
Training Institute
a Wholly Owned Division of AuditNet®
in conjunction with
WEBINAR RECORDINGS AVAILABLE FOR PURCHASE

Missed the Event?
As soon as you have purchased the recordings you will be provided with the access URL for the recording (we will send you the username and password)
Pay for the number of Webinars you would like and indicate the number(s) in an email to webinars @ auditnet.org
2012-23 Using Data Analytics to Detect Procure-to-Pay Fraud October
29, 2012
This “how-to” Webinar will how you how to apply the powers of
user-friendly data analysis to detect the numerous frauds threatening
all three key components of procure-to-pay: Procurement ... Receiving
... Disbursement.
What you will learn:
- Common and not-so-common frauds in procurement, receiving and • payment
- Who commits P2P fraud
- Red flags of fraud in procurement, receiving and payment
- Detecting the red flags using data analytics tools
- How to minimize risk of becoming a victim of P2P fraud
Special guest presenter: Katrina Kiselinchev, CPA, CIA, CFE, CFF, president of Inclusivitie LLC, an accounting, consulting and investigative firm.Katrina has over 15 years of experience in consulting, project management, finance, strategy, fraud investigation and forensic accounting in such industries as energy, retail, banking, healthcare, hospitality and not-for-profits.
Date: Monday, October 29, 2012
Time: Recorded
CPE: N/A
Level: Intermediate
SPECIAL FREE BONUS for all attendees of this Webinar:
• Special Report: “Procure-to-Pay Fraud Detection and Prevention: The
Insider Threat” by Peter Goldmann, MSc., CFE ($40 value)
2012-22 When Law Enforcement Come Knocking October 23, 2012
When dealing with the law enforcement when fraud has occurred or is
suspected, your rule of thumb should be to choose your
words very carefully.
Reason: It is a felony to lie to the government, punishable by jail
time. It doesn’t matter that the lie wasn’t made under oath.
It doesn’t matter that you weren’t warned of the possible consequences
of lying. It doesn’t even matter that the lie
didn’t deceive the government.
Part of the AuditNet-FraudAware Webinar Series, "Detecting and Preventing Fraud in Today's High-Crime Climate", in this session you will learn:
- How to greet law enforcement agents when they show up asking for an interview related to an alleged fraud
- Your rights when being asked for information about an alleged fraud
- How to avoid legal traps when answer law enforcement officials’ questions
- When to contact an attorney
- Rules of thumb for how to answer specific questions
Title: "When Law Enforcement Comes
Knocking"
Date & Time Recorded Tuesday, October 23, 2012
Time N/A
CPE Credits: N/A
Level: Basic/Intermediate
2012-21
Social Networking and Fraud Risk—What you Don’t Know Can Cost
You Oct. 10
Social media--Facebook, LinkedIn and other on-line "communities"-- are
being used by virtually every computer user in the world. Problem is
that with social media use comes social media-based fraud. And it's not
just the individual user who is at risk of identity theft, fraud and
abuse ... it's the organizations they work for as well.
What you will learn:
- How E-fraudsters exploit Facebook and other social media sites to commit fraud
- How to monitor social media sites for signs of criminal actions against your organization
- Who should be accountable for monitoring and reacting to social media attacks
Special guest presenter: Robert Siciliano, CEO,
www.IDTheftSecurity.com For over 20 years Robert has been researching
and keeping in tune with all aspects of on-line security by staying on
top of what is new and ahead of what is next at all times. His purpose
is to inform and educate individuals and organizations to avoid becoming
a statistic in the identity theft, social engineering and other on-line
fraud environments. He says “There always has been, there is now and
there will always be a criminal predatory element stalking their next
victim. Being proactive and knowing your options are essential.”
Date: Wednesday, October 10, 2012
Time: 2PM -3:15PM EDT (Eastern, GMT -0500)
CPE: N/A
Level: Intermediate
Cost: $85
2012-20
Protecting Your Organization from the Growing Threat of External Cyber
Fraud Sep 19
Latest research from top experts indicates that 98% of all cyber-attacks were perpetrated by outsiders. In 2011. That represents a staggering increase of 12 percentage points over 2010. There is a good reason for that: Most organizations lack the anti-cybercrime prevention and detection measures needed to avoid being victimized by the growing army of online criminals operating from virtually everywhere in the world. But it doesn’t have to be that way...
In this critically important Webinar, you will learn:
- Types of information fraudsters outside hackers may try to steal
- Latest cyber-threats to protect against
- How stolen information is used to sabotage, extort and financially undermine your organization
- How to measure your organization’s current cyber- security status
- Essential protective measures for
minimizing risk of externally-perpetrated computer and Internet
fraud now
Special Guest Presenter: Jeff Kalwerisky, Vice President and Director of Information Security Training at CPE Interactive. Jeff has specialized in information security, information risk management and IT auditing for over 30 years. He has held executive positions in information security and risk management with Accenture and Booz Allen Hamilton consulting firms. In both of these capacities, he has consulted with Fortune 100 companies as well as national governments, assisting in their development and deployment of enterprise security governance policies and frameworks, and technology solutions that strengthen information security and data privacy/protection.
Date & Time Wednesday, September 19,
Time 2:00-3:15 EDT
CPE Credits: N/A
Level: Basic/Intermediate
2012-19
Best Practices in Detecting Accounts Payable Fraud Using Data Analysis
September 11
One of our most popular Webinars over the years— if you haven’t attended it yet, you should definitely consider making time for it this year. Even if you have attended it before, this year’s Webinar will offer plenty of fresh AP fraud-detection tools and techniques using popular data analytics software as well as new and unqiue case studies.
This “how-to” Webinar is being offered
again in response to the high demand for knowledge about how to
efficiently and inexpensively detect Accounts Payable and related frauds
using today’s top audit automation tools.
You will learn how to....
- Uncover check fraud in accounts payable
- Detect duplicate billing schemes
- Detect and prevent expense reimbursement scams
- Flag bogus invoices
- Identify Purchasing Card and other employee expense scams and schemes
Special guest presenter: Katrina Kiselinchev, CPA, CIA, CFE, CFF, president of Inclusivitie LLC, an accounting, consulting and investigative firm.Katrina has over 15 years of experience in consulting, project management, finance, strategy, fraud investigation and forensic accounting in such industries as energy, retail, banking, healthcare, hospitality and not-for-profits.
Date: Tuesday, Sept. 11, 2012
Time: 11AM -1PM EDT (Eastern, GMT -0500)
CPE: N/A
Level: Intermediate
Cost: $99
FREE BONUSES for all attendees of this Webinar include:
-
Special AuditNet Accounts Payable Audit Plan with Data Analytics ($50 value)
- Special Report “Introduction to Fraudulent Financial Reporting White Paper” by Peter Goldmann, MSc., CFE ($40 value) by Peter Goldmann, MSc., CFE ($40 value)
2012-18
How to Apply Benford's Law to Detect Fraud in
Accounting Data Aug 8
How to Apply Benford's Law to Detect Fraud in Accounting Data (Recorded August 8, 2012)
Almost from the beginning, proponents of Benford’s Law have suggested that it would be a beneficial tool for fraud detection. You may actually be using it already. But are you getting all of the advantages that Benford’s offers in detecting fraud?
In this Webinar, you’ll learn from a top expert:
1.
Exactly how Benford’s Law works—and doesn’t work—in clear, concise
terminology
2. How Benford’s Law can help
detect the red flags of different types of fraud
3. Best data to use in Benford’s
Law tests
4. Step-by-step demonstration of
applying Benford’s Law to fraud audits
5. Software programs for
facilitating use of Benford’s Law
This Webinar will include a video segment with Dr. Mark Nigrini, renowned expert on Benford’s Law. Mark’s latest book Benford's Law was published in April, 2012. His previous books include Using Microsoft Access for data analysis and interrogation and Forensic Analytics.
Speaker - Richard B. Lanza, CPA, CFE – President – Cash Recovery Partners, LLC

- Over two decades of ACL and Excel software usage
- Wrote the first practical ACL publication on how to use the product in 101 ways (101 ACL Applications)
- CPA, CFE, and over 10 years of external/internal audit experience.
- Has written and spoken on the use of audit data analytics for over 15 years.
- Received the Outstanding Achievement in Business Award by the Association of Certified Fraud Examiners for developing the publication Proactively Detecting Fraud Using Computer Audit Reports as a research project for the IIA – Link to
-
Recently was a contributing author of:
- Global Technology Audit Guide (GTAG #13) Fraud in an Automated World – Institute of Internal Auditors. –
- Data Analytics – A Practical Approach - research whitepaper for the Information System Accountability Control Association.
