New RGP Training Opportunities!

August better prepare:  it will have a hard time handling all the new training opportunities that policyIQ and RGP are throwing at it!  Be sure to follow proper procedures (included in the sign-up after the links) for CPE credit, if applicable.  Here is a quick glance at the upcoming events:

policyIQ Training:

August 20: policyIQ “Introduction to policyIQ” Training

It’s that time again!  As part of our ongoing quarterly training, this event will be hosted via WebEx and will include helpful notes, ideas and tips for new or prospective users of policyIQ.  Participants will learn the basic navigation of policyIQ, create and edit content, and even learn what is possible with our reporting module.  Even more experienced users will find valuable new tips to share with colleagues.  Plus, we’ll provide you with a recording of the session just for attending.  You won’t want to miss it!

RGP Training:

August 6: Third Party Oversight – Vendor Risk Management

Third Party Oversight is now a significant compliance initiative for many companies, and requires comprehensive controls and oversight.  In this webcast, RGP professionals will provide an overview of the compliance initiative, examine how companies are establishing and advancing their programs, and discuss RGP’s proven methodology used with our clients to achieve sustainable compliance with these important regulatory requirements.

August 13: FASB & IASB Update – Financial Instruments and Insurance Projects

Join RGP for an update on the status of projects currently being developed by the FASB and IASB. Although these are “joint projects”, we will also review the areas in which the FASB and IASB have diverged. We will also discuss the future of the IFRS in the United States.

August 27: Cyber Security Risk Assessment: A Practical Approach

RGP’s Rebecca Snevel and Ed Glover will present strategies and best practices to protect sensitive corporate data and provide a holistic approach to Cyber Security.  Among the items discussed will be Risk Assessments, Vendor/Business Partner Risk Assessments, and information security control design.  This session will not only demystify the complexities of Information Security but give you practical steps you can implement to better protect your organization from a security breach.

Be prepared, August.  There’s a lot on your plate.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s