AML High-Risk Transactions - Identify, Manage and Resolve
Jim George
90 Min
Product Id: 704792
This webinar will discuss the techniques for controlling and managing High Risk Transaction. The Instructor will discuss the parameters for identifying and qualifying transactions as high risk and process and communication to be followed. He will also discuss how to resolve the end result.
Developing a Risk-Based Audit Program
Richard Cascarino
60 Min
Product Id: 703566
In this webinar attendees will gain an understanding of how to develop a practical tailored action plan for their own audit function. Whether you have been charged with establishing a risk audit framework for your organization, want to increase the effectiveness of the existing risk-based audit process or wish to benchmark against emerging best practice, this is the webinar for you.
Dietary Supplements - Regulatory Compliance Requirements, Product Claims, Labeling Issues and FDA Updates
Travis Austin MacKay
90 Min
Product Id: 702154
This training will review the dietary supplement regulations in the USA and explain how to verify that your products are compliant with the most recent regulations and provisions. It covers the FDA regulatory structure and considerations for manufacturing, labeling and advertising dietary supplements.
Identity Issues in Banking - After the Breach, 26 Red Flags and More
Jim George
60 Min
Product Id: 704664
This webinar training helps attendees to understand the problems with 26 Red flags released by federal regulators in regards to identity fraud. The instructor will discuss how to create and implement the fraud control program and Identity solutions to combat ID theft and reduce future losses.
Supplier Management: Challenges and Opportunities
Jeff Kasoff
60 Min
Product Id: 700193
Attend this webinar to learn the QSR and ISO requirements for supplier evaluation, including defining the types of suppliers that require evaluation, including “critical” suppliers and outsourced processes. The QSR and ISO requirements for supplier assessment will be defined as well. The webinar will discuss the application of a risk-based process resulting in a customized supplier management system.
Understanding ESG in the Banking Industry
Stanley Epstein
60 Min
Product Id: 706785
Surface temperature on the Earth have risen at a record pace in recent decades, creating risks to life, ecosystems, and economies. Climate science warns us that further warming is unavoidable over the next decade, and probably after that as well. Climate change poses a real threat and a huge risk to banks as key providers of finance for commerce and industry.
Excel: Power Pivot - Taking Pivot Tables to the Next Level
Mike Thomas
60 Min
Product Id: 705025
In this training attendees will learn how Power Pivot provides business Intelligence functionality and reporting within the familiar environment of Excel with practical examples. This webinar will discuss best practices for importing data into Excel from external sources, creating relationships in Power Pivot, Power Query data sources, and more.
FDA Compliance and Enforcement Trends focused on Data Integrity
Carolyn Troiano
90 Min
Product Id: 706353
FDA requires that all computer systems used to produce, manage and report on “GxP” (GMP, GLC, GCP) related products be validated and maintained in accordance with specific rules. This webinar will help you understand the FDA’s current thinking on computer systems that are validated and subject to inspection and audit.
21 CFR Part 111 - Current FDA 483 Observations and Warning Letters Review
Andy Swenson
60 Min
Product Id: 706772
The FDA inspects facilities, online marketing collateral and physical products to determine compliance with the 21 CFR Part 111 dietary supplement regulations. It is very helpful to review their observations to infer what their priorities are and where industries and companies alike can improve.
GAAP: Accounting for Inventory
Christy Foister
60 Min
Product Id: 705203
For manufacturers and retailers inventory is one of the most valuable assets on the balance sheet. The cost of inventory is one of the largest expenses on the income statement. Practitioners and members in industry will benefit from this training program’s comprehensive guidance on inventory accounting issues.
"Front-End, Middle, and Back-End" Approach to Credit Management
David L Osburn
60 Min
Product Id: 705808
This credit management webinar will discuss the credit analysis process, how to do financial statement analysis and how to do effective cash management using various tools and techniques and how to use various collection techniques (manage legal issues and using negotiation skills) and overall how to manage the collection process.
How to Go from Pivot Tables to Dashboards Using Excel
Joe Weil
90 Min
Product Id: 705599
This webinar will update your Excel skills by teaching you how to create impressive Dashboards even if you don’t have artistic talent. At the conclusion of this webinar you'll be able to create amazing, interactive Excel dashboards that update at the click of a button and leave a lasting 'wow' impression.
Addressing Non-Conformances using Root Cause Analysis (RCA)
Michael Brodsky
60 Min
Product Id: 704861
In this webinar you will learn how to determine the Root Cause origin of a problem. You will learn a specific set of steps, with associated tools, to find the primary cause of the problem, so that you can prevent occurrences.
Navigating California Prop 65 Incorporating FSMA Preventative Controls, Best Practice Approach
Gina Reo
60 Min
Product Id: 706263
Attention Food Manufacturers, attend this webinar to learn latest FSMA based strategies to navigate the complexity under Prop 65. Prop 65 is an ever-changing regulatory arena, with complex requirements, frequent legal actions and strict labeling and notification regulations.
Interdisciplinary Bedside Rounds: The State of the Art
Toni Cesta
60 Min
Product Id: 705237
This webinar will identify the key stakeholders needed for effective interdisciplinary rounds. It will review the best practice rounding processes including scripting and time management.
IT Auditing: How to Apply Analytical Procedures for Meaningful Analysis
Robert Davis
60 Min
Product Id: 706680
This webinar facilitates understanding analytical procedures associated with performing IT assurance services and defining risk areas using a system perspective. The "IT Auditing: How to Apply Analytical Procedures for Meaningful Analysis" webinar presents guidance following the general structure of planning, studying, testing, reporting, and follow-up. The offered activities apply to broadly or narrowly defined IT audits.
21 CFR Part 11 and QMS Software Risk-Based Implementation
John E Lincoln
60 Min
Product Id: 706363
CGMP-compliant companies must develop / implement formal software controls and usage, starting with proper verification and validation methods. This is an important consideration for a company’s Quality Management System (QMS) and must consider applicable elements of electronic records / signatures / Part 11. The US FDA recently added data integrity and cybersecurity to these requirements. These activities must be properly documented.
Anti-Kickback, Fraud, Stark, and Marketing - Where are the Landmines?
William Mack Copeland
90 Min
Product Id: 704950
This webinar will provide an in-depth understanding of the Federal False Claims Act, Federal Anti-Kickback and Stark laws, and discuss how marketing activities can trigger either or both.
Human Error and Cognitive Load: How to Reduce Memory and Attention Failures
Ginette M Collazo
60 Min
Product Id: 704210
This training program will discuss the types of human error, the taxonomy of human error, human error reduction initiatives, individual performance, cognitive load and human error, cognitive load categories, and more.
Basic Cleanroom Technology, Operation and Contamination Control in a Nutshell
Charity Ogunsanya
90 Min
Product Id: 706142
Attend this webinar to understand the Clean Room regulations, design, classification, sources and types of particles. Learn how to create a common ground between these varying regulations and requirements. It will discuss the types of micro-organisms, routine monitoring processes, and typical mitigation steps to effective contamination control.