- Cost Recovery – Turning Your Accounts Payable Department into a Profit Center – Wiley and Sons.
- Currently builds customized continuous monitoring applications for clients
Please see Rich’s full bio at http://www.richlanza.com/
2012-17 Fraud, Corruption & Money Laundering: Prevention, Detection and Recovery (FCPA) July 2012
Fraud, Corruption & Money Laundering: Prevention, Detection and Recovery (FCPA)
Wal-Mart is the latest company to get caught paying illegal bribes to foreign government officials—a violation of the Foreign Corrupt Practices Act (FCPA)... The SEC and Department of Justice are on a rampage to catch organizations—large and small—that violate this tricky law. Penalties can be painfully steep.
In this Webinar, you’ll learn:
-
Overview of anti-corruption laws and regulations
-
Why You Should Be Concerned About Anti-Corruption Laws (include case studies)
-
Main anti-bribery compliance requirements & how to document them in event of investigation
-
How to do business without running afoul of anti-bribery laws
Title: Fraud, Corruption & Money Laundering: Prevention, Detection
and Recovery (FCPA)
Date: Recorded Wednesday,
July 25, 2012
Time: 2:00 PM - 3:15 PM EDT
CPE: Not available
Special Guest presenters:
Brian J. Mich, JD, CAMS, Managing Director and Pei Li Wong, Director, BDO Consulting
2012-16 How to Catch Expense Reimbursement (T & E) Cheaters Using Data Analysis July 12
Travel & Entertainment expenses rank high on the list of budget items most vulnerable to fraud and abuse.
Reason: There are virtually countless ways employees with T&E privileges can exploit those privileges, believing that they won’t get caught.
The good news is that with focused audit planning and the use of basic data analytics tools and techniques, your organization can begin preventing much of this type of fraud almost overnight.
In this Webinar, you’ll learn:
· How to detect common T&E schemes such as getting reimbursement TWICE for the same expenses ... using bogus receipts to get reimbursed for expenses never incurred... abusing corporate credit and P-cards for personal expenses ... and more
· Best practices for T&E fraud deterrence and prevention
· Data analytics-based audit techniques for detecting T&E frauds quickly
· How to formulate a T&E anti-fraud policy
Special guest presenter: Katrina Kiselinchev, CPA, CIA, CFE, CFF, president of Inclusivitie LLC, an accounting, consulting and investigative firm. Katrina has over 15 years of experience in consulting, project management, finance, strategy, fraud investigation and forensic accounting in such industries as energy, retail, banking, healthcare, hospitality and not-for-profits.
2012-15 Effective Fraud Interviewing Techniques (FG-2-2) June 20
What you will learn:
The critical difference between
interviewing and interrogating
Which works best in which situation
Mistakes to avoid in setting up the interview room
Best ways for structuring a fraud interview
Understanding suspects’ body language
Main types of questions and when to use each
Best strategy for getting a confession
Title: Effective Fraud Interviewing
Techniques
Date: Recorded Wednesday, June 20, 2012
Time: 2:00 PM - 3:15 PM EDT
CPE: Not available
Special Guest Panelist: Michael Brozzetti, CIA, CSA, Boundless LLC
2012-14
Best Practices in Preventing and Detecting P-Card Fraud
using Data Analysis (DA-3) June 13
Best Practices in Preventing and Detecting P-Card Fraud using Data Analysis (DA-3) June 13
What you will learn:
Common and not-so-common P-card frauds
Mistakes organizations make in P-card programs that promote fraud
Formulating an effective P-card fraud prevention policy
Red flags of potential P-card fraud
Using data analytics to detect indicators of P-card fraud
Finding the hard evidence of P-card fraud with data analytics
Who in your organization should “own” P-card administration and fraud
prevention
Special Guest Presenter:
CPE: Not available
Special Guest Panelist: Michael MacLellan, Manager, McKesson
Supplemental Bonus File: Procurement Card Fraud by Mike Blakely
2012-13 An Expert’s Advice on Establishing an Organization Wide Fraud Policy June 5
What you will learn:
Critical reasons to have a fraud policy
Why an ethics policy is not enough
Who should formulate the policy
What NOT to include in a fraud policy
Best practices for implementing and enforcing your fraud policy
How to keep your fraud policy current and effective
Title: An Expert’s Advice on Establishing
an Organization Wide Fraud Policy (FG-1-4)
Date: Tuesday, June 5, 2012
Time: 2:00 PM - 3:15 PM EDT
CPE: Not available for recorded event viewing
Special Guest Panelist: Paul McCormack, CFE, Executive Vice President, Connectics
2012-12
Fraud Detection and Prevention Techniques Using Excel May 17
Part of the AuditNet-FraudAware Webinar Series,
"Detecting and Preventing Fraud Using Data Analytics", in this session you will
learn:
• Introducing data analytics software to your audit process
• How to use Excel to boost efficiency and effectiveness in auditing for
different types of fraud
• Demonstrations of Excel's functionality in identifying data anomalies that may
represent red flags of fraud
• Useful shortcuts and processes for making Excel easy
Title: "Fraud Detection and Prevention Techniques
Using Excel"
Date: Recorded May 17, 2012
Time: 2 Hours
From an attendee at one of our recent anti-fraud Webinars:
Hi – I just wanted to say that it was a terrific webinar and I enjoyed it very much. Will you be posting a link to be able to view it again? Some of the searches Charlie Walker performed went a little bit faster than my brain and I would like to be able to view it one more time!”
2012-11
Fraud Risk Assessment — A Top Expert’s Blueprint
Fraud Risk Assessment -- A Top Expert's Blueprint May 22
Part of the AuditNet-FraudAware Webinar Series, "Detecting and
Preventing Fraud in Today's High Crime Climate", in this session you
will learn:
• How your fraud risk assessment can slash your organization's fraud
losses
• Why it is essential to conduct the Fraud Risk Assessment at least
annually
• How to set the right objectives
• Who should conduct your fraud risk assessment
• Step-by-step guidance for conducting a successful FRA
• How to get maximum risk-prevention impact from your FRA
• Traps to avoid when planning and conducting your FRA
Title: Fraud Risk Assessment -- A Top
Expert's Blueprint May 22
Date: Recorded Tuesday, May 22, 2012
2012-10
Fraud Investigation Leading Practices
Sponsored by
The Association of Certified Fraud Examiners most recent Report to the Nations estimates that fraud costs organizations 5% of annual revenue. Extrapolated to the global gross product, the potential loss is a staggering $2.9 trillion. You simply cannot afford to be ill-prepared for the fraudster who is about to come knocking on your front door, sneak in the back, or even worse, is already lurking inside your house.
Falling prey to fraud and misconduct is no longer a matter of “if,” but rather “when,” which then lends itself to the question: “how much?” Developing and implementing a fraud response plan is a good start, yet hardly fail proof if those charged with executing the plan lack a clear understanding of current leading investigative practices and relevant legal considerations. Having the right plan, people and processes are critical; together they influence the efficiency and effectiveness of a company’s efforts to investigate and furthermore, remediate suspect instances of fraud. This webinar will focus on the following key topics:
- Incident Response Planning
- Internal and/or External Legal & Investigative Resources
- Planning the Investigation
- Conducting Interviews
- Collecting & Preserving Evidence
- Forensic Procedures
2012-9
Rooting Out Healthcare Vendor Fraud Using Data Analysis May 2
Part of the AuditNet-FraudAware
Webinar Series, "Detecting and Preventing Fraud Using Data
Analytics", in this session you will learn:
• Who are the dishonest vendors—It’s not always clear!
