Achieving Enterprise Information Security Goals - Creating Right Teams
Rich Devlin,Joe Grannemon
60 Min
Product Id: 704863
This webinar will involve a high-level discussion on how you can create effective teams for achieving your Information Security goals and addressing complex threats such as Ransomware. Learn how to create a Information Security plan and align your goals with objectives, strategies and tactics across teams.
Designing Effective Controls, Security Safeguards and Governance by a Risk-Based Methodology
Javier Kuong
120 Min
Product Id: 704656
This training program will provide a practical and structured methodology for the design of governance, controls and security provisions. The methodology can be applied to participants’ real work environment immediately. Participants will also benefit from comparing their present governance and controls design practices with the structured, risk-based methodology presented in the webinar.
3-Hr Virtual Seminar - Understanding DFAR and Developing Compliance - DCAA Audit, Labor Records, Penalties, Policies & Procedures
JeFreda Brown
3 hrs
Product Id: 704619
This training program will demonstrate why companies planning to do business with the government should be prepared to be audited by the Defense Contract Audit Agency (DCAA). DCAA performs all needed contract audits for the Department of Defense (DoD). The focus of this program is to offer attendees a strong knowledge of DFARS (Defense Federal Acquisition Regulation Supplement) and help understand what is required when pricing proposals, developing a compliant accounting system, and maintaining contracts.
BCBS 239 - Principles of Effective Risk Data Aggregation and Risk Reporting
Mario Mosse
90 Min
Product Id: 703943
Risk management is a key component of every banking governance framework. This webinar discuss the BCSB 239 standard. The instructor will discuss the critical risk-data aggregation capabilities and internal risk-reporting practices (the Principles) to enhance risk management and decision-making processes at banks.
Dos & Don'ts Related to Information Security and Data Privacy
Marc Perl
60 Min
Product Id: 704736
This training program will prepare your organization to understand the need for data security, the steps that can be taken to institute or augment your data security policies/procedures, and the implementation of the needed controls. This webinar will introduce attendees to a set of known and respected data security standards that can be employed by your organization to improve your security. Attendees will walk away with ideas to leverage the curriculum with their existing security infrastructure.
How to Establish & Review Your Risk Metrics Effectively
Robert Geary
90 Min
Product Id: 704709
This webinar training provides an in depth understanding and applicability of the risk metrics. The instructor helps in establishing the purpose they serve and reviewing the methodology for creating a set of risk metrics. He will also discuss the sampling of forms of risk metrics to be employed and review the risk metric management process.
Pricing for Risk in Merchant Payments - Risk Metrics, Reserve Requirements, Pricing Models, Best Interchange Rates, EMV/NFC Guidelines
Armen Khachadourian
90 Min
Product Id: 704546
This training program will provide insight into fundamental underwriting and risk management guidelines, determining variables that constitute merchant risk, and on how to assign a dollar value and quantify exposure.
Measuring and Managing Customer Profitability - From Growing Sales to 'Profitable' Sales
Gary Cokins
90 Min
Product Id: 704679
This training program will focus on how to shift the mindset from growing sales to growing profitable sales and to view customers as investments like in a stock portfolio to seek higher ROIs – return on customers (ROC). It will also look at how measuring forward-looking customer lifetime value (CLV) differs from calculating historical customer/consumer profitability for B2C industries.
Protecting Your Intellectual Property Abroad
Douglas Cohen
60 Min
Product Id: 702972
IP piracy costs more than a loss in sales. If your brand loses value because it is seen as less exclusive or is confused with poor imitations this poses a long term threat to profitability. Re-establishing brand identity and company reputation is expensive if not impossible. This webinar will provide specific, practical steps to take to lessen this risk of loss.
CAMELS Methodology | Market Risk Identification, Evaluation and Managing Risk Conditions - CCAR and CLAR
Robert Geary
60 Min
Product Id: 704669
This training webinar discusses CAMELS components in terms of the regulators’ evaluation methodology. It covers how these considerations translate into the rating of each component and the formulation of a bank’s CAMELS composite rating. In addition, the instructor explains two related evaluations: CCARS which is a “Comprehensive Capital Assessment and Review”, and CLAR which is a “Comprehensive Liquidity Assessment and Review” and how to rate bank’s capital adequacy and liquidity adequacy.
