Transaction Monitoring and Cybersecurity - DFS, SOC, Cybersecurity Framework and Many More
William Akel
60 Min
Product Id: 705365
Attend this webinar to understand the best ways to maintain annual compliance with DFS cybersecurity requirements through a strategic transformation of IT security monitoring to proactive cyber risk management; and to learn how a human-centric security orchestration model with people, process and technology will save and make you money.
Cybersecurity Policy and Controls Management with Root Cause Analysis (RCA)
William Akel
60 Min
Product Id: 705404
Learn corporate policy definition and assignment with ramifications for both. We'll discuss how to identify and document management review controls, why a fine tuned policy and procedure are critical to business operations and how to obtain the real root cause of cyber security incidents effectively.
Exclusive Cyber Security Incident Management Program 2017
William Akel
60 Min
Product Id: 705380
Gain a better understanding of cyber security incident management that is proactive versus reactive, learn methods to minimize business disruption and damages, and the impact and urgency on customers and the business for risk and costs.
Impact and Control of RFIs on Construction Projects
Jim Zack
90 Min
Product Id: 704288
This webinar discusses the genesis of RFIs and their development and the use and abuse of RFIs on construction projects including ways to mitigate the potential adverse impact of RFIs. Speaker discusses a number of contractual mechanisms to control the RFI process and mitigate potential impact damage claims based on the number of RFIs. The webinar also sets forth best management practices concerning the RFI process.
The IRS is Coming: How to Prepare for the New IRS Partnership Audit Rules
Travis A Greaves,T Joshua Wu
60 Min
Product Id: 705112
The new IRS partnership audit rules require all partnership and LLCs taxed as partnerships to amend their partnership agreement and take action now. In this training program, attendees will learn how these rules impact your business and your clients. The session will discuss IRS issues with TEFRA (Tax Equity and Fiscal Responsibility Act) and detail the concepts and terms in the Bipartisan Budget Act.
Affordable Care Act (ACA); Discrimination; Interpreter and More: Complying with Section 1557: OCR and CMS Hospital CoPs
Sue Dill Calloway
120 Min
Product Id: 705151
Section 1557 of the Affordable Care Act (ACA) forbids discrimination based on sex, race, color, national origin, age and disability. It builds on longstanding and familiar federal civil rights laws but is the first law to prohibit discrimination on the basis of sex (which includes gender, gender identity and sex stereotyping) in covered health programs and activities. Sex discrimination also includes discriminatory treatment on the basis of pregnancy, false pregnancy, termination of pregnancy, recovering from pregnancy, childbirth and related medical conditions, sex stereotyping, and gender identity.
Corporate Governance and the Board of Directors' Role
Adam Kerns
60 Min
Product Id: 705067
This webinar will offer a comprehensive, in-depth review of the state laws affecting the corporate governance standards applicable to insurance companies and the board of directors’ role in those standards.
AML Risks in Correspondent Banking: What You Need to Know for 2017
Joe Soniat
60 Min
Product Id: 704997
Correspondent banking has become a hot topic with BSA AML over the past few years. With examination scrutiny on correspondent banking high, this training program will highlight why it is essential to know the risk and what to do when it comes to banking other banks.
Procurement and Contract Fraud - Detection and Prevention
John E Grimes
90 Min
Product Id: 704334
This training program will examine the fraud vulnerabilities in the procurement of materials and services in the private sector. In addition, it will explore the many procurement and contract fraud schemes and at what point in the procurement and contract process they occur.
Ethical Dilemmas in Food Policy
Darin Detwiler
90 Min
Product Id: 705034
This webinar sheds light on the changes in the political, economic and judicial landscape of the food industry. Landmark food industry events over the last two decades highlight the evolution of the challenges and consequences related to ethical dilemmas in the food industry. This webinar covers the elements of food systems, economics of failure, true burden of disease, case studies from industry and regulatory agencies.
The Department of Labor's Fiduciary the New Final Rule - Best Practices for Conducting a Due Diligence and Reviewing the Best Interest Contract Exemption
Lisa Marsden
60 Min
Product Id: 705021
This 60-minute training session will provide a detailed overview of the Department of Labor’s Final Fiduciary Rule including the history and on-going resistance to the rule. The session will delve into details on how the rule was established and who it will be applied to. The webinar instructor will discuss the summary of the details of the new final rule and what firms must do to comply.
What is Required for RoHS2 per EN 50581, 2012?
Jim Kandler
60 Min
Product Id: 704988
This training program will discuss the manufacturer’s obligations mentioned in the EN 50581, 2012 guidance document. The topics in the guidance document will be explored from the perspective of a US manufacturer.
Preparing a Financial Industry Compliance Manual and Code of Ethics
Lisa Marsden
60 Min
Product Id: 704962
This training program will detail developing a compliance manual and a code of ethics for the financial industry, with the intent of clarifying the requirements of the Advisers Act. The instructor will also guide attendees on testing the manual, effectively managing it, and keeping it constantly updated.
Protecting Your Business from ACH Fraud | Developing the Internal Controls
Rayleen M Pirnie
90 Min
Product Id: 704921
This webinar training will help you identify common ACH frauds. The instructor will discuss the sound business practices and easy to implement internal controls proven to reduce losses and how to review common financial institution offered solutions to further minimize exposure.
FCPA and Anti-Bribery Cases and Trends in the US, China and Russia
Grant Smith
60 Min
Product Id: 704332
This training program will highlight the practices prohibited by the FCPA. It will help determine if your current travel and entertainment policy is in compliance and discuss what accounting and anti-bribery violations are covered.
Red Flags of Internal Fraud, Asset Misappropriation, and Corruption
H. David Kotz
75 Min
Product Id: 704865
This webinar highlights how one can identify red flags of frauds, asset misappropriation and corruption. Presented by the former Inspector General of the SEC, the webinar provides specific and concrete tips to identify potential red flags before there is significant exposure.
Develop and Upgrade Sound Business Continuity Plans | New and Potential Threats
Javier Kuong
120 Min
Product Id: 704908
This webinar will offer guidelines on how organizations should take a short-, medium-, and long-term vision of their enterprise-wide contingency and business continuity plan preparation. It will also offer best practices to upgrade your Business Continuality Plan (BCP) to cope with a whole variety of new current and forecast threats, with uncertain times of occurrence, in a dynamic business and global threat panorama.
Complying with the Rules and Regulations Pertaining to Letters of Credit: OFAC, Anti-Boycott, and the USA PATRIOT Act
Buddy Baker
90 Min
Product Id: 702639
This international trade compliance training will provide an overview and introduction to rules and regulations governing international trade and take an in-depth look at US sanctions enforced by the Office of Foreign Assets Control (OFAC), Anti-Boycott regulations maintained by the US Department of Commerce, and section 326 of the USA PATRIOT Act (“Know Your Customer”).
Achieving Enterprise Information Security Goals - Creating Right Teams
Rich Devlin,Joe Grannemon
60 Min
Product Id: 704863
This webinar will involve a high-level discussion on how you can create effective teams for achieving your Information Security goals and addressing complex threats such as Ransomware. Learn how to create a Information Security plan and align your goals with objectives, strategies and tactics across teams.
Designing Effective Controls, Security Safeguards and Governance by a Risk-Based Methodology
Javier Kuong
120 Min
Product Id: 704656
This training program will provide a practical and structured methodology for the design of governance, controls and security provisions. The methodology can be applied to participants’ real work environment immediately. Participants will also benefit from comparing their present governance and controls design practices with the structured, risk-based methodology presented in the webinar.







