BSA Training - Tips & Tools
Doug Keipper
60 Min
Product Id: 702832
This Bank Secrecy Act (BSA) program training will guide attendees through the methods to train each segment of the bank’s or credit union’s employees annually on Bank Secrecy Act. It can be used as a “Train the Trainer” course or as annual training for all employees.
Payments Fraud: Detect and Prevent Check, ACH and P-Card Schemes
Peter Goldmann
90 Min
Product Id: 704774
This training program will examine vendor/billing schemes that exploit payments process control weaknesses; latest electronic payments schemes (ACH hijacking, spear-phishing, social engineering); check counterfeiting, forgery and tampering schemes to be aware of; and, detecting common external payments schemes versus internal attacks.
Best Practices for Working with Vendors and Suppliers
Kenneth Jones
90 Min
Product Id: 706380
Everyone in procurement needs to take time out to review how they are doing in getting the best service out of their vendors. Are they unknowingly putting their employer at increased risk by the way they transact business with vendors? Learn how to develop healthy business relationships with your vendors to get the best results for your company or agency. Discover tools you can use to maintain vendor quality standards.
How To Establish an Effective Chief Compliance Officer's (CCO) or Chief Risk Officer's (CRO) Function - Organization and Responsibilities
Javier Kuong
120 Min
Product Id: 700095
This training will provide valuable knowledge on what companies need to do to establish an "effective" Compliance Office that leads to conceiving, developing and implementing successful GRC programs and provides top level coordinating leadership for governance, risk management and compliance issues across the enterprise.
Measuring and Driving Success in AP and Procurement Operations with KPIs
Brian G Rosenberg
60 Min
Product Id: 704767
Key Performance Indicators and Metrics provide your AP or Procurement operation with vital information that you can use to measure success and drive process improvement. In this webinar we will discuss how to create a culture of continuous improvement within your operation using metrics.
Identifying Information Security Risks in the Supply Chain
Robert Davis
60 Min
Product Id: 706578
Information systems play a significant and static role in change adaptation and innovation. Procedures are operationally tailored, with processes linking to systems, and systems interfacing with various programs receiving objectives from the firm’s oversight committee through established reporting lines. Therefore, this presentation addresses information systems security issues regarding supply chain integration, coordination, and collaboration.
Implementing Operations Risk Management within an ERM Framework
Mario Mosse
90 Min
Product Id: 703728
Sound management of operational risk is an integral part of strong governance, risk and compliance (GRC) and enterprise risk management. In this session, the instructor will define operational risk and explain how to identify, quantify, manage, and control it. He will discuss why all employees must be cognizant of these risks in their day to day jobs and how an organization can better manage and control these risks that have resulted in the failure of several high profile firms and significant losses and unwanted press at others. The course will also review and discuss the building blocks and key players in implementing an effective ORM program that is integrated into the enterprise risk management framework.
Measuring Risk from Financial Statements
Fred Vacelet
60 Min
Product Id: 706568
For external analysts, financial statements are a key source of information for getting an understanding of how risk a financial institution can be. Yet, still too many people are tempted to think that financial statements are designed to provide a true and fair view on risks. Do we know how much of the risks are genuinely communicated via financial statements?
Developing and Implementing an Effective Regulatory Tracking Process
Mario Mosse
90 Min
Product Id: 705993
This webinar will prepare participants to build a legislative and regulatory tracking process that monitors regulatory change, measures impact on business operations, and ensures the implementation of appropriate policy, training, and control updates.
Why Management System Audit Programs Should Utilize ISO 19011
Robert Davis
60 Min
Product Id: 706574
An audit function should be thought of and managed as an independent business, including stakeholder analysis and feedback, setting objectives, developing necessary processes for managing resources and risks, measuring and improving performance, and even marketing to potential customers. This webinar covers topics specifically related to the audit system. How professional judgment and intent need consideration, auditing risks, and how entity life-cycles can affect audits are vital areas addressed during the webinar.
