ComplianceOnline

Corporate Governance Policies and Processes Training - Live Webinars, Recordings & CDs

Detecting and Preventing Embezzlement in Your Organization
13
/ Dec
Thursday-2018

Detecting and Preventing Embezzlement in Your Organization

  • Speaker: Peter Goldmann
  • Product ID: 703763
  • Duration: 90 Min
While there are innumerable ways to detect, prevent and investigate embezzlement, it is not always easy to organize a consistently effective anti-embezzlement strategy. This webinar will guide you through the common and not-so-common forms of embezzlement—with uniquely instructional case studies. It will emphasize the red flags of each and go on to highlight best practices in embezzlement risk mitigation.
* Per Attendee
$199
How to Establish an Effective IT Governance, Risk and Compliance (GRC) Framework - Organization and Responsibilities
16
/ Jan
Wednesday-2019

How to Establish an Effective IT Governance, Risk and Compliance (GRC) Framework - Organization and Responsibilities

  • Speaker: Michael C Redmond
  • Product ID: 704991
  • Duration: 60 Min
This training program will discuss how to develop a great GRC program that ensures proper governance, risk management and compliance management of all IT systems and processes that support the business operations.
* Per Attendee
$199
Implementing P-Card Policies, Procedures, and Internal Controls Best Practices
19
/ Feb
Tuesday-2019

Implementing P-Card Policies, Procedures, and Internal Controls Best Practices

  • Speaker: Chris Doxey
  • Product ID: 703920
  • Duration: 60 Min
This training program will discuss how purchasing cards (P Cards) provide a means for streamlining the procure-to-pay process, allowing organizations to procure goods and services in a timely manner, reduce transaction costs, track expenses, take advantage of supplier discounts, reduce or redirect staff in the purchasing and/or accounts payable departments, reduce or eliminate petty cash, and more. It will also illustrate how a P-Card program can create additional fraud risk and requires robust policies, procedures, and internal controls.
* Per Attendee
$199
EDD what are the auditors looking for?
21
/ Feb
Thursday-2019

EDD what are the auditors looking for?

  • Speaker: Vicki Landon
  • Product ID: 703455
  • Duration: 90 Min
This webinar will explain the concept of Enhanced Due Diligence (EDD), including EDD time tables and checklist. Attendees will learn how to conduct Enhanced Due Diligence (EDD) that will satisfy the auditors.
* Per Attendee
$199
Guidelines for Performing a Corporate Wide Internal Audit Risk Assessment
21
/ Feb
Thursday-2019

Guidelines for Performing a Corporate Wide Internal Audit Risk Assessment

  • Speaker: Marna Steuart
  • Product ID: 703775
  • Duration: 100 Min
Performing a corporate wide risk assessment is doable, and can provide internal audit and its organization a roadmap for the upcoming audit year. In this webinar, participants will learn how to maximize the time spent on the risk assessment process on an annual basis.
* Per Attendee
$199
Recorded/CD
The Board of Directors Role in Cybersecurity

The Board of Directors Role in Cybersecurity

  • Speaker: Rayleen M Pirnie
  • Product ID: 705117
  • Duration: 60 Min
This webinar will break down the Board’s role in effective cybersecurity oversight, the 12 questions a board member should be knowing to answer, key principles of oversight, tips and resources for board.
CD/Recorded
$249
Recorded/CD
How to Think Like a Crook - Money Laundering Prevention

How to Think Like a Crook - Money Laundering Prevention

  • Speaker: Doug Keipper
  • Product ID: 702770
  • Duration: 60 Min
This anti-money laundering training will describe the reasons and methods of money laundering in financial institutions. This will help attendees to protect themselves from regulatory risk by establishing an effective anti-money laundering system within their financial institution.
CD/Recorded
$199
Recorded/CD
Implementing Operations Risk Management within an ERM Framework

Implementing Operations Risk Management within an ERM Framework

  • Speaker: Mario Mosse
  • Product ID: 703728
  • Duration: 90 Min
Sound management of operational risk is an integral part of strong governance, risk and compliance (GRC) and enterprise risk management. In this session, the instructor will define operational risk and explain how to identify, quantify, manage, and control it. He will discuss why all employees must be cognizant of these risks in their day to day jobs and how an organization can better manage and control these risks that have resulted in the failure of several high profile firms and significant losses and unwanted press at others. The course will also review and discuss the building blocks and key players in implementing an effective ORM program that is integrated into the enterprise risk management framework.
CD/Recorded
$249
Recorded/CD
Bank Secrecy Act (BSA), Title 31, Compliance

Bank Secrecy Act (BSA), Title 31, Compliance

  • Speaker: Armen Khachadourian
  • Product ID: 703574
  • Duration: 60 Min
This webinar will review current requirements of the Bank Secrecy Act, why to comply, how to comply, reporting techniques and current positions by the IRS and FinCEN.
CD/Recorded
$249
Recorded/CD
Practical Risk Appetite and Risk Tolerance