• Most common phony healthcare vendor frauds now
• Case studies: Surprising ways that vendors rip off hospitals,
clinics and other providers
• How insiders collude with vendors to embezzle funds, divert
inventory and steal confidential data
• Red flags of healthcare billing schemes, sham vendor frauds, drug
diversion schemes and other hugely costly scams
• Proven data analytics procedures for detecting indicators of
healthcare fraud
Title: "Rooting Out Healthcare Vendor
Fraud Using Data Analysis"
Date: Wednesday, May 2, 2012
Time: 11:00 AM - 1:00 PM EDT
2012-8
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data
Analysis April 11
Detecting and Preventing Fixed Asset and
Inventory Fraud Using Data Analytics
What you will learn:
• Phantom inventory: How to know what’s really in your warehouses and
what’s not
• How managers conceal inventory and capital asset theft by reporting
fraudulently inflated values
• Case studies of inventory/fixed asset theft and concealment
• Easy but effective data analytics tests that reveal red flags of
inventory theft and asset value misstatement
• What to do once your data analytics work has uncovered signs of
inventory fraud
Title: "Recognizing and Preventing Fixed Asset and Inventory Fraud
using Data Analysis"
Date: Wednesday, April 11, 2012
Time: Recorded
2012-7
ACH and Check
Fraud—Proven Detection and Prevention Methods April 5, 2012
Part of the AuditNet-FraudAware Webinar
Series, "Detecting and Preventing Fraud in Today's High Crime Climate",
in this session you will learn:
ACH and Check Fraud
"What you will learn:
• Check and ACH fraud schemes you may be surprised by
• Common mistakes that check fraudsters take advantage of
• Powerful ways to detect red flags of check and ACH fraud
• Which prevention measures work and which don’t
• Much more
Title: ACH and Check Fraud—Proven Detection and Prevention Methods
Date: Thursday, April 5, 2012
Time: Recorded event
2012-6
Beat Vendor and
Procurement Fraudsters using Data Analysis March 29, 2012
Part of the AuditNet-FraudAware Webinar Series, "Detecting and
Preventing Fraud Using Data Analytics", in this session you will learn:
• What to look for in the audit using data analysis
• How to conduct the audit using data analysis
• What to do if you find data pointing to potential vendor fraud
• Why to audit a vendor and when
• All about right-to-audit contract clauses
2012-5
Keep Ghosts off Your
Payroll - Detecting and Preventing Payroll Fraud Using Data Analysis
(DA-1) Mar 21
Ghost employee schemes ... Claiming for overtime not worked... Giving oneself a pay raise... Counterfeiting payroll checks...
These are just a few of the increasingly costly payroll schemes ALL
organizations are up against today. And the problem is getting worse.
According to the Association of Certified Fraud Examiners, the average
payroll scheme cost $49,000 in 2008; by 2010 that figure had skyrocketed
by almost 50% to $72,000.
Problem: Without the tools and techniques for detecting these frauds, an
organization can be victimized by these schemes for two full years or
longer!
ESSENTIALS OF SUCCESSFUL SELF DEFENSE
The good news: Now there’s a convenient, low-cost opportunity to learn
how to protect your organization from payroll fraudsters using today’s
user-friendly data analysis software.
Part of the AuditNet-FraudAware Webinar Series, "Detecting and
Preventing Fraud Using Data Analytics", in this session you will learn:
• Costliest forms of internal and external payroll fraud
• Who commits payroll fraud
• Gathering accurate data for effective payroll fraud data analysis
• Powerful and user-friendly audit automation tests and techniques for
detecting red flags of payroll frauds
• Using data analytics results to improve payroll fraud preventative
controls
2012-4
Establishing an Effective
Fraud Awareness Program March 7, 2012
That sounds great but there’s a catch: The number of whistleblower tips is not nearly great enough to keep up with the fraudsters. Fraud is growing at a steady clip and that means organizations need more tips in order to get a step ahead of the fraudsters.
Problem is: Tips won’t come if employees don’t know what to look for. Sarbanes Oxley requires publicly traded companies to have a whistleblower hotline in place for employees to use when the spot suspicious conduct or actual fraud. But the tips will start coming only if you teach your employees what to look for...
MANAGEMENT’S EYES AND EARS
It’s no coincidence that employee tips are at the top of the list of ways that fraud is detected. More and more organizations are gaining better training results and huge savings from awareness training for their employees.
Example: For one large hospitality company, employee fraud awareness training produced a 329% ROI in the 1st year of the training.
MORE BENEFITS OF FRAUD AWARENESS TRAINING
• Makes employees alert to the signs
of fraud by co-workers, supervisors and managers.
• Supports management’s effort to build Tone at the Top -- a culture
of “doing the right thing.”
• Reduces turnover. Investing in employee training reduces high
turnover by building morale. One restaurant chain cut its
out-of-control turnover rate to below 100% after implementing a
multi-course employee E-learning program.
BY ATTENDING THIS WEBINAR YOU’LL
LEARN:
• How to start planning a successful employee fraud awareness
training program
• Best methods for training employees in how to recognize red flags
of fraud
• How to turn fraud awareness into whistleblower tips
• How to measure effectiveness of fraud awareness training
• Who should conduct training and when
2012-3 The Critical Role of Control Self Assessments in Your Anti Fraud
Program Feb. 22, 2012
Part of the AuditNet-FraudAware 2012 Webinar Series, "Detecting and Preventing Fraud Using Data Analysis" Training without Travel.
In this session you will learn:
- The disturbing facts about anti-fraud controls: Why fraud still
pays
- How to identify vulnerabilities in existing anti-fraud controls
in accounts payable, payroll, procurement, T&E and other key
functions
- The Critical Components of Internal Controls
- Segregation of Duties: What it REALLY means and how to use it as
a powerful foundation for effective process-level anti-fraud
controls
- Who should be in charge of building your organization’s
anti-fraud controls
- Case studies: When organizations do controls right
- How to do a proper anti-fraud controls self-assessment
2012-2
Secrets of Uncovering Financial
Statement Fraud Using Data Analysis (DA-2) Feb. 16, 2012
Recent major corporate scandals have prompted business owners to turn to the auditors for fraud risk analysis and proactive fraud checkups. In order to uncover financial statement fraud, auditors analyze the financial statements by using a combination of ratio analysis and certain data analysis techniques such as Benford’s Law, a procedure used to determine the likelihood that data have been altered. The lawsuit filed against Ernst & Young by former New York State Attorney General Andrew Cuomo for allegedly assisting Lehman Brothers to cook its books has been described by some as one of of the largest accounting scandals in history.
Maybe it is and maybe it's not. But
one thing is certain: Regulators and law enforcement are going after
financial statement and accounting fraud in corporations, government
agencies and accounting firms in a major way.
And the repercussions of such an
investigation can be devastating both financially as well as
impacting your organization's reputation.
To dodge the bullets, attend this one-time Webinar opportunity and
learn the secrets of successful investigation and
prevention of financial statement frauds in the following areas:
- Recording of fictitious sales
- Capitalizing of expenses
- Misstatement of asset values
- Improper/fraudulent disclosures
- Illegal revenue transactions
- Illegal side agreements
- Much much more..
If you are an internal auditor, external auditor, chief financial officer, compliance officer or senior accounting executive or corporate counsel, this Webinar will give you tools and tactics to minimize the chances that regulators or law enforcement agencies may find reason to question your organization’s books and records.
2012-1 What Auditors need to Know Today about
Forensic Audit Investigation Using Data Analysis
Part of the AuditNet-FraudAware 2012 Webinar Series, "Detecting and Preventing Fraud Using Data Analysis" Training without Travel.
In this session you will learn:
- Definition of forensic audit investigation: What
it is and what it isn’t
- Why computer data is so critical to a forensic
audit investigation
- How to plan your investigation
- Recruiting counsel, HR and/ or others to support
the investigation
- Analyzing the data and preserving the evidence
- When to contact law enforcement
2011-22 Planning, Acquiring, and Importing
Data: A Basic Guide for
Planning Data Analysis Projects
- Data analysis is the act of
transforming data with the aim of extracting useful information and
facilitating conclusions. - Data mining is the process of automatically searching large
volumes of data for patterns
using tools such as classification, association
rule mining, clustering, etc
One of the challenges that auditors face with using data analysis is requesting, acquiring and importing data. According to the IIA's latest Global Technology Audit Guide (GTAG 16), data access and preparation can be a challenging step within the audit process. Requests to IT departments can take weeks and the resulting data can often be incomplete or incorrect, making for an inefficient process.
In order to apply data analysis techniques in audit projects the auditor should follow a process. The auditor begins by determining the audit objectives and identifies organizational systems containing potentially relevant data. In order to obtain sufficient, reliable, and relevant evidence to achieve their audit objectives, the auditor then determines the relevant data needed to perform audit tests. The data is then requested from the organization’s IT department working with the data owner (department/functional entity staff). When data is extracted from an organization, the auditor must verify the integrity of the organization’s information system and IT environment from which the data is extracted. The auditor must determine the completeness and relevancy of data obtained by the organization. Acquiring and importing data is an important and required step in the process of applying data analysis in audit projects.
