Cyber Incident Response: The Payments Perspective - Threat Intelligence and Best Practices to Manage Threats
Rayleen M Pirnie
90 Min
Product Id: 704443
This training program will discuss how cyber-attacks affect payment processing. It will highlight to attendees how best to record appropriate sound business practices for managing operational risk due to a cyber-attack. Attendees will also learn to identify critical operational communications, from internal staff to customers and institutions to vendor support.
E-Compliance: Online Privacy, Harassment and Identity Theft in the Digital Age
Joseph Rosner
60 Min
Product Id: 704524
This webinar will discuss the bane of new technology and social media in regards to employers’ and employees’ privacy. The instructor will discuss e-compliances that employers need to adhere to avoid privacy suits. He will also cover the risks of information breach and defamation claims from electronic employee postings. Participants will know how to deal with online privacy and harassment claims and ways and limits of disciplining employees’ online presence. The course will also examine how to legally use Internet postings, profiles and other content in hiring decisions.
Understanding Disclosures, Certifications and Corporate Responsibility Relating to SOX - Sections 302, 401, 404, 409, 906
David Sanders
90 Min
Product Id: 704440
This webinar will enhance attendees’ knowledge of corporate responsibility for financial reports, disclosures and certifications relating to SOX Sections 302, 401, 404, 409, 802, 906 (Sarbanes-Oxley Act) by helping you understand the levels of corporate responsibility and certification.
Risk Management - Best Practices, Roles and Responsibilities, Types and Preventives, Case Studies
Robert Geary
90 Min
Product Id: 703689
This webinar will demonstrate a conceptual framework and thought process to address risk management. It will discuss the significance of risk management processes with emphasis on causes of risk and risk preventives. The instructor will explain the best practices, roles and responsibilities, risk types and how to prevent them.
A Risk-Based Methodology to Develop and Prepare an Effective Service Level Agreement (SLA) Package to Improve Service and Security Quality
Javier Kuong
90 Min
Product Id: 703999
This training program will illustrate a structured methodology to develop effective service level agreements based on a top-down, risk-based approach, summarized in a matrix that documents the whole development process for specific SLAs that respond to business objectives.
Managing Through a Product Recall - Process and Procedures
Richard Maksimoski
60 Min
Product Id: 704325
Attendees will leave this training session with more confidence, vision, and productivity. The confidence is knowing that you have a process that is developed prior to the actual event (if ever needed) and a decision tree is developed in time of stability rather than one of high emotion. The ability to establish the necessary processes will allow you to have confidence that your company will not be operating in panic mode.
Marketing for Most of Us Today
Barney Kramer
90 Min
Product Id: 704287
This training program will focus on current marketing avenues such as outbound and inbound marketing, social media and its reach with consumers, content marketing and more. It will focus on the basics of marketing principles and guide attendees in developing target markets and segments for subsets of your strategic plan.
5-Hour Virtual Seminar: P2P Standards of Internal Controls - Preapproved by the American Purchasing Society
Chris Doxey
5 hrs
Product Id: 704195
This two-part five-hour certificate program focuses on internal controls leading practices and standards for the Procure to Pay (P2P) process. Attendees will learn about internal controls best practices by focusing on the Internal Controls Questionnaires (ICQ) for each component of the P2P process. Participants in this program will obtain a certificate in Procure to Pay (P2P) Standards of Internal Controls from the American Purchasing Society (APS).
The Core of Program Management Across Sectors
Samir Penkar
60 Min
Product Id: 704402
This training program will lay emphasis on industry trends shaping the program management world. Course participants will learn the top three core program management concepts needed to shape and update your programs.
3-Hour Virtual Training: Guidelines for Performing a Corporate Wide Internal Audit Risk Assessment
Marna Steuart
180 Min
Product Id: 704386
This training program will detail key components of a risk assessment and management program, and include a fraud risk assessment discussion. Other training points in the program include analyzing the methodology for successful risk assessment process, understanding the steps involved in the risk assessment process, and fraud risk assessment.
Driver Performance-Based Budgeting and Rolling Financial Forecasts
Gary Cokins
90 Min
Product Id: 704391
This training program will help attendees understand the deficiencies with the traditional annual budget. Attendees will also learn how to apply unit-level consumption rates with forecasts to project operational expenses and how to include strategic projects and risk mitigation projects in expense projections.
Regulation V - Fair Credit Reporting Act
Kara Lamphere
60 Min
Product Id: 704290
This webinar will discuss the Regulation V – Fair Credit Reporting Act(FCRA) in details and explain attendees what types of marketing are allowed, requirements of affiliate marketing, and disclosures required with regard to consumer credit report. Speaker will discuss about consumer credit report alerts and identity theft protections, as well as what an institution must do with these alerts.
Out in the Open: Protecting Your Privacy and Identity in the Digital Age on the Internet
Joseph Rosner
60 Min
Product Id: 704256
This privacy protection in the digital age training program will detail what the Internet of Things is and how it collects data and tracks you. It will further examine the risks attached to personal information and more.
Vendor Management - Building a Strong Questionnaire
Michael D King
60 Min
Product Id: 704119
This training program will highlight why a vendor questionnaire is the keystone your vendor management program is built on. The course will help ensure attendees get the whole picture and determine appropriate controls for information security and privacy.
ISO/IEC 27001:2013 - Breaking It Down to Understand and Implement
Michael C Redmond
90 Min
Product Id: 703977
This training program will guide attendees in implementing and complying with the requirements of ISO 27001:2013. ISO 27001 is an international standard published by the International Standardization Organization (ISO), and it describes how to manage information security in a company. The latest revision of this standard was published in 2013, and its full title now is ISO/IEC 27001:2013.
How to Develop a Successful ERM Program Ensuring Synergy, Transparency and System Solutions
Michael C Redmond
60 Min
Product Id: 703580
This webinar highlights the importance of an effective ERM program in project management and risk assessment. Attendees will learn how to implement a viable ERM program including documenting and testing it.
The Role of the Board in Oversight of Enterprise Risk
Douglas Webster
90 Min
Product Id: 702708
This webinar highlights the evolution of Enterprise Risk Management (ERM), the importance of ERM in meeting board fiduciary responsibilities, and the rationale and mechanisms for ensuring effective risk management through the board.
Managing Corporate Risks with ISO 31000
Kelly Eisenhardt
60 Min
Product Id: 705083
ISO 31000 is a standard developed by the International Organization for Standardization (ISO) which provides a basic guideline and principles for the application of risk management. Companies that use risk management processes vary across industries in scope and magnitude and address a wide variety of challenges. This training program will offer an in depth look into the key components of the ISO 31000 guideline and best practices to implement and support a corporate risk management strategy or program.
Essentials of Successful Fraud Risk Management
Daniel Clark
60 Min
Product Id: 706984
"Essentials of Successful Fraud Risk Management" is a session all about fraud. We begin by defining exactly what fraud looks like and provide a brief history of frauds impact to financial services.
The Evolving Landscape for Management of Third Party Service Providers
Daniel Clark
60 Min
Product Id: 706980
Third Party Risk Management is all about managing service providers. For several years, businesses have been increasing reliance on third parties. While this reliance has many upsides, there are risks that should be recognized and managed. This session highlights those risks and provides alternatives to best manage them.







