A2Z of ACH - Pre-Notifications, Returns and Reversals - Part 3
Rayleen M Pirnie
90 Min
Product Id: 704573
This three-part webinar series is designed specifically for businesses who either currently process ACH credits and/or debits, or those exploring the network for use in the future. Each session will focus on niche areas of ACH essentials. This course in the series will explore ACH pre-notifications, returns and reversals from the perspective of how each affects a business originator.
Conducting a Shrink Investigation - How to Determine the Source of Your Inventory Discrepancy
John E Grimes
90 Min
Product Id: 704802
Small business failures are particularly vulnerable to going out of business as a result of uncontrolled and unidentified losses. If you are small business retail owner, manager, or loss prevention consultant, this training program will teach you how to conduct a full shrink (loss) investigation. If you are contemplating opening a small retail business, this webinar will give you a head start on understanding the complexities and importance of controlling losses.
Block Chain for Risk Management /Data Security | Emerging Technological Approach for KYC and Secure Transactions
Shaun Miller
120 Min
Product Id: 704808
A block chain is a transaction database shared by all nodes participating in a system based on the Bitcoin protocol. This course describes the Bitcoin concept, what Blockchain is and its financial applications to creating secure KYC and payment data sets. This course explains a Blockchain concept where the Blockchain itself is a shared single source of truth.
Application for Investor Advisor Registration - ADV Part 1, Part 2A, Part 2B and More
Lisa Marsden
60 Min
Product Id: 704741
This training program will analyze ADV Part 1, ADV Part 2 A, ADV Part 2 B, and offer a breakdown of each section of the ADV. It will discuss annual filing requirements and offer best practices for reporting accurately.
2016 Financial Regulator Priorities - SEC, FINRA, and State Regulators
Lisa Marsden
60 Min
Product Id: 704765
In this training program, attendees will learn how to gain access to the financial regulators priorities and understand how to apply those priorities to their firm. The program will also discuss incorporating the priorities into your annual review and identifying priorities that need to become part of the compliance manual/code of ethics.
Community Reinvestment Act (CRA) - Understanding High Risk Lending and Compliance Issues
Vidia Ramdeen
60 Min
Product Id: 704764
This training program will address important compliance issues and high risk lending issues of the Community Reinvestment Act (CRA). It will help attendees in understanding why community bank lending is important for achieving goals underlying successful community reinvestment and focus on the basics of risk management for community bank lending.
Fitting the Concepts of Enterprise Risk Management to Your Organization
Lynn Fountain
90 Min
Product Id: 704763
This training program will explore standard stated benefits of ERM including increased competitive advantage, increased likelihood of achieving strategic objectives and ability to meet increased stakeholder expectations, improved governance and increased likelihood of meeting regulatory and compliance expectations.
Risk-Based Monitoring Beyond the RACT
Beat Widler
60 Min
Product Id: 704721
This training program will explain what the strengths and weaknesses of the RACT are and where it should be used with caution. It will also elaborate on what needs to be done to establish a comprehensive risk management approach to support risk-based quality management in clinical trials.
SEC Examinations - Practical Tips on How to Defend Yourself
H. David Kotz
60 Min
Product Id: 704605
This webinar provides practical information on how companies may defend themselves during SEC examinations. The webinar highlights the newest initiatives arising from the SEC’s examination program. Presented by the former Inspector General of the SEC, the webinar provides valuable insider information about SEC exams.
Designing Effective Controls, Security Safeguards and Governance by a Risk-Based Methodology
Javier Kuong
120 Min
Product Id: 704656
This training program will provide a practical and structured methodology for the design of governance, controls and security provisions. The methodology can be applied to participants’ real work environment immediately. Participants will also benefit from comparing their present governance and controls design practices with the structured, risk-based methodology presented in the webinar.