What you will learn:
- A methodology for requesting data from owners
- How to deal with IT
- How to Import the data in various formats
- Methods to assure the data reliability
2011-21 Cyber-Crime: Protecting Against the
Increasing Threat of Computer and Internet Fraud
Everyone knows that fraud is increasingly a high-tech crime. Fraudsters who may live down the block or half way across the world use off-the-shelf software or create their own “malware” to hack into organizations’ secure databases. Once they’re in, they steal massive volumes of proprietary data such as credit card information, customer Social Security cards and drivers license numbers and more. They either sell this “cyber-gold” on the black market or use it themselves to commit a wide range of identity thefts and frauds.
And don’t overlook the
cyber threats within. Your own employees are sometimes as tech-savvy (and as dishonest) as malicious outsiders. And if they have access to customer databases, employee records or corporate secrets, your organization is a cyber-sitting duck.
The good news: There are affordable ways to protect
your organization. You’ll learn about them in this special 75-minute
Webinar
In this information-packed Webinar, part of the AuditNet-FraudAware Series, "Detecting and Preventing Fraud in Today's High-Crime Climate", you will get guidance from one of the country’s top anti-fraud experts on....
- Most dangerous Internet and computer frauds to worry about now
- Why not to underestimate the insider threat to information security
- Costliest mistakes management makes in protecting confidential data
- Case study: How not to implement an information security program
- Proven expert insights for protecting against theft of trade secrets, industrial espionage and system sabotage
2011-20 Implementing CAATS
Integrating Data Analysis into your Audit Process
Why are auditors not fully utilizing data analysis in conducting audits? AuditNet has long held the opinion that data analytics are not as widely used as the profession would lead us to believe. In 2011 both the IIA and ISACA published guidance on data analysis. According to Data Analysis Technologies (GTAG 16):
Purpose-built data analytic technologies for audit have been around for over 20 years. Yet according to the PricewaterhouseCoopers 2010 State of the Internal Audit Profession Study, auditors for the most part are not taking advantage of them effectively.
The question of course is why internal auditors are not using data analysis in the audit process?
There are a number of reasons why auditors are not embracing technology to make their audit functions more efficient and effective.
This timely Webinar that will cover the following:
- Reasons why auditors don’t use data analytics software
- Options when it comes to data analytics software and how to ensure you make the right choice for your department
- A step by step guide to ensure your data analytics deployment is a success
- The 6 mistakes to avoid when implementing data analytics
Special Guest Panelist:
Charlie Walker, the author of “The Ultimate Guide to
Auditing with Excel” and the creator of TopCAATs, an Excel based CAATs
package. Charlie presented earlier this year on What
are CAATTs and Why Should Auditors Care?
Your presenters and moderators for this event include:
- Jim Kaplan, CIA, CFE, President of Auditnet
- Peter Goldmann, President of White-Collar Crime 101/FraudAware
2011-19 Planning, Acquiring, and Importing Data
A Basic Guide for Planning Data Analysis Projects
Sponsored by CaseWare IDEA

- Data analysis is the act of
transforming data with the aim of extracting useful information and
facilitating conclusions. - Data mining is the process of automatically searching large
volumes of data for patterns
using tools such as classification, association
rule mining, clustering, etc
One of the challenges that auditors face with using data analysis is requesting, acquiring and importing data. According to the IIA's latest Global Technology Audit Guide (GTAG 16), data access and preparation can be a challenging step within the audit process. Requests to IT departments can take weeks and the resulting data can often be incomplete or incorrect, making for an inefficient process.
In order to apply data analysis techniques in audit projects the auditor should follow a process. The auditor begins by determining the audit objectives and identifies organizational systems containing potentially relevant data. In order to obtain sufficient, reliable, and relevant evidence to achieve their audit objectives, the auditor then determines the relevant data needed to perform audit tests. The data is then requested from the organization’s IT department working with the data owner (department/functional entity staff). When data is extracted from an organization, the auditor must verify the integrity of the organization’s information system and IT environment from which the data is extracted. The auditor must determine the completeness and relevancy of data obtained by the organization. Acquiring and importing data is an important and required step in the process of applying data analysis in audit projects.
What you will learn:
- A methodology for requesting data from owners
- How to deal with IT
- How to Import the data in various formats
- Methods to assure the data reliability
2011-18 Techniques for Supporting Fraud Litigation
When a fraud case involves legal action against a suspected perpetrator, the organization’s legal team may require the support of internal auditors in preparing their case. Auditors may be called to testify in connection with this role. Doing so is rarely straightforward. It requires the use of specific tactics and techniques. This webinar will provide you with expert information on what to expect and how to be prepared when the attorneys recruit auditors or other key insiders to initiate legal action in a fraud case.
Your moderators:
Jim Kaplan, CIA, CFE, Auditnet® President
and Founder
Peter Goldmann, President of White-Collar Crime 101/FraudAware
Special guest presenter: Anthony Jordan, CPA, CFF, Partner, StoneTurn Group, a consulting firm specializing in financial investigations, financial analysis and related services. Tony is former Boston District Office Accounting Branch Chief of the Securities and Exchange Commission, where he oversaw all accounting related investigations.
Supplemental Files
- When the Feds Come Knocking-White Collar Crime Fighter Newsletter Article
-
Special Report: Computer and Internet Crime: Expert Insight and Advice to Protect Your Organization
-
How to Encourage Whistleblowers to Blow the Whistle exclusive article from White-Collar Crime Fighter
2011-17 Investigating Fraud – The Critical Role of Auditors, Accountants, Compliance Officers and HR
Investigating Fraud – The Critical Role
of Auditors, Accountants, Compliance Officers and HR
Management may or may not initiate a full-fledged fraud investigation
after a whistleblower or auditor reports compelling evidence of a fraud.
However, when it does, a professional investigator may benefit from key
managers and executives within the organization to ensure that the
investigation is completed efficiently and effectively. Specifically,
internal auditors, accountants, compliance officers and human resources
executives can play a critical direct role. They can provide valuable
support for investigations with...
- Audit tests
- Data mining skills
- Financial evidence
- Employee data
- More
This important Webinar will provide expert insight into how non-investigators inside your organization can help to find out exactly how a fraud happens and who the perpetrator was.
Your moderators:
Jim Kaplan, CIA, CFE, President of Auditnet
Peter Goldmann, President of White-Collar Crime 101/FraudAware
Special Guest Panelist: Special Guest Panelist:
Special Guest Panelist: Special Guest
Panelist: Richard Cascarino MBA, CIA, CISM, CFE
Richard is CEO of Richard Cascarino & Associates, author of the
Auditor's Guide to Information Systems Auditing, specialties include
Risk Management, Internal Audit, IT Audit, Fraud and Forensic Audit,
Corporate Governance, Strategic use of IT, IT Security.
Supplemental Files
- Fraud and Internal Controls: Understanding Employee Embezzlement in the Workplace -- by Joseph Dervaes, CFE, CIA, former Audit Manager for Special Investigations in the Washington State Auditor's Office.
- When the Feds Come Knocking-White Collar Crime Fighter Newsletter Article
- AuditNet Fraud Susceptibility Worksheet (value $75)
2011-16 Expert Advice on Detecting and Preventing Embezzlement, Kickbacks, Bribery and Collusion
This Webinar is especially timely as the economy continues to falter. Weak economies are known to substantially increase the frequency of employee embezzlement, kickback schemes, bribery and other very costly frauds.
Watch this Webinar to learn:
• How employees embezzle funds, perpetrate or perpetuate kickback
schemes, accept or pay bribes and collude with co-workers or outsiders
to defraud the organization.
• Case studies: How employee fraud causes devastating financial and
reputational damage to organizations
• Fraud-auditing techniques for detecting red flags of embezzlement,
inventory theft, corruption and collusion
• How to train employees to be your organization’s “eyes and ears” for
spotting signs of insider misconduct
• Best anti-fraud controls for minimizing the risk of common employee
frauds -- in tough times and good.
Your moderators:
Jim Kaplan, CIA, CFE, President of
Auditnet
Peter Goldmann, President of White-Collar Crime 101/FraudAware
Special Guest Panelist: Special Guest Panelist:
Paul McCormack, CFE, Paul has over 16 years of fraud investigation and detection experience working in a number of industries including banking, real estate, transportation, manufacturing and insurance. He currently serves as Vice President with Connectics where he is responsible for the firm’s fraud and intellectual property theft prevention practice. Paul has held positions with Innovar Partners, Ernst & Young, Delta Air Lines, PricewaterhouseCoopers, Putnam Hayes & Bartlett, and SunTrust Bank where he managed deposit, check, bank card and internal fraud detection.
