Choosing and Using Key Risk Indicators
Mario Mosse
60 Min
Product Id: 704948
This webinar will discuss the significance, nature and types of KRIs. The instructor will discuss how to develop, evaluate and implement KRIs in accordance with organization’s risk culture and create strategies for effective reporting of risk indicators that lead to management action.
Third Party Vendor Risk Assessment for Financial Firms - Rules, Regulations and Best Practices
Lisa Marsden
60 Min
Product Id: 704474
This training program will examine who are third party vendors and analyze why it is critical to prepare a risk assessment for third parties. The course will also offer an overview of the potential risks a third party vendor may impose on your firm.
Transaction Monitoring and Cybersecurity - DFS, SOC, Cybersecurity Framework and Many More
William Akel
60 Min
Product Id: 705365
Attend this webinar to understand the best ways to maintain annual compliance with DFS cybersecurity requirements through a strategic transformation of IT security monitoring to proactive cyber risk management; and to learn how a human-centric security orchestration model with people, process and technology will save and make you money.
How to Build and Use a Risk Matrix
Mario Mosse
60 Min
Product Id: 704970
Risk matrices are used during risk assessment to define the various levels of risk as the product of the probability and impact categories. This webinar training will focus on this simple but powerful mechanism to increase visibility of risks and assist management decision making. Risk matrices are one of the most widespread tools for risk evaluation.
Implementing the new standard for product recall: AS/ISO 10393
Steve Hather
60 Min
Product Id: 705478
This webinar will help you how to improve the effectiveness of recalls and enhance consumer safety, as well as protecting the company’s reputation.
Conflicts of Interest in Financial Services; Identify, Eliminate, Mitigate and Disclose
Lisa Marsden
60 Min
Product Id: 705466
Learn how best to identify, mitigate and make accurate disclosures of conflicts of interest.
Vendor Due Diligence: The Cybersecurity Perspective
Rayleen M Pirnie
90 Min
Product Id: 704700
In most industries, you can contract away a responsibility or task, but not the liability of an attack or compliance expectations. This training program will examine key questions in case of a security breach. Whom will your customers hold liable? Who is going to get fined and possibly sued? At the end of the day, your organization will suffer the negative publicity, the reputation damage, and financial loss of the attack. This program will address vendor due diligence and security to better understand the risks your organization could face while outsourcing your business needs.
Managing Communication in a Crisis and Protecting Your Brand
Michael Barrio
60 Min
Product Id: 705448
This webinar will focus on the effective crisis communication strategies. Attendees will learn best practices to protect their organization’s brand in the time of crisis.
Effective and Proactive Strategic Risk Management - A Vital Element to Achieve Effective Enterprise-wide Governance, Risk Management and Compliance (GRC) Programs
Javier Kuong
120 Min
Product Id: 705407
Learn an effective approach to practice risk management process that is proactive, strategic and top-down in nature to anticipate, avoid and mitigate potential losses from threats and risks that are present in the real world regardless of any organization’s wishes.
New Customer Due Diligence Beneficial Owner Rule
Joe Soniat
60 Min
Product Id: 705221
FinCEN is issuing final rules under the Bank Secrecy Act to clarify and strengthen customer due diligence requirements for: banks; brokers or dealers in securities; mutual funds; and futures commission merchants and introducing brokers in commodities. The rules contain explicit customer due diligence requirements and include a new requirement to identify and verify the identity of beneficial owners of legal entity customers, subject to certain exclusions and exemptions. This training program will walk attendees through the new rules and how to implement them.
Cybersecurity Policy and Controls Management with Root Cause Analysis (RCA)
William Akel
60 Min
Product Id: 705404
Learn corporate policy definition and assignment with ramifications for both. We'll discuss how to identify and document management review controls, why a fine tuned policy and procedure are critical to business operations and how to obtain the real root cause of cyber security incidents effectively.
10 Common Misconceptions About Payroll and How to Avoid Them
Vicki M. Lambert
90 Min
Product Id: 704924
This webinar discusses 10 areas of wage and hour and tax law that when misunderstood or applied incorrectly causes employees to be paid or taxed incorrectly with the resulting penalties, fines and interest levied on the employer. Some of these wage and hour law misconceptions can even cause the employer to overpay employees forcing unnecessarily higher labor costs.
Conducting Investigative Interviews: Breaching Barriers with Hostile, Uncooperative, and Reluctant Interviewees
John E Grimes
90 Min
Product Id: 704835
Interviewing is a craft that involves applying proven and practiced steps along with skilled communication. This training program will discuss the art of human interaction to help achieve successful interview results. It will help participants in gaining the trust of the interviewee and in encouraging truthful responses.
Whistle While You Work: Protecting Your Organization from Whistleblower Threats
Christine Zack
60 Min
Product Id: 705413
This webinar will provide an overview of SEC Whistleblower Rules such as False Claims Act, Dodd-Frank, Sarbanes-Oxley and Commodity Exchange Act. It will also discuss best practices on how to mitigate damages from an actual or purported whistleblower.
UCC4A Applications to ACH Payments, ACH Fraud Risk Management, and Contracts
Rayleen M Pirnie
90 Min
Product Id: 705386
This webinar will untangle the complexities of UCC4A and how it applies to ACH payments. It will discuss legal and compliance risks presented by UCC4A and provisions impacting potential liability.
Tax Refund Fraud: The Fraud that Keeps Getting Worse
Rayleen M Pirnie
90 Min
Product Id: 705134
This training program will help identity frauds that lead to tax refund fraud and discuss funds availability exceptions. It will also discuss common non-post issues, the IRS Opt-In Program and eLeads, refund handling procedures, remedial actions, and suspicious activity reports.
Annual Current Good Clinical Practices (cGCP) Training
Shana Dressel
60 Min
Product Id: 705408
This webinar will cover background information and history of clinical research and drug development, followed by review of the federal regulations, International Council for Harmonisation (ICH), and Good Clinical Practices (GCP) that apply to clinical research.
Exclusive Cyber Security Incident Management Program 2017
William Akel
60 Min
Product Id: 705380
Gain a better understanding of cyber security incident management that is proactive versus reactive, learn methods to minimize business disruption and damages, and the impact and urgency on customers and the business for risk and costs.
Evidence Gathering in a Fraud Investigation
Eli J Richardson
60 Min
Product Id: 703498
This webinar will explain tools and tips for conducting internal investigations. Attendees will learn how to conduct effective witness interviews, how to draft comprehensive investigative reports and how to report evidence of fraud to law-enforcement authorities.
Regulation B - Equal Credit Opportunity Act (ECOA)
Kara Lamphere
60 Min
Product Id: 704268
This training program will help attendees understand how policies created to help keep costs low and net earnings up could create a disparate impact situation in your organization. Attendees will also learn the nuances with notification requirements especially related to incomplete applications.







