The GSB Online Seminar Series

The GSB Online Seminars Series offers a convenient, cost-effective way to access quality educational opportunities. Please note ALL times below in CENTRAL TIMEZONE.

Learn more »

Upcoming Sessions

See All Upcoming Sessions

Get these programs together at a discount: Overview of Appraisal Rules/Guidelines and the Review Process - October 5 Appraisal Approaches to Value De-mystified - October 12 Key Appraisal Components Beyond the Approaches to Value - October 19 Overview of Evaluations and Other Valuation Options - October 26 Read More

Get these programs together at a discount: Developing a Cash Flow and Key Ratios - October 5 Cap Rates and Factors Beyond Debt Coverage and Loan-to Value - October 12 Issues with Property Types & Lease Structures - October 19 Developing a Global Analysis of Property Holdings - October 26 Read More

Presenter: Richard Hamm, Advantage Consulting & Training This 90-minute program will be presented live on: November 23, 8:30-10:00 a.m. Central Time Recording available through: February 23, 2022 Price: $275 Analyzing business financial statements and tax returns starts with understanding the basic components of the balance sheet and income statement, along with the reconciliation of retained earnings, plus footnotes and other disclosures.  The business tax return is nothing more than a financial statement with similar components, but with a different format and structure.  A second step is to use a diagram, with the components in rough proportion to dollar size, to see how the components “flow” together and interact to create three major financial relationships:  (1) Sales to total assets, (2) profit retention, and (3) leverage.  A third step is to identify and understand the key principles underlying the three primary methods of accounting, followed by examining an accountant cover letter, if applicable. Topics to be covered include: Identify various financial statement analysis options and tools, plus the basic structure and purposes of financial statements and tax returns Diagram the statement components and how they flow together and create three major relationships Identify various levels of accountant-prepared financial statements (compilations, reviews and audits) and related accountant cover letters Describe key issues in using internal or company-prepared statements, as well as interim statements Compare and contrast the three primary methods of accounting Key standards, limitations and alternatives within accrual accounting or generally accepted accounting principles (GAAP) Target Audience:  Credit analysts, portfolio managers, assistant relationship managers, community bankers, small business lenders, commercial lenders, consumer lenders, branch managers that lend to business owners, private bankers, special assets Read More

Get these programs together at a discount: Administering and Monitoring Residential Construction Loans - September 28 Analyzing Personal Financial Statements and Loan Applications - November 23 Overview of Credit History and the Role of Collateral - November 30 Overview of Residential Mortgages and Home Equity Lending - December 7 Read More

Presenter:   Buzz Hillestad, SBS CyberSecurity This 90-minute program will be presented live on: November 5, 10:00-11:30 a.m. Central Time Recording available through: February 5, 2022 Price: $275 When notified of a malware infection on a bank or customer system, it is the digital equivalent of being notified about a robbery. In a robbery situation, we would preserve evidence and investigate the crime. All too often in the digital world, we respond to malware infections with intentions to remove it and get the system back into production. When really, we need to enact our incident response plan and evaluate how we might have just been robbed – digitally. It’s more difficult in a digital robbery to immediately identify if data or money were stolen. We should conduct a digital investigation to ensure the crime is still not occurring, identify what was stolen, and identify who stole it. Information must also be collected from the employees and clearly documented. This discussion will overview different types of incidents that are more frequent for financial institutions and illustrate how to prepare for them. The following are key focuses for our digital robbery discussion: Trending cybercrime and malware threats Examination of which IT systems are affected Breakdown of business process to explore who is affected Standard Incident Response Procedures Basic digital forensic Target Audience:  Incident Response Team, Information Security Officer, IT Manager, Risk Officer, Internal Auditor, and IT focused resources looking to assist in governance or implementation of Incident Response. This program qualifies for the following CPE Credits through the SBS Institute:  1.5 CPEs*: CBSM, CBSTP, CBIH  ISC2*: Estimated 1.5 hrs. CISSP.  ISACA*: Estimated 1.5 hrs. CISA/CISM/CRISC. *Self-Reporting Read More

Presenter: Shane Daniel, SBS CyberSecurity, LLC This 90-minute program will be presented live on: December 3, 10:00-11:30 a.m. Central Time Recording available through: March 3, 2022 Price: $275 Boards have the ultimate responsibility for the security of customer information, as well as the responsibility to approve financial investments into cybersecurity, create accountability in the institution for security operations, and set clear expectations for management. A positive culture needs to be established for the organization to be successful in addressing cybersecurity needs. For an organization’s culture to be positive, it must start with the Board. Important decisions are made at each board meeting that affect strategic objectives, products and service offerings, and ultimately information security. Poorly informed or misinformed decision makers could influence security negatively and cause unintended damage to an institution. Understanding the basics of an Information Security Program is critical for the board to make effective discussions. This session will discuss how to improve communication and reporting with the board, basic processes and components of the ISP relevant to the board create, and how to improve cybersecurity culture.   The following topics will be discussed:  Information security program basics  Trends in cybersecurity  Improving board information flow  Cybersecurity culture  Roles and responsibilities   Target Audience:  Both board members and information security professional will benefit from this session. Board and Senior Executives will receive a basic review of Cybersecurity and a strong Information Security Program, plus questions to ask of management. Members of the management team will benefit from a better understanding of what the board needs to know, how to communicate it, and tips in creating a strong culture.    This program qualifies for the following CPE Credits through the SBS Institute: 1.5 CPEs*: CBSM, CBSE, CBCM   ISC2*: Estimated 1.5 hrs. CISSP.  ISACA*: Estimated 1.5 hrs. CISA/CISM/CRISC. *Self-Reporting Read More

Shopping Cart

Your cart is empty