Search Trainings

107 results of "Banking & Insurance x" and "Fraud Analytics x"
Live Webinar

CFPB's New Proposed Debt Collections Rules

The CFPB's debt collection rules change the way consumers are contacted when a debt is owed. The rules will include limits on the number of calls collectors can make on a weekly basis, address communications by email and text, and require new disclosures at th ...

Live Webinar

EBIT/EBITDA - Understanding Your Profit and Loss Statement- SHRM & HRCI Accredited

This training program will review different types of profit and loss statements, including a QuickBooks profit and loss standard layout as a complex, multi-fund example. Attendees will learn how to analyze growth or loss within a business or department by comp ...

Live Webinar

2-hr Virtual Seminar: Service Level Agreements (SLAs) - Preparation Guidelines for Effective SLAs

This 2-hr webinar on Service Level Agreements (SLAs) will provide you with sound principles and a set of guidelines for developing and preparing ‘effective’ Service Level Agreements (SLAs) for an internal service function or an outside service provider.

Live Webinar

Employee Expense Reimbursement Fraud: Schemes and Controls - SHRM & HRCI Accredited

This 90-minute webinar will summarize the main types of reimbursement fraud to be alert to, and include an analysis of several “real life” case studies. It will explain how to identify the red flags of possible reimbursement fraud, offer specific fraud-audit t ...

Live Webinar

Bank Best Practices to Prevent Fraud

Fraud is of more concern to banking leaders today than ever before. This is driven by national media coverage, actual dollar losses, the attack on trust (which is key to customer relationships), costs to allay customer concerns, changing the regulatory environ ...

  • Basic & Intermediate
  • 60 Mins
  • Jim George
  • Jan 07, 2020
Live Webinar

Payments Fraud Detect & Prevent Check, ACH and P-Card Schemes

This training program will examine vendor/billing schemes that exploit payments process control weaknesses; latest electronic payments schemes (ACH hijacking, spear-phishing, social engineering); check counterfeiting, forgery and tampering schemes to be aware ...

Live Webinar

Designing Full Cyber Security Incident Response Team (CSIRT) Training Program as well as Table Top and Simulation Testing

Learn the how to design Full Cyber Security Incident Response Team (CSIRT) Training Program for employees including how, when and who should be doing testing organization processes, scenario developments.

Live Webinar

Conducting a Thorough Needs Analysis and Developing a Solid Compliance Training Program

Whenever conducting a needs analysis there are certain steps that should not be missed. If missed, it will not have a positive impact on your compliance training program and the compliance culture. We will go over the necessary steps and show how it impacts yo ...

Live Webinar

Using Controls and Segregation of Duties to Build a Bullet Proof AP Operation

This training program will detail how to create a bullet-proof AP operation that is setup to detect and proactively prevent fraud from occurring. During this session, the webinar presenter will discuss real cases of AP fraud and the controls that organizations ...

On-Demand Webinar

Writing Effective Audit Observations

As you develop conclusions, findings, and recommendations, you must present them to your client in a logical, complete, and objective way.This process provides an easy way to consistently develop and present your observations. The components in this process in ...