Streamlining your QMS and Audit System for Remote Audits
Betty Lane
60 Min
Product Id: 703448
This webinar will cover creating of a value-added internal auditing program that is compliant to FDA cGMP/ Quality System Regulation and ISO 13485. It will include how to set up and manage the auditing system as well as how to conduct an internal audit and document the results and any nonconformities. It will discuss the value of a good internal auditing program.
Pricing Contractor Jobsite Overhead Delay Costs
Jim Zack
90 Min
Product Id: 704367
After attending this training program, attendees will have a better understanding of the issues concerning the pricing of contractor delay damages. Contractors will gain knowledge about the various methods of calculating extended field office overhead costs. Owners will learn some contractual methods for predetermining this element of delay costs in order to prevent the need for end of the job audits or disputes over such costs.
Integrating Cyber Risks in the ERM Plan
Mario Mosse
90 Min
Product Id: 706035
You need to protect your information technology assets and information against unauthorized internal or external access and cyber-attacks. Data destruction, alteration, unavailability or breach of confidentiality are the consequences of such attacks. A primary step toward inventorying, assessing, and addressing cyber risks that threaten your organization is to develop and maintain a cyber risk management program as part of your enterprise risk management framework. This presentation will help in developing your organization's risk profile and decide the action plans to mitigate those risks.
Introduction to Root Cause Investigation for CAPA
Vanessa Lopez
60 Min
Product Id: 704409
This CAPA training program will provide an understanding of FDA and ISO requirements, steps in CAPA process and the challenges associated to root cause analysis. Attendees will learn the tools and quality data sources to use during root cause analysis investigation.
How to Conduct High Quality Risk Assessments
Mario Mosse
90 Min
Product Id: 704994
This training program will help articulate your business objectives and define the scope of your risk assessment. It will guide attendees in identifying the most appropriate risk assessment technique and plan and facilitate a risk assessment. Further, the session will help tailor a risk matrix to enable you to rate your risks.
Aligning Individuals Who Have Competing Priorities
Madonna Swanson
60 Min
Product Id: 706405
This webinar will provide practical learning for implementing design thinking principles into your meeting management techniques. Learn how to facilitate interactive meetings which motivate teams to quick alignment. Understand how to “group” synthesized data for buy in from all parties.
SR Letter 11-7 - Supervisory Guidance on Model Risk Management
Mario Mosse
90 Min
Product Id: 703995
This training program will detail why SR Letter 11-7 has become the gold standard for model risk management, with its principle being adopted not only by banks but also virtually all U.S. financial institutions.
Risk and Forecasting Systems, Beyond Gaussian Wisdom
Fred Vacelet
90 Min
Product Id: 706534
For as long as can be remembered, financial markets have thrived under the following paradigm: if we do not know future prices, then they must be stochastically determined, therefore Gaussian mathematics is the tool to use. In this webinar, we address the questions: where does this reflex come from? How sure can we be? Are there no other ways?
Auditing Information Security Using ISO 27001
Michael C Redmond
60 Min
Product Id: 705910
This ISO 27001 webinar will help you to audit your program in relation to establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system and we will also discuss which standards to reference to effectively ensure your organization has a robust security program for your organization's vital information assets.
Cyber-Security Risk Management to The Test of Systemic Approaches
Fred Vacelet
90 Min
Product Id: 706524
Lots of energy are being spent on ensuring that IT systems in financial institutions are 'safe' or can be declared as such to the public. However, we have to observe a gap between what needs to be told and the cyber-risks that are actually incurred by financial institutions. In this webinar, we keep away from the technical considerations which, as useful as these may be, inevitable end up in the dead-end when confidentiality has to be alleged. Instead, we challenge where the approach may err: when cyber-security teams have to keep their specialist knowledge to themselves instead of enrolling the other functions of the bank into a cyber-security systemic approach which can cover cyber-risks whatever their sources and natures: from organized crime to internal negligence, and including reputational risks.