers in 2017 and Beyond
Janette Levey Frisch
120 Min
Product Id: 703843
This training program will focus on ACA compliance requirements for 2017. It will also cover topics such as anti-discrimination provisions for highly compensated employees, affordable coverage penalty, transitional relief for some employers in 2017, and more.
Exclusive Cyber Security Incident Management Program 2017
William Akel
60 Min
Product Id: 705380
Gain a better understanding of cyber security incident management that is proactive versus reactive, learn methods to minimize business disruption and damages, and the impact and urgency on customers and the business for risk and costs.
Implementing a Risk Management Program - Handbook, Risk Appetite and Risk Culture
Fred Vacelet
60 Min
Product Id: 705115
This training program will review a few ways to ensure that a financial institution reviews things from the start and consistently, in setting up a risk management framework that allows the bank to focus on its strategy rather than mere compliance.
The IRS is Coming: How to Prepare for the New IRS Partnership Audit Rules
Travis A Greaves,T Joshua Wu
60 Min
Product Id: 705112
The new IRS partnership audit rules require all partnership and LLCs taxed as partnerships to amend their partnership agreement and take action now. In this training program, attendees will learn how these rules impact your business and your clients. The session will discuss IRS issues with TEFRA (Tax Equity and Fiscal Responsibility Act) and detail the concepts and terms in the Bipartisan Budget Act.
COSO Integrated Guidance: Effective Internal Control for Successful Corporate Management
Lynn Fountain
90 Min
Product Id: 704696
This training program will highlight the importance of management’s role in instilling proper internal controls within their processes. Although the Sarbanes-Oxley Act made it abundantly clear that internal controls is the responsibility of management, many companies still view those processes as the responsibility of the auditors or quality assurance individuals. The impending release of the new COSO Framework clearly outlines the importance of understanding all aspects of internal control and ensuring those elements are properly working together in an effective manner.
How to Establish an Effective Internal Control System
David Sanders
90 Min
Product Id: 705133
This webinar will enhance participants’ knowledge by detailing the elements of internal controls. Internal controls are a key part of any organization's continued growth, performance and success. With fraud at an all-time high, a well-designed internal control structure will enhance operations by improving your department's over all security and effectiveness.
Setting Up A Stress-Testing Program
Fred Vacelet
60 Min
Product Id: 705155
For a multitude of reasons, stress-testing programs have seldom satisfied regulators, even after the 2007 crisis. After most significant mishap in every bank, management often discovers that the managerial stress-testing have revealed to be insufficient, over-driven by optimism. In this training program, the instructor will deconstruct regulatory constraints after Basel II and III, lessons learnt after 2007, and stress-testing as a strategic exercise.
Using Lean to Streamline your Operations, Continuity Planning and Recovery
Michael C Redmond
60 Min
Product Id: 704826
This webinar training will discuss the lean principles and how to effectively implement them in your system to identify and reduce waste. The instructor will discuss how to apply lean to align business system and process with organisational goals so as to deliver rapid and measurable results.
Corporate Governance and the Board of Directors' Role
Adam Kerns
60 Min
Product Id: 705067
This webinar will offer a comprehensive, in-depth review of the state laws affecting the corporate governance standards applicable to insurance companies and the board of directors’ role in those standards.
Business Email Compromise and Ransomware - Red Flags and Mitigation
Rayleen M Pirnie
60 Min
Product Id: 705038
The Internet Crime Complaint Center (IC3) reports that U.S. victims alone lost $18 million in 15 months to just a single form of ransomware. This training program will review the risks associated with various types of cyber fraud, and in particular, business email compromise (BEC) and ransomware. The session will also discuss documenting sound business practices to minimize exposure and loss and list what to present to your board of directors before an incident.
Ethical Dilemmas in Food Policy
Darin Detwiler
90 Min
Product Id: 705034
This webinar sheds light on the changes in the political, economic and judicial landscape of the food industry. Landmark food industry events over the last two decades highlight the evolution of the challenges and consequences related to ethical dilemmas in the food industry. This webinar covers the elements of food systems, economics of failure, true burden of disease, case studies from industry and regulatory agencies.
Reducing the Cost of RoHS and REACH Compliance Declarations
Jim Kandler
60 Min
Product Id: 705028
This training program will introduce different methods to improve existing declaration collection efforts. It will propose several practical methods a manufacturer might implement to make their material compliance efforts more effective.
How to Implement a Workplace Diversity and Inclusion Program
Catherine Mattice Zundel
90 Min
Product Id: 705017
A common workplace discussion often centers around diversity and inclusion and why it should be celebrated. This training program will discuss creating a strategic plan for diversity and inclusion. It will detail building an audit plan and auditing your HR department in order to determine opportunities for improvement.
Cyber Risk Register: The Cornerstone for Understanding and Managing Cyber Risk
Mario Mosse
90 Min
Product Id: 704977
Information technology assets and information need to be protected against unauthorized internal or external access and cyberattacks. These attacks may result in data destruction, alteration, unavailability or breach of confidentiality. This training program will discuss how developing and maintaining a cyber risk register is a fundamental step toward inventorying, assessing and addressing cyber risks threatening your organization.
Planning and Managing Organizational Change: 10 Tips and Techniques
Christopher R DeVany
90 Min
Product Id: 704980
This training program will analyze the gaps that need to be addressed while implementing organizational changes. It will help attendees assess major issues involved in organizational readiness, help overcome intellectual challenges, help create effective communication plans, ensure all systems support, and finally, assess change management.