Product Id: 704994
This training program will help articulate your business objectives and define the scope of your risk assessment. It will guide attendees in identifying the most appropriate risk assessment technique and plan and facilitate a risk assessment. Further, the session will help tailor a risk matrix to enable you to rate your risks.
Product Id: 703751
Scenario analysis complements the risk assessment process, which often overlooks material events that only happen infrequently, such as natural disasters, acts of terrorism, and data breaches. This webinar will highlight the importance of scenario analysis, its objectives and expected benefits, and the ideal methodology for quantifying and reporting operational risk scenarios.
Product Id: 704345
This training program may well change the way in which you prepare or analyze the very next time extension request you have to deal with. It will discuss rules concerning time extension requests, arguments about waiver and apportionment of liquidated damages, concurrent delay issues and who has to prove concurrent delay, and more.
David L Osburn
Product Id: 704759
This training program will review the three keys to success for any bank: marketing, financing, and management. The webinar will also include how to correctly interpret the bank’s financial statements including analyzing key numbers and ratios. Additionally, attendees will be exposed to how a bank’s overall success is measured including the CAMELS rating, Baurer Financial Rating, and Texas Ratio. Furthermore, various bank HR issues and the risk of cyber security threats will be outlined.
Rayleen M Pirnie
Product Id: 705117
This webinar will break down the Board’s role in effective cybersecurity oversight, the 12 questions a board member should be knowing to answer, key principles of oversight, tips and resources for board.
Product Id: 704970
Risk matrices are used during risk assessment to define the various levels of risk as the product of the probability and impact categories. This webinar training will focus on this simple but powerful mechanism to increase visibility of risks and assist management decision making. Risk matrices are one of the most widespread tools for risk evaluation.
Effective and Proactive Strategic Risk Management - A Vital Element to Achieve Effective Enterprise-wide Governance, Risk Management and Compliance (GRC) Programs
Product Id: 705407
Learn an effective approach to practice risk management process that is proactive, strategic and top-down in nature to anticipate, avoid and mitigate potential losses from threats and risks that are present in the real world regardless of any organization’s wishes.
Product Id: 705380
Gain a better understanding of cyber security incident management that is proactive versus reactive, learn methods to minimize business disruption and damages, and the impact and urgency on customers and the business for risk and costs.
Product Id: 704288
This webinar discusses the genesis of RFIs and their development and the use and abuse of RFIs on construction projects including ways to mitigate the potential adverse impact of RFIs. Speaker discusses a number of contractual mechanisms to control the RFI process and mitigate potential impact damage claims based on the number of RFIs. The webinar also sets forth best management practices concerning the RFI process.
Product Id: 704696
This training program will highlight the importance of management’s role in instilling proper internal controls within their processes. Although the Sarbanes-Oxley Act made it abundantly clear that internal controls is the responsibility of management, many companies still view those processes as the responsibility of the auditors or quality assurance individuals. The impending release of the new COSO Framework clearly outlines the importance of understanding all aspects of internal control and ensuring those elements are properly working together in an effective manner.
Product Id: 705083
ISO 31000 is a standard developed by the International Organization for Standardization (ISO) which provides a basic guideline and principles for the application of risk management. Companies that use risk management processes vary across industries in scope and magnitude and address a wide variety of challenges. This training program will offer an in depth look into the key components of the ISO 31000 guideline and best practices to implement and support a corporate risk management strategy or program.
Product Id: 705198
Within the same document recommending never to take up a model without its full analysis and justification, the Basel Committee demanded that banks take up the IRB formula, explained par. 272 of the Basel II original text. This formula has, since then, determined to a large extent the amount of regulatory capital in the financial system. This webinar training will break down the rationale and the limitations of this critical formula.
Rayleen M Pirnie
Product Id: 705038
The Internet Crime Complaint Center (IC3) reports that U.S. victims alone lost $18 million in 15 months to just a single form of ransomware. This training program will review the risks associated with various types of cyber fraud, and in particular, business email compromise (BEC) and ransomware. The session will also discuss documenting sound business practices to minimize exposure and loss and list what to present to your board of directors before an incident.
John E Grimes
Product Id: 704334
This training program will examine the fraud vulnerabilities in the procurement of materials and services in the private sector. In addition, it will explore the many procurement and contract fraud schemes and at what point in the procurement and contract process they occur.
Product Id: 705012
Reputation risk is the risk of loss resulting from damages to a firm's reputation, in lost revenue; increased operating, capital or regulatory costs; or destruction of shareholder value, due to an adverse or potentially criminal event even if the company is not found guilty. This training program will explore the hidden danger behind reputational risk that can pose a threat to the survival of the biggest and best-run companies, often wiping out millions or billions of dollars in market capitalization or future revenues and occasionally resulting in a change at the uppermost levels of management.
Product Id: 704969
A risk register, also known as a risk log, serves as a central repository for the organization's risk information. This training program will discuss its key function, i.e., to provide management, the board, and key stakeholders with significant information on the main risks faced by the organization. The program will also delve into designing and using your own ‘fit-for-purpose’ risk register.
Vicki M. Lambert
Product Id: 704943
This webinar concentrates on preparing the department for the end of the calendar tax year and the New Year processing. Topics include reconciling, completing and submitting Form W-2, 941 federal and state; update to annual changes from the IRS, SSA, DOL and on the state level; and best practices that will help make the year-end and year beginning go smoother.
Product Id: 704332
This training program will highlight the practices prohibited by the FCPA. It will help determine if your current travel and entertainment policy is in compliance and discuss what accounting and anti-bribery violations are covered.
Travis A Greaves,T Joshua Wu
Product Id: 704897
This presentation will provide tax and compliance professionals with an understanding of the stages of an audit with potential criminal exposure. Panelists will discuss the sources of criminal tax cases and the evaluation and investigation involved in an “eggshell audit”. The panelists will also cover the coordination between the IRS civil team and IRS criminal investigation division.
Product Id: 704908
This webinar will offer guidelines on how organizations should take a short-, medium-, and long-term vision of their enterprise-wide contingency and business continuity plan preparation. It will also offer best practices to upgrade your Business Continuality Plan (BCP) to cope with a whole variety of new current and forecast threats, with uncertain times of occurrence, in a dynamic business and global threat panorama.