Is Your Vendor Ripping You Off? Fraud Red Flags Corporate Executives Should Recognize
Anne M McFadden
90 Min
Product Id: 704015
This training program will primarily focus on analytical and accounting red flags in purchasing schemes, bid rigging, billing schemes, personal purchase schemes, product substitution and all other kinds of corporate fraud.
Building a Comprehensive Fraud Investigative Report
H. David Kotz
75 Min
Product Id: 704035
This training program will discuss how to ensure the credibility of a fraud investigative report. It will train attendees on conducting effective witness interviews, discuss fraud investigative techniques utilized in different situations, and offer tips to locate relevant documents in a fraud investigation.
2-Hr Virtual Seminar - Understanding FAR and Developing Compliance - Intellectual Property, CAS, DCAA Audit
JeFreda Brown
2 hrs
Product Id: 704644
This training program will outline business practices and conflicts of interest prohibited by FAR. Attendees will learn labor laws and requirements under FAR and FAR procedures and policies pertaining to intellectual property. They will also understand how contractors are required to apply Cost Accounting Standards (CAS) to negotiated contracts per FAR, and FAR cost principles and what types of costs contractors are not allowed to include.
The Credit Managers Toolbox - Free Cash Flow, Common-Sizing Financial Statements, Key Financial Ratios, DSO, Altman Z Score, Financial Reviews
Ronald Sereika
90 Min
Product Id: 704577
In this training program, the instructor will discuss how and where to find financial information and how to read a balance sheet, income statement and statement of cash flows. The program will also detail how to calculate DSO.
What Accounts Payable (A/P) Needs to Know About Payroll and Vice Versa 2016
Vicki M. Lambert
90 Min
Product Id: 704634
This webinar will discuss various types of payments and how to ensure that the information requested by payroll and provided by accounts payable is done in a professional and timely manner. The program will also concentrate on how payroll and accounts payable must work together to ensure compliance with taxation and reporting requirements.
Cyber Security Incident Response Program
Michael C Redmond
60 Min
Product Id: 704631
This cyber security training program will assess the strength of the procedures your organization has in place to deal with a breach, malware and more. It will highlight the risk you are vulnerable to and discuss adopting a systematic approach to risk tracking to enhance the effectiveness of your cyber security incident response program.
Home Mortgage Disclosure Act (HMDA) Reports - Meeting Regulators: Expectations - Tools and technique to reduce errors
Jim George
60 Min
Product Id: 703743
Fraudsters are always looking for new opportunities and new weaknesses. The availability of customer data on the black-market gives them just the tools they need. A bank has responsibilities to its shareholders and customers to protect them from these ever-changing threats. This webinar will furnish attendees with a complete understanding of the changes in the fraud arena and the strategies needed to combat fraud.
Writing an Effective Coverage Letter - Analyzing the Facts, the Law and the Insurance Policy
Marc Estrella
60 Min
Product Id: 704553
In this training program, attendees will understand the necessity of writing a coverage letter. Attendees will understand how to utilize the facts and communicate to the insured the need for more information when there is insufficient information to make a coverage determination. They will also learn to employ state mandated language in the coverage letter.
Vendor Management Program - Risk Assessment, Effective Controls, Best Practices to Minimize 3PV Risk
Anne M McFadden
90 Min
Product Id: 704615
This vendor management training program will offer best practices for managing and minimizing third party vendor risk through strategies that help you focus resources with a risk based approach. It will explore the five elements of a successful vendor management program, including: vendor culture, vendor risk assessment, ensuring effective controls around vendor management, monitoring vendor programs, and vendor communication.
What Does the Foreign Corrupt Practices Act (FCPA) Mean to the Procure to Pay (P2P) Process
Chris Doxey
90 Min
Product Id: 704606
This webinar will discuss the Foreign Corrupt Practices Act (FCPA) and its implication on the pay-to-procure (P2P) process. Participants will learn the 15 step compliance roadmap for the FCPA and FCPA compliance programs and how to test for FCPA violations in the P2P process. The Instructor will share guidelines to help your company establish FCPA compliance for your P2P process.
