Designing Effective Controls, Security Safeguards and Governance by a Risk-Based Methodology
Javier Kuong
120 Min
Product Id: 704656
This training program will provide a practical and structured methodology for the design of governance, controls and security provisions. The methodology can be applied to participants’ real work environment immediately. Participants will also benefit from comparing their present governance and controls design practices with the structured, risk-based methodology presented in the webinar.
Building a Comprehensive Fraud Investigative Report
H. David Kotz
75 Min
Product Id: 704035
This training program will discuss how to ensure the credibility of a fraud investigative report. It will train attendees on conducting effective witness interviews, discuss fraud investigative techniques utilized in different situations, and offer tips to locate relevant documents in a fraud investigation.
A Risk-Based Methodology to Develop and Prepare an Effective Service Level Agreement (SLA) Package to Improve Service and Security Quality
Javier Kuong
90 Min
Product Id: 703999
This training program will illustrate a structured methodology to develop effective service level agreements based on a top-down, risk-based approach, summarized in a matrix that documents the whole development process for specific SLAs that respond to business objectives.
Marketing for Most of Us Today
Barney Kramer
90 Min
Product Id: 704287
This training program will focus on current marketing avenues such as outbound and inbound marketing, social media and its reach with consumers, content marketing and more. It will focus on the basics of marketing principles and guide attendees in developing target markets and segments for subsets of your strategic plan.
3-Hour Virtual Training: Guidelines for Performing a Corporate Wide Internal Audit Risk Assessment
Marna Steuart
180 Min
Product Id: 704386
This training program will detail key components of a risk assessment and management program, and include a fraud risk assessment discussion. Other training points in the program include analyzing the methodology for successful risk assessment process, understanding the steps involved in the risk assessment process, and fraud risk assessment.
10 CAM Mistakes and How to Avoid Them
Robert Machson
60 Min
Product Id: 704308
This training program will list common CAM mistakes and practical solutions that will save you money. If you are the owner or operator of leased property, a tenant, franchisee, attorney, paralegal, lease administrator or auditor, you want to make sure that you are not paying more than you ought to.
Vendor Management - Building a Strong Questionnaire
Michael D King
60 Min
Product Id: 704119
This training program will highlight why a vendor questionnaire is the keystone your vendor management program is built on. The course will help ensure attendees get the whole picture and determine appropriate controls for information security and privacy.
Managing Corporate Risks with ISO 31000
Kelly Eisenhardt
60 Min
Product Id: 705083
ISO 31000 is a standard developed by the International Organization for Standardization (ISO) which provides a basic guideline and principles for the application of risk management. Companies that use risk management processes vary across industries in scope and magnitude and address a wide variety of challenges. This training program will offer an in depth look into the key components of the ISO 31000 guideline and best practices to implement and support a corporate risk management strategy or program.
Introduction to disaster/emergency management and business continuity programs
Bill Greulich
60 Min
Product Id: 701337
This Risk management training module will describe a common set of criteria for disaster/emergency management and business continuity programs.
How to Establish an Effective IT Governance, Risk and Compliance (GRC) Framework - Organization and Responsibilities
Michael C Redmond
Product Id: 704991
This training program will discuss how to develop a great GRC program that ensures proper governance, risk management and compliance management of all IT systems and processes that support the business operations.
Auditing Business Continuity Plans According to ISO 22301
Michael C Redmond
Product Id: 704410
This training will cover the best practices for implementing and auditing a Business Continuity Plan. The speaker will discuss the lifecycle of a BCP program with specific emphasis on Risk Assessment and Business Impact Analysis, Designing a living BCP & Testing & Maintenance. The program will also detail the various standards from FFIEC to ISO. Participants will understand what’s involved in a full BCP program and have insights based upon field experience that can be applied to Internal Audit work and BCP. The session will provide you with tools that you can bring back to your company to improve upon BCP programs & ability to audit them to provide targeted recommendations.
Developing a Highly Effective Enterprise Risk Management Program
Michael C Redmond
Product Id: 704827
This webinar highlights the importance of an effective ERM program in project management and risk assessment. Attendees will learn how to implement a viable ERM program including documenting and testing it.







