What Does the Foreign Corrupt Practices Act (FCPA) Mean to the Procure to Pay (P2P) Process
Chris Doxey
90 Min
Product Id: 704606
This webinar will discuss the Foreign Corrupt Practices Act (FCPA) and its implication on the pay-to-procure (P2P) process. Participants will learn the 15 step compliance roadmap for the FCPA and FCPA compliance programs and how to test for FCPA violations in the P2P process. The Instructor will share guidelines to help your company establish FCPA compliance for your P2P process.
Payment Card Industry Data Security Standard (PCI DSS) and Your Company
Marc Perl
90 Min
Product Id: 704601
This training program will explore how development and deployment of PCI DSS (Payment Card Industry Data Security Standard) compliant networks can assist your business to secure those electronic assets that the business considers vital. The principles specified in PCI DSS, which the program will discuss, can be a guide for all organizations that wish to secure their data.
Advanced Consumer Lending - Process, Best Practices, 6Cs of Credit, Loan Structuring and Pricing
Robert D Hawkins
60 Min
Product Id: 704502
This training program will introduce the consumer lending process from the initial application to closing and documentation. Proper analysis of consumer loan requests is more important today than any time in the history of banking as a result of the current economic environment worldwide which has left many consumers in a weaker financial condition than in the past. For this reason and the need for banks to continue growing the consumer loan portfolio safely, it is important for bankers to adjust their lending practices to insure the next consumer applicant is not becoming overextended and unable to meet their obligations.
eXtensible Business Reporting Language(XBRL)-Tagging levels, Terms and Taxonomy, SEC Viewer-Calculations and common errors
Lynn Fountain
90 Min
Product Id: 704589
This webinar will discuss the XBRL basis, terms and taxonomies. XBRL, eXtensible Business Reporting Language, a global electronic information format designed to transmit and store business information in a machine readable format, is now mandated by U.S. securities and exchange commission. Instructor will discuss the functioning of XBRL, why it is needed, tagging levels and definitions and help understand the XBRL SEC Viewer.
Defending FCPA Claims and Minimizing FCPA Exposure
H. David Kotz
60 Min
Product Id: 704556
This training program will highlight how one can effectively manage risks resulting from Foreign Corrupt Practices Act (FCPA) claims. Presented by the former Inspector General of the SEC, who served in senior-level positions in several federal agencies, the webinar will provide practical lessons on how to manage FCPA claims, devise effective compliance programs, conduct internal investigations and achieve a culture of compliance in an organization.
10 Best Practices to Improve Your Fiscal Closing Process
Chris Doxey
90 Min
Product Id: 704580
Regardless of company size or complexity, all successful financial close processes require continuous communication, comprehensive documentation and a flexible, responsive organization. This training program will focus on 10 critical methods that you can use to dramatically improve your Record to Report (R2R) process. The R2R or Financial Closing Process is the centerpiece of the controllership function. This program will examine the process that ranges from transaction processing through internal and external reporting, and it incorporates everything from internal controls, the corporate organizational hierarchy - its people, processes, and technology.
Seven Habits of an Effective Loan Committee
Robert D Hawkins
60 Min
Product Id: 704570
This training program will list and discuss documents required to complete the five steps in the documentation process. On completion of the program, attendees will be able to provide a broad overview of the loan documents’ provisions to borrowers and loan processing management techniques.
ATM & POS Skimming Fraud Losses - Detection and Prevention
Rayleen M Pirnie
90 Min
Product Id: 704512
This training program will classify common forms of ATM skimming fraud, POS skimmers, and POS malware, and also identify appropriate mitigation strategies. The course will further analyze why EMV will not stop ATM fraud and POS skimming fraud.
Cyber Incident Response: The Payments Perspective - Threat Intelligence and Best Practices to Manage Threats
Rayleen M Pirnie
90 Min
Product Id: 704443
This training program will discuss how cyber-attacks affect payment processing. It will highlight to attendees how best to record appropriate sound business practices for managing operational risk due to a cyber-attack. Attendees will also learn to identify critical operational communications, from internal staff to customers and institutions to vendor support.
