Writing an Effective Coverage Letter - Analyzing the Facts, the Law and the Insurance Policy
Marc Estrella
60 Min
Product Id: 704553
In this training program, attendees will understand the necessity of writing a coverage letter. Attendees will understand how to utilize the facts and communicate to the insured the need for more information when there is insufficient information to make a coverage determination. They will also learn to employ state mandated language in the coverage letter.
Vendor Management Program - Risk Assessment, Effective Controls, Best Practices to Minimize 3PV Risk
Anne M McFadden
90 Min
Product Id: 704615
This vendor management training program will offer best practices for managing and minimizing third party vendor risk through strategies that help you focus resources with a risk based approach. It will explore the five elements of a successful vendor management program, including: vendor culture, vendor risk assessment, ensuring effective controls around vendor management, monitoring vendor programs, and vendor communication.
What Does the Foreign Corrupt Practices Act (FCPA) Mean to the Procure to Pay (P2P) Process
Chris Doxey
90 Min
Product Id: 704606
This webinar will discuss the Foreign Corrupt Practices Act (FCPA) and its implication on the pay-to-procure (P2P) process. Participants will learn the 15 step compliance roadmap for the FCPA and FCPA compliance programs and how to test for FCPA violations in the P2P process. The Instructor will share guidelines to help your company establish FCPA compliance for your P2P process.
ACH Fraud - Detection and Prevention
Rayleen M Pirnie
90 Min
Product Id: 704369
This training program will discuss common forms of ACH fraud, including: social engineering, account takeover (consumer, corporate, and institution internal accounts), money mules and advance fee frauds, and embezzlement. Under each of these sections, the course will also discuss: ACH fraud detection, fraud mitigation, ACH Returns, sound business practices to thwart attempts, and education.
Payment Card Industry Data Security Standard (PCI DSS) and Your Company
Marc Perl
90 Min
Product Id: 704601
This training program will explore how development and deployment of PCI DSS (Payment Card Industry Data Security Standard) compliant networks can assist your business to secure those electronic assets that the business considers vital. The principles specified in PCI DSS, which the program will discuss, can be a guide for all organizations that wish to secure their data.
Advanced Consumer Lending - Process, Best Practices, 6Cs of Credit, Loan Structuring and Pricing
Robert D Hawkins
60 Min
Product Id: 704502
This training program will introduce the consumer lending process from the initial application to closing and documentation. Proper analysis of consumer loan requests is more important today than any time in the history of banking as a result of the current economic environment worldwide which has left many consumers in a weaker financial condition than in the past. For this reason and the need for banks to continue growing the consumer loan portfolio safely, it is important for bankers to adjust their lending practices to insure the next consumer applicant is not becoming overextended and unable to meet their obligations.
Effective Credit Memo - Reporting Effectively in the Credit Memorandum
Robert D Hawkins
60 Min
Product Id: 704504
This training program will explore the underwriting and reporting on commercial real estate, construction loans, acquisition and development loans and multi-family unit loans. In doing so, several samples of proven credit memos will be examined to insure bankers are covering the areas required by the banking regulators.
Defending FCPA Claims and Minimizing FCPA Exposure
H. David Kotz
60 Min
Product Id: 704556
This training program will highlight how one can effectively manage risks resulting from Foreign Corrupt Practices Act (FCPA) claims. Presented by the former Inspector General of the SEC, who served in senior-level positions in several federal agencies, the webinar will provide practical lessons on how to manage FCPA claims, devise effective compliance programs, conduct internal investigations and achieve a culture of compliance in an organization.
10 Best Practices to Improve Your Fiscal Closing Process
Chris Doxey
90 Min
Product Id: 704580
Regardless of company size or complexity, all successful financial close processes require continuous communication, comprehensive documentation and a flexible, responsive organization. This training program will focus on 10 critical methods that you can use to dramatically improve your Record to Report (R2R) process. The R2R or Financial Closing Process is the centerpiece of the controllership function. This program will examine the process that ranges from transaction processing through internal and external reporting, and it incorporates everything from internal controls, the corporate organizational hierarchy - its people, processes, and technology.
