Training Institute

a Wholly Owned Division of AuditNet®

in conjunction with


WEBINAR RECORDINGS AVAILABLE FOR PURCHASE


ABOUT TRUST ONLINE

 



 

Missed the Event?

As soon as you have purchased the recordings you will be provided with the access URL for the recording (we will send you the username and password)

 

Anti-Fraud Webinar Recordings
    

Pay for the number of Webinars you would like and indicate the number(s) in an email to webinars @ auditnet.org




2012-23 Using Data Analytics to Detect Procure-to-Pay Fraud October 29, 2012

This “how-to” Webinar will how you how to apply the powers of user-friendly data analysis to detect the numerous frauds threatening all three key components of procure-to-pay: Procurement ... Receiving ... Disbursement.
 

What you will learn:

  • Common and not-so-common frauds in procurement, receiving and • payment
  • Who commits P2P fraud
  • Red flags of fraud in procurement, receiving and payment
  • Detecting the red flags using data analytics tools
  • How to minimize risk of becoming a victim of P2P fraud

Special guest presenter: Katrina Kiselinchev, CPA, CIA, CFE, CFF, president of Inclusivitie LLC, an accounting, consulting and investigative firm.Katrina has over 15 years of experience in consulting, project management, finance, strategy, fraud investigation and forensic accounting in such industries as energy, retail, banking, healthcare, hospitality and not-for-profits.

Date: Monday, October 29, 2012
Time: Recorded
CPE: N/A
Level: Intermediate
 

SPECIAL FREE BONUS for all attendees of this Webinar:
• Special Report: “Procure-to-Pay Fraud Detection and Prevention: The Insider Threat” by Peter Goldmann, MSc., CFE ($40 value)

 


2012-22 When Law Enforcement Come Knocking October 23, 2012

 


 

 

 

When dealing with the law enforcement when fraud has occurred or is suspected, your rule of thumb should be to choose your
words very carefully.


Reason: It is a felony to lie to the government, punishable by jail time. It doesn’t matter that the lie wasn’t made under oath.
It doesn’t matter that you weren’t warned of the possible consequences of lying. It doesn’t even matter that the lie
didn’t deceive the government.

Part of the AuditNet-FraudAware Webinar Series, "Detecting and Preventing Fraud in Today's High-Crime Climate", in this session you will learn:

  • How to greet law enforcement agents when they show up asking for an interview related to an alleged fraud
  • Your rights when being asked for information about an alleged fraud
  • How to avoid legal traps when answer law enforcement officials’ questions
  • When to contact an attorney
  • Rules of thumb for how to answer specific questions

Title: "When Law Enforcement Comes Knocking"
Date & Time Recorded Tuesday, October 23, 2012
Time N/A
CPE Credits: N/A
Level: Basic/Intermediate
 

 


2012-21 Social Networking and Fraud Risk—What you Don’t Know Can Cost You Oct. 10

 


Social media--Facebook, LinkedIn and other on-line "communities"-- are being used by virtually every computer user in the world. Problem is that with social media use comes social media-based fraud. And it's not just the individual user who is at risk of identity theft, fraud and abuse ... it's the organizations they work for as well.

What you will learn:

  • How E-fraudsters exploit Facebook and other social media sites to commit fraud
  • How to monitor social media sites for signs of criminal actions against your organization
  • Who should be accountable for monitoring and reacting to social media attacks

Special guest presenter: Robert Siciliano, CEO, www.IDTheftSecurity.com For over 20 years Robert has been researching and keeping in tune with all aspects of on-line security by staying on top of what is new and ahead of what is next at all times. His purpose is to inform and educate individuals and organizations to avoid becoming a statistic in the identity theft, social engineering and other on-line fraud environments. He says “There always has been, there is now and there will always be a criminal predatory element stalking their next victim. Being proactive and knowing your options are essential.”

