Corporate Governance and the Board of Directors' Role
Adam Kerns
60 Min
Product Id: 705067
This webinar will offer a comprehensive, in-depth review of the state laws affecting the corporate governance standards applicable to insurance companies and the board of directors’ role in those standards.
Business Email Compromise and Ransomware - Red Flags and Mitigation
Rayleen M Pirnie
60 Min
Product Id: 705038
The Internet Crime Complaint Center (IC3) reports that U.S. victims alone lost $18 million in 15 months to just a single form of ransomware. This training program will review the risks associated with various types of cyber fraud, and in particular, business email compromise (BEC) and ransomware. The session will also discuss documenting sound business practices to minimize exposure and loss and list what to present to your board of directors before an incident.
AML Risks in Correspondent Banking: What You Need to Know for 2017
Joe Soniat
60 Min
Product Id: 704997
Correspondent banking has become a hot topic with BSA AML over the past few years. With examination scrutiny on correspondent banking high, this training program will highlight why it is essential to know the risk and what to do when it comes to banking other banks.
Ethics in the Financial Services Industry
Lisa Marsden
60 Min
Product Id: 705053
The application and practice of ethical behavior is not just about complying with rules and regulations but about doing the right thing. This training program will discuss case studies and how to apply best practical ethical behavior and how to incorporate the ethical behavior into your firm’s overall business culture.
Procurement and Contract Fraud - Detection and Prevention
John E Grimes
90 Min
Product Id: 704334
This training program will examine the fraud vulnerabilities in the procurement of materials and services in the private sector. In addition, it will explore the many procurement and contract fraud schemes and at what point in the procurement and contract process they occur.
The Department of Labor's Fiduciary the New Final Rule - Best Practices for Conducting a Due Diligence and Reviewing the Best Interest Contract Exemption
Lisa Marsden
60 Min
Product Id: 705021
This 60-minute training session will provide a detailed overview of the Department of Labor’s Final Fiduciary Rule including the history and on-going resistance to the rule. The session will delve into details on how the rule was established and who it will be applied to. The webinar instructor will discuss the summary of the details of the new final rule and what firms must do to comply.
Project Risk Management
Mario Mosse
90 Min
Product Id: 705015
Project risk management includes the processes of conducting risk management planning, identification, analysis, action planning, and controlling risk on a project. This training program will analyze the objectives of project risk management - to increase the likelihood and impact of positive outcomes while decreasing the likelihood and impact of negative events affecting the success of the project.
How to Manage Reputational Risk
Mario Mosse
90 Min
Product Id: 705012
Reputation risk is the risk of loss resulting from damages to a firm's reputation, in lost revenue; increased operating, capital or regulatory costs; or destruction of shareholder value, due to an adverse or potentially criminal event even if the company is not found guilty. This training program will explore the hidden danger behind reputational risk that can pose a threat to the survival of the biggest and best-run companies, often wiping out millions or billions of dollars in market capitalization or future revenues and occasionally resulting in a change at the uppermost levels of management.
The Overall Annual Compliance Review - Latest Advisers Act
Lisa Marsden
60 Min
Product Id: 705016
This webinar will focus on compliance requirements to prevent violations of the Advisers Act. The training program will also discuss how to design your firm’s annual review and effectively manage the review process.
Cyber Risk Register: The Cornerstone for Understanding and Managing Cyber Risk
Mario Mosse
90 Min
Product Id: 704977
Information technology assets and information need to be protected against unauthorized internal or external access and cyberattacks. These attacks may result in data destruction, alteration, unavailability or breach of confidentiality. This training program will discuss how developing and maintaining a cyber risk register is a fundamental step toward inventorying, assessing and addressing cyber risks threatening your organization.
How to Develop an Effective Risk Register
Mario Mosse
90 Min
Product Id: 704969
A risk register, also known as a risk log, serves as a central repository for the organization's risk information. This training program will discuss its key function, i.e., to provide management, the board, and key stakeholders with significant information on the main risks faced by the organization. The program will also delve into designing and using your own ‘fit-for-purpose’ risk register.
Preparing a Financial Industry Compliance Manual and Code of Ethics
Lisa Marsden
60 Min
Product Id: 704962
This training program will detail developing a compliance manual and a code of ethics for the financial industry, with the intent of clarifying the requirements of the Advisers Act. The instructor will also guide attendees on testing the manual, effectively managing it, and keeping it constantly updated.
FCPA and Anti-Bribery Cases and Trends in the US, China and Russia
Grant Smith
60 Min
Product Id: 704332
This training program will highlight the practices prohibited by the FCPA. It will help determine if your current travel and entertainment policy is in compliance and discuss what accounting and anti-bribery violations are covered.
Enterprise Risk Management (ERM) and an Insurer’s Own Risk and Solvency Assessment (ORSA)
Adam Kerns
60 Min
Product Id: 704931
This webinar offer a comprehensive and in-depth review of the National Association of Insurance Commissioner’s (NAIC) Risk Management and Own Risk and Solvency Assessment Model Act and Guidance Manual (ORSA). Participants will learn about real world application to insurer’s daily operations and lessons learned so far.
How to Apply ISO 27001 Principles to Enterprise Risk Management in 2017
Michael C Redmond
60 Min
Product Id: 704828
This webinar training will help you implement ISO standards in your Enterprise risk management (ERM) system and understand the benefits. This session will enable on how to integrate ISO 27001 in your organization as the main structure for information security management.
Develop and Upgrade Sound Business Continuity Plans | New and Potential Threats
Javier Kuong
120 Min
Product Id: 704908
This webinar will offer guidelines on how organizations should take a short-, medium-, and long-term vision of their enterprise-wide contingency and business continuity plan preparation. It will also offer best practices to upgrade your Business Continuality Plan (BCP) to cope with a whole variety of new current and forecast threats, with uncertain times of occurrence, in a dynamic business and global threat panorama.
Complying with the Rules and Regulations Pertaining to Letters of Credit: OFAC, Anti-Boycott, and the USA PATRIOT Act
Buddy Baker
90 Min
Product Id: 702639
This international trade compliance training will provide an overview and introduction to rules and regulations governing international trade and take an in-depth look at US sanctions enforced by the Office of Foreign Assets Control (OFAC), Anti-Boycott regulations maintained by the US Department of Commerce, and section 326 of the USA PATRIOT Act (“Know Your Customer”).
Mitigating and Conducting Very Effective Risk Assessments and Business Impact Analysis
Michael C Redmond
60 Min
Product Id: 704823
This webinar training will explain project management principles to prepare your business to overcome risk and outage. The instructor will discuss how to conduct risk assessment and business impact analysis. He will also discuss how to test and document risk elements and the process or steps to be taken to combat it.
Achieving Enterprise Information Security Goals - Creating Right Teams
Rich Devlin,Joe Grannemon
60 Min
Product Id: 704863
This webinar will involve a high-level discussion on how you can create effective teams for achieving your Information Security goals and addressing complex threats such as Ransomware. Learn how to create a Information Security plan and align your goals with objectives, strategies and tactics across teams.
Fitting the Concepts of Enterprise Risk Management to Your Organization
Lynn Fountain
90 Min
Product Id: 704763
This training program will explore standard stated benefits of ERM including increased competitive advantage, increased likelihood of achieving strategic objectives and ability to meet increased stakeholder expectations, improved governance and increased likelihood of meeting regulatory and compliance expectations.