Learn how to take advantage of every encounter and each contact with your account holders to strengthen the customer relationship. Use technology and online services to maximize the customer experience and increase your profitability per account.
This webinar will address the current state of ransomware and cybersecurity. Upon completion of this webinar, participants will (1) Understand how ransomware works on your network; (2) Be able to identify different types of ransomware and how they propagate across networks; (3) Be equipped to make better decisions around mitigating controls to reduce the risk of ransomware on your network; (4) Gain a better understanding of how to recovery from ransomware; and, (5) Be able to share information with others at their institution about how to identify and prevent ransomware attacks.
Wednesday, January 10, 2018 - 11:00 AM - 12:30 PM ET
Excel has many built-in functions that help you deal with that data. It is very important that you know how to use some of these functions to get the most out of your data in a time efficient manner. This way, you can turn the data into meaningful information and then provide the answers that you need for yourself, your boss, your company or your organization.
This webinar will first take you through a step-by-step process to develop strong Risk Assessments to address key areas of your institution. Then the presenter will specifically focus on three key Risk Assessments you must have as critical components of your ERM Program: the Enterprise Risk Management Risk Assessment, Information Technology Risk Assessment, and the Internal Controls Risk Assessment. You will walk away with practical tools and examples you can implement in your organization immediately.
Thursday, January 25, 2018 - 11:00 AM - 12:30 PM ET
While online account opening presents growth potential for institutions, it also presents significant risk, particularly when these accounts are funded using ACH. These risks can be controlled with proper due diligence for the online environment, account validation, and enhanced risk controls. This course evaluates practical risk management strategies institutions can use to build a program appropriate for their risk appetite. Covers both new consumer and business accounts.
Wednesday, January 31, 2018 - 11:00 AM - 12:00 PM ET
This webinar will reveal best practices to close the gap in understanding the importance of simple internal controls and a sound control environment. Join us to discover the secrets of top-notch financial statement auditing!
Upon completion of this webinar, participants will be able to:
• Create a Pivot Table
• Create a Pivot Chart
• Sort and Filter a Pivot Table
• Manipulate a Pivot Table
• Add Slicers and Timelines to a Pivot Table
After attending this session, you will be equipped to:
Effectively manage unique issues related to emails and other forms of written communication;
Compose concise, audience-focused messages;
Communicate your intent in a courteous, but purposeful, tone; and,
Effectively and efficiently master your email system
Despite the fact that a majority of United States organizations have experienced a cyber-attack either directly or through a vendor, U.S. businesses do not consistently address cyber threats. This webinar will help: (1) you focus on what you can control to mitigate litigation and reputational risk; (2) your organization create a culture of cybersecurity continuity; and, (3) ensure everyone in your Institution understands the role s/he plays in protecting information, customers, assets, other employees, and your corporate mission.
A 10-Step Checklist will be used throughout the session to help you learn how to design, implement, and monitor an efficient Cybersecurity Program.
You will also receive a complimentary 9-part Toolkit to help your Institution comply with federal and state cyber laws.
Tuesday, October 30, 2018 - 11:00 AM - 12:30 PM ET
Session explores how technology can help a financial institution expose and mitigate risk and fraud. Behavioral analytics, transaction analytics, monitoring and measuring incoming items and returns, filters and blocks, biometrics and more.
This session will explore all elements of your business continuity plan, including design, testing and implementation.
Every financial institution should have a tested business continuity plan. This plan should prepare your institution for when something goes wrong. The potential for disaster is limitless, from short term software failure to long term facilities loss. Having a plan in place will help your institution deal with these disasters with confidence and in an effective and efficient manner.
Join us to review FDIC and other regulatory retention rules; E-Sign record requirements; email, social media, and mobile device record risks; and electronic record retention rules, policies, and best practices.
Claims under Title III of the Americans with Disabilities Act (ADA) are rising. The DOJ received 6,391 accessibility complaints in 2015—a 40% increase over 2014. Moreover, 240 businesses across the United States have been sued by plaintiffs who claim these organizations' websites fail to accommodate certain disabilities. Even more Financial Institutions and businesses have received demand letters from law firms. Targets have been strong-armed into settlement agreements due to plaintiffs' citation of favorable arguments in previous cases which held that the ADA applies to websites.