Date: Wednesday, October 10, 2012
Time: 2PM -3:15PM EDT (Eastern, GMT -0500)
CPE: N/A
Level: Intermediate
Cost: $85

 


2012-20 Protecting Your Organization from the Growing Threat of External Cyber Fraud Sep 19

Latest research from top experts indicates that 98% of all cyber-attacks were perpetrated by outsiders. In 2011. That represents a staggering increase of 12 percentage points over 2010. There is a good reason for that: Most organizations lack the anti-cybercrime prevention and detection measures needed to avoid being victimized by the growing army of online criminals operating from virtually everywhere in the world. But it doesn’t have to be that way...

In this critically important Webinar, you will learn:

  • Types of information fraudsters outside hackers may try to steal
  • Latest cyber-threats to protect against
  • How stolen information is used to sabotage, extort and financially undermine your organization
  • How to measure your organization’s current cyber- security status
  • Essential protective measures for minimizing risk of externally-perpetrated computer and Internet fraud now

Special Guest Presenter: Jeff Kalwerisky, Vice President and Director of Information Security Training at CPE Interactive. Jeff has specialized in information security, information risk management and IT auditing for over 30 years. He has held executive positions in information security and risk management with Accenture and Booz Allen Hamilton consulting firms. In both of these capacities, he has consulted with Fortune 100 companies as well as national governments, assisting in their development and deployment of enterprise security governance policies and frameworks, and technology solutions that strengthen information security and data privacy/protection.

 

Date & Time Wednesday, September 19,
Time 2:00-3:15 EDT
CPE Credits: N/A
Level: Basic/Intermediate

 

 


2012-19 Best Practices in Detecting Accounts Payable Fraud Using Data Analysis September 11

 

One of our most popular Webinars over the years— if you haven’t attended it yet, you should definitely consider making time for it this year. Even if you have attended it before, this year’s Webinar will offer plenty of fresh AP fraud-detection tools and techniques using popular data analytics software as well as new and unqiue case studies.

 

This “how-to” Webinar is being offered again in response to the high demand for knowledge about how to efficiently and inexpensively detect Accounts Payable and related frauds using today’s top audit automation tools.

You will learn how to....

  • Uncover check fraud in accounts payable
  • Detect duplicate billing schemes
  • Detect and prevent expense reimbursement scams
  • Flag bogus invoices
  • Identify Purchasing Card and other employee expense scams and schemes

Special guest presenter: Katrina Kiselinchev, CPA, CIA, CFE, CFF, president of Inclusivitie LLC, an accounting, consulting and investigative firm.Katrina has over 15 years of experience in consulting, project management, finance, strategy, fraud investigation and forensic accounting in such industries as energy, retail, banking, healthcare, hospitality and not-for-profits.

 

Date: Tuesday, Sept. 11, 2012
Time: 11AM -1PM EDT (Eastern, GMT -0500)
CPE: N/A
Level: Intermediate
Cost: $99

FREE BONUSES for all attendees of this Webinar include:

  • Special AuditNet Accounts Payable Audit Plan with Data Analytics ($50 value)

  • Special Report “Introduction to Fraudulent Financial Reporting White Paper” by Peter Goldmann, MSc., CFE ($40 value) by Peter Goldmann, MSc., CFE ($40 value)

 

 


2012-18 How to Apply Benford's Law to Detect Fraud in Accounting Data Aug 8

 

How to Apply Benford's Law to Detect Fraud in Accounting Data (Recorded August 8, 2012)

 

Almost from the beginning, proponents of Benford’s Law have suggested that it would be a beneficial tool for fraud detection. You may actually be using it already. But are you getting all of the advantages that Benford’s offers in detecting fraud?