Supplemental Files
- Fraud and Internal Controls: Understanding Employee Embezzlement in the Workplace -- by Joseph Dervaes, CFE, CIA, former Audit Manager for Special Investigations in the Washington State Auditor's Office.
- “Putting the Freud in Fraud: Focus on the Human Element”, article by Jonathan Marks, CPA/CFF, CFE, CITP, Crowe Horwath LLP, published in White-Collar Crime Fighter.
- AuditNet COSO Entity Level Control Risk Assessment Matrix Workbook (Value $75)
2011-15 Proactive Fraud Detection With Data Mining and Monitoring
How strong are your organization's
anti-fraud controls? “Strong enough”, is what many auditors,
security and compliance officers will tell you.... Until they
receive a tip about a fraud. That’s when they suddenly learn the
hard way that controls thought to be in place and effective were
circumvented by the fraudster, oftentimes without detection.
The time to test the adequacy of controls is before a fraud happens.
The longer it takes to detect the fraud, the lower the chance for
recovery and the higher the cost of damages.
Stakeholders are reacting by demanding a higher priority be placed on the implementation of anti-fraud controls that get the job done.
Not just compliance focused but
performance based controls. That means not only putting controls in
place... It means continuously monitoring them to ensure that
necessary steps are taken to ensure that fraudsters don’t find ways
around them.
This session will use a real fraud case to demonstrate how to optimize your fraud approach by combining anti-fraud controls with powerful data mining and continuous monitoring techniques.
Learning objectives include:
- Defining a COSO based Anti-fraud framework
- Examining internal audit's role
- Providing examples of working papers
- Demonstrating how to use data mining
- Discussing the role of continuous monitoring
- How to evaluate and identify existing controls to mitigate fraud risks
- Detail best practices to prevent and detect issues before they become a corporate scandal
Special Guest Panelist: Don Sparks
Donald E. Sparks, CISA, CIA, ARM, currently Vice President of Industry Relations for Audimation Services Inc., has 30 years of experience in finding significant errors and fraud using data analysis software in the property casualty insurance industry including 12 years as a chief audit executive and corporate director. He also worked for The IIA, where he was responsible for reviving Global Audit Information Network (GAIN) benchmarking services and introducing Flash Surveys and live-streaming video monthly web casts. Most recently, Sparks served as a director in public accounting, where he worked with several clients to achieve Sarbanes-Oxley Section 404 IT compliance controls.
2011-14 Detecting and Preventing Cash Skimming & Larceny
Under the broad category of “Asset Misappropriation”, the Association of Certified Fraud Examiners (ACFE) lists cash theft/skimming and larceny as two of the most serious subcategories of employee fraud. These crimes involve pilfering incoming cash receipts, such as sales revenues and accounts receivable collections. If your organization lacks tight controls of these two areas, it is a virtual certainty that employees with access to these funds will sooner or later begin to steal them.
Join this Webinar to learn:
• The difference between skimming and larceny
• How these frauds are most commonly carried out
• Who the likeliest perpetrators are
• How to assess your existing controls over incoming cash and remediate
deficiencies
• Essential audit and investigative techniques for reducing your
organization’s exposure to cash theft and larceny.
Your moderators:
Jim Kaplan, CIA, CFE, President of Auditnet
Peter Goldmann, President of White-Collar Crime 101/FraudAware
Special Guest Presenter:
Paul McCormack, CFE, Paul has over 16 years of fraud investigation and detection experience working in a number of industries including banking, real estate, transportation, manufacturing and insurance. He currently serves as Vice President with Connectics where he is responsible for the firm’s fraud and intellectual property theft prevention practice. Prior to joining Connectics, Paul held positions with Innovar Partners, Ernst & Young, Delta Air Lines, PricewaterhouseCoopers, Putnam Hayes & Bartlett, and SunTrust Bank where he managed deposit, check, bank card and internal fraud detection.
Supplemental Files
White Paper: Insider Procure-To-Pay Fraud Detection and Prevention
“Putting the Freud in Fraud: Focus on the Human Element”, article by Jonathan Marks, CPA/CFF, CFE, CITP, Crowe Horwath LLP, published in White-Collar Crime Fighter.
AuditNet COSO Entity Level Control Risk Assessment Matrix Workbook (Value $75)
2011-13 Recovering Fraud Losses through
Commercial Crime Insurance

These schemes engage every likely angle, captivating benefit of any potential weakness in your company’s monetary controls. From untrue workers, mannequin accounts owed, non-existent suppliers to absolute theft of money, securities and possessions. Fraud and misappropriation in the workplace is on the rise, happening in even the best work environment.
It is unfortunately, all too easy to “blow” a fidelity or commercial crime insurance claim when one or more employees is caught having embezzled, accepted kickbacks, taken bribes or committed any number of computer crimes and other frauds. Your organization is paying hefty premiums to cover the potentially large losses that can result from an employee’s dishonest activity. But it’s critical to know how insurance companies assess claims to avoid having a claim rejected.
You’ll learn:
1. Why your organization needs commercial
crime insurance in the first place
2. How much insurance you need. Because crime-related losses are not
typically covered by most property insurance policies, crime protection
insurance is a necessary component for any business. Unfortunately, the
majority of businesses don't purchase enough crime protection.
3. Critical steps to take — and traps to avoid— when you discover an
employee theft— to ensure maximum recovery on your insurance claims
tive steps to use when an employee fraud is first
discovered
5. Much more
Supplemental Files
-
White Paper: Insider Procure-To-Pay Fraud Detection and Prevention
-
Special Report: Computer and Internet Crime: Expert Insight and Advice to Protect Your Organization ($85 value)
-
AuditNet COSO Entity Level Control Risk Assessment Matrix Workbook (Value $75)
Commercial Crime Coverage Policy
FIB Standard Form 24
2011-12
Process-Level Internal Controls:
the First Line of Defense in Your Anti-Fraud Program
This Webinar will
take the ambiguity out of the term “internal controls” and give you
brass tacks, “how-to” guidance on how to implement anti-fraud controls
with teeth in key business processes
What you will learn:
-
The disturbing facts about anti-fraud controls: Why fraud still pays
-
How to identify vulnerabilities in existing anti-fraud controls in accounts payable, payroll, procurement, T&E and other key functions
-
The Critical Components of Internal Controls
-
Segregation of Duties: What it REALLY means and how to use it as a powerful foundation for effective process-level anti-fraud controls
-
Who should be in charge of building your organization’s anti-fraud controls
-
Case studies: When organizations do controls right
-
How to do a proper anti-fraud controls self-assessment
Supplemental Files
-
White Paper: Insider Procure-To-Pay Fraud Detection and Prevention
-
Special Report: Computer and Internet Crime: Expert Insight and Advice to Protect Your Organization ($85 value)
-
AuditNet COSO Entity Level Control Risk Assessment Matrix Workbook (Value $75)
2011-11
Locating
Hidden Assets in Fraud Cases (Forensics)
Putting fraudsters behind bars is satisfying for victims and prosecutors. And restitution is almost always a punishment meted out to these embezzlers, cash thieves, check fraudsters and others once they’re caught, convicted and sentenced.
But when it comes to getting hold of the ill-gotten financial gains that perpetrators have socked away somewhere is rarely easy. Investigators who specialize in asset recovery have their own ways of getting the job done. Now you can learn from these experts...
-
Types of fraud where hidden assets are most likely to come into play (embezzlement? Financial statement fraud? Inventory schemes? Others?)
-
Who the perpetrators are-- senior executives ... middle managers ... Accountants ... and others
-
Most common types of assets investigators look for (cash, inventory, raw materials, etc)
-
Red flags of hidden asset schemes
-
Audit/investigative techniques to locate hidden assets in fraud cases.
Special Guest Panelist: Joseph P. Dooley, CPA/CFF/CITP, CFE, CIPP, Managing Director, Stroz Friedberg
2011-10 Healthcare
Vendor Fraud: Detection and Prevention
• Who are the dishonest vendors—It’s
not always clear!
• Most common phony healthcare vendor frauds now
• Case studies: Surprising ways that vendors rip off hospitals,
clinics and other providers
• How insiders collude with vendors to embezzle funds, divert
inventory and steal confidential data
• Best healthcare vendor fraud prevention practices
Who would benefit from this Webinar?
