AML Risks in Correspondent Banking: What You Need to Know for 2017
Joe Soniat
60 Min
Product Id: 704997
Correspondent banking has become a hot topic with BSA AML over the past few years. With examination scrutiny on correspondent banking high, this training program will highlight why it is essential to know the risk and what to do when it comes to banking other banks.
Ethics in the Financial Services Industry
Lisa Marsden
60 Min
Product Id: 705053
The application and practice of ethical behavior is not just about complying with rules and regulations but about doing the right thing. This training program will discuss case studies and how to apply best practical ethical behavior and how to incorporate the ethical behavior into your firm’s overall business culture.
Procurement and Contract Fraud - Detection and Prevention
John E Grimes
90 Min
Product Id: 704334
This training program will examine the fraud vulnerabilities in the procurement of materials and services in the private sector. In addition, it will explore the many procurement and contract fraud schemes and at what point in the procurement and contract process they occur.
How to Manage Reputational Risk
Mario Mosse
90 Min
Product Id: 705012
Reputation risk is the risk of loss resulting from damages to a firm's reputation, in lost revenue; increased operating, capital or regulatory costs; or destruction of shareholder value, due to an adverse or potentially criminal event even if the company is not found guilty. This training program will explore the hidden danger behind reputational risk that can pose a threat to the survival of the biggest and best-run companies, often wiping out millions or billions of dollars in market capitalization or future revenues and occasionally resulting in a change at the uppermost levels of management.
Cyber Risk Register: The Cornerstone for Understanding and Managing Cyber Risk
Mario Mosse
90 Min
Product Id: 704977
Information technology assets and information need to be protected against unauthorized internal or external access and cyberattacks. These attacks may result in data destruction, alteration, unavailability or breach of confidentiality. This training program will discuss how developing and maintaining a cyber risk register is a fundamental step toward inventorying, assessing and addressing cyber risks threatening your organization.
Preparing a Financial Industry Compliance Manual and Code of Ethics
Lisa Marsden
60 Min
Product Id: 704962
This training program will detail developing a compliance manual and a code of ethics for the financial industry, with the intent of clarifying the requirements of the Advisers Act. The instructor will also guide attendees on testing the manual, effectively managing it, and keeping it constantly updated.
FCPA and Anti-Bribery Cases and Trends in the US, China and Russia
Grant Smith
60 Min
Product Id: 704332
This training program will highlight the practices prohibited by the FCPA. It will help determine if your current travel and entertainment policy is in compliance and discuss what accounting and anti-bribery violations are covered.
Red Flags of Internal Fraud, Asset Misappropriation, and Corruption
H. David Kotz
75 Min
Product Id: 704865
This webinar highlights how one can identify red flags of frauds, asset misappropriation and corruption. Presented by the former Inspector General of the SEC, the webinar provides specific and concrete tips to identify potential red flags before there is significant exposure.
Enterprise Risk Management (ERM) and an Insurer’s Own Risk and Solvency Assessment (ORSA)
Adam Kerns
60 Min
Product Id: 704931
This webinar offer a comprehensive and in-depth review of the National Association of Insurance Commissioner’s (NAIC) Risk Management and Own Risk and Solvency Assessment Model Act and Guidance Manual (ORSA). Participants will learn about real world application to insurer’s daily operations and lessons learned so far.
Develop and Upgrade Sound Business Continuity Plans | New and Potential Threats
Javier Kuong
120 Min
Product Id: 704908
This webinar will offer guidelines on how organizations should take a short-, medium-, and long-term vision of their enterprise-wide contingency and business continuity plan preparation. It will also offer best practices to upgrade your Business Continuality Plan (BCP) to cope with a whole variety of new current and forecast threats, with uncertain times of occurrence, in a dynamic business and global threat panorama.
Achieving Enterprise Information Security Goals - Creating Right Teams
Rich Devlin,Joe Grannemon
60 Min
Product Id: 704863
This webinar will involve a high-level discussion on how you can create effective teams for achieving your Information Security goals and addressing complex threats such as Ransomware. Learn how to create a Information Security plan and align your goals with objectives, strategies and tactics across teams.