 

In this Webinar, you’ll learn from a top expert:

 

1.       Exactly how Benford’s Law works—and doesn’t work—in clear, concise terminology
2.       How Benford’s Law can help detect the red flags of different types of fraud
3.       Best data to use in Benford’s Law tests
4.       Step-by-step demonstration of applying Benford’s Law to fraud audits
5.       Software programs for facilitating use of Benford’s Law

 

This Webinar will include a video segment with Dr. Mark Nigrini, renowned expert on Benford’s Law. Mark’s latest book Benford's Law was published in April, 2012. His previous books include Using Microsoft Access for data analysis and interrogation and Forensic Analytics.  


Speaker - Richard B. Lanza, CPA, CFE – President – Cash Recovery Partners, LLC

  • Over two decades of ACL and Excel software usage
  • Wrote the first practical ACL publication on how to use the product in 101 ways (101 ACL Applications)
  • CPA, CFE, and over 10 years of external/internal audit experience.
  • Has written and spoken on the use of audit data analytics for over 15 years.
  • Received the Outstanding Achievement in Business Award by the Association of Certified Fraud Examiners for developing the publication Proactively Detecting Fraud Using Computer Audit Reports as a research project for the IIA – Link to
  • Recently was a contributing author of:

 

Please see Rich’s full bio at http://www.richlanza.com/

 


 

 

2012-17 Fraud, Corruption & Money Laundering: Prevention, Detection and Recovery (FCPA) July 2012

 

 

Fraud, Corruption & Money Laundering: Prevention, Detection and Recovery (FCPA)

 

Wal-Mart is the latest company to get caught paying illegal bribes to foreign government officials—a violation of the Foreign Corrupt Practices Act (FCPA)... The SEC and Department of Justice are on a rampage to catch organizations—large and small—that violate this tricky law. Penalties can be painfully steep.

 

In this Webinar, you’ll learn:

 

  • Overview of anti-corruption laws and regulations

  • Why You Should Be Concerned About Anti-Corruption Laws (include case studies)

  • Main anti-bribery compliance requirements & how to document them in event of investigation

  • How to do business without running afoul of anti-bribery laws

Title: Fraud, Corruption & Money Laundering: Prevention, Detection and Recovery (FCPA)
Date: Recorded Wednesday,
July 25, 2012
Time: 2:00 PM - 3:15 PM EDT

CPE: Not available

 

Special Guest presenters:

Brian J. Mich, JD, CAMS, Managing Director and Pei Li Wong, Director, BDO Consulting

 

 


2012-16 How to Catch Expense Reimbursement (T & E) Cheaters Using Data Analysis July 12

 

 

 

 

Travel & Entertainment expenses rank high on the list of budget items most vulnerable to fraud and abuse.

 

Reason: There are virtually countless ways employees with T&E privileges can exploit those privileges, believing that they won’t get caught.

The good news is that with focused audit planning and the use of basic data analytics tools and techniques, your organization can begin preventing much of this type of fraud almost overnight.

 

In this Webinar, you’ll learn:

·         How to detect common T&E schemes such as getting reimbursement TWICE for the same expenses ... using bogus receipts to get reimbursed for expenses never incurred... abusing corporate credit and P-cards for personal expenses ... and more

·         Best practices for T&E fraud deterrence and prevention

·         Data analytics-based audit techniques for detecting T&E frauds quickly

·         How to formulate a T&E anti-fraud policy

 

Special guest presenter: Katrina Kiselinchev, CPA, CIA, CFE, CFF, president of Inclusivitie LLC, an accounting, consulting and investigative firm. Katrina has over 15 years of experience in consulting, project management, finance, strategy, fraud investigation and forensic accounting in such industries as energy, retail, banking, healthcare, hospitality and not-for-profits.

