This webinar will first take you through a step-by-step process to develop strong Risk Assessments to address key areas of your institution. Then the presenter will specifically focus on three key Risk Assessments you must have as critical components of your ERM Program: the Enterprise Risk Management Risk Assessment, Information Technology Risk Assessment, and the Internal Controls Risk Assessment. You will walk away with practical tools and examples you can implement in your organization immediately.
After attending this webinar, you will walk away with a deeper knowledge of Cash Management, conduct a risk assessment on any new products, and bring back ideas to your bank on how to market Cash Management products and services to your business clients. In addition, your team will also work better together knowing how critical each area is to the success of the implementation and sale of these products and services.
This webinar will address the current state of ransomware and cybersecurity. Upon completion of this webinar, participants will (1) Understand how ransomware works on your network; (2) Be able to identify different types of ransomware and how they propagate across networks; (3) Be equipped to make better decisions around mitigating controls to reduce the risk of ransomware on your network; (4) Gain a better understanding of how to recovery from ransomware; and, (5) Be able to share information with others at their institution about how to identify and prevent ransomware attacks.
This is Part II of our V-Part 2018 Safe Deposit Series. This webinar will address issues related to documentation of the notification of death; sealing the box of the decedent; temporarily denying access.
While online account opening presents growth potential for institutions, it also presents significant risk, particularly when these accounts are funded using ACH. These risks can be controlled with proper due diligence for the online environment, account validation, and enhanced risk controls. This course evaluates practical risk management strategies institutions can use to build a program appropriate for their risk appetite. Covers both new consumer and business accounts.
We will review, E-OSCAR (Electronic-Online Solution for Complete and Accurate Reporting), pros and cons of using METRO vs METRO-2 format, and special comment reporting codes. Also, we will discuss if you should report to more than one NCRA, and why you have to run quality checks on that data to make sure your trade lines are reporting accurately to stay in compliance.
Participants will understand what constitutes a well planned institutional loan policy that is in accordance with sound practices as well as regulatory requirements. You will also discover how to devise clear, precise, and meaningful procedures to audit the loan function.
This session will explore all elements of your business continuity plan, including design, testing and implementation.
Every financial institution should have a tested business continuity plan. This plan should prepare your institution for when something goes wrong. The potential for disaster is limitless, from short term software failure to long term facilities loss. Having a plan in place will help your institution deal with these disasters with confidence and in an effective and efficient manner.