Hospital, clinic, and other provider CFO’s, controllers, insurance company claims professionals, third part administrators, internal auditors, administrators, accounts payable professionals, attorneys, procurement personnel, investigators, compliance directors, ethics officers, regulators and IT managers
2011-9 Detecting, Preventing and
Auditing Inventory & Fixed Asset Fraud Using Data Analysis
Inventory continues to be an irresistible target for internal and external fraudsters. Between outright theft from your warehouses, diversion of deliveries, kickbacks from vendors and a host of financial statement fraud schemes, inventory fraud and manipulation is in dire need of attention and action on the part of internal auditors, senior management, controllers, finance executives and security managers.
What you will learn:
-
Phantom inventory: How to know what’s really in your warehouses and what’s not
-
How managers conceal inventory and capital asset theft by reporting fraudulently inflated values
-
Case studies of inventory/fixed asset theft and concealment
-
Easy but effective data analytics tests that reveal red flags of inventory theft and asset value misstatement
-
What to do once your data analytics work has uncovered signs of inventory fraud
2011-8 Detecting, Preventing and
Auditing
Receivables and Revenue Fraud Using Data Analysis
Sponsored in part by
Accounts Receivable/Revenue Recognition
What you will learn:
-
How to detect and prevent lapping schemes
-
The anatomy of revenue recognition schemes such as channel stuffing, fake sales, round-tripping and more
-
How to obtain the best accounts receivable and revenue data to perform optimal data mining-based audits
-
Step-by-step data mining techniques for monitoring accounts receivable and revenue recording activity
-
How data mining helps to pinpoint control weaknesses and best ways to eliminate them
2011-7 Tips and Techniques for
Conducting an Effective Fraud Risk Assessment
Contrary to popular belief, conducting a
successful Fraud Risk Assessment (FRA) is NOT hugely complex,
labor intensive or costly.
-
How your fraud risk assessment can slash your organization's fraud losses
-
Why it is essential to conduct the Fraud Risk Assessment at least annually
-
How to set the right objectives
-
Who should conduct
-
Step-by-step guidance for conducting a successful FRA
-
How to get maximum risk-prevention impact
-
Traps to avoid when planning and conducting
Special expert presenter: Richard Cascarino, MBA, CIA, CFE, CISM, Richard Cascarino & Associates
2011-6 Detecting, Preventing and Auditing
Payables, P-Card and Expenditure Fraud Using Data Analysis
Sponsored in part by
This “how-to” Webinar is being offered again in response to the high and rapidly increasing demand for knowledge about how to efficiently and inexpensively detect Accounts Payable fraud using today’s top audit automation tools.
Our special guest presenter, Jarod Apperson, Supervisor at RGL Forensics, will demonstrate the powers of data-analytics tools for catching Accounts Payable and other internal fraudsters with your own data. Jarod will demonstrate how to....
- Uncover check fraud in accounts payable
- Detect duplicate billing schemes
- Detect and prevent expense reimbursement scams
- Flag bogus invoices
- Identify Purchasing Card and other employee expense scams and schemes
You will receive a link to the recording, handouts and bonus material.
2011-5 Protecting
Your Organization against Check and ACH Fraud
Fact: Check Fraud losses are rising at a
rate of 6.5% a year
Fact: Check fraud is attempted against 90% of companies each year
Fact: Check fraud use is declining at a rate of 18%
Fact: ACH account hijacking is becoming a virtual epidemic
Key Lesson: Check fraudsters are still succeeding at their unlawful
actions — despite the shrinking volume of checks with which to do their
dirty work
The good news: There are numerous effective and cost-effective measures
available to you to protect your organization against check and ACH
fraud. Prevention hinges on implementing these measures and maintaining
them by adhering to JP Morgan Chase’s , advice: “Constant Vigilance Is
Key”.
What you’ll learn in this important Webinar:
• Check and ACH fraud schemes you may be surprised by
• Common mistakes that check fraudsters take advantage of
• Powerful ways to detect red flags of check and ACH fraud
• Which prevention measures work and which don’t
Special Guest Presenter: Paul McCormack CFE, bank fraud consultant and
former fraud department head at SunTrust Bank
2011-4 Setting
Up an Effective Fraud Awareness Training Program
It has been stated over and over again: Employee tips represent the most common way that internal fraud is detected. Not internal audits ... Not external audits ... Not even account reconciliation.
That sounds great but there’s a catch: The number of whistleblower tips is not nearly great enough to keep up with the fraudsters. Fraud is growing at a steady clip and that means organizations need more tips in order to get a step ahead of the fraudsters.
Problem is: Tips won’t come if employees don’t know what to look for. Sarbanes Oxley requires publicly traded companies to have a whistleblower hotline in place for employees to use when the spot suspicious conduct or actual fraud. But the tips will start coming only if you teach your employees what to look for...
MANAGEMENT’S EYES AND EARS
It’s no coincidence that employee tips are at the top of the list of ways that fraud is detected. More and more organizations are gaining better training results and huge savings from awareness training for their employees.
Example: For one large hospitality company, employee fraud awareness training produced a 329% ROI in the 1st year of the training.
MORE BENEFITS OF FRAUD AWARENESS TRAINING
• Makes employees alert to the signs
of fraud by co-workers, supervisors and managers.
• Supports management’s effort to build Tone at the Top -- a culture
of “doing the right thing.”
• Reduces turnover. Investing in employee training reduces high
turnover by building morale. One restaurant chain cut its
out-of-control turnover rate to below 100% after implementing a
multi-course employee E-learning program.
BY ATTENDING THIS WEBINAR YOU’LL
LEARN:
• How to start planning a successful employee fraud awareness
training program
• Best methods for training employees in how to recognize red flags
of fraud
• How to turn fraud awareness into whistleblower tips
• How to measure effectiveness of fraud awareness training
• Who should conduct training and when
Supplemental Files
Special Report “Introduction to Fraudulent Financial Reporting White Paper” by Peter Goldmann, MSc., CFE ($40 value)
FraudAware Fraud Awareness Training Framework
2011-3 Detecting, Preventing and Auditing Travel and Entertainment Employee
Expense Fraud Using Data Analysis
Sponsored by
This important Webinar will give you expert insight into the T&E frauds your organization is most threatened by, including:
-
Submitting reimbursement claims TWICE for the same expenses
-
Using bogus receipts to get reimbursed for expenses never incurred
-
Making personal purchases just under the approval amount to avoid having to get approval
-
Abusing corporate credit and P-cards for personal expenses
-
Getting reimbursed for airfare that is never used
Supplemental Files
- Special Report “Introduction to Fraudulent Financial Reporting White Paper” by Peter Goldmann, MSc., CFE ($40 value)
-
AuditNet's Exclusive T&E and P-Card Fraud Worksheet ($75 value)
2011-2 Fraud Detection, Prevention and
Audit Using Data Analysis: Planning, Acquiring, and Importing the Data
- Data analysis is the act of
transforming data with the aim of extracting useful information and
facilitating conclusions. - Data mining is the process of automatically searching large
volumes of data for patterns
using tools such as classification, association
rule mining, clustering, etc
In order to apply data analysis techniques in audit projects the auditor should follow a process. The auditor begins by determining the audit objectives and identifies organizational systems containing potentially relevant data. In order to obtain sufficient, reliable, and relevant evidence to achieve their audit objectives, the auditor then determines the relevant data needed to perform audit tests. The data is then requested from the organization’s IT department working with the data owner (department/functional entity staff). When data is extracted from an organization, the auditor must verify the integrity of the organization’s information system and IT environment from which the data is extracted. The auditor must determine the completeness and relevancy of data obtained by the organization. Acquiring and importing data is an important and required step in the process of applying data analysis in audit projects.
What you will learn:
- A methodology for requesting data from owners
- How to deal with IT
- How to Import the data in various formats
- Methods to assure the data reliability
Supplemental Files
CAATTs Checklist for Solving the Data Problem (Reprinted with permission from Wiley and David Coderre)
Moving Forward with Data Analysis Systematic Software Selection and Implementation
Data Analysis Selection Matrix Workbook
2011-01 Detecting, Preventing and Auditing Payroll Fraud Using Data Analysis
(March 23, 2011)
Sponsored by ACL
Ghost employee schemes ... Claiming for overtime not worked... Giving oneself a pay raise... Counterfeiting payroll checks...