 

 


 

2012-15 Effective Fraud Interviewing Techniques (FG-2-2) June 20

 

What you will learn:

The critical difference between interviewing and interrogating
Which works best in which situation
Mistakes to avoid in setting up the interview room
Best ways for structuring a fraud interview
Understanding suspects’ body language
Main types of questions and when to use each
Best strategy for getting a confession

 

Title: Effective Fraud Interviewing Techniques
Date: Recorded Wednesday, June 20, 2012
Time: 2:00 PM - 3:15 PM EDT

CPE: Not available

 

Special Guest Panelist: Michael Brozzetti, CIA, CSA, Boundless LLC

 


2012-14 Best Practices in Preventing and Detecting P-Card Fraud using Data Analysis (DA-3) June 13

 

 

 

 

Best Practices in Preventing and Detecting P-Card Fraud using Data Analysis (DA-3) June 13

 

What you will learn:

Common and not-so-common P-card frauds
Mistakes organizations make in P-card programs that promote fraud
Formulating an effective P-card fraud prevention policy
Red flags of potential P-card fraud
Using data analytics to detect indicators of P-card fraud
Finding the hard evidence of P-card fraud with data analytics
Who in your organization should “own” P-card administration and fraud prevention

Special Guest Presenter:

 

 

Title: Best Practices in Preventing and Detecting P-Card Fraud using Data Analysis (DA-3)
Date:  Recorded Wednesday, June 13, 2012
Time: 2 hours

CPE: Not available

 

 

Special Guest Panelist: Michael MacLellan, Manager, McKesson

 

Supplemental Bonus File: Procurement Card Fraud by Mike Blakely

 

 

 


 

 

2012-13 An Expert’s Advice on Establishing an Organization Wide Fraud Policy June 5

 

 

 

What you will learn:

Critical reasons to have a fraud policy
Why an ethics policy is not enough
Who should formulate the policy
What NOT to include in a fraud policy
Best practices for implementing and enforcing your fraud policy
How to keep your fraud policy current and effective

 

Title: An Expert’s Advice on Establishing an Organization Wide Fraud Policy (FG-1-4)
Date: Tuesday, June 5, 2012
Time: 2:00 PM - 3:15 PM EDT

CPE: Not available for recorded event viewing

 

Special Guest Panelist: Paul McCormack, CFE, Executive Vice President, Connectics

 

2012-12 Fraud Detection and Prevention Techniques Using Excel May 17

Part of the AuditNet-FraudAware Webinar Series, "Detecting and Preventing Fraud Using Data Analytics", in this session you will learn:

• Introducing data analytics software to your audit process
• How to use Excel to boost efficiency and effectiveness in auditing for different types of fraud
• Demonstrations of Excel's functionality in identifying data anomalies that may represent red flags of fraud
• Useful shortcuts and processes for making Excel easy

 

Title: "Fraud Detection and Prevention Techniques Using Excel"
Date:  Recorded May 17, 2012
Time:  2 Hours

 

From an attendee at one of our recent anti-fraud Webinars:

Hi – I just wanted to say that it was a terrific webinar and I enjoyed it very much. Will you be posting a link to be able to view it again? Some of the searches Charlie Walker performed went a little bit faster than my brain and I would like to be able to view it one more time!”

 


2012-11 Fraud Risk Assessment — A Top Expert’s Blueprint 

Fraud Risk Assessment -- A Top Expert's Blueprint May 22 


Part of the AuditNet-FraudAware Webinar Series, "Detecting and Preventing Fraud in Today's High Crime Climate", in this session you will learn:
• How your fraud risk assessment can slash your organization's fraud losses
• Why it is essential to conduct the Fraud Risk Assessment at least annually
• How to set the right objectives
• Who should conduct your fraud risk assessment
• Step-by-step guidance for conducting a successful FRA
• How to get maximum risk-prevention impact from your FRA
• Traps to avoid when planning and conducting your FRA

 

Title: Fraud Risk Assessment -- A Top Expert's Blueprint May 22 
Date: Recorded Tuesday, May 22, 2012

 


2012-10

Fraud Investigation Leading Practices

Sponsored by

 

 

 

The Association of Certified Fraud Examiners most recent Report to the Nations estimates that fraud costs organizations 5% of annual revenue. Extrapolated to the global gross product, the potential loss is a staggering $2.9 trillion. You simply cannot afford to be ill-prepared for the fraudster who is about to come knocking on your front door, sneak in the back, or even worse, is already lurking inside your house.