Designing Effective Controls, Security Safeguards and Governance by a Risk-Based Methodology
Javier Kuong
120 Min
Product Id: 704656
This training program will provide a practical and structured methodology for the design of governance, controls and security provisions. The methodology can be applied to participants’ real work environment immediately. Participants will also benefit from comparing their present governance and controls design practices with the structured, risk-based methodology presented in the webinar.
3-Hr Virtual Seminar - Understanding DFAR and Developing Compliance - DCAA Audit, Labor Records, Penalties, Policies & Procedures
JeFreda Brown
3 hrs
Product Id: 704619
This training program will demonstrate why companies planning to do business with the government should be prepared to be audited by the Defense Contract Audit Agency (DCAA). DCAA performs all needed contract audits for the Department of Defense (DoD). The focus of this program is to offer attendees a strong knowledge of DFARS (Defense Federal Acquisition Regulation Supplement) and help understand what is required when pricing proposals, developing a compliant accounting system, and maintaining contracts.
Dos & Don'ts Related to Information Security and Data Privacy
Marc Perl
60 Min
Product Id: 704736
This training program will prepare your organization to understand the need for data security, the steps that can be taken to institute or augment your data security policies/procedures, and the implementation of the needed controls. This webinar will introduce attendees to a set of known and respected data security standards that can be employed by your organization to improve your security. Attendees will walk away with ideas to leverage the curriculum with their existing security infrastructure.
How to Establish & Review Your Risk Metrics Effectively
Robert Geary
90 Min
Product Id: 704709
This webinar training provides an in depth understanding and applicability of the risk metrics. The instructor helps in establishing the purpose they serve and reviewing the methodology for creating a set of risk metrics. He will also discuss the sampling of forms of risk metrics to be employed and review the risk metric management process.
Pricing for Risk in Merchant Payments - Risk Metrics, Reserve Requirements, Pricing Models, Best Interchange Rates, EMV/NFC Guidelines
Armen Khachadourian
90 Min
Product Id: 704546
This training program will provide insight into fundamental underwriting and risk management guidelines, determining variables that constitute merchant risk, and on how to assign a dollar value and quantify exposure.
Measuring and Managing Customer Profitability - From Growing Sales to 'Profitable' Sales
Gary Cokins
90 Min
Product Id: 704679
This training program will focus on how to shift the mindset from growing sales to growing profitable sales and to view customers as investments like in a stock portfolio to seek higher ROIs – return on customers (ROC). It will also look at how measuring forward-looking customer lifetime value (CLV) differs from calculating historical customer/consumer profitability for B2C industries.
CAMELS Methodology | Market Risk Identification, Evaluation and Managing Risk Conditions - CCAR and CLAR
Robert Geary
60 Min
Product Id: 704669
This training webinar discusses CAMELS components in terms of the regulators’ evaluation methodology. It covers how these considerations translate into the rating of each component and the formulation of a bank’s CAMELS composite rating. In addition, the instructor explains two related evaluations: CCARS which is a “Comprehensive Capital Assessment and Review”, and CLAR which is a “Comprehensive Liquidity Assessment and Review” and how to rate bank’s capital adequacy and liquidity adequacy.
Is Your Vendor Ripping You Off? Fraud Red Flags Corporate Executives Should Recognize
Anne M McFadden
90 Min
Product Id: 704015
This training program will primarily focus on analytical and accounting red flags in purchasing schemes, bid rigging, billing schemes, personal purchase schemes, product substitution and all other kinds of corporate fraud.
Building a Comprehensive Fraud Investigative Report
H. David Kotz
75 Min
Product Id: 704035
This training program will discuss how to ensure the credibility of a fraud investigative report. It will train attendees on conducting effective witness interviews, discuss fraud investigative techniques utilized in different situations, and offer tips to locate relevant documents in a fraud investigation.







