Exclusive Cyber Security Incident Management Program 2017
William Akel
60 Min
Product Id: 705380
Gain a better understanding of cyber security incident management that is proactive versus reactive, learn methods to minimize business disruption and damages, and the impact and urgency on customers and the business for risk and costs.
Implementing a Risk Management Program - Handbook, Risk Appetite and Risk Culture
Fred Vacelet
60 Min
Product Id: 705115
This training program will review a few ways to ensure that a financial institution reviews things from the start and consistently, in setting up a risk management framework that allows the bank to focus on its strategy rather than mere compliance.
Impact and Control of RFIs on Construction Projects
Jim Zack
90 Min
Product Id: 704288
This webinar discusses the genesis of RFIs and their development and the use and abuse of RFIs on construction projects including ways to mitigate the potential adverse impact of RFIs. Speaker discusses a number of contractual mechanisms to control the RFI process and mitigate potential impact damage claims based on the number of RFIs. The webinar also sets forth best management practices concerning the RFI process.
The IRS is Coming: How to Prepare for the New IRS Partnership Audit Rules
Travis A Greaves,T Joshua Wu
60 Min
Product Id: 705112
The new IRS partnership audit rules require all partnership and LLCs taxed as partnerships to amend their partnership agreement and take action now. In this training program, attendees will learn how these rules impact your business and your clients. The session will discuss IRS issues with TEFRA (Tax Equity and Fiscal Responsibility Act) and detail the concepts and terms in the Bipartisan Budget Act.
AML Compliance and FinCEN Updates and its Implications
Armen Khachadourian
90 Min
Product Id: 705185
The webinar will provide an overview of the currency and monetary reporting requirements imposed by the Bank Secrecy Act. It will also discuss red flags that pose present and future challenges for regulated businesses. Recognizing and investigating suspicious activities is the key in safeguarding an organization's financial system from illicit use and combating money laundering. Timely and accurate reporting will promote national security through the collection, analysis, and dissemination of financial intelligence to the proper authorities.
Introduction to EU REACH for US Manufacturers
Jim Kandler
60 Min
Product Id: 705190
EU REACH can be confusing and many in the US seek a more solid understanding of it. In this introductory webinar, participants will be introduced to the important terms and concepts of the directive. They will obtain a basic knowledge of what RoHS is about and if they need to learn more.
Affordable Care Act (ACA); Discrimination; Interpreter and More: Complying with Section 1557: OCR and CMS Hospital CoPs
Sue Dill Calloway
120 Min
Product Id: 705151
Section 1557 of the Affordable Care Act (ACA) forbids discrimination based on sex, race, color, national origin, age and disability. It builds on longstanding and familiar federal civil rights laws but is the first law to prohibit discrimination on the basis of sex (which includes gender, gender identity and sex stereotyping) in covered health programs and activities. Sex discrimination also includes discriminatory treatment on the basis of pregnancy, false pregnancy, termination of pregnancy, recovering from pregnancy, childbirth and related medical conditions, sex stereotyping, and gender identity.
PMP - Requirement Validation and Gathering for Fortune 500 Companies
Kevin Chenoweth
90 Min
Product Id: 705129
This training program will deconstruct how to define requirements management and change process. It will also offer a clear understanding of the role of requirements in the project life cycle, the role of requirements in the business case, and the role of stakeholders in requirements definition.
Setting Up A Stress-Testing Program
Fred Vacelet
60 Min
Product Id: 705155
For a multitude of reasons, stress-testing programs have seldom satisfied regulators, even after the 2007 crisis. After most significant mishap in every bank, management often discovers that the managerial stress-testing have revealed to be insufficient, over-driven by optimism. In this training program, the instructor will deconstruct regulatory constraints after Basel II and III, lessons learnt after 2007, and stress-testing as a strategic exercise.
Using Lean to Streamline your Operations, Continuity Planning and Recovery
Michael C Redmond
60 Min
Product Id: 704826
This webinar training will discuss the lean principles and how to effectively implement them in your system to identify and reduce waste. The instructor will discuss how to apply lean to align business system and process with organisational goals so as to deliver rapid and measurable results.
Corporate Governance and the Board of Directors' Role
Adam Kerns
60 Min
Product Id: 705067
This webinar will offer a comprehensive, in-depth review of the state laws affecting the corporate governance standards applicable to insurance companies and the board of directors’ role in those standards.
Business Email Compromise and Ransomware - Red Flags and Mitigation
Rayleen M Pirnie
60 Min
Product Id: 705038
The Internet Crime Complaint Center (IC3) reports that U.S. victims alone lost $18 million in 15 months to just a single form of ransomware. This training program will review the risks associated with various types of cyber fraud, and in particular, business email compromise (BEC) and ransomware. The session will also discuss documenting sound business practices to minimize exposure and loss and list what to present to your board of directors before an incident.
Ethical Dilemmas in Food Policy
Darin Detwiler
90 Min
Product Id: 705034
This webinar sheds light on the changes in the political, economic and judicial landscape of the food industry. Landmark food industry events over the last two decades highlight the evolution of the challenges and consequences related to ethical dilemmas in the food industry. This webinar covers the elements of food systems, economics of failure, true burden of disease, case studies from industry and regulatory agencies.
Project Management Essentials: The 8 Keys to Successfully Completing Every Project On-Time and On Budget
Christopher R DeVany
90 Min
Product Id: 705013
This training program will help attendees grasp the essentials of project management and plan effectively for identifying project needs. It will also discuss practices for keeping content, process, and structure on track to produce positive outcomes.
How to Develop an Effective Risk Register
Mario Mosse
90 Min
Product Id: 704969
A risk register, also known as a risk log, serves as a central repository for the organization's risk information. This training program will discuss its key function, i.e., to provide management, the board, and key stakeholders with significant information on the main risks faced by the organization. The program will also delve into designing and using your own ‘fit-for-purpose’ risk register.
Planning and Managing Organizational Change: 10 Tips and Techniques
Christopher R DeVany
90 Min
Product Id: 704980
This training program will analyze the gaps that need to be addressed while implementing organizational changes. It will help attendees assess major issues involved in organizational readiness, help overcome intellectual challenges, help create effective communication plans, ensure all systems support, and finally, assess change management.
FCPA and Anti-Bribery Cases and Trends in the US, China and Russia
Grant Smith
60 Min
Product Id: 704332
This training program will highlight the practices prohibited by the FCPA. It will help determine if your current travel and entertainment policy is in compliance and discuss what accounting and anti-bribery violations are covered.
How to Apply ISO 27001 Principles to Enterprise Risk Management in 2017
Michael C Redmond
60 Min
Product Id: 704828
This webinar training will help you implement ISO standards in your Enterprise risk management (ERM) system and understand the benefits. This session will enable on how to integrate ISO 27001 in your organization as the main structure for information security management.
Mitigating and Conducting Very Effective Risk Assessments and Business Impact Analysis
Michael C Redmond
60 Min
Product Id: 704823
This webinar training will explain project management principles to prepare your business to overcome risk and outage. The instructor will discuss how to conduct risk assessment and business impact analysis. He will also discuss how to test and document risk elements and the process or steps to be taken to combat it.
Achieving Enterprise Information Security Goals - Creating Right Teams
Rich Devlin,Joe Grannemon
60 Min
Product Id: 704863
This webinar will involve a high-level discussion on how you can create effective teams for achieving your Information Security goals and addressing complex threats such as Ransomware. Learn how to create a Information Security plan and align your goals with objectives, strategies and tactics across teams.







