Many treasury departments are still using outdated technology and spreadsheets to manage massive cash flow.

Due to the availability of spreadsheets and their ease of modification, these practices are understandable but not optimal. 

Moving Beyond Spreadsheets: Cash Management in 2018

Co-Presented with Axletree Solutions

Date:     Tuesday, April 17th, 2018

Time:     2:00PM – 3:00PM EST

Where:  This is an online event.

With how quickly technology changes, it makes sense that treasurers tend to rely on spreadsheets a majority of the time. While this is easy, it is not the best solution available. There are best practices for the crucial activities that are demanded of treasurers that should be taken advantage of including visibility to cash, banking structure simplicity, and bullet-proof cash management.

This session will aid users in understanding the risks of using sub-optimal resources and the benefits of leveraging best practices and constantly improving technology. 

1.2 CTP and FP&A re-certification credits will be given for this webinar.

View the replay:
Download the deck from the webinar here:
If you encounter any issues with the replay or have questions regarding credits, please contact our team.

You may also be interested in:

Webinar: 2023 Treasury Fraud & Controls Survey Results | April 4

Webinar: 2023 Treasury Fraud & Controls Survey Results | April 4

The Treasury Fraud and Controls Survey studies the current state of fraud experience, security
measures, and plans for the future. The 2023 results provide valuable data on multiple elements
impacting corporate fraud and security, including most commonly experienced fraud types, trends in
control measures and training policies, investment plans for prevention and detection technology, and
more. This webinar will highlight and discuss some of the key findings from this year’s research, covering
topics such as the following:

• Views of the fraud threat level and corporate security position
• Fraud types and rates of loss and attack
• Security practices and controls employed
• Types of cyber security technology currently employed
• Expected investments in security & fraud prevention technology