These are just a few of the increasingly costly payroll schemes ALL organizations are up against today. And the problem is getting worse. According to the Association of Certified Fraud Examiners, the average payroll scheme cost $49,000 in 2008; by 2010 that figure had skyrocketed by almost 50% to $72,000.
Problem: Without the tools and techniques for detecting these frauds, an organization can be victimized by these schemes for two full years or longer!
ESSENTIALS OF SUCCESSFUL SELF DEFENSE
The good news: Now there’s a convenient, low-cost opportunity to learn how to protect your organization from payroll fraudsters using today’s user-friendly data mining and analytics software.
By attending the upcoming Webinar, “Detecting, Preventing and Auditing for Payroll Fraud Using Data Mining”, you will get expert guidance on:
• Costliest forms of internal and external payroll fraud
• Who commits payroll fraud
• Gathering accurate data for effective payroll fraud data analysis
• Powerful and user-friendly audit automation tests and techniques for detecting red flags of payroll frauds
• Using data analytics results to improve payroll fraud preventative controls
Angela Clancy, CA, Manager, RGL Forensics. Angela has over six years of international experience in investigative accounting which includes her current responsibilities as a Manager in forensic accounting and consulting firm of RGL Forensics.
Throughout her career she has utilized electronic data analysis to effectively to conduct a variety of accounting fraud investigations. She has been responsible for the development of training programs to assist in the application of investigative data management techniques.
Angela began her career in Melbourne, Australia where she focused her practice on the quantification of financial assets for a variety of industries. Her experience there included a concentration on mergers and acquisitions, fraud investigation, due diligence assignments and compliance audits. Ms. Clancy joined RGL Forensics in 2008 and has since focused her attention on RGL’s fraud, insurance and litigation cases. This experience has seen her involved in, among other things, mortgage fraud, vendor fraud and fraud kickback schemes.

2010-20 Detecting and Preventing Financial Statement Fraud
To dodge the bullets, download this Webinar and the supplemental material for the essentials of detecting and auditing for...
- Recording of fictitious sales
- Capitalizing of expenses
- Misstatement of asset values
- Improper/fraudulent disclosures
- Illegal revenue transactions
- Illegal side agreements
Plus you'll learn the secrets of successful investigation and prevention of financial statement frauds
If you are an internal auditor, external auditor, chief financial officer, compliance officer or senior accounting executive or corporate counsel, this Webinar will give you tools and tactics to minimize the chances that regulators or law enforcement agencies may find reason to question your organization’s books and records.
2010-19 Detecting and Preventing Fraud Using Data Analysis
Making the Power of Data Analysis Work For YOU!
Sponsored in part by
Why are auditors not fully utilizing data analysis in conducting audits?
AuditNet has long held the opinion that data analytics are not as widely used as the profession would lead us to believe. In December 2009 the IIA published GTAG 13 Fraud Prevention and Detection in an Automated World.
According to the Guide;
It is imperative that auditors stay ahead of fraudsters in their knowledge of technology and available tools. With readily available software, using computers to isolate accounting fraud clues not only makes sense, it is an absolute necessity if auditors are to help fulfill their duty of independent oversight.
IIA’s December 2009 Global Technology Audit Guide, “ Fraud Prevention and Detection in an Automated World”
Problem: AuditNet conducted a software survey in 2009 and found that only slightly over one-third of auditors use audit software for data analytics.
Reason: We sense that there is a pervasive Analysis Software Auditor Paralysis or ASAP. This fear of audit software technology may be caused by many factors but despite the cause, we want to help auditors overcome the obstacles to using the powerful and affordable audit analytics software products that can vastly enhance your productivity and reduce costs.
This timely Webinar that will cover the following:
- Reasons why auditors don't use data analysis software
- Easy steps for integrating data analysis in your audit department
- Best Practices for the Use of Data Analysis Software in Audit
- A comprehensive solution to implementing data analytics in audit
- Results of an updated 2010 AuditNet survey on the use of data analysis software by auditors.
2010-18 Detecting and Preventing Fraud in
Today’s
High-Crime Climate
Computer and Information Security
In this information-packed Webinar, part of the AuditNet-FraudAware Series, "Detecting and Preventing Fraud in Today's High-Crime Climate", you will get guidance from one of the country’s top anti-fraud experts on....
- Most dangerous Internet and computer frauds to worry about now
- Why not to underestimate the insider threat to information security
- Costliest mistakes management makes in protecting confidential data
- Case study: How not to implement an information security program
- Proven expert insights for protecting against theft of trade secrets, industrial espionage and system sabotage
2010-17 Detecting and Preventing Fraud in
Today’s
High-Crime Climate
Inventory Theft and Manipulation: Essentials of Prevention and Detection
Inventory continues to be an irresistible target for internal and external fraudsters. Between outright theft from your warehouses, diversion of deliveries, kickbacks from vendors and a host of financial statement fraud schemes, inventory fraud and manipulation is in dire need of attention and action on the part of internal auditors, senior management, controllers, finance executives and security managers.
In this information-packed Webinar, part of the AuditNet-FraudAware Series, "Detecting and Preventing Fraud in Today's High-Crime Climate", you will get guidance from one of the country’s top anti-fraud experts on....
- How shrewd employees steal inventory without ever getting caught
- Mechanics of complicity between procurement staff and vendors to divert inventory
- Manipulating inventory reporting: Do you warehouses store what the paperwork says they store?
- Inventory valuation fraud: How management makes the books look better than they should
- Best manual and automated audit procedures for detecting and preventing inventory fraud
2010-16 Detecting and Preventing Accounts
Payable Fraud Using
Data Mining
Sponsored in part by
Wed., November 3, 2010, 11AM -1PM EDT.
Our special guest presenter, Angela Clancy will again demonstrate the amazing powers of data-mining tools for catching fraudsters. This time she shows how to....
-
Generate recoveries through identification of fraudulent invoices
-
Analyze transactions to pinpoint override of invoice and PO approval
-
Detect the most common symptoms of phony vendor frauds
-
Detect employee manipulation of vendor master file
-
Understand Benford's Law and how to use it to analyze suspicious patterns in large payables databases
2010-15 October
19, 2010, Employee Fraud: Part 1: Embezzlement, Kickbacks, Bribery,
Collusion
What you will learn:
-
How employees embezzle funds, steal inventory, perpetrate kickback schemes, accept or pay bribes and collude with co-workers or outsiders to defraud the organization
-
Case studies: How employee fraud nearly bankrupted one organization and got another into deep trouble with federal law enforcement agencies
-
Fraud-auditing techniques for detecting red flags of embezzlement, inventory theft, corruption and collusion
-
How to train employees to be your organization’s “eyes and ears” for spotting signs of insider misconduct
-
Best anti-fraud controls for minimizing the risk of common employee frauds
Special Guest Panelist: Nidhi Rao, CPA, CFE is a Director at BDO Consulting in New York where she leads the Fraud Prevention practice. She has more than 14 years of experience conducting internal audits and forensic investigations involving complex accounting and auditing issues and alleged or suspected fraudulent activity for Fortune 500 companies. She has experience providing services to organizations in the hospitality, not for profit, government contractor, retail, restaurant, media and advertising industries.
FREE BONUSES for all attendees of this Webinar include:
- Special Report “Introduction to Fraudulent Financial Reporting White Paper” by Peter Goldmann, MSc., CFE ($40 value)
- Segregation of Duties Checklist: A Tool to Assist in Identifying Fraud Risks from BDO Consulting ($40 Value)
2010-14 October
20, 2010: Employee Fraud: Part 2: Cash Theft, Check theft, fraud and
forgery, Trade Secrets Customer Information Theft.
What you will learn:
-
How employees steal cash, forge checks and misappropriate trade secrets and confidential customer data
-
Case study: Anatomy of an insider fraud scheme
-
Fraud-auditing techniques for detecting red flags of insider theft, check fraud and information security breaches
-
How to train employees to be your organization’s “eyes and ears” for spotting signs of insider misconduct
-
Stop the bleeding: Proven preventative measures for staying a step ahead of dishonest insiders
Special Guest Panelist: Stephen Pedneault, CPA, CFE, President, Forensic Accounting Services LLC, Steve has conducted numerous employee fraud investigations using conventional as well as automated audit and investigative tools and methods. He is a frequent speaker on how to detect and prevent employee fraud and is the author of several books including Anatomy of a Fraud Investigation: From Detection to Prosecution
Cost: $115
FREE BONUSES for all attendees of this Webinar include:
-
Special Report “Introduction to Fraudulent Financial Reporting White Paper” by Peter Goldmann, MSc., CFE ($40 value)
-
The Devil is in the Details: Evidence Gathering Mistakes to Avoid in Fraud Investigations by Stephen Pedneault ($20 value)
2010-13 Fraudulent Financial Reporting and Concealment of Fixed Asset and Inventory Fraud
Sponsored in part by
Wed., October 6, 2010, 11AM -1PM EDT.
