Deposit Operations Fraud Trends: Identification, Mitigation and Prevention
A financial institution’s deposit operations area performs many operational functions and identifies fraud that may often times be missed in other monitoring […]
Real Estate Appraisals – Regulations, Processes, and Pitfalls
A key part of commercial real estate (CRE) lending is assessing the bank’s secondary source of repayment for the loan i.e. liquidation […]
Aligning Debit Card Programs with External Fraud Threats
Debit card fraud losses have had a significant impact on the bottom line for many financial institutions due to social engineering attacks […]
Key Lender Mistakes in Underwriting and Structuring Commercial Loans
Executive management and lenders often attribute portfolio loan problems to borrower mistakes or failures in management. Unfortunately, in many instances, it is […]
Analyzing Corporate and Personal Tax Returns for Lenders (2-Part Webinar Series)
Small business lenders often rely on tax returns when analyzing a borrower. Tax returns do provide significant information for evaluating the small […]
Documenting Your Zelle And Person To Person (P2P) Payments Risk Assessment
P2P payments (also known as social payments) have significantly changed the way consumers make payments to each other. This session will differentiate […]
Wire Transfer Basics for New Employees and Refresher for Existing Employees
This webinar covers the basics of wire transfer and is great for new employees or as a refresher for existing employees. Areas […]
BSA Negative News Searches: Search Tools and Best Practice Tips
Know Your Customer (KYC) is a critical part of a strong BSA/AML compliance program. The purpose of KYC is to identify customers, […]
Why EBITDA Doesn’t Spell Cash Flow
EBITDA (Earnings before Interest, Taxes, Depreciation, and Amortization) is a popular measure of cash flow, but it is not accurate, and bankers […]
Trends in Call Center Fraud and Leading Practices for Identification and Response
Call centers are targets for fraudsters looking to gain access to financial information and other sensitive information. Fraudsters typically navigate through a […]