Search Trainings

117 results of "Multi Industry x" and "Information Technology x"
Live Webinar

Using Controls and Segregation of Duties to Build a Bullet Proof AP Operation

This training program will detail how to create a bullet-proof AP operation that is setup to detect and proactively prevent fraud from occurring. During this session, the webinar presenter will discuss real cases of AP fraud and the controls that organizations ...

Live Webinar

Letters of Credit for Importers and Exporters

This web session is designed to provide attendees with an end-to-end understanding of the L/C (letter of credit) process. From the beginning of a contractual agreement, through the letter of credit application process and actual negotiation of the L/C, this in ...

Live Webinar

Best Practices: How to deal with Hoarding, Resident Harassment, Unauthorized Pets and Tenant, Drugs, Noise Complaints and other Management Issues

This webinar covers many of the common issues facing property managers and property owners today. Paul will go over how to correctly document various tenant violations and strategies and techniques for documenting and solving resident violations. Bonus This w ...

Live Webinar

Unmanageable Inbox? Imagine a Clean Inbox and Take Control Today!

Do you remember when hand-written letters or typed letters were the main means of communication? If so, you may also remember how glorious it was to send information and have immediately received via the fax machine. Nearly as irritating as letters were the p ...

Live Webinar

Integrating Word, Excel and PowerPoint

Microsoft Office is known for integration capabilities. We typically work with Excel, Word and PowerPoint individually, and we may insert data from Excel into a Word report or a PowerPoint presentation. Each program has features specific to sharing data automa ...

Live Webinar

NY State Shield Requirements for Cyber Security and Protection of Personally Identifiable Information

New York State recently passed the ‘Stop Hacks and Improve Electronic Data’ Security Act (SHIELD Act) and is set to go into effect by October 23rd of this year. The SHIELD Act requires employers in possession of New York residents' private information to "dev ...

Live Webinar

Essentials of IT Auditing for the Non-IT Auditor

Information Technology (IT) is a critical enabler of business. As computing power has advanced, enterprises have become increasingly dependent on technology to carry out their operational requirements and to collect, process, maintain and report essential data ...

Live Webinar

DEALING WITH THE PANDEMIC OF BED BUGS & PESTS USING IPM METHOD

HUD Requirement & Compliance - Eliminate Bed Bug Infestations Before They Become a Serious Health and Compliance Headache  With bed bug infestations being a serious problem throughout the country. Bed bugs are once again making a comeback in dorm rooms, hotel ...

Live Webinar

Excel Spreadsheets; Ensuring Data Integrity and 21 CFR Part 11 Compliance

This interactive webinar explains how to configure and validate a GxP compliant spreadsheet applications to avoid FDA 483s. Follow the step-by-step instructions as we configure Excel for audit trails, security features, and data entry verification. Understand ...

Live Webinar

Leadership: The Art of Knowing How to Say It and Engage It

Today's 24/7, "always-on" world often cycles between "do more with less" downsizing and ever faster upgrading and can even appear to be spinning out of control. How do you harness the problem-solving support, resiliency and creativity in your work team? Are yo ...

  • Basic & Intermediate
  • 60 Mins
  • Mark Gorkin
  • Dec 12, 2019