Our special guest presenter, Angela Clancy will again demonstrate the amazing powers of data-mining tools for catching fraudsters. This time she shows how to identify employees who steal inventory and other assets, conceal their thefts and falsify the books to cover their tracks.
What you will learn:
-
Phantom inventory: How to know what’s really in your warehouses and what’s not
-
How managers conceal inventory and capital asset theft by reporting fraudulently inflated values
-
Case studies of inventory/fixed asset theft and concealment
-
Easy but effective data analytics tests that reveal red flags of inventory theft and asset value misstatement
-
What to do once your data analytics work has uncovered signs of inventory fraud
2010-12 Essentials of Effective Operations-Level Anti-Fraud Controls Wed., Sept. 29, 2010, 2PM – 3:15 PM Eastern.
What you will learn:
-
The disturbing facts about anti-fraud controls: Why fraud still pays
-
How to identify vulnerabilities in existing anti-fraud controls in accounts payable, payroll, procurement, T&E and other key functions
-
The Critical Components of Internal Controls
-
Segregation of Duties: What it REALLY means and how to use it as a powerful foundation for effective process-level anti-fraud controls
-
Who should be in charge of building your organization’s anti-fraud controls
-
Case studies: When organizations do controls right
-
How to do a proper anti-fraud controls self-assessment
2010-11 Healthcare Vendor Fraud: Detection and Prevention Secrets
Wed., Sept. 22, 2010, 3PM – 4:15 PM Eastern.
- Who are the dishonest vendors—It’s not always clear!
- Most common phony healthcare vendor frauds now
- Case studies: Surprising ways that vendors rip off hospitals, clinics and other providers
- How insiders collude with vendors to embezzle funds, divert inventory and steal confidential data
- What the bosses don’t want you to know: How healthcare executives fraudulently enrich themselves
- Red flags of healthcare billing schemes, sham vendor frauds, drug diversion schemes and other hugely costly scams
- Most effective fraud detection tools and techniques
- Internal control best practices for protecting healthcare organizations from the growing population of dishonest suppliers and their accomplices.
2010-10 Detecting and Preventing Travel & Entertainment and P-Card Fraud Using Data Mining September 15, 2010
Do you know where your organization’s T&E dollars are going? Statistics from the Association of Certified Fraud Examiners show that the average T&E fraud results in $33,000 in losses. Do the math: If just 20 of you organization’s employees steals $33,000 in T&E funds, that adds up to $660,000. And—purchasing cards are a big part of the problem when employees abuse the cards to get reimbursed for personal T&E expenses.
Bottom line: T&E frauds should NOT be taken lightly. Especially because there so many types of them.
Now there’s a convenient, low-cost opportunity to learn the essentials of how T&E and P-Card fraud is committed, who commits these frauds most often, and — most importantly—how to use the latest software tools and techniques to detect and prevent these crimes and substantially reduce your organization’s losses.
This important Webinar will give you expert insight into the T&E frauds your organization is most threatened by, including:
-
Submitting reimbursement claims TWICE for the same expenses
-
Using bogus receipts to get reimbursed for expenses never incurred
-
Abusing corporate credit and P-cards for personal expenses (Remember former Wal-Mart Co-Chairman Thomas Coughlin’s $1,300 alligator boots and personal hunting vacations paid for by the company?)
-
Getting reimbursed for airfare that is never used
2010-9 Essentials of Conducting
an Effective Fraud Risk Assessment
Tues. Aug 10, 2010, 2PM-3:15PM Eastern
Contrary to popular belief, conducting a
successful Fraud Risk Assessment (FRA) is NOT hugely complex,
labor intensive or costly.
-
How your fraud risk assessment can slash your organization's fraud losses
-
Why it is essential to conduct the Fraud Risk Assessment at least annually
-
How to set the right objectives
-
Who should conduct
-
Step-by-step guidance for conducting a successful FRA
-
How to get maximum risk-prevention impact
-
Traps to avoid when planning and conducting
2010-8 Essentials of Effective Whistleblower Hotlines July 14, 2010
Detecting, Preventing and Auditing for Payroll Fraud Using Data Mining”, will give you expert insight into the following:
-
Whether to “do it yourself" or use an outside provider
-
How to guarantee anonymity and confidentiality
-
Do’s and don’ts for getting maximum employee use of the hotline
-
Proven practices for handling fraud-related hotline tips (and traps to avoid)
- Legal and regulatory pitfalls too many organizations make with their hotlines
2010-7 Detecting, Preventing and Auditing for Payroll Fraud Using Data Mining July 7, 2010
Detecting, Preventing and Auditing for Payroll Fraud Using Data Mining”, will give you expert insight into the following:
• Costliest forms of internal and external payroll fraud
• Who commits payroll fraud
• Gathering accurate data for effective payroll fraud data analysis
• Powerful and user-friendly audit automation tests and techniques for detecting red flags of payroll frauds
• Using data analytics results to improve payroll fraud preventative controls
2010-6 Detecting and Preventing Fraud in Travel & Entertainment June 23, 2010 $99
This important Webinar will give you expert insight into the T&E frauds your organization is most threatened by, including:
- Submitting reimbursement claims TWICE for the same expenses
- Using bogus receipts to get reimbursed for expenses never incurred
- Abusing corporate credit and P-cards for personal expenses (Remember former Wal-Mart Co-Chairman Thomas Coughlin’s $1,300 alligator boots and personal hunting vacations paid for by the company?)
- Getting reimbursed for airfare that is never used
2010-5 Detecting and Preventing Fraud in Accounts Receivable/Revenue Recognition Using Data Mining June 16, 2010
What you will learn:
-
How to detect and prevent lapping schemes
-
The anatomy of revenue recognition schemes such as channel stuffing, fake sales, round-tripping and more
-
How to obtain the best accounts receivable and revenue data to perform optimal data mining-based audits
-
Step-by-step data mining techniques for monitoring accounts receivable and revenue recording activity
-
How data mining helps to pinpoint control weaknesses and best ways to eliminate them
2010-4 Auditing for Financial Statement Fraud May 19, 2010
Regardless of the outcome of the fraud case against Goldman Sachs and other alleged contributors to the Great Financial Meltdown, one thing is certain: Regulators and law enforcement are going after financial statement and accounting fraud in corporations, government agencies and not-for-profit organizations in a major way.
The good news is that the experiences of the past provide valuable lessons for implementing better internal controls over financial reporting (ICFR) that DO deter and prevent book-cooking schemes of all kinds.
Get the latest expert advice from this high-impact Webinar!
2010-3 Detecting and Preventing Accounts Payable Fraud Using Data Mining Techniques. Accounts Payable is your organization’s main gateway for disbursing funds. Whether it’s a vendor invoice payment, check disbursement, vendor master file control, account reconciliation, or travel expense reimbursement, fraudsters are constantly devising new ways to exploit control weaknesses to rip off your organization.
But—you can stay a step ahead of them with the latest generation of data extraction and analysis software. April 21, 2010, 11:00AM-1:00PM (Recording, PDF and Bonus Files Available after the event)
2010-2 Audit Software for Fraud Prevention and Detection: What You Need to Know. Learn from top experts how to choose the right fraud auditing software and how to get the biggest bang for your technology dollars in detecting and preventing fraud in the internal audit function. March 16, 2010, 2:00PM-3:15PM
2010-1 Internal Auditing and Fraud: How to Meet the New Fraud Detection Standards Don't risk your job by not knowing how to comply with the toughening rules for catching fraudsters at their own games. January 20, 2010, 2:00PM-3:15PM
2009-2 Auditing for and Preventing Fraud in Accounts Payable More than 60% of all fraud involves AP in one or more ways. Learn how to audit your AP operations to detect red flags of fraud and prevent losses. December 2, 2009, 2:00PM-3:15PM
2009-1 Fraud In Tough Times: How to Audit for the Costliest Schemes Threatening Your Organization Now. Don’t wait for fraud to damage your organization. Even in today’s budget-conscious economy, you can implement audit procedures to detect fraud EARLY — to initiate the investigative process BEFORE losses pile up. Held September 23, 2009




