Financial institutions have long been the payments engines for their customers. However, with heightened competition and the advent of new non-bank entries into the marketplace, financial institutions have been playing more defense than offense. It is now time to go from playing 'not to lose' to using the implied trust and the customer experience to reverse the trend, get back lost customers,and retain existing ones.
Join us for 90 minutes to learn how to put the powerful sensitivity tools of Microsoft Excel to work in your models. Learn the top 20 best practices of solid model design, development and delivery. Seasoned financial analyst, Miles Hutchinson, will show you how to unlock the power of scroll bars and spinners, goal seek, one and two-input data tables and scenario manager in your models. He will provide you with samples of the tools demonstrated during the webinar along with complete instructions for creating and using each of these tools.
This session will raise awareness of fraud issues in Accounts Payable and examine processes to mitigate the risk associated with Accounts Payable to comply with SOX. It will provide you with the tools you need to establish and maintain strong internal controls that meet Sarbanes-Oxley standards by reducing risk and protecting company assets.
At the completion of this course you will have the tools necessary to evaluate the W9 and prepare a Form 1099-MISC with all the blocks properly completed. This course will cover not only these common mistakes but make suggestions regarding the contents of each Block on the Form 1099-MISC.
Every business that purchases and contracts for goods or services is vulnerable to a wide variety of fraud hazards. Many of the fraud schemes involve vendors and contractors in collusion with employees responsible for making purchases and administrating contracts, as well as with the employee who requests the purchase of goods or services. Other fraud hazards involve solicited and bidding contractors in collusion with each other. Most procurement frauds go undetected due to the off the books nature of the fraud. The ACFE suggests that organizations lose as much as 5% of revenue to fraud. Government Agencies have armies of investigators and auditors whose mission is to prevent and detect procurement and contract fraud. Small, medium, and even large businesses are often not equipped to combat this prevalent vulnerability. The first step is awareness of the hazard.
Excel expert David Ringstrom, CPA, shows you how to implement internal control features within your Excel spreadsheets in this enlightening presentation. David uses a simple invoice form as a teaching aid to present various ways to control users' actions within Excel spreadsheets and to protect worksheets and workbooks from unauthorized changes. David demonstrates every technique at least twice first, on a PowerPoint slide with numbered steps, and second, in Excel 2016. He'll draw to your attention any differences in Excel 2013, 2010, or 2007 during the presentation as well as in his detailed handouts. David also provides an Excel workbook that includes most of the examples he uses during the webcast.
A high number of complaints may suggest your business customer is engaging in Unfair, Deceptive or Abusive Acts and Practices (UDAAP). Harmful businesses don't disclose a poor or declining reputation, yet this can signal that your business customer is engaged in anti-consumer behavior.
ACH Returns can be complicated and requires attention to detail. In the ACH network, for years, returns have been sent- typically with financial institutions processing exception items on Day 2 why not change that now in the new Same Day ACH environment? There are many opportunities with the extra settlement windows for exception processing to change (if the RDFI wants to)- this session will identify the options and it's up to the participant whether they will utilize the option or not.
In this webinar, you'll learn about the common types of fraud perpetrated against organizations and how to implement processes, procedures, and controls that mitigate your risk.You'll learn about a number of different fraud schemes, focusing on fraud committed against small businesses.
Computer Intrusions are the cyber actor's portal to invade and burglarize homes and business across the nation and the threat will only continue to grow. The Financial Industry is faced with increasingly complex threats almost daily. These threats challenge traditional models of law enforcement, IT Management and Regulations. The SEC's Cyber Sweep Exam is not only another regulatory task for Financial Advisors but also serves as an outline to help your firm defend against the Cyber Criminal. Education, awareness and communication will help defend against the criminal element and protect our clients and our firms. The ongoing impact to financial firms is of critical importance to all. We hope this session will help educate you on your role in the defense process as well as review the regulatory landscape surrounding this topic.
As a finance or accounting professional, you should be familiar with exactly what these IFRS standards for Extractive Industries consist of, and what they mean for companies in the oil, gas and mining industries. This webinar will help you become acquainted with the latest information regarding IFRS for companies in the resource sector.
This class is designed to give you the basics for doing an operational audit. We will discuss management and audit concepts to help you understand how the process works. We will also do some exercises to further strengthen your knowledge.
Excel expert David Ringstrom, CPA, will share helpful tweaks you can use with the revered VLOOKUP function in this valuable webcast. VLOOKUP is the lookup function many users rely on to return data from other locations in a worksheet. However, using VLOOKUP isn't always the most efficient approach, so David will explain alternatives, including the INDEX and MATCH, SUMIF, SUMIFS, SUMPRODUCT, IFNA, and OFFSET functions.
This webinar will explain the concept of International ACH, how it works, rationale for choosing it and how it differs from US domestic ACH. It will also discuss what the International Payments Framework Association (IPFA) is and how it addresses International ACH issues. Instructor will cover customer benefits and value proposition regarding International ACH and why it may be preferred over wire transfers.
If you are looking for ways to improve your Corporate Expense Account Oversight and Reporting, you will find best-of-breed practices and suggestions at a basic level. Finance and Operational staff will find this presentation interesting and informative. This webinar will provide you with some of the best practices in corporate expense account review used today.
What are the rules regarding paying and IRS reporting on Independent Contractors? How do I avoid the IRS CP-2100 (B-Notices)? What if my vendor claims exemption; must I obtain a W-9 anyway? What are the best practices? How can I minimize risk of improper exemption claims by my vendors? Get the answers to these and related questions to reduce your risk of huge penalties from the IRS.
Excel expert David H. Ringstrom, CPA, draws your attention to the What-If Analysis tools available within Excel's Data menu in this informative presentation. David teaches you how and when to make use of Excel's Scenario Manager as well as how to use the Data Table feature to compare calculation results based on two or three inputs. He also explains how Excel's Goal Seek feature empowers you to perform basic what-if analyses, in effect, solving for a single value.
Learn from Excel expert David H. Ringstrom, CPA, how to create resilient and practical budget spreadsheets in this informative webcast. David shares a wide range of helpful techniques, including how to separate inputs from calculations, streamline formula writing, preserve key formulas, and create both operating and cash flow budgets. In addition, he explains the uses and benefits of a variety of Excel functions, including CHOOSE IFNA, IFERROR, and ISERROR ROUNDUP and ROUNDDOWN VLOOKUP and SUM and SUMIF.
Written specifically for businesses, not-for-profits and government agencies, this 90-minute information packed course delves into the best practices every organization should implement to detect and mitigate the threat of ACH fraud. From internal controls and processes, to services you should discuss with your financial institution, this course helps any size organization reduce their exposure and risk. Regardless of how relentless the fraud is, so much of today's fraud losses can be avoided if you know what to look for and implement the right controls. The types of internal processes and controls necessary vary by industry and organization size. This course reviews a wide variety of options and recommendations to assist attendees with developing their own internal protocols.
Grab a cup of coffee and join us to learn how to analyze the numbers, and use this intel to juice up virtually every facet of your organization's operations from marketing, to finance, to HR, to customer service and sales.
Cyber-attacks and breaches dominate the media and are a significant focus of the government. Businesses and financial institutions are faced with the grim reality that a cyber-attack is inevitable. It's not a matter of if an attack will occur, only when. Entities large and small are under siege by sophisticated attacks that often are financially driven, draining accounts as effectively as they cut off the entities operations. Incident Response Plans today have to consider a myriad of possible attack methods to ensure Plans appropriately mitigate unique threats.