top of page
Vendor Data Management

Vendor Data Management

Authentication > Validation > Management


Welcome to the Vendor Data Management CPE webinar event, where we delve into the critical aspects of managing vendor data effectively and securely within your procure to pay processes. Our goal is to equip you with the knowledge and tools necessary to navigate the complexities of managing vendor data in today's business landscape.


Our Vendor Data Management CPE event is designed to provide comprehensive insights into the best practices for collecting, storing, and securing vendor data. In an age where data breaches and cyber threats are on the rise, it's crucial for businesses to prioritize the protection of their vendor data. Discover 5 Authentication Techniques, 29 Internal Controls, 17 Best Practices, and 16 Vendor Validations with immediate takeaways to implement now whether you have no clearly defined process, a paper/electronic form, or a vendor self-registration portal. Managing vendor data is a priority in the procure to payment process.


This CPE event aims to empower vendor management professionals with the expertise needed to mitigate risks and avoid compliance fines and bad vendor data. We will equip your procure to payment staff in properly managing vendor data.


What You'll Learn


Authentication – Learn 5 Authentication Techniques and 13 Internal Controls when collecting vendor supporting documentation and the management of vendor data. Create your Authentication Reference to reduce fraud risk when communicating with vendors or internal team members.

Validation – Learn 16 Vendor Validations and 3 Internal Controls to ensure managment of vendor data is accurate and that vendors are real. Customize your Vendor Validation Reference List specific to your company and industry to ensure you are performing the validations required.

Management – Learn 13 Internal Controls and 17 Best Practices to maintain accurate vendor data. Discover a customizable step by step process to managing vendors in your vendor master file.


Templates Included

  • Vendor Validation Reference List - TEMPLATE
  • Authentication Reference - TEMPLATE


Who Should Attend


This internal control training event is ideal for professionals involved in procurement, managing vendors, compliance, information security, and anyone responsible for the integrity and security of managing vendor data within their organization.


Why Attend


By attending this event, you'll gain actionable insights and practical strategies to strengthen your organization's managing vendor data practices. You'll also have the opportunity to connect with industry experts and peers, expanding your professional network and staying abreast of the latest trends in vendor data management. (is this for in-person?)


We look forward to welcoming you to management of vendor data CPE event, where we'll navigate the complexities of vendor data management together and empower you with the knowledge to protect your organization's valuable data assets.


Register Now to secure your spot and take the first step towards enhancing your managing vendor capabilities!


This internal control training course provides each attendee will receive 4 CPE Event Hours (YB). A certificate of completion will be provided.

  • Details on Event Presentation

    Offered every six weeks on Fridays at 10:00 a.m. to 2:30 p.m. Central Time in four CPE-Credit event.

    We can schedule private events on your timetable for two or more attendees. This event is also available for on-site private training for your procurement staff.

    NASBA Program Disclosure

    Program Level of Understanding: Basic
    Prerequisites: None
    Advance Preparation: None
    Delivery Format: Group Internet Based
    NASBA Field(s) of Study: Auditing
    CPE Credits: 4, based on 50 minutes of instruction per hour

  • CPE Event Highlights

    1. Data Security Strategies

    Discover the latest strategies and technologies for safeguarding vendor data against cyber threats and payment fraud. Gain valuable insights into practical security measures designed to protect your organization's invaluable data assets.

    2. Compliance Requirements Demystified

    Navigate the regulatory landscape surrounding vendor data management, including GDPR, CCPA, and more. Ensure compliance with data protection regulations while optimizing your vendor data management practices.

    3. Proactive Risk Mitigation

    Go beyond collecting vendor data and entering it into your vendor master file.  Equip yourself with effective risk assessment and mitigation techniques to proactively address vulnerabilities in vendor data management. Learn to identify and mitigate risks for a robust data management strategy.

    4. Leading Industry Framework

    Explore Authentication.Validation.ManagementTM, a proven framework for vendor data management to avoid fraud, regulatory fines and bad vendor data.   Elevate your data management approach with insights from an experienced professional.

    Explore Authentication.Validation.ManagementTM, a proven framework for vendor data management to avoid fraud, regulatory fines and bad vendor data.   Elevate your data management approach with insights from an experienced professional.

  • Learning Objectives

    • Dive into the cutting-edge strategies and technologies crafted to protect vendor data against evolving cyber threats that can lead to payment fraud.
    • Embark on a journey through a comprehensive foundation framework for vendor data management.
    • Arm yourself with impactful mitigation techniques to proactively tackle vulnerabilities in vendor data management.
    • Discover the industry's authentication techniques, internal controls, best practices, and vendor validations for accurate vendor data management to avoid payment fraud, regulatory fines and bad vendor data.
  • Key Issues on the Agenda


    Section 1 Fraud in the Vendor Process

    • Sensitive Personal Information
    • Social Engineering Schemes
    • Occupational Fraud

    Section 2 Three Step Vendor Setup & Maintenance Process
    Section 3 Data Authentication

    • Authentication Techniques for Callers
    • Authentication Techniques for Emails
    • Authentication Techniques for Vendor Information Fields
    • Authentication Recap

    Section 4 Validation of Data

    • Validate Vendor Data Collected
    • Validate Vendor Banking Data Collected
    • Other Validation Considerations
    • Validate Recap

    Section 5 Management of Vendor Data

    • Vendor Master File Best Practices
    • Vendor Master File Internal Controls
    • Vendor Master File Vendor Data Review
    • Managsment Recap

    Section 6 Summary and Wrap-Up


  • Summary of the Subject Matter

    This CPE training event provides an insightful exploration of the essential strategies and technologies aimed at safeguarding vendor data against emerging cyber threats that can lead to payment fraud, compliance fines and bad vendor data.

    It also delves deep into the intricate landscape of regulatory compliance that surrounds vendor data management, offering a comprehensive understanding of the crucial requirements and implications. Additionally, the training event equips individuals with effective risk assessment and mitigation techniques, empowering them to proactively address vulnerabilities in vendor data management.

    Furthermore, the instruction uncovers the industry's authentication techniques, internal controls, best practices and vendor validation in a framework that have proven to be an effective strategy for vendor data management.

  • Distinguished Instructor

    Debra R Richardson, MBA, CFE, APM, APPM, CPRS

    Debra, an accounts payable consultant with over 20 years of experience in Fortune 500 companies like Verizon, General Motors, and Aramark, is a seasoned professional in accounts payable, accounts receivable, general ledger, and financial reporting. Debra brings a wealth of knowledge to her events.A Certified Fraud Examiner (CFE), her expertise in Global Vendor Maintenance and implementation of vendor self-registration portals has been pivotal in establishing robust internal controls to prevent fraud.

bottom of page