Red Flags of Internal Fraud, Asset Misappropriation, and Corruption
H. David Kotz
75 Min
Product Id: 704865
This webinar highlights how one can identify red flags of frauds, asset misappropriation and corruption. Presented by the former Inspector General of the SEC, the webinar provides specific and concrete tips to identify potential red flags before there is significant exposure.
State Insurance Solvency Modernization Initiatives - Financial Crisis to Present
Adam Kerns
60 Min
Product Id: 704901
This webinar training will discuss the state insurance regulatory developments from 2008 through today regarding the (NAIC) Solvency Modernization Initiative (SMI). Participants who attend this webinar will receive a comprehensive, in-depth review of the various state insurance solvency modernization initiatives, along with a better understanding of how such initiatives will directly impact their daily operations.
Procure to Pay Automation - What's Next
Brian G Rosenberg
60 Min
Product Id: 704881
This webinar training will provide an overall view of the current state and future of automation to help attendees make strategic decisions to prioritize their projects and understand technologies to invest in. The instructor will explain why automation is important, types of solutions available, and current gaps.
Managing ACH Business to Business Payments
Rayleen M Pirnie
90 Min
Product Id: 704918
This webinar training will explore B2B ACH payments. The instructor will explain how to isolate benefits and risks and discuss various options including Credit Push vs. Debit, and analyze critical authorization provisions. He will also investigate sound business practices to successfully managing business to business ACH payments.
How to Apply ISO 27001 Principles to Enterprise Risk Management in 2017
Michael C Redmond
60 Min
Product Id: 704828
This webinar training will help you implement ISO standards in your Enterprise risk management (ERM) system and understand the benefits. This session will enable on how to integrate ISO 27001 in your organization as the main structure for information security management.
Complying with the Rules and Regulations Pertaining to Letters of Credit: OFAC, Anti-Boycott, and the USA PATRIOT Act
Buddy Baker
90 Min
Product Id: 702639
This international trade compliance training will provide an overview and introduction to rules and regulations governing international trade and take an in-depth look at US sanctions enforced by the Office of Foreign Assets Control (OFAC), Anti-Boycott regulations maintained by the US Department of Commerce, and section 326 of the USA PATRIOT Act (“Know Your Customer”).
How to Use Big Data for an AML/AB&C Compliance and Risk Mitigation
Shaun Miller
120 Min
Product Id: 704779
This webinar discuss how big data is used for AML compliance review. The instructor will explain how an unstructured data, becomes structured and is subjected to data quality review, sampling and subsequent forensic analysis. The instructor will share how this analysis influences strategic decision in terms of risk mitigation and AML Program enhancement.
Essentials of Taxing and Reporting Insurance Benefits for 2016 and Beyond
Vicki M. Lambert
90 Min
Product Id: 704870
This webinar covers the basics of handling insurances in the payroll department including reviewing the requirements under the ACA for the 2016 reporting of health insurance. The Instructor will cover how to handle health insurance plans such as HSAs or HRAs, taxing and reporting life insurance and third party sick pay. He will also explain the role payroll plays in workers’ compensation pay-outs and premium payments.
The Custody Rule for Financial Firms
Lisa Marsden,Stacey Rodgers
60 Min
Product Id: 704873
This training program explains ‘The Custody Rule’. The instructor will help you determine if your firm has custody, compliance surrounding maintaining custody and regulatory deficiencies.
Mitigating and Conducting Very Effective Risk Assessments and Business Impact Analysis
Michael C Redmond
60 Min
Product Id: 704823
This webinar training will explain project management principles to prepare your business to overcome risk and outage. The instructor will discuss how to conduct risk assessment and business impact analysis. He will also discuss how to test and document risk elements and the process or steps to be taken to combat it.
Investment Advisors' Investment Policy Statement (IPS) - Rules, Regulations and Best Practices
Lisa Marsden
60 Min
Product Id: 704521
This training program will analyze best practices for the investment policy statement (IPS), elements of the IPS, the significant areas of the firm that should be involved in the development of the IPS, creating and maintaining the IPS, and compliance testing of the IPS.