Practical Risk Appetite and Risk Tolerance

  • Speaker: Mario Mosse
  • Product ID: 704949
  • Duration: 90 Min
This webinar will discuss how to implement and monitor risk policy. The instructor will explain the challenges and opportunities involved in developing and implementing an effective risk appetite statement, which is supported by risk limits, and the determination of actual exposure against those limits and risk tolerance.
CD/Recorded
$229
Recorded/CD
Writing Effective Audit Observations

Writing Effective Audit Observations

  • Speaker: Jonnie T Keith
  • Product ID: 703740
  • Duration: 90 Min
This webinar will provide the principles for writing an effective audit report. The audit report represents the end result of weeks of reviews, analyses, interviews and discussions. It is used to provide information to management on the areas you reviewed. And, more importantly, the report brings issues to their attention that needs to be addressed. How well you communicate that information is critical to getting the results you are seeking.
CD/Recorded
$249
Recorded/CD
Risk Based Internal Auditing - Establishing the Methodology

Risk Based Internal Auditing - Establishing the Methodology

  • Speaker: Lynn Fountain
  • Product ID: 704819
  • Duration: 90 Min
True RBIA incorporates cascading the process through to each individual audit as well as the audit reporting process. The training program will focus on the establishment of a framework or methodology for RBIA and examine how to utilize risk based questions within the process steps.
CD/Recorded
$249
Recorded/CD
Chief Compliance Officer: What does it take to do the job? The Organization's and CCO's Responsibilities

Chief Compliance Officer: What does it take to do the job? The Organization's and CCO's Responsibilities

  • Speaker: Laura S Hargraves
  • Product ID: 703303
  • Duration: 60 Min
This webinar will explain how to select an effective Chief Compliance Officer (CCO) or Chief Risk Officer (CRO) best suited to the position. It will also review the skills needed to communicate the essence and structure behind a good compliance program.
CD/Recorded
$249
Recorded/CD
Choosing and Using Key Risk Indicators

Choosing and Using Key Risk Indicators

  • Speaker: Mario Mosse
  • Product ID: 704948
  • Duration: 60 Min
This webinar will discuss the significance, nature and types of KRIs. The instructor will discuss how to develop, evaluate and implement KRIs in accordance with organization’s risk culture and create strategies for effective reporting of risk indicators that lead to management action.
CD/Recorded
$249
Recorded/CD
Compliance Department Restructuring with the New Regulatory Demands

Compliance Department Restructuring with the New Regulatory Demands

  • Speaker: Carlo Chalhoub
  • Product ID: 705454
  • Duration: 60 Min
This webinar addresses recent changes in the compliance environment. It will also discuss the process for evaluating compliance department structure and the goals of compliance restructuring.
Recorded/CD
How to Build and Use a Risk Matrix

How to Build and Use a Risk Matrix

  • Speaker: Mario Mosse
  • Product ID: 704970
  • Duration: 60 Min
Risk matrices are used during risk assessment to define the various levels of risk as the product of the probability and impact categories. This webinar training will focus on this simple but powerful mechanism to increase visibility of risks and assist management decision making. Risk matrices are one of the most widespread tools for risk evaluation.
CD/Recorded
$179
Recorded/CD
Effective and Proactive Strategic Risk Management - A Vital Element to Achieve Effective Enterprise-wide Governance, Risk Management and Compliance (GRC) Programs

Effective and Proactive Strategic Risk Management - A Vital Element to Achieve Effective Enterprise-wide Governance, Risk Management and Compliance (GRC) Programs

  • Speaker: Javier Kuong
  • Product ID: 705407
  • Duration: 120 Min
Learn an effective approach to practice risk management process that is proactive, strategic and top-down in nature to anticipate, avoid and mitigate potential losses from threats and risks that are present in the real world regardless of any organization’s wishes.
Recorded/CD
Cybersecurity Policy and Controls Management with Root Cause Analysis (RCA)

Cybersecurity Policy and Controls Management with Root Cause Analysis (RCA)

  • Speaker: William Akel
  • Product ID: 705404
  • Duration: 60 Min
Learn corporate policy definition and assignment with ramifications for both. We'll discuss how to identify and document management review controls, why a fine tuned policy and procedure are critical to business operations and how to obtain the real root cause of cyber security incidents effectively.
Recorded/CD
Auditing the Cyber Security Program to Ensure the Company's Digital Crown Jewels are Safeguarded from Hackers

Auditing the Cyber Security Program to Ensure the Company's Digital Crown Jewels are Safeguarded from Hackers

  • Speaker: Barbara Gai
  • Product ID: 705426
  • Duration: 60 Min
This webinar will provide an overview of the ways to identify and assess security risks within the company. Attendees will learn to develop a robust audit program that will thoroughly assess existing controls in protecting the organizations’ data.
CD/Recorded
$179
Recorded/CD
The Affordable Care Act: Key Compliance Issues for Employers in 2017 and Beyond

The Affordable Care Act: Key Compliance Issues for Employers in 2017 and Beyond

  • Speaker: Janette Levey Frisch
  • Product ID: 703843
  • Duration: 120 Min
This training program will focus on ACA compliance requirements for 2017. It will also cover topics such as anti-discrimination provisions for highly compensated employees, affordable coverage penalty, transitional relief for some employers in 2017, and more.
CD/Recorded
$149
Best Sellers
You Recently Viewed
    Loading