Strategies to Pass the Certified Internal Auditor's (CIA) Exam
Jonnie T Keith
90 Min
Product Id: 704487
This training program will discuss the many advantages in obtaining a CIA designation. In addition to the vast audit and business knowledge you are exposed to, it can lead to promotions and pay increases. You become a valuable asset to your organization. And while the test is difficult, it is not impossible. It is meant to make sure that when you carry the CIA designation, people know that you have an excellent grasp of audit and business knowledge.
Loan Portfolio Management and Review - Regulations, Process, Loan Grading Techniques, Collateral and Documentation
Robert D Hawkins
60 Min
Product Id: 704545
This training program explains the details of loan portfolio management and factors of macro economic, industry, business and management that must be considered. The instructor discusses the process of examining the quality of credit file documentation, including assessment of the credit memorandum and loan documentation. Participants will also understand the loan grading techniques and the check points that are needed to complete a full loan review.
AML, SOX and Licensing Controls Failures - Detection, Prevention and Risk Mitigation Strategies
Jim George
60 Min
Product Id: 704527
This webinar will discuss the common AML, SOX and Licensing control failures and how to detect and prevent them. The instructor will discuss the legal impact of non-compliance on banks and financial institutions, red flags and how to strengthen your internal controls to mitigate risk.
Applying ISO 27001 to ERM Risk
Michael C Redmond
60 Min
Product Id: 704470
This ERM training program will discuss how today’s enterprise risk evaluation and control and impact analysis include identifying enterprise threats, which can truly lead not only to a disruption but also to the destruction of an enterprise.
Understanding Disclosures, Certifications and Corporate Responsibility Relating to SOX - Sections 302, 401, 404, 409, 906
David Sanders
90 Min
Product Id: 704440
This webinar will enhance attendees’ knowledge of corporate responsibility for financial reports, disclosures and certifications relating to SOX Sections 302, 401, 404, 409, 802, 906 (Sarbanes-Oxley Act) by helping you understand the levels of corporate responsibility and certification.
The Practice of Factoring - A Viable Lending Component
Ray Graber
90 Min
Product Id: 704430
This training program on factoring will discuss the fragmented market place, the missing link to receivables management, interesting alternatives, and the new face of factoring.
Recovery Audits and Contract Compliance - Types and Strategies to Improve Controls
Jon Casher
60 Min
Product Id: 704284
This purchasing and accounts payable training will focus on why you should do recovery and contract compliance audits as well as some specialized audits as they can significantly enhance your bottom line. They can also help you learn how to improve and enhance controls to reduce future risks and exposure.
Proper Recordkeeping in Quickbooks
JeFreda Brown
90 Min
Product Id: 704238
This training program will detail important requirements for adequate financial recordkeeping. Attendees will learn how to record transactions, develop financial reports, and proper recordkeeping in QuickBooks.
Crowdfunding and the Community Capital Marketplace
Kim Kaselionis
90 Min
Product Id: 704128
This training program will discuss how crowdfunding has come of age. It will also detail business capitalization and investment opportunities created by the JOBS Act of 2012.
Cryptocurrencies - The Next Step in Banking: Implementation, Rules and Support
Warren R Markowitz
60 Min
Product Id: 704178
The objective of this training program is to understand the impact of cryptocurrencies and how they are shaping the current economics of the banking industry. The course will also offer attendees an understanding of how to implement protective and supportive measures into current compliance operations.
OFAC and Other Denied Parties: What Your Company Needs to Know and Do
Jon Casher
60 Min
Product Id: 703915
This training program will focus on what your company needs to know and do about laws and regulations within and outside the US regarding individuals and entities that you are prohibited from doing business with. These individuals and entities are sometimes referred to as denied, debarred, excluded or restricted parties. Contrary to the idea that these laws and regulations apply only to financial institutions, they, in fact, apply to all types of organizations. This session will identify the parts of your organization that need to be aware of the issues, the necessary controls and the steps you should take to avoid compliance issues, penalties and lawsuits.