Compliance Department Restructuring with the New Regulatory Demands
Carlo Chalhoub
60 Min
Product Id: 705454
This webinar addresses recent changes in the compliance environment. It will also discuss the process for evaluating compliance department structure and the goals of compliance restructuring.
Transaction Monitoring and Cybersecurity - DFS, SOC, Cybersecurity Framework and Many More
William Akel
60 Min
Product Id: 705365
Attend this webinar to understand the best ways to maintain annual compliance with DFS cybersecurity requirements through a strategic transformation of IT security monitoring to proactive cyber risk management; and to learn how a human-centric security orchestration model with people, process and technology will save and make you money.
Develop a Device Master Record that can assist with Device History Record Review
Mary Nunnally
60 Min
Product Id: 705328
This webinar provides a basic understanding of the records required to fulfill requirements of both US FDA 21CFR 820 and ISO 13485:2016 for establishment and maintenance of a Device Master Record. It will further discuss the responsibilities of various development team members such as R&D/engineering, operations, quality assurance, project management and executive management.
How to Build and Use a Risk Matrix
Mario Mosse
60 Min
Product Id: 704970
Risk matrices are used during risk assessment to define the various levels of risk as the product of the probability and impact categories. This webinar training will focus on this simple but powerful mechanism to increase visibility of risks and assist management decision making. Risk matrices are one of the most widespread tools for risk evaluation.
Conflicts of Interest in Financial Services; Identify, Eliminate, Mitigate and Disclose
Lisa Marsden
60 Min
Product Id: 705466
Learn how best to identify, mitigate and make accurate disclosures of conflicts of interest.
Vendor Due Diligence: The Cybersecurity Perspective
Rayleen M Pirnie
90 Min
Product Id: 704700
In most industries, you can contract away a responsibility or task, but not the liability of an attack or compliance expectations. This training program will examine key questions in case of a security breach. Whom will your customers hold liable? Who is going to get fined and possibly sued? At the end of the day, your organization will suffer the negative publicity, the reputation damage, and financial loss of the attack. This program will address vendor due diligence and security to better understand the risks your organization could face while outsourcing your business needs.
Managing Communication in a Crisis and Protecting Your Brand
Michael Barrio
60 Min
Product Id: 705448
This webinar will focus on the effective crisis communication strategies. Attendees will learn best practices to protect their organization’s brand in the time of crisis.
Effective and Proactive Strategic Risk Management - A Vital Element to Achieve Effective Enterprise-wide Governance, Risk Management and Compliance (GRC) Programs
Javier Kuong
120 Min
Product Id: 705407
Learn an effective approach to practice risk management process that is proactive, strategic and top-down in nature to anticipate, avoid and mitigate potential losses from threats and risks that are present in the real world regardless of any organization’s wishes.
New Customer Due Diligence Beneficial Owner Rule
Joe Soniat
60 Min
Product Id: 705221
FinCEN is issuing final rules under the Bank Secrecy Act to clarify and strengthen customer due diligence requirements for: banks; brokers or dealers in securities; mutual funds; and futures commission merchants and introducing brokers in commodities. The rules contain explicit customer due diligence requirements and include a new requirement to identify and verify the identity of beneficial owners of legal entity customers, subject to certain exclusions and exemptions. This training program will walk attendees through the new rules and how to implement them.
Cybersecurity Policy and Controls Management with Root Cause Analysis (RCA)
William Akel
60 Min
Product Id: 705404
Learn corporate policy definition and assignment with ramifications for both. We'll discuss how to identify and document management review controls, why a fine tuned policy and procedure are critical to business operations and how to obtain the real root cause of cyber security incidents effectively.
Auditing the Cyber Security Program to Ensure the Company's Digital Crown Jewels are Safeguarded from Hackers
Barbara Gai
60 Min
Product Id: 705426
This webinar will provide an overview of the ways to identify and assess security risks within the company. Attendees will learn to develop a robust audit program that will thoroughly assess existing controls in protecting the organizations’ data.
10 Common Misconceptions About Payroll and How to Avoid Them
Vicki M. Lambert
90 Min
Product Id: 704924
This webinar discusses 10 areas of wage and hour and tax law that when misunderstood or applied incorrectly causes employees to be paid or taxed incorrectly with the resulting penalties, fines and interest levied on the employer. Some of these wage and hour law misconceptions can even cause the employer to overpay employees forcing unnecessarily higher labor costs.
Detecting and Responding to Accounts Payable Fraud
Eli J Richardson
90 Min
Product Id: 703471
This webinar on detecting and preventing Accounts Payable (AP) fraud will discuss various ways in which AP fraud can be committed, the telltale signs of AP fraud, and the various options for responding to possible AP fraud once it is recognized.
Conducting Investigative Interviews: Breaching Barriers with Hostile, Uncooperative, and Reluctant Interviewees
John E Grimes
90 Min
Product Id: 704835
Interviewing is a craft that involves applying proven and practiced steps along with skilled communication. This training program will discuss the art of human interaction to help achieve successful interview results. It will help participants in gaining the trust of the interviewee and in encouraging truthful responses.
Whistle While You Work: Protecting Your Organization from Whistleblower Threats
Christine Zack
60 Min
Product Id: 705413
This webinar will provide an overview of SEC Whistleblower Rules such as False Claims Act, Dodd-Frank, Sarbanes-Oxley and Commodity Exchange Act. It will also discuss best practices on how to mitigate damages from an actual or purported whistleblower.
UCC4A Applications to ACH Payments, ACH Fraud Risk Management, and Contracts
Rayleen M Pirnie
90 Min
Product Id: 705386
This webinar will untangle the complexities of UCC4A and how it applies to ACH payments. It will discuss legal and compliance risks presented by UCC4A and provisions impacting potential liability.
Tax Refund Fraud: The Fraud that Keeps Getting Worse
Rayleen M Pirnie
90 Min
Product Id: 705134
This training program will help identity frauds that lead to tax refund fraud and discuss funds availability exceptions. It will also discuss common non-post issues, the IRS Opt-In Program and eLeads, refund handling procedures, remedial actions, and suspicious activity reports.
Exclusive Cyber Security Incident Management Program 2017
William Akel
60 Min
Product Id: 705380
Gain a better understanding of cyber security incident management that is proactive versus reactive, learn methods to minimize business disruption and damages, and the impact and urgency on customers and the business for risk and costs.
Mitigating Strategies for New Product Development Process & Approvals - Policy, Governance and Methodology
Mario Mosse
90 Min
Product Id: 705132
Many financial scandals and significant operational losses can be traced back to poorly designed or improperly implemented products. Other problems arise from faulty legal and operational processes that lead to improper documentation and other issues. This training program will address risks and corresponding mitigating strategies involved in the new product development process. It will also discuss risk assessment protocol and product monitoring.
Evidence Gathering in a Fraud Investigation
Eli J Richardson
60 Min
Product Id: 703498
This webinar will explain tools and tips for conducting internal investigations. Attendees will learn how to conduct effective witness interviews, how to draft comprehensive investigative reports and how to report evidence of fraud to law-enforcement authorities.