Seven Habits of an Effective Loan Committee
Robert D Hawkins
60 Min
Product Id: 704570
This training program will list and discuss documents required to complete the five steps in the documentation process. On completion of the program, attendees will be able to provide a broad overview of the loan documents’ provisions to borrowers and loan processing management techniques.
Foreign Exchange Hedging for Corporations
Jonathan Wetreich
90 Min
Product Id: 704133
In this training program, attendees will learn the types of FX hedge programs typically utilized by corporations and the hedge instruments typically used by corporate hedgers such as forwards and collars. They will also gain an understanding of the concept of view-neutral hedging.
ATM & POS Skimming Fraud Losses - Detection and Prevention
Rayleen M Pirnie
90 Min
Product Id: 704512
This training program will classify common forms of ATM skimming fraud, POS skimmers, and POS malware, and also identify appropriate mitigation strategies. The course will further analyze why EMV will not stop ATM fraud and POS skimming fraud.
Cyber Incident Response: The Payments Perspective - Threat Intelligence and Best Practices to Manage Threats
Rayleen M Pirnie
90 Min
Product Id: 704443
This training program will discuss how cyber-attacks affect payment processing. It will highlight to attendees how best to record appropriate sound business practices for managing operational risk due to a cyber-attack. Attendees will also learn to identify critical operational communications, from internal staff to customers and institutions to vendor support.
Strategies to Pass the Certified Internal Auditor's (CIA) Exam
Jonnie T Keith
90 Min
Product Id: 704487
This training program will discuss the many advantages in obtaining a CIA designation. In addition to the vast audit and business knowledge you are exposed to, it can lead to promotions and pay increases. You become a valuable asset to your organization. And while the test is difficult, it is not impossible. It is meant to make sure that when you carry the CIA designation, people know that you have an excellent grasp of audit and business knowledge.
Loan Portfolio Management and Review - Regulations, Process, Loan Grading Techniques, Collateral and Documentation
Robert D Hawkins
60 Min
Product Id: 704545
This training program explains the details of loan portfolio management and factors of macro economic, industry, business and management that must be considered. The instructor discusses the process of examining the quality of credit file documentation, including assessment of the credit memorandum and loan documentation. Participants will also understand the loan grading techniques and the check points that are needed to complete a full loan review.
AML, SOX and Licensing Controls Failures - Detection, Prevention and Risk Mitigation Strategies
Jim George
60 Min
Product Id: 704527
This webinar will discuss the common AML, SOX and Licensing control failures and how to detect and prevent them. The instructor will discuss the legal impact of non-compliance on banks and financial institutions, red flags and how to strengthen your internal controls to mitigate risk.
Applying ISO 27001 to ERM Risk
Michael C Redmond
60 Min
Product Id: 704470
This ERM training program will discuss how today’s enterprise risk evaluation and control and impact analysis include identifying enterprise threats, which can truly lead not only to a disruption but also to the destruction of an enterprise.
Understanding Disclosures, Certifications and Corporate Responsibility Relating to SOX - Sections 302, 401, 404, 409, 906
David Sanders
90 Min
Product Id: 704440
This webinar will enhance attendees’ knowledge of corporate responsibility for financial reports, disclosures and certifications relating to SOX Sections 302, 401, 404, 409, 802, 906 (Sarbanes-Oxley Act) by helping you understand the levels of corporate responsibility and certification.
Compilation and Review Update - New Formats, SSARS21
Candace Leuck
90 Min
Product Id: 704490
This training program leads to an understanding of the recently effective SSARS 21 which supersedes SSARS 19. It will provide insight for accountants in public practice and accountants in industry who will be engaged in compilation and review services with year ends after December 15, 2015.
The Practice of Factoring - A Viable Lending Component
Ray Graber
90 Min
Product Id: 704430
This training program on factoring will discuss the fragmented market place, the missing link to receivables management, interesting alternatives, and the new face of factoring.







