Accounts Payable Payment (ACH, Check and Card) Fraud, Risk and Risk Mitigation
Ray Graber
60 Min
Product Id: 704905
This training on detecting and preventing accounts payable payment fraud will explain the several types of payment fraud that occur in today’s business environment. It will provide you the tools to safeguard your accounts payable process from potential fraud.
Risk Based Internal Auditing - Establishing the Methodology
Lynn Fountain
90 Min
Product Id: 704819
True RBIA incorporates cascading the process through to each individual audit as well as the audit reporting process. The training program will focus on the establishment of a framework or methodology for RBIA and examine how to utilize risk based questions within the process steps.
Audit 2020: A New Approach that Enhances Audit Reporting
Daniel Clark
60 Min
Product Id: 705641
This webinar will discuss the use of the Comparative Effectiveness Matrix as a audit reporting tool to communicate improvement opportunities to your management or the client.
Conducting Internal Investigations: Insights from Former SEC Inspector General
H. David Kotz
90 Min
Product Id: 703339
This training will provide the attendees simple but powerful tools and tips to conduct credible and thorough internal investigations. Attendees will learn how to perform effective witness interviews.
Designing Full Cyber Security Incident Response Team (CSIRT) Training Program as well as Table Top and Simulation Testing
Michael C Redmond
60 Min
Product Id: 705638
Learn the how to design Full Cyber Security Incident Response Team (CSIRT) Training Program for employees including how, when and who should be doing testing organization processes, scenario developments.
Best Practices Processes for Travel and Entertainment Expenses - IRS Tax Codes, Audit Tips and Documentation
Candace Leuck
90 Min
Product Id: 704567
This training program is designed to ensure that businesses maximize the available deductions for travel and entertainment expenses. It is important to remain current on these regulations as the Internal Revenue Service focuses a fair amount of effort in this area during audits.
How to Effectively perform due diligence on outsourced vendors and Navigating SEC and Federal Regulations of Cybersecurity
Lisa Marsden
60 Min
Product Id: 704154
This training program will equip attendees with basic everyday tools to keep cyber criminals at bay. The course will also emphasize the need for effective communication between team members of a financial firm.
BCBS 239 - Complying with Data Aggregation Requirements
Daniel Clark
60 Min
Product Id: 705601
This webinar will include discussions on the risk data aggregation capabilities and internal risk-reporting practices (the Principles) that enhance risk management and decision making processes at financial institutions.
Post-market Surveillance - Clinical Evaluation and Risk Management
Daniel O Leary
90 Min
Product Id: 705402
This Post-market Surveillance (PMS) webinar will discuss in detail the clinical evaluation and risk management requirements as described in MedDev 2.7/1 Rev. 4, EN ISO 14971:2012 and EN ISO 14971:2012 standards and how they are related. It will also explain some of the recent changes in EU medical device regulations.
Overview of FinCEN’s Enforcement Against Money Services Businesses and Use of Geographic Targeting Orders
Barbara Keller
60 Min
Product Id: 705484
This webinar will cover the agency's current enforcement climate for NBFIs, provide detail on recent enforcement actions against MSBs including money transmitters, virtual currency exchanges, and individuals; and discuss FinCEN’s use of GTOs. This webinar will also provide lessons learned and key themes drawn from FinCEN's increase in enforcement actions against NBFIs and its use of GTOs.
Evidence Gathering in a Fraud Investigation
H. David Kotz
75 Min
Product Id: 703261
This training on fraud investigation will explain how to deal effectively with allegations of fraud and how to conduct internal investigations. It will provide the attendees tips on how to gather evidence in a fraud investigation.
Social Security - What Advisors Need to Understand Regarding Social Security When Meeting With Clients
Marc Kiner,Jim Blair
90 Min
Product Id: 705385
This webinar will cover computation of social security benefits, eligibility, consequences of early benefits vs later, spousal benefits, social security claiming strategies, use of the Restricted Application and more.
The Australian AML/CTF Act - Preparing for an Independent Review
David Harley
90 Min
Product Id: 704662
This training program will discuss the planning and preparation needed for an independent review, or any other review of an AML/CTF program, and consider the stakeholders who need to be identified and managed throughout the field work, the impact on the business as they continue with business as usual as well as the likely areas where issues may be found. Understanding the process of an independent review provides the opportunity to test the implementation of your program before hand and call out some issues that need focus before any review commences.
Medical Device Software Verification and Validation
Nancy Knettell
60 Min
Product Id: 705393
This webinar will teach you how to design, build and test medical device software in preparation for the successful 510k submissions. It will cover medical device software user requirements, software architecture, design, unit testing and more.
Preparation Guidelines for Service Level Agreements
Barbara Gai
60 Min
Product Id: 705540
This training session will provide the guidelines to formulate effective SLAs for services needed for all support areas (Accounting, Human Resources, Information Technology, Supply Chain, etc.) whether the support is provided internally or external (outside) service providers. Also attendees will learn the importance of “best interest” when SLAs are constructed with external (outside) service providers.
Compliance and Data Privacy (Ramifications on Client Data Safeguards in Collecting and Disposing of it)
Carlo Chalhoub
60 Min
Product Id: 705535
This webinar addresses the compliance challenges in data privacy. It will also discuss the key drivers for developing a formal data privacy program and the elements of a data privacy compliance program.
Mobile Medical Apps (Is It a FDA Regulated Device?) and Cybersecurity
Edwin Waldbusser
60 Min
Product Id: 705432
This webinar will provide an overview of mobile medical apps and discuss when the app becomes the FDA regulated medical device. It will also discuss the cybersecurity requirements for mobile apps.
Choosing and Using Key Risk Indicators
Mario Mosse
60 Min
Product Id: 704948
This webinar will discuss the significance, nature and types of KRIs. The instructor will discuss how to develop, evaluate and implement KRIs in accordance with organization’s risk culture and create strategies for effective reporting of risk indicators that lead to management action.
SARs and Law Enforcement: Practical Insight to Streamline the Investigation Process
Joe Soniat
60 Min
Product Id: 705177
In this training program, attendees will learn best practices for a financial institution’s SAR process. The program will also discuss SAR reporting process, working with law enforcement on SAR cases, documenting SAR decisions, and investigation tips.
Third Party Vendor Risk Assessment for Financial Firms - Rules, Regulations and Best Practices
Lisa Marsden
60 Min
Product Id: 704474
This training program will examine who are third party vendors and analyze why it is critical to prepare a risk assessment for third parties. The course will also offer an overview of the potential risks a third party vendor may impose on your firm.