Due to the availability of spreadsheets and their ease of modification, these practices are understandable but not optimal.
Moving Beyond Spreadsheets: Cash Management in 2018
Date: Tuesday, April 17th, 2018
Time: 2:00PM – 3:00PM EST
Where: This is an online event.
This session will aid users in understanding the risks of using sub-optimal resources and the benefits of leveraging best practices and constantly improving technology.
1.2 CTP and FP&A re-certification credits will be given for this webinar.
You may also be interested in:
Webinar: Bank Fee Management Webinar Series: Bank Account Management and Structures
Continuing the series on bank relationship management, we transition now to bank account management and structures. Properly designing the cash management structures is vital for operational efficiency and control. Banking structures, for most corporations, will include multiple banks, and several longstanding principles and techniques are being supplemented with new structures. Turmoil in the banking sector has caused a revival for operational backup structures to strengthen the risk management footing of the organization. Additionally, the process and tools of bank account management can look notably different depending upon the organization’s complexity and size. This session will highlight many of the key details from both of these components.
Webinar: 2023 Treasury Fraud & Controls Survey Results | April 4
The Treasury Fraud and Controls Survey studies the current state of fraud experience, security
measures, and plans for the future. The 2023 results provide valuable data on multiple elements
impacting corporate fraud and security, including most commonly experienced fraud types, trends in
control measures and training policies, investment plans for prevention and detection technology, and
more. This webinar will highlight and discuss some of the key findings from this year’s research, covering
topics such as the following:
• Views of the fraud threat level and corporate security position
• Fraud types and rates of loss and attack
• Security practices and controls employed
• Types of cyber security technology currently employed
• Expected investments in security & fraud prevention technology