Develop and Upgrade Sound Business Continuity Plans | New and Potential Threats
Javier Kuong
120 Min
Product Id: 704908
This webinar will offer guidelines on how organizations should take a short-, medium-, and long-term vision of their enterprise-wide contingency and business continuity plan preparation. It will also offer best practices to upgrade your Business Continuality Plan (BCP) to cope with a whole variety of new current and forecast threats, with uncertain times of occurrence, in a dynamic business and global threat panorama.
Mitigating and Conducting Very Effective Risk Assessments and Business Impact Analysis
Michael C Redmond
60 Min
Product Id: 704823
This webinar training will explain project management principles to prepare your business to overcome risk and outage. The instructor will discuss how to conduct risk assessment and business impact analysis. He will also discuss how to test and document risk elements and the process or steps to be taken to combat it.
Designing Effective Controls, Security Safeguards and Governance by a Risk-Based Methodology
Javier Kuong
120 Min
Product Id: 704656
This training program will provide a practical and structured methodology for the design of governance, controls and security provisions. The methodology can be applied to participants’ real work environment immediately. Participants will also benefit from comparing their present governance and controls design practices with the structured, risk-based methodology presented in the webinar.
BCBS 239 - Principles of Effective Risk Data Aggregation and Risk Reporting
Mario Mosse
90 Min
Product Id: 703943
Risk management is a key component of every banking governance framework. This webinar discuss the BCSB 239 standard. The instructor will discuss the critical risk-data aggregation capabilities and internal risk-reporting practices (the Principles) to enhance risk management and decision-making processes at banks.
How to Establish & Review Your Risk Metrics Effectively
Robert Geary
90 Min
Product Id: 704709
This webinar training provides an in depth understanding and applicability of the risk metrics. The instructor helps in establishing the purpose they serve and reviewing the methodology for creating a set of risk metrics. He will also discuss the sampling of forms of risk metrics to be employed and review the risk metric management process.
Life Science or Non-Life Science - Oh My! FMLA, ADA and Workers' Comp Overlap Guidance for all Employers
Janette Levey Frisch
120 Min
Product Id: 704344
This training program will analyze these three seemingly different bodies of law that often overlap leading to ambiguity and confusion. What are the eligibility/coverage criteria under the FMLA and the ADA/ADAAA and workers comp? When might an extended leave be a reasonable accommodation? When might it be an undue hardship? Undue hardship can mean different things to different employers. If you are in healthcare, pharma, banking and finance, to name a few examples, accommodations of leave requests that may be feasible for many other employers, might, for you, be an undue hardship. If it’s not deemed an undue hardship are there steps you can take to mitigate the burden? What are the notice requirements? In this webinar, participants will get answers to these and many other questions.
Pricing for Risk in Merchant Payments - Risk Metrics, Reserve Requirements, Pricing Models, Best Interchange Rates, EMV/NFC Guidelines
Armen Khachadourian
90 Min
Product Id: 704546
This training program will provide insight into fundamental underwriting and risk management guidelines, determining variables that constitute merchant risk, and on how to assign a dollar value and quantify exposure.
Protecting Your Intellectual Property Abroad
Douglas Cohen
60 Min
Product Id: 702972
IP piracy costs more than a loss in sales. If your brand loses value because it is seen as less exclusive or is confused with poor imitations this poses a long term threat to profitability. Re-establishing brand identity and company reputation is expensive if not impossible. This webinar will provide specific, practical steps to take to lessen this risk of loss.
Writing Effective Email
Phil Vassallo
90 Min
Product Id: 704380
This training program will discuss best practices for managing your email system effectively and efficiently. It will guide attendees in composing purposeful, reader-focused emails and in employing strategies for creating a courteous tone.
Home Mortgage Disclosure Act (HMDA) Reports - Meeting Regulators: Expectations - Tools and technique to reduce errors
Jim George
60 Min
Product Id: 703743
Fraudsters are always looking for new opportunities and new weaknesses. The availability of customer data on the black-market gives them just the tools they need. A bank has responsibilities to its shareholders and customers to protect them from these ever-changing threats. This webinar will furnish attendees with a complete understanding of the changes in the fraud arena and the strategies needed to combat fraud.
