How to Apply ISO 27001 Principles to Enterprise Risk Management in 2017
Michael C Redmond
60 Min
Product Id: 704828
This webinar training will help you implement ISO standards in your Enterprise risk management (ERM) system and understand the benefits. This session will enable on how to integrate ISO 27001 in your organization as the main structure for information security management.
Litigation and Bankruptcy : How Accountants Can Help Clients Minimize Attorney Fees
Candace Leuck
120 Min
Product Id: 704911
In this webinar, you’ll learn about the role accountants can play in managing litigation and bankruptcy to reduce costs for their clients in cash distressed situations.
How to Use Big Data for an AML/AB&C Compliance and Risk Mitigation
Shaun Miller
120 Min
Product Id: 704779
This webinar discuss how big data is used for AML compliance review. The instructor will explain how an unstructured data, becomes structured and is subjected to data quality review, sampling and subsequent forensic analysis. The instructor will share how this analysis influences strategic decision in terms of risk mitigation and AML Program enhancement.
Essentials of Taxing and Reporting Insurance Benefits for 2016 and Beyond
Vicki M. Lambert
90 Min
Product Id: 704870
This webinar covers the basics of handling insurances in the payroll department including reviewing the requirements under the ACA for the 2016 reporting of health insurance. The Instructor will cover how to handle health insurance plans such as HSAs or HRAs, taxing and reporting life insurance and third party sick pay. He will also explain the role payroll plays in workers’ compensation pay-outs and premium payments.
The Custody Rule for Financial Firms
Lisa Marsden,Stacey Rodgers
60 Min
Product Id: 704873
This training program explains ‘The Custody Rule’. The instructor will help you determine if your firm has custody, compliance surrounding maintaining custody and regulatory deficiencies.
Mitigating and Conducting Very Effective Risk Assessments and Business Impact Analysis
Michael C Redmond
60 Min
Product Id: 704823
This webinar training will explain project management principles to prepare your business to overcome risk and outage. The instructor will discuss how to conduct risk assessment and business impact analysis. He will also discuss how to test and document risk elements and the process or steps to be taken to combat it.
Excel 2013 PivotTable Secrets: Analyze Lists in a Flash with PivotTables
Dennis Taylor
60 Min
Product Id: 704392
In this training program, participants will learn the best ways to create PivotTables and Pivot Charts by comparing two or more fields in a variety of layout styles, performing ad-hoc grouping of information, creating a Pivot Chart that is in sync with a PivotTable, and more.
Investment Advisors' Investment Policy Statement (IPS) - Rules, Regulations and Best Practices
Lisa Marsden
60 Min
Product Id: 704521
This training program will analyze best practices for the investment policy statement (IPS), elements of the IPS, the significant areas of the firm that should be involved in the development of the IPS, creating and maintaining the IPS, and compliance testing of the IPS.
Dealing with the Weingarten Ruling (Interviewing Public Sector and Private Sector Union Employees)
John E Grimes
90 Min
Product Id: 704777
This training program will explore the rationale behind the Weingarten Decision and other similar court decisions. It will also examine the union employee’s responsibilities when subject to an investigative interview and the union representative’s role in an investigative interview, along with sanctions and remedies for violation of Weingarten Rights.
Protect Your Organization from the Growing Internal Cyber Threat
Peter Goldmann
60 Min
Product Id: 704817
With the constant tide of data breaches and hacker threats, cybersecurity is a critical element in an organization’s policies. This training program will explore the common and not-so-common insider threats to your organization’s information security and help identify the red flags of potential or actual insider cyber crime.
A2Z of ACH - Pre-Notifications, Returns and Reversals - Part 3
Rayleen M Pirnie
90 Min
Product Id: 704573
This three-part webinar series is designed specifically for businesses who either currently process ACH credits and/or debits, or those exploring the network for use in the future. Each session will focus on niche areas of ACH essentials. This course in the series will explore ACH pre-notifications, returns and reversals from the perspective of how each affects a business originator.
Conducting a Shrink Investigation - How to Determine the Source of Your Inventory Discrepancy
John E Grimes
90 Min
Product Id: 704802
Small business failures are particularly vulnerable to going out of business as a result of uncontrolled and unidentified losses. If you are small business retail owner, manager, or loss prevention consultant, this training program will teach you how to conduct a full shrink (loss) investigation. If you are contemplating opening a small retail business, this webinar will give you a head start on understanding the complexities and importance of controlling losses.
Block Chain for Risk Management /Data Security | Emerging Technological Approach for KYC and Secure Transactions
Shaun Miller
120 Min
Product Id: 704808
A block chain is a transaction database shared by all nodes participating in a system based on the Bitcoin protocol. This course describes the Bitcoin concept, what Blockchain is and its financial applications to creating secure KYC and payment data sets. This course explains a Blockchain concept where the Blockchain itself is a shared single source of truth.
Application for Investor Advisor Registration - ADV Part 1, Part 2A, Part 2B and More
Lisa Marsden
60 Min
Product Id: 704741
This training program will analyze ADV Part 1, ADV Part 2 A, ADV Part 2 B, and offer a breakdown of each section of the ADV. It will discuss annual filing requirements and offer best practices for reporting accurately.
2016 Financial Regulator Priorities - SEC, FINRA, and State Regulators
Lisa Marsden
60 Min
Product Id: 704765
In this training program, attendees will learn how to gain access to the financial regulators priorities and understand how to apply those priorities to their firm. The program will also discuss incorporating the priorities into your annual review and identifying priorities that need to become part of the compliance manual/code of ethics.
Community Reinvestment Act (CRA) - Understanding High Risk Lending and Compliance Issues
Vidia Ramdeen
60 Min
Product Id: 704764
This training program will address important compliance issues and high risk lending issues of the Community Reinvestment Act (CRA). It will help attendees in understanding why community bank lending is important for achieving goals underlying successful community reinvestment and focus on the basics of risk management for community bank lending.
SEC Examinations - Practical Tips on How to Defend Yourself
H. David Kotz
60 Min
Product Id: 704605
This webinar provides practical information on how companies may defend themselves during SEC examinations. The webinar highlights the newest initiatives arising from the SEC’s examination program. Presented by the former Inspector General of the SEC, the webinar provides valuable insider information about SEC exams.
3-Hr Virtual Seminar - Understanding DFAR and Developing Compliance - DCAA Audit, Labor Records, Penalties, Policies & Procedures
JeFreda Brown
3 hrs
Product Id: 704619
This training program will demonstrate why companies planning to do business with the government should be prepared to be audited by the Defense Contract Audit Agency (DCAA). DCAA performs all needed contract audits for the Department of Defense (DoD). The focus of this program is to offer attendees a strong knowledge of DFARS (Defense Federal Acquisition Regulation Supplement) and help understand what is required when pricing proposals, developing a compliant accounting system, and maintaining contracts.
Dos & Don'ts Related to Information Security and Data Privacy
Marc Perl
60 Min
Product Id: 704736
This training program will prepare your organization to understand the need for data security, the steps that can be taken to institute or augment your data security policies/procedures, and the implementation of the needed controls. This webinar will introduce attendees to a set of known and respected data security standards that can be employed by your organization to improve your security. Attendees will walk away with ideas to leverage the curriculum with their existing security infrastructure.
How to Establish & Review Your Risk Metrics Effectively
Robert Geary
90 Min
Product Id: 704709
This webinar training provides an in depth understanding and applicability of the risk metrics. The instructor helps in establishing the purpose they serve and reviewing the methodology for creating a set of risk metrics. He will also discuss the sampling of forms of risk metrics to be employed and review the risk metric management process.