Dealing with the Weingarten Ruling (Interviewing Public Sector and Private Sector Union Employees)
John E Grimes
90 Min
Product Id: 704777
This training program will explore the rationale behind the Weingarten Decision and other similar court decisions. It will also examine the union employee’s responsibilities when subject to an investigative interview and the union representative’s role in an investigative interview, along with sanctions and remedies for violation of Weingarten Rights.
Protect Your Organization from the Growing Internal Cyber Threat
Peter Goldmann
60 Min
Product Id: 704817
With the constant tide of data breaches and hacker threats, cybersecurity is a critical element in an organization’s policies. This training program will explore the common and not-so-common insider threats to your organization’s information security and help identify the red flags of potential or actual insider cyber crime.
A2Z of ACH - Pre-Notifications, Returns and Reversals - Part 3
Rayleen M Pirnie
90 Min
Product Id: 704573
This three-part webinar series is designed specifically for businesses who either currently process ACH credits and/or debits, or those exploring the network for use in the future. Each session will focus on niche areas of ACH essentials. This course in the series will explore ACH pre-notifications, returns and reversals from the perspective of how each affects a business originator.
Conducting a Shrink Investigation - How to Determine the Source of Your Inventory Discrepancy
John E Grimes
90 Min
Product Id: 704802
Small business failures are particularly vulnerable to going out of business as a result of uncontrolled and unidentified losses. If you are small business retail owner, manager, or loss prevention consultant, this training program will teach you how to conduct a full shrink (loss) investigation. If you are contemplating opening a small retail business, this webinar will give you a head start on understanding the complexities and importance of controlling losses.
Block Chain for Risk Management /Data Security | Emerging Technological Approach for KYC and Secure Transactions
Shaun Miller
120 Min
Product Id: 704808
A block chain is a transaction database shared by all nodes participating in a system based on the Bitcoin protocol. This course describes the Bitcoin concept, what Blockchain is and its financial applications to creating secure KYC and payment data sets. This course explains a Blockchain concept where the Blockchain itself is a shared single source of truth.
Application for Investor Advisor Registration - ADV Part 1, Part 2A, Part 2B and More
Lisa Marsden
60 Min
Product Id: 704741
This training program will analyze ADV Part 1, ADV Part 2 A, ADV Part 2 B, and offer a breakdown of each section of the ADV. It will discuss annual filing requirements and offer best practices for reporting accurately.
Community Reinvestment Act (CRA) - Understanding High Risk Lending and Compliance Issues
Vidia Ramdeen
60 Min
Product Id: 704764
This training program will address important compliance issues and high risk lending issues of the Community Reinvestment Act (CRA). It will help attendees in understanding why community bank lending is important for achieving goals underlying successful community reinvestment and focus on the basics of risk management for community bank lending.
SEC Examinations - Practical Tips on How to Defend Yourself
H. David Kotz
60 Min
Product Id: 704605
This webinar provides practical information on how companies may defend themselves during SEC examinations. The webinar highlights the newest initiatives arising from the SEC’s examination program. Presented by the former Inspector General of the SEC, the webinar provides valuable insider information about SEC exams.
3-Hr Virtual Seminar - Understanding DFAR and Developing Compliance - DCAA Audit, Labor Records, Penalties, Policies & Procedures
JeFreda Brown
3 hrs
Product Id: 704619
This training program will demonstrate why companies planning to do business with the government should be prepared to be audited by the Defense Contract Audit Agency (DCAA). DCAA performs all needed contract audits for the Department of Defense (DoD). The focus of this program is to offer attendees a strong knowledge of DFARS (Defense Federal Acquisition Regulation Supplement) and help understand what is required when pricing proposals, developing a compliant accounting system, and maintaining contracts.