 

Falling prey to fraud and misconduct is no longer a matter of “if,” but rather “when,” which then lends itself to the question: “how much?” Developing and implementing a fraud response plan is a good start, yet hardly fail proof if those charged with executing the plan lack a clear understanding of current leading investigative practices and relevant legal considerations. Having the right plan, people and processes are critical; together they influence the efficiency and effectiveness of a company’s efforts to investigate and furthermore, remediate suspect instances of fraud. This webinar will focus on the following key topics:

 

  • Incident Response Planning
  • Internal and/or External Legal & Investigative Resources
  • Planning the Investigation
  • Conducting Interviews
  • Collecting & Preserving Evidence
  • Forensic Procedures

2012-9 Rooting Out Healthcare Vendor Fraud Using Data Analysis May 2

 

Part of the AuditNet-FraudAware Webinar Series, "Detecting and Preventing Fraud Using Data Analytics", in this session you will learn:
• Who are the dishonest vendors—It’s not always clear!
• Most common phony healthcare vendor frauds now
• Case studies: Surprising ways that vendors rip off hospitals, clinics and other providers
• How insiders collude with vendors to embezzle funds, divert inventory and steal confidential data
• Red flags of healthcare billing schemes, sham vendor frauds, drug diversion schemes and other hugely costly scams
• Proven data analytics procedures for detecting indicators of healthcare fraud
 

Title: "Rooting Out Healthcare Vendor Fraud Using Data Analysis"
Date:  Wednesday, May 2, 2012
Time:  11:00 AM - 1:00 PM EDT
 

 

 


2012-8 Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis April 11

 

 

 

 

 

Detecting and Preventing Fixed Asset and Inventory Fraud Using Data Analytics  
 

What you will learn:
• Phantom inventory: How to know what’s really in your warehouses and what’s not
• How managers conceal inventory and capital asset theft by reporting fraudulently inflated values
• Case studies of inventory/fixed asset theft and concealment
• Easy but effective data analytics tests that reveal red flags of inventory theft and asset value misstatement
• What to do once your data analytics work has uncovered signs of inventory fraud

 
Title: "Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis"
Date:  Wednesday, April 11, 2012
Time:  Recorded


2012-7 ACH and Check Fraud—Proven Detection and Prevention Methods April 5, 2012

 

 

 

 

 

 

Part of the AuditNet-FraudAware Webinar Series, "Detecting and Preventing Fraud in Today's High Crime Climate", in this session you will learn:

ACH and Check Fraud  
"What you will learn:
• Check and ACH fraud schemes you may be surprised by

• Common mistakes that check fraudsters take advantage of

• Powerful ways to detect red flags of check and ACH fraud

• Which prevention measures work and which don’t

• Much more


 
Title: ACH and Check Fraud—Proven Detection and Prevention Methods
Date: Thursday, April 5, 2012
Time:  Recorded event

 

 

 


2012-6 Beat Vendor and Procurement Fraudsters using Data Analysis March 29, 2012

 

 

 

 

 

 

Part of the AuditNet-FraudAware Webinar Series, "Detecting and Preventing Fraud Using Data Analytics", in this session you will learn:
 

• What to look for in the audit using data analysis
• How to conduct the audit using data analysis
• What to do if you find data pointing to potential vendor fraud
• Why to audit a vendor and when
• All about right-to-audit contract clauses

 

 

 


2012-5 Keep Ghosts off Your Payroll - Detecting and Preventing Payroll Fraud Using Data Analysis (DA-1) Mar 21

 

 

 

 

Ghost employee schemes ... Claiming for overtime not worked... Giving oneself a pay raise... Counterfeiting payroll checks...

 
These are just a few of the increasingly costly payroll schemes ALL organizations are up against today. And the problem is getting worse. According to the Association of Certified Fraud Examiners, the average payroll scheme cost $49,000 in 2008; by 2010 that figure had skyrocketed by almost 50% to $72,000.
 
