While online account opening presents growth potential for institutions, it also presents significant risk, particularly when these accounts are funded using ACH. These risks can be controlled with proper due diligence for the online environment, account validation, and enhanced risk controls. This course evaluates practical risk management strategies institutions can use to build a program appropriate for their risk appetite. Covers both new consumer and business accounts.
Excel has many built-in functions that help you deal with that data. It is very important that you know how to use some of these functions to get the most out of your data in a time efficient manner. This way, you can turn the data into meaningful information and then provide the answers that you need for yourself, your boss, your company or your organization.
FinCEN is issuing final rules under the Bank Secrecy Act to clarify and strengthen customer due diligence requirements for: banks; brokers or dealers in securities; mutual funds; and futures commission merchants and introducing brokers in commodities. The rules contain explicit customer due diligence requirements and includea new requirement to identify and verify the identity of beneficial owners of legal entity customers, subject to certain exclusions and exemptions.
In this webinar, we will review common problems with e-communications, such as burying a key point at the end of a message, or ineffectively conveying multiple ideas in one paragraph. We will cover appropriate methods of correspondence based on the relationship between the author and the recipient. We will likewise discuss how to communicate your attitude without sounding defensive, annoyed, sloppy, or rushed. You will walk away with a new approach to written communications. From proper grammar to concise formulas, you will learn best practices to improve your writing daily.
This webinar will address the current state of ransomware and cybersecurity. Upon completion of this webinar, participants will (1) Understand how ransomware works on your network; (2) Be able to identify different types of ransomware and how they propagate across networks; (3) Be equipped to make better decisions around mitigating controls to reduce the risk of ransomware on your network; (4) Gain a better understanding of how to recovery from ransomware; and, (5) Be able to share information with others at their institution about how to identify and prevent ransomware attacks.
we will use a 10-Step Cybersecurity Checklist to review best practices your Institution can take to prevent cyber incidents from arising at all. We will review relevant laws and regulations, and examine case law trends.You will learn what types of cyber threats to expect, and how to properly train your personnel. We will also explore incident management and discuss the procedures you need to have in place so that you can immediately respond to a cyber incident.