ACH Fraud - Detection and Prevention
Rayleen M Pirnie
90 Min
Product Id: 704369
This training program will discuss common forms of ACH fraud, including: social engineering, account takeover (consumer, corporate, and institution internal accounts), money mules and advance fee frauds, and embezzlement. Under each of these sections, the course will also discuss: ACH fraud detection, fraud mitigation, ACH Returns, sound business practices to thwart attempts, and education.
Payment Card Industry Data Security Standard (PCI DSS) and Your Company
Marc Perl
90 Min
Product Id: 704601
This training program will explore how development and deployment of PCI DSS (Payment Card Industry Data Security Standard) compliant networks can assist your business to secure those electronic assets that the business considers vital. The principles specified in PCI DSS, which the program will discuss, can be a guide for all organizations that wish to secure their data.
Advanced Consumer Lending - Process, Best Practices, 6Cs of Credit, Loan Structuring and Pricing
Robert D Hawkins
60 Min
Product Id: 704502
This training program will introduce the consumer lending process from the initial application to closing and documentation. Proper analysis of consumer loan requests is more important today than any time in the history of banking as a result of the current economic environment worldwide which has left many consumers in a weaker financial condition than in the past. For this reason and the need for banks to continue growing the consumer loan portfolio safely, it is important for bankers to adjust their lending practices to insure the next consumer applicant is not becoming overextended and unable to meet their obligations.
Quality Writing for Technical Communicators
Phil Vassallo
60 Min
Product Id: 704017
This training program will address the daunting task of conveying complex technical data clearly, concisely, and purposefully to technical and non-expert audiences alike. Writing examples from diverse technical fields makes this webinar highly relevant. The program will build a foundation for learning by identifying the qualities of effective writing and the roadblocks to overcoming them.
Effective Credit Memo - Reporting Effectively in the Credit Memorandum
Robert D Hawkins
60 Min
Product Id: 704504
This training program will explore the underwriting and reporting on commercial real estate, construction loans, acquisition and development loans and multi-family unit loans. In doing so, several samples of proven credit memos will be examined to insure bankers are covering the areas required by the banking regulators.
Defending FCPA Claims and Minimizing FCPA Exposure
H. David Kotz
60 Min
Product Id: 704556
This training program will highlight how one can effectively manage risks resulting from Foreign Corrupt Practices Act (FCPA) claims. Presented by the former Inspector General of the SEC, who served in senior-level positions in several federal agencies, the webinar will provide practical lessons on how to manage FCPA claims, devise effective compliance programs, conduct internal investigations and achieve a culture of compliance in an organization.
10 Best Practices to Improve Your Fiscal Closing Process
Chris Doxey
90 Min
Product Id: 704580
Regardless of company size or complexity, all successful financial close processes require continuous communication, comprehensive documentation and a flexible, responsive organization. This training program will focus on 10 critical methods that you can use to dramatically improve your Record to Report (R2R) process. The R2R or Financial Closing Process is the centerpiece of the controllership function. This program will examine the process that ranges from transaction processing through internal and external reporting, and it incorporates everything from internal controls, the corporate organizational hierarchy - its people, processes, and technology.
Seven Habits of an Effective Loan Committee
Robert D Hawkins
60 Min
Product Id: 704570
This training program will list and discuss documents required to complete the five steps in the documentation process. On completion of the program, attendees will be able to provide a broad overview of the loan documents’ provisions to borrowers and loan processing management techniques.
Foreign Exchange Hedging for Corporations
Jonathan Wetreich
90 Min
Product Id: 704133
In this training program, attendees will learn the types of FX hedge programs typically utilized by corporations and the hedge instruments typically used by corporate hedgers such as forwards and collars. They will also gain an understanding of the concept of view-neutral hedging.
ATM & POS Skimming Fraud Losses - Detection and Prevention
Rayleen M Pirnie
90 Min
Product Id: 704512
This training program will classify common forms of ATM skimming fraud, POS skimmers, and POS malware, and also identify appropriate mitigation strategies. The course will further analyze why EMV will not stop ATM fraud and POS skimming fraud.