3-Hr Virtual Seminar - Understanding DFAR and Developing Compliance - DCAA Audit, Labor Records, Penalties, Policies & Procedures
JeFreda Brown
3 hrs
Product Id: 704619
This training program will demonstrate why companies planning to do business with the government should be prepared to be audited by the Defense Contract Audit Agency (DCAA). DCAA performs all needed contract audits for the Department of Defense (DoD). The focus of this program is to offer attendees a strong knowledge of DFARS (Defense Federal Acquisition Regulation Supplement) and help understand what is required when pricing proposals, developing a compliant accounting system, and maintaining contracts.
FDA's Medical Device Software Regulation
Casper Uldriks
90 Min
Product Id: 704749
This training program will focus on FDA software guidance. It will elaborate on applying current provisions that NIST (National Institute of Science and Technology) has put forth in recent reports that FDA will integrate into its regulatory oversight as well.
BCBS 239 - Principles of Effective Risk Data Aggregation and Risk Reporting
Mario Mosse
90 Min
Product Id: 703943
Risk management is a key component of every banking governance framework. This webinar discuss the BCSB 239 standard. The instructor will discuss the critical risk-data aggregation capabilities and internal risk-reporting practices (the Principles) to enhance risk management and decision-making processes at banks.
Dos & Don'ts Related to Information Security and Data Privacy
Marc Perl
60 Min
Product Id: 704736
This training program will prepare your organization to understand the need for data security, the steps that can be taken to institute or augment your data security policies/procedures, and the implementation of the needed controls. This webinar will introduce attendees to a set of known and respected data security standards that can be employed by your organization to improve your security. Attendees will walk away with ideas to leverage the curriculum with their existing security infrastructure.
How to Establish & Review Your Risk Metrics Effectively
Robert Geary
90 Min
Product Id: 704709
This webinar training provides an in depth understanding and applicability of the risk metrics. The instructor helps in establishing the purpose they serve and reviewing the methodology for creating a set of risk metrics. He will also discuss the sampling of forms of risk metrics to be employed and review the risk metric management process.
Detecting and Preventing Corporate Card Fraud - Travel and Entertainment Expenses
Chris Doxey
90 Min
Product Id: 704707
This webcast will discuss the policies, procedures, and controls that will help your company detect and prevent corporate card fraud. The Instructor will discuss the type of corporate credit cards and best practices for developing your travel and entertainment expense (T&E) policy. Participants will learn the T&E standards of internal control and how to automate their T&E Process.
A2Z of ACH - Authorizations, Revocations, and NOCs - Part 2
Rayleen M Pirnie
90 Min
Product Id: 704572
This three-part webinar series is designed specifically for businesses who either currently process ACH credits and/or debits, or those exploring the network for use in the future. Each session will focus on niche areas of ACH essentials. This course in the series will explore ACH authorization requirements, revocations, and Notifications of Change (NOCs) in the ACH network from the perspective of how each affects a business originator.
Should We Offer Home Equity Lines of Credit? HELOC VS. Conventional Mortgage
J T Turner
60 Min
Product Id: 704612
This training program will offer an introduction to HELOCs and explain how a HELOC is structured. It will also discuss why they are profitable, potential issues, and how to retain loans.
A2Z of ACH - Transaction Flows and Standard Entry Class Codes - Part 1
Rayleen M Pirnie
90 Min
Product Id: 704571
This three-part webinar series is designed specifically for businesses who either currently process ACH credits and/or debits, or those exploring the network for use in the future. Each session will focus on niche areas of ACH essentials. This first part in the series will focus on recognizing an ACH transaction flow - both credit and debit, identifying ACH network participants, and locating Standard Entry Class Code (transaction) Rules in the ACH Rules book.
Grant Writing - All You Need to Know About Criteria, Parameters, Obligations, Application Structure and Grant Reporting
Vidia Ramdeen
60 Min
Product Id: 704550
This training program will help participants identify grant opportunities and get started with the grant writing process. They will gain insight into public/private grants, the grant application process and grant reporting.