All Training articles
View all stories of the same content type.
-
Training
The internal threat actor: Fraud prevention & detection training
This one-day course will explore how poorly crafted incentives and a lack of true oversight can lead to internal fraud. The discussion will break down how to evaluate your organization’s anti-fraud program and controls for effectiveness and continuous improvement.
-
Training
Information security compliance: Need to know
This one-day course will help you learn the basic and necessary procedures needed to help organizations establish and maintain effective controls to cover information security risks.
-
Training
FCPA essentials training
This one-day course offers practical guidance regarding how to comply with the Foreign Corrupt Practices Act, U.K. Bribery Act, and other anti-bribery laws.
-
Training
Third-party program risk assessments
This one-day course will help you learn the basic and necessary controls needed to ensure organizations identify, establish, assess, and maintain effective controls to help manage third-party arrangements through a well-defined risk assessment process.
-
Training
Ransomware Attack: A scenario-based immersive learning
Take this self-directed, interactive immersive study of a fictional cyber event based on real-life scenarios to deepen your understanding of the importance of crisis management planning and put you in the shoes of a compliance leader during a ransomware attack.
-
Training
On-demand training: Everything you need to know about ESG but were afraid to ask
Take this self-directed, interactive course to deepen your understanding of the increasing importance of environmental, social, and corporate governance initiatives and how ESG planning processes can help manage risks and lead to better reporting outcomes.
-
Training
On-demand training: Protect your company from cyber risks
Take this self-directed, interactive course to deepen your understanding of cybersecurity risks and learn about the latest regulations to keep your organization compliant and prepared for today’s dangerous cyber environment.