Writing Effective Email
Phil Vassallo
90 Min
Product Id: 704380
This training program will discuss best practices for managing your email system effectively and efficiently. It will guide attendees in composing purposeful, reader-focused emails and in employing strategies for creating a courteous tone.
Is Your Vendor Ripping You Off? Fraud Red Flags Corporate Executives Should Recognize
Anne M McFadden
90 Min
Product Id: 704015
This training program will primarily focus on analytical and accounting red flags in purchasing schemes, bid rigging, billing schemes, personal purchase schemes, product substitution and all other kinds of corporate fraud.
Building a Comprehensive Fraud Investigative Report
H. David Kotz
75 Min
Product Id: 704035
This training program will discuss how to ensure the credibility of a fraud investigative report. It will train attendees on conducting effective witness interviews, discuss fraud investigative techniques utilized in different situations, and offer tips to locate relevant documents in a fraud investigation.
Home Mortgage Disclosure Act (HMDA) Reports - Meeting Regulators: Expectations - Tools and technique to reduce errors
Jim George
60 Min
Product Id: 703743
Fraudsters are always looking for new opportunities and new weaknesses. The availability of customer data on the black-market gives them just the tools they need. A bank has responsibilities to its shareholders and customers to protect them from these ever-changing threats. This webinar will furnish attendees with a complete understanding of the changes in the fraud arena and the strategies needed to combat fraud.
Vendor Management Program - Risk Assessment, Effective Controls, Best Practices to Minimize 3PV Risk
Anne M McFadden
90 Min
Product Id: 704615
This vendor management training program will offer best practices for managing and minimizing third party vendor risk through strategies that help you focus resources with a risk based approach. It will explore the five elements of a successful vendor management program, including: vendor culture, vendor risk assessment, ensuring effective controls around vendor management, monitoring vendor programs, and vendor communication.
Organizing an Effective Chief Risk Officer's Function to Improve GRC
Javier Kuong
120 Min
Product Id: 701736
This risk management webinar will discuss how to set up a sound and Chief Risk Officer’s (CRO) function that will help organizations to achieve sound risk management, governance and compliance to laws.
What Does the Foreign Corrupt Practices Act (FCPA) Mean to the Procure to Pay (P2P) Process
Chris Doxey
90 Min
Product Id: 704606
This webinar will discuss the Foreign Corrupt Practices Act (FCPA) and its implication on the pay-to-procure (P2P) process. Participants will learn the 15 step compliance roadmap for the FCPA and FCPA compliance programs and how to test for FCPA violations in the P2P process. The Instructor will share guidelines to help your company establish FCPA compliance for your P2P process.
ACH Fraud - Detection and Prevention
Rayleen M Pirnie
90 Min
Product Id: 704369
This training program will discuss common forms of ACH fraud, including: social engineering, account takeover (consumer, corporate, and institution internal accounts), money mules and advance fee frauds, and embezzlement. Under each of these sections, the course will also discuss: ACH fraud detection, fraud mitigation, ACH Returns, sound business practices to thwart attempts, and education.
Defending FCPA Claims and Minimizing FCPA Exposure
H. David Kotz
60 Min
Product Id: 704556
This training program will highlight how one can effectively manage risks resulting from Foreign Corrupt Practices Act (FCPA) claims. Presented by the former Inspector General of the SEC, who served in senior-level positions in several federal agencies, the webinar will provide practical lessons on how to manage FCPA claims, devise effective compliance programs, conduct internal investigations and achieve a culture of compliance in an organization.
Foreign Exchange Hedging for Corporations
Jonathan Wetreich
90 Min
Product Id: 704133
In this training program, attendees will learn the types of FX hedge programs typically utilized by corporations and the hedge instruments typically used by corporate hedgers such as forwards and collars. They will also gain an understanding of the concept of view-neutral hedging.