Organizing an Effective Chief Risk Officer's Function to Improve GRC
Javier Kuong
120 Min
Product Id: 701736
This risk management webinar will discuss how to set up a sound and Chief Risk Officer’s (CRO) function that will help organizations to achieve sound risk management, governance and compliance to laws.
WTO Valuation Code - FSFE, DDP, DDU and More
Chris Pey
60 Min
Product Id: 704375
This WTO Valuation Code training program will discuss how to properly value products, WTO valuation methodologies, and foreign-based importing and DDP pricing. Best practices for designing compliance procedures which will ensure continued valuation success will be detailed.
ACH Fraud - Detection and Prevention
Rayleen M Pirnie
90 Min
Product Id: 704369
This training program will discuss common forms of ACH fraud, including: social engineering, account takeover (consumer, corporate, and institution internal accounts), money mules and advance fee frauds, and embezzlement. Under each of these sections, the course will also discuss: ACH fraud detection, fraud mitigation, ACH Returns, sound business practices to thwart attempts, and education.
E-Compliance: Online Privacy, Harassment and Identity Theft in the Digital Age
Joseph Rosner
60 Min
Product Id: 704524
This webinar will discuss the bane of new technology and social media in regards to employers’ and employees’ privacy. The instructor will discuss e-compliances that employers need to adhere to avoid privacy suits. He will also cover the risks of information breach and defamation claims from electronic employee postings. Participants will know how to deal with online privacy and harassment claims and ways and limits of disciplining employees’ online presence. The course will also examine how to legally use Internet postings, profiles and other content in hiring decisions.
Risk Management - Best Practices, Roles and Responsibilities, Types and Preventives, Case Studies
Robert Geary
90 Min
Product Id: 703689
This webinar will demonstrate a conceptual framework and thought process to address risk management. It will discuss the significance of risk management processes with emphasis on causes of risk and risk preventives. The instructor will explain the best practices, roles and responsibilities, risk types and how to prevent them.
4 P’s of ITAR - Policies, Provisions, Procedures & Penalties
Suzanne Richer
60 Min
Product Id: 704343
This training program will offer an overview of the International Traffic in Arms Regulations (ITAR) Part 126 – General Policies and Provisions, Part 128 – Administrative Procedures.
5-Hour Virtual Seminar: P2P Standards of Internal Controls - Preapproved by the American Purchasing Society
Chris Doxey
5 hrs
Product Id: 704195
This two-part five-hour certificate program focuses on internal controls leading practices and standards for the Procure to Pay (P2P) process. Attendees will learn about internal controls best practices by focusing on the Internal Controls Questionnaires (ICQ) for each component of the P2P process. Participants in this program will obtain a certificate in Procure to Pay (P2P) Standards of Internal Controls from the American Purchasing Society (APS).
3-Hour Virtual Training: Guidelines for Performing a Corporate Wide Internal Audit Risk Assessment
Marna Steuart
180 Min
Product Id: 704386
This training program will detail key components of a risk assessment and management program, and include a fraud risk assessment discussion. Other training points in the program include analyzing the methodology for successful risk assessment process, understanding the steps involved in the risk assessment process, and fraud risk assessment.
Driver Performance-Based Budgeting and Rolling Financial Forecasts
Gary Cokins
90 Min
Product Id: 704391
This training program will help attendees understand the deficiencies with the traditional annual budget. Attendees will also learn how to apply unit-level consumption rates with forecasts to project operational expenses and how to include strategic projects and risk mitigation projects in expense projections.
10 CAM Mistakes and How to Avoid Them
Robert Machson
60 Min
Product Id: 704308
This training program will list common CAM mistakes and practical solutions that will save you money. If you are the owner or operator of leased property, a tenant, franchisee, attorney, paralegal, lease administrator or auditor, you want to make sure that you are not paying more than you ought to.







