Regulation V - Fair Credit Reporting Act
Kara Lamphere
60 Min
Product Id: 704290
This webinar will discuss the Regulation V – Fair Credit Reporting Act(FCRA) in details and explain attendees what types of marketing are allowed, requirements of affiliate marketing, and disclosures required with regard to consumer credit report. Speaker will discuss about consumer credit report alerts and identity theft protections, as well as what an institution must do with these alerts.
Fraud Red Flags All Corporate Executives Should Recognize
Anne M McFadden
60 Min
Product Id: 704347
This training program will provide an overview of the three main occupational fraud categories, including corruption, asset misappropriation and financial reporting. Attendees will learn how to minimize the impact of the fraud scheme by detecting red flags for fraud early.
Fraud and Cash Receipts: Common Frauds and Internal Controls
Toby Lawrence
60 Min
Product Id: 704301
This training program will enumerate the types of frauds that occur in the revenue cycle and cash receipts function. It will also highlight red flags or warning signs to look out for that may indicate someone is committing fraud. Further, attendees will learn to perform a cost benefit analysis to determine whether it makes business sense to correct a control deficiency.
Out in the Open: Protecting Your Privacy and Identity in the Digital Age on the Internet
Joseph Rosner
60 Min
Product Id: 704256
This privacy protection in the digital age training program will detail what the Internet of Things is and how it collects data and tracks you. It will further examine the risks attached to personal information and more.
Quantitative Analysis of Individual Borrower Credit Risk
Joseph M. Pimbley
90 Min
Product Id: 704326
This training program will detail the development and use of credit ratings for credit risk assessment; development of financial statement regression techniques as embodied in the Altman Z score for credit risk assessment; differences in quantitative tools for differing loan type; importance of data quality for quantitative tools, and more.
Analytics Based Enterprise Performance Management
Gary Cokins
90 Min
Product Id: 704192
This training program will guide attendees in viewing enterprise and corporate performance management (EPM/CPM) as the seamless integration of managerial methods rather than as a process. The course will also offer insight into identifying and differentiating strategic KPIs in a balanced scorecard and operational performance indicators (PIs) in dashboards.
Establishing an Effective Internal Controls System: AP, COSO, COBIT, SAS, SAC
David Sanders
90 Min
Product Id: 704266
This training program will help find the dots relating to AP internal controls and connect them. The course will include: processes of formulation and implementation; how to develop steps for internal controls; how to develop tools for internal controls; how to benefit from these tools and more.
Creating a Risk Assessment Plan - Your Risk Radar
Denise Cicchella
60 Min
Product Id: 703430
This webinar will discuss different approaches to risk management. Attendees will learn how to identify common risks and mitigate their impact.
Crowdfunding and the Community Capital Marketplace
Kim Kaselionis
90 Min
Product Id: 704128
This training program will discuss how crowdfunding has come of age. It will also detail business capitalization and investment opportunities created by the JOBS Act of 2012.
How to Conduct Corporate Fraud Investigations: Planning, Gathering and Drafting a Comprehensive Investigative Report
H. David Kotz
90 Min
Product Id: 703700
Learn more about fraud investigation and get trained on effective investigative techniques by former SEC Inspector General David Kotz. This executive training session will increase your understanding of conducting a credible fraud investigation and creating precise reports. The session will conclude with best practices for putting in place policies that detect and deter fraud.
OFAC and Other Denied Parties: What Your Company Needs to Know and Do
Jon Casher
60 Min
Product Id: 703915
This training program will focus on what your company needs to know and do about laws and regulations within and outside the US regarding individuals and entities that you are prohibited from doing business with. These individuals and entities are sometimes referred to as denied, debarred, excluded or restricted parties. Contrary to the idea that these laws and regulations apply only to financial institutions, they, in fact, apply to all types of organizations. This session will identify the parts of your organization that need to be aware of the issues, the necessary controls and the steps you should take to avoid compliance issues, penalties and lawsuits.
Reaching Clean Power Plan Goals at No Cost: Securing the Smart Grid’s Potential
Paul Alvarez
60 Min
Product Id: 704137
This Clean Power Plans training program will discuss and debate the final 111(d) rule components under which smart grid capabilities will qualify. It will also discuss smart grid capabilities with significant greenhouse gas emission reduction goal potential and challenges associated with smart grid capability optimization.
Supplier Inspections, Audits, and Compliance Tracking
Richard Maksimoski
60 Min
Product Id: 704130
Attendees will leave this training program with more confidence, vision, and productivity. The confidence comes from knowing that you have more tools to keep your product in compliance with regulatory and company standards. The ability to establish the necessary processes will allow attendees to remain confident that your company will be safe.
Performing Your ACH Audit: The Ins and Outs of ACH Rule Compliance
Luann Kohlmann
100 Min
Product Id: 703861
The NACHA Operating Rules and Guidelines require that all participating depository financial institutions, third-party senders and third-party service providers that provide ACH services conduct an annual ACH audit to be performed by December 31 of each year (ACH Rules, Appendix Eight, Section 8.1). It is critical that electronic payments work safely and efficiently for all users. The ACH network strives for just that by requiring the annual ACH audit. This webinar will offer attendees a keen understanding of general audit requirements, and the functions of a receiving depository financial institution (RDFI), and an originating depository financial institution (ODFI).
Steering Clear of DOJ’s Most Likely to Be Caught List
Joe Dell Aquila,Harry Falber
90 Min
Product Id: 704067
This training program will detail what a compliance program is and what it covers. It will discuss the DOJ’s (Department of Justice) compliance investigations over the last year. The course will also illustrate how compliance programs are successfully extended to external business partners and how a code of conduct should be written into a compliance program.
Achieving Consistent Performance with ERM
David Birk
90 Min
Product Id: 704135
This training program will offer attendees a broader perspective of understanding the risk responses that can be adapted to any particular situation and the importance of aligning risk management with strategy development.
Managing an Effective AML Audit Program
Laura H Goldzung
90 Min
Product Id: 702988
This webinar will highlight the techniques and best practices that can be used for conducting an effective AML audit in order to ensure compliance with Bank Secrecy Act (BSA) regulations.
Vendor Management - Building a Strong Questionnaire
Michael D King
60 Min
Product Id: 704119
This training program will highlight why a vendor questionnaire is the keystone your vendor management program is built on. The course will help ensure attendees get the whole picture and determine appropriate controls for information security and privacy.
ISO/IEC 27001:2013 - Breaking It Down to Understand and Implement
Michael C Redmond
90 Min
Product Id: 703977
This training program will guide attendees in implementing and complying with the requirements of ISO 27001:2013. ISO 27001 is an international standard published by the International Standardization Organization (ISO), and it describes how to manage information security in a company. The latest revision of this standard was published in 2013, and its full title now is ISO/IEC 27001:2013.
Compliance with U.S. Securities and Exchange Commission Laws
Lynn Fountain
90 Min
Product Id: 704071
This training program is designed for individuals who need a more detailed understanding of the Securities and Exchange Commission procedures and process and its authority over publically traded companies. The session is applicable to all financial, compliance and regulatory personnel. It will serve as an introduction to the basics of the SEC organization and overview aspects of the organization itself, its enforcement reach and laws subject to SEC scrutiny.