Dos & Don'ts Related to Information Security and Data Privacy
Marc Perl
60 Min
Product Id: 704736
This training program will prepare your organization to understand the need for data security, the steps that can be taken to institute or augment your data security policies/procedures, and the implementation of the needed controls. This webinar will introduce attendees to a set of known and respected data security standards that can be employed by your organization to improve your security. Attendees will walk away with ideas to leverage the curriculum with their existing security infrastructure.
How to Establish & Review Your Risk Metrics Effectively
Robert Geary
90 Min
Product Id: 704709
This webinar training provides an in depth understanding and applicability of the risk metrics. The instructor helps in establishing the purpose they serve and reviewing the methodology for creating a set of risk metrics. He will also discuss the sampling of forms of risk metrics to be employed and review the risk metric management process.
Detecting and Preventing Corporate Card Fraud - Travel and Entertainment Expenses
Chris Doxey
90 Min
Product Id: 704707
This webcast will discuss the policies, procedures, and controls that will help your company detect and prevent corporate card fraud. The Instructor will discuss the type of corporate credit cards and best practices for developing your travel and entertainment expense (T&E) policy. Participants will learn the T&E standards of internal control and how to automate their T&E Process.
A2Z of ACH - Authorizations, Revocations, and NOCs - Part 2
Rayleen M Pirnie
90 Min
Product Id: 704572
This three-part webinar series is designed specifically for businesses who either currently process ACH credits and/or debits, or those exploring the network for use in the future. Each session will focus on niche areas of ACH essentials. This course in the series will explore ACH authorization requirements, revocations, and Notifications of Change (NOCs) in the ACH network from the perspective of how each affects a business originator.
Should We Offer Home Equity Lines of Credit? HELOC VS. Conventional Mortgage
J T Turner
60 Min
Product Id: 704612
This training program will offer an introduction to HELOCs and explain how a HELOC is structured. It will also discuss why they are profitable, potential issues, and how to retain loans.
A2Z of ACH - Transaction Flows and Standard Entry Class Codes - Part 1
Rayleen M Pirnie
90 Min
Product Id: 704571
This three-part webinar series is designed specifically for businesses who either currently process ACH credits and/or debits, or those exploring the network for use in the future. Each session will focus on niche areas of ACH essentials. This first part in the series will focus on recognizing an ACH transaction flow - both credit and debit, identifying ACH network participants, and locating Standard Entry Class Code (transaction) Rules in the ACH Rules book.
TILA-RESPA Integrated Disclosures (TRID) Review
J T Turner
60 Min
Product Id: 704680
This webinar will discuss the you understand Truth In Lending Act and Real Estate Settlement Procedures Act Disclosures. Instructor will explain how to review the history of the disclosures. Participants will understand the nature of the changes, the Loan Estimate form and calculations, closing disclosure and time considerations of the disclosures.
Measuring and Managing Customer Profitability - From Growing Sales to 'Profitable' Sales
Gary Cokins
90 Min
Product Id: 704679
This training program will focus on how to shift the mindset from growing sales to growing profitable sales and to view customers as investments like in a stock portfolio to seek higher ROIs – return on customers (ROC). It will also look at how measuring forward-looking customer lifetime value (CLV) differs from calculating historical customer/consumer profitability for B2C industries.
CAMELS Methodology | Market Risk Identification, Evaluation and Managing Risk Conditions - CCAR and CLAR
Robert Geary
60 Min
Product Id: 704669
This training webinar discusses CAMELS components in terms of the regulators’ evaluation methodology. It covers how these considerations translate into the rating of each component and the formulation of a bank’s CAMELS composite rating. In addition, the instructor explains two related evaluations: CCARS which is a “Comprehensive Capital Assessment and Review”, and CLAR which is a “Comprehensive Liquidity Assessment and Review” and how to rate bank’s capital adequacy and liquidity adequacy.
Is Your Vendor Ripping You Off? Fraud Red Flags Corporate Executives Should Recognize
Anne M McFadden
90 Min
Product Id: 704015
This training program will primarily focus on analytical and accounting red flags in purchasing schemes, bid rigging, billing schemes, personal purchase schemes, product substitution and all other kinds of corporate fraud.
2-Hr Virtual Seminar - Understanding FAR and Developing Compliance - Intellectual Property, CAS, DCAA Audit
JeFreda Brown
2 hrs
Product Id: 704644
This training program will outline business practices and conflicts of interest prohibited by FAR. Attendees will learn labor laws and requirements under FAR and FAR procedures and policies pertaining to intellectual property. They will also understand how contractors are required to apply Cost Accounting Standards (CAS) to negotiated contracts per FAR, and FAR cost principles and what types of costs contractors are not allowed to include.
The Credit Managers Toolbox - Free Cash Flow, Common-Sizing Financial Statements, Key Financial Ratios, DSO, Altman Z Score, Financial Reviews
Ronald Sereika
90 Min
Product Id: 704577
In this training program, the instructor will discuss how and where to find financial information and how to read a balance sheet, income statement and statement of cash flows. The program will also detail how to calculate DSO.
What Accounts Payable (A/P) Needs to Know About Payroll and Vice Versa 2016
Vicki M. Lambert
90 Min
Product Id: 704634
This webinar will discuss various types of payments and how to ensure that the information requested by payroll and provided by accounts payable is done in a professional and timely manner. The program will also concentrate on how payroll and accounts payable must work together to ensure compliance with taxation and reporting requirements.
Cyber Security Incident Response Program
Michael C Redmond
60 Min
Product Id: 704631
This cyber security training program will assess the strength of the procedures your organization has in place to deal with a breach, malware and more. It will highlight the risk you are vulnerable to and discuss adopting a systematic approach to risk tracking to enhance the effectiveness of your cyber security incident response program.
Home Mortgage Disclosure Act (HMDA) Reports - Meeting Regulators: Expectations - Tools and technique to reduce errors
Jim George
60 Min
Product Id: 703743
Fraudsters are always looking for new opportunities and new weaknesses. The availability of customer data on the black-market gives them just the tools they need. A bank has responsibilities to its shareholders and customers to protect them from these ever-changing threats. This webinar will furnish attendees with a complete understanding of the changes in the fraud arena and the strategies needed to combat fraud.
Writing an Effective Coverage Letter - Analyzing the Facts, the Law and the Insurance Policy
Marc Estrella
60 Min
Product Id: 704553
In this training program, attendees will understand the necessity of writing a coverage letter. Attendees will understand how to utilize the facts and communicate to the insured the need for more information when there is insufficient information to make a coverage determination. They will also learn to employ state mandated language in the coverage letter.
Vendor Management Program - Risk Assessment, Effective Controls, Best Practices to Minimize 3PV Risk
Anne M McFadden
90 Min
Product Id: 704615
This vendor management training program will offer best practices for managing and minimizing third party vendor risk through strategies that help you focus resources with a risk based approach. It will explore the five elements of a successful vendor management program, including: vendor culture, vendor risk assessment, ensuring effective controls around vendor management, monitoring vendor programs, and vendor communication.
What Does the Foreign Corrupt Practices Act (FCPA) Mean to the Procure to Pay (P2P) Process
Chris Doxey
90 Min
Product Id: 704606
This webinar will discuss the Foreign Corrupt Practices Act (FCPA) and its implication on the pay-to-procure (P2P) process. Participants will learn the 15 step compliance roadmap for the FCPA and FCPA compliance programs and how to test for FCPA violations in the P2P process. The Instructor will share guidelines to help your company establish FCPA compliance for your P2P process.
ACH Fraud - Detection and Prevention
Rayleen M Pirnie
90 Min
Product Id: 704369
This training program will discuss common forms of ACH fraud, including: social engineering, account takeover (consumer, corporate, and institution internal accounts), money mules and advance fee frauds, and embezzlement. Under each of these sections, the course will also discuss: ACH fraud detection, fraud mitigation, ACH Returns, sound business practices to thwart attempts, and education.
Payment Card Industry Data Security Standard (PCI DSS) and Your Company
Marc Perl
90 Min
Product Id: 704601
This training program will explore how development and deployment of PCI DSS (Payment Card Industry Data Security Standard) compliant networks can assist your business to secure those electronic assets that the business considers vital. The principles specified in PCI DSS, which the program will discuss, can be a guide for all organizations that wish to secure their data.







