Preparing a Financial Industry Compliance Manual and Code of Ethics
Lisa Marsden
60 Min
Product Id: 704962
This training program will detail developing a compliance manual and a code of ethics for the financial industry, with the intent of clarifying the requirements of the Advisers Act. The instructor will also guide attendees on testing the manual, effectively managing it, and keeping it constantly updated.
FCPA and Anti-Bribery Cases and Trends in the US, China and Russia
Grant Smith
60 Min
Product Id: 704332
This training program will highlight the practices prohibited by the FCPA. It will help determine if your current travel and entertainment policy is in compliance and discuss what accounting and anti-bribery violations are covered.
How to Apply ISO 27001 Principles to Enterprise Risk Management in 2017
Michael C Redmond
60 Min
Product Id: 704828
This webinar training will help you implement ISO standards in your Enterprise risk management (ERM) system and understand the benefits. This session will enable on how to integrate ISO 27001 in your organization as the main structure for information security management.
Develop and Upgrade Sound Business Continuity Plans | New and Potential Threats
Javier Kuong
120 Min
Product Id: 704908
This webinar will offer guidelines on how organizations should take a short-, medium-, and long-term vision of their enterprise-wide contingency and business continuity plan preparation. It will also offer best practices to upgrade your Business Continuality Plan (BCP) to cope with a whole variety of new current and forecast threats, with uncertain times of occurrence, in a dynamic business and global threat panorama.
Mitigating and Conducting Very Effective Risk Assessments and Business Impact Analysis
Michael C Redmond
60 Min
Product Id: 704823
This webinar training will explain project management principles to prepare your business to overcome risk and outage. The instructor will discuss how to conduct risk assessment and business impact analysis. He will also discuss how to test and document risk elements and the process or steps to be taken to combat it.
Achieving Enterprise Information Security Goals - Creating Right Teams
Rich Devlin,Joe Grannemon
60 Min
Product Id: 704863
This webinar will involve a high-level discussion on how you can create effective teams for achieving your Information Security goals and addressing complex threats such as Ransomware. Learn how to create a Information Security plan and align your goals with objectives, strategies and tactics across teams.
Fitting the Concepts of Enterprise Risk Management to Your Organization
Lynn Fountain
90 Min
Product Id: 704763
This training program will explore standard stated benefits of ERM including increased competitive advantage, increased likelihood of achieving strategic objectives and ability to meet increased stakeholder expectations, improved governance and increased likelihood of meeting regulatory and compliance expectations.
Designing Effective Controls, Security Safeguards and Governance by a Risk-Based Methodology
Javier Kuong
120 Min
Product Id: 704656
This training program will provide a practical and structured methodology for the design of governance, controls and security provisions. The methodology can be applied to participants’ real work environment immediately. Participants will also benefit from comparing their present governance and controls design practices with the structured, risk-based methodology presented in the webinar.
Pricing for Risk in Merchant Payments - Risk Metrics, Reserve Requirements, Pricing Models, Best Interchange Rates, EMV/NFC Guidelines
Armen Khachadourian
90 Min
Product Id: 704546
This training program will provide insight into fundamental underwriting and risk management guidelines, determining variables that constitute merchant risk, and on how to assign a dollar value and quantify exposure.
Protecting Your Intellectual Property Abroad
Douglas Cohen
60 Min
Product Id: 702972
IP piracy costs more than a loss in sales. If your brand loses value because it is seen as less exclusive or is confused with poor imitations this poses a long term threat to profitability. Re-establishing brand identity and company reputation is expensive if not impossible. This webinar will provide specific, practical steps to take to lessen this risk of loss.
E-Compliance: Online Privacy, Harassment and Identity Theft in the Digital Age
Joseph Rosner
60 Min
Product Id: 704524
This webinar will discuss the bane of new technology and social media in regards to employers’ and employees’ privacy. The instructor will discuss e-compliances that employers need to adhere to avoid privacy suits. He will also cover the risks of information breach and defamation claims from electronic employee postings. Participants will know how to deal with online privacy and harassment claims and ways and limits of disciplining employees’ online presence. The course will also examine how to legally use Internet postings, profiles and other content in hiring decisions.
Risk Management - Best Practices, Roles and Responsibilities, Types and Preventives, Case Studies
Robert Geary
90 Min
Product Id: 703689
This webinar will demonstrate a conceptual framework and thought process to address risk management. It will discuss the significance of risk management processes with emphasis on causes of risk and risk preventives. The instructor will explain the best practices, roles and responsibilities, risk types and how to prevent them.
A Risk-Based Methodology to Develop and Prepare an Effective Service Level Agreement (SLA) Package to Improve Service and Security Quality
Javier Kuong
90 Min
Product Id: 703999
This training program will illustrate a structured methodology to develop effective service level agreements based on a top-down, risk-based approach, summarized in a matrix that documents the whole development process for specific SLAs that respond to business objectives.
Marketing for Most of Us Today
Barney Kramer
90 Min
Product Id: 704287
This training program will focus on current marketing avenues such as outbound and inbound marketing, social media and its reach with consumers, content marketing and more. It will focus on the basics of marketing principles and guide attendees in developing target markets and segments for subsets of your strategic plan.
3-Hour Virtual Training: Guidelines for Performing a Corporate Wide Internal Audit Risk Assessment
Marna Steuart
180 Min
Product Id: 704386
This training program will detail key components of a risk assessment and management program, and include a fraud risk assessment discussion. Other training points in the program include analyzing the methodology for successful risk assessment process, understanding the steps involved in the risk assessment process, and fraud risk assessment.
Sales Principles for Small and Medium Businesses
Barney Kramer
90 Min
Product Id: 704354
This training program will discuss the core process of selling with integrity and how it ties to the true definition of sales. Attendees will understand how sales will need to adapt a more collaborative role with marketing and why.
Fraud Red Flags All Corporate Executives Should Recognize
Anne M McFadden
60 Min
Product Id: 704347
This training program will provide an overview of the three main occupational fraud categories, including corruption, asset misappropriation and financial reporting. Attendees will learn how to minimize the impact of the fraud scheme by detecting red flags for fraud early.
Fraud and Cash Receipts: Common Frauds and Internal Controls
Toby Lawrence
60 Min
Product Id: 704301
This training program will enumerate the types of frauds that occur in the revenue cycle and cash receipts function. It will also highlight red flags or warning signs to look out for that may indicate someone is committing fraud. Further, attendees will learn to perform a cost benefit analysis to determine whether it makes business sense to correct a control deficiency.
Out in the Open: Protecting Your Privacy and Identity in the Digital Age on the Internet
Joseph Rosner
60 Min
Product Id: 704256
This privacy protection in the digital age training program will detail what the Internet of Things is and how it collects data and tracks you. It will further examine the risks attached to personal information and more.
Changing Trend in Risk Allocation - Differing Site Conditions
Jim Zack
90 Min
Product Id: 704240
This webinar discusses the definition of a differing site condition and why there is a need for a Differing Site Conditions clause in a construction contract. The webinar sets forth the history and purpose of the clause and examines the modern Differing Site Conditions clauses and the changes over time.