Analytics Based Enterprise Performance Management
Gary Cokins
90 Min
Product Id: 704192
This training program will guide attendees in viewing enterprise and corporate performance management (EPM/CPM) as the seamless integration of managerial methods rather than as a process. The course will also offer insight into identifying and differentiating strategic KPIs in a balanced scorecard and operational performance indicators (PIs) in dashboards.
How to Conduct Corporate Fraud Investigations: Planning, Gathering and Drafting a Comprehensive Investigative Report
H. David Kotz
90 Min
Product Id: 703700
Learn more about fraud investigation and get trained on effective investigative techniques by former SEC Inspector General David Kotz. This executive training session will increase your understanding of conducting a credible fraud investigation and creating precise reports. The session will conclude with best practices for putting in place policies that detect and deter fraud.
Supplier Inspections, Audits, and Compliance Tracking
Richard Maksimoski
60 Min
Product Id: 704130
Attendees will leave this training program with more confidence, vision, and productivity. The confidence comes from knowing that you have more tools to keep your product in compliance with regulatory and company standards. The ability to establish the necessary processes will allow attendees to remain confident that your company will be safe.
Internal Controls: Documenting Internal Accounting Policies and Procedures
Vidia Ramdeen
90 Min
Product Id: 704125
This interactive training program will enable attendees to devise a plan to assess and develop their organization’s internal control structure. They will also gain an understanding of key areas that are impacted when there is a lack of internal controls.
Managing an Effective AML Audit Program
Laura H Goldzung
90 Min
Product Id: 702988
This webinar will highlight the techniques and best practices that can be used for conducting an effective AML audit in order to ensure compliance with Bank Secrecy Act (BSA) regulations.
Vendor Management - Building a Strong Questionnaire
Michael D King
60 Min
Product Id: 704119
This training program will highlight why a vendor questionnaire is the keystone your vendor management program is built on. The course will help ensure attendees get the whole picture and determine appropriate controls for information security and privacy.
ISO/IEC 27001:2013 - Breaking It Down to Understand and Implement
Michael C Redmond
90 Min
Product Id: 703977
This training program will guide attendees in implementing and complying with the requirements of ISO 27001:2013. ISO 27001 is an international standard published by the International Standardization Organization (ISO), and it describes how to manage information security in a company. The latest revision of this standard was published in 2013, and its full title now is ISO/IEC 27001:2013.
Legitimacy of Buyers/Suppliers in Export/Import
Igor Chigrin
60 Min
Product Id: 704100
This training program will explore 8 techniques for verifying the legitimacy of your foreign counterparty. It will also discuss credit check, background check, reference check, criminal record check, restricted parties record check, financial health check, and more.
Conducting Internal Investigations - Legal Issues, Documenting Interviews and Policy Considerations
Kelly Rietow
60 Min
Product Id: 703984
This training program will help participants understand when an investigation is warranted, considerations in working with outside investigators, and provide practical steps to conduct your own internal investigation. Employee complaints go with the territory when you are a manager. But how do you know when to address a complaint informally or when you should launch an investigation? This webinar will also guide attendees in assessing situations that warrant formal investigation.
How to Build an Anti-Fraud Culture
Peter Goldmann
60 Min
Product Id: 702607
This anti-fraud webinar will discuss how to create an anti-fraud culture in your organization. How to put down anti-fraud zero tolerance policies that explain to employees what constitutes fraud, fraud awareness training, how to recognize its red flags and how to set up a effective fraud hotline.
How to Effectively Identify and Complete a Successful Merger or Acquisition of a Bank
Toby Lawrence
60 Min
Product Id: 704014
This training program will discuss how to create an effective M&A strategic plan that will help attendees identify and solicit targets that will add to the long-term shareholder value of their institution. Is your institution in the market for an acquisition or looking to grow? If so, this session will assist you and discuss keys to identifying and persuading an acquisition target interested in selling and the steps to completing a successful acquisition.
How Audit Evaluation Can Ensure Effective Decision Making Under Uncertainty
Geary Sikich
60 Min
Product Id: 703679
This presentation will explore the nature of decision making in crisis situations. It will explore the psychology of decision making under stress and overview risk management analysis tools. The webinar instructor will present tips and techniques to identify structural and cyclical changes, improve risk management strategy processes, and identify transparent vulnerabilities.
Evaluating the Effectiveness of your ERM Program: Risk Assessment, Recognizing Risk Awareness, and Building a Strong and Effective ERM Program
Gary W Patterson
60 Min
Product Id: 703626
This webinar will detail ERM core elements and discuss the basics of risk assessment. Attendees will learn to identify critical risk areas and mange backlog of risk areas as well.
Investigating Internal Non Compliance Complaints for the General Counsel - FSLA, FMLA and USERRA
Douglas Pilarski
120 Min
Product Id: 703845
This webinar will help general counsel and senior HR executives work together to better understand internal complaint systems, and design, establish, and maintain an effective system for handling employee complaints in the workplace when associates charge that the employer has violated one or more of the laws that regulate the employer-employee relationship. The course will review three examples in this session - FSLA, FMLA, and USERRA.
Data Breaches: What's the Risk?
Robert Minniti
60 Min
Product Id: 703722
This webinar will discuss the risks and costs of data breaches. Participants will learn who is vulnerable and what can be done to help prevent losses from data breaches. Additionally, the course will discuss the legal responsibilities and liabilities of an organization that is a victim of data breach and offer guidance to help prevent such breaches.
Illegal Insider Trading: A Working Knowledge of Recent Developments
Aldo Martinez
90 Min
Product Id: 703805
Although arguments exist on both sides regarding whether illegal insider trading should be deemed illegal or not, today it is globally recognized as a tool to perpetrate a fraud and is a direct threat to investors and therefore the capital raising process used by publicly traded companies. To ensure you, your employees and your financial institution are not fined, jailed or forced to close, it is imperative that you understand what to look for when identifying possible money laundering on accounts within your institution.
Creating and Updating an Effective Anti-Corruption Compliance Program
Lindsey Fetzer
60 Min
Product Id: 703783
As compliance with the Foreign Corrupt Practices Act (FCPA) and other anti-corruption statutes has matured into its own field, compliance professionals are faced with the proverbial one-way ratchet. U.S. enforcers’ compliance expectations continue to increase, and compliance programs now need to address multiple laws as more countries enhance and enforce their own anti-corruption regimes. This course will address the essential elements of an effective compliance program.
ORM Maturity Model - What Does Good Look Like?
Craig Spielmann
90 Min
Product Id: 703768
Regulators, executives, and boards have raised the bar for operational risk programs. There has been frustration from all key stakeholders with the perceived lack of value. It’s critical that there is a realistic expectation and picture of a truly mature program. It is in everyone’s interest to agree upon a true maturity level that is sustainable, attracts talent and is attainable in line with business direction.
The Role of the Audit Committee in Corporate Governance
Richard Cascarino
90 Min
Product Id: 703761
Audit committees are a fundamental part of the proper governance of any organization, together with the executive management and internal as well as external audit. This webinar will explore the role of the audit committee in corporate governance and risk management.
Developing and Implementing an Effective Employee Fraud Awareness Program
Peter Goldmann
90 Min
Product Id: 703647
A well-planned fraud awareness training can deliver maximum benefits with minimal delay at the lowest cost. This webinar will review best practices for training employees to recognize fraudulent conduct and how to report it without the fear of retaliation. Further, it will also highlight mistakes to avoid while setting up a whistleblower hotline and detail how best to measure the effectiveness of your fraud awareness training.