Problem: Without the tools and techniques for detecting these frauds, an organization can be victimized by these schemes for two full years or longer!
ESSENTIALS OF SUCCESSFUL SELF DEFENSE
 
The good news: Now there’s a convenient, low-cost opportunity to learn how to protect your organization from payroll fraudsters using today’s user-friendly data analysis software.
 
Part of the AuditNet-FraudAware Webinar Series, "Detecting and Preventing Fraud Using Data Analytics", in this session you will learn:
 
• Costliest forms of internal and external payroll fraud
• Who commits payroll fraud
• Gathering accurate data for effective payroll fraud data analysis
• Powerful and user-friendly audit automation tests and techniques for detecting red flags of payroll frauds
• Using data analytics results to improve payroll fraud preventative controls

 


2012-4 Establishing an Effective Fraud Awareness Program March 7, 2012

 

It has been stated over and over again: Employee tips represent the most common way that internal fraud is detected. Not internal audits ... Not external audits ... Not even account reconciliation.

 

That sounds great but there’s a catch: The number of whistleblower tips is not nearly great enough to keep up with the fraudsters. Fraud is growing at a steady clip and that means organizations need more tips in order to get a step ahead of the fraudsters.

 

Problem is: Tips won’t come if employees don’t know what to look for. Sarbanes Oxley requires publicly traded companies to have a whistleblower hotline in place for employees to use when the spot suspicious conduct or actual fraud. But the tips will start coming only if you teach your employees what to look for...

 

MANAGEMENT’S EYES AND EARS

It’s no coincidence that employee tips are at the top of the list of ways that fraud is detected. More and more organizations are gaining better training results and huge savings from awareness training for their employees.

Example: For one large hospitality company, employee fraud awareness training produced a 329% ROI in the 1st year of the training.

 

MORE BENEFITS OF FRAUD AWARENESS TRAINING

• Makes employees alert to the signs of fraud by co-workers, supervisors and managers.
• Supports management’s effort to build Tone at the Top -- a culture of “doing the right thing.”
• Reduces turnover. Investing in employee training reduces high turnover by building morale. One restaurant chain cut its out-of-control turnover rate to below 100% after implementing a multi-course employee E-learning program.

 

BY ATTENDING THIS WEBINAR YOU’LL LEARN:
• How to start planning a successful employee fraud awareness training program
• Best methods for training employees in how to recognize red flags of fraud
• How to turn fraud awareness into whistleblower tips
• How to measure effectiveness of fraud awareness training
• Who should conduct training and when


2012-3  The Critical Role of Control Self Assessments in Your Anti Fraud Program Feb. 22, 2012

 

 

 

 

 

 

 

Part of the AuditNet-FraudAware 2012 Webinar Series, "Detecting and Preventing Fraud Using Data Analysis" Training without Travel.

In this session you will learn:

  • The disturbing facts about anti-fraud controls: Why fraud still pays
     
  • How to identify vulnerabilities in existing anti-fraud controls in accounts payable, payroll, procurement, T&E and other key functions
     
  • The Critical Components of Internal Controls
     
  • Segregation of Duties: What it REALLY means and how to use it as a powerful foundation for effective process-level anti-fraud controls
     
  • Who should be in charge of building your organization’s anti-fraud controls
     
  • Case studies: When organizations do controls right
     
  • How to do a proper anti-fraud controls self-assessment

 


 

2012-2 Secrets of Uncovering Financial Statement Fraud Using Data Analysis (DA-2) Feb. 16, 2012

 

 

 

 

 

 

Recent major corporate scandals have prompted business owners to turn to the auditors for fraud risk analysis and proactive fraud checkups. In order to uncover financial statement fraud, auditors analyze the financial statements by using a combination of ratio analysis and certain data analysis techniques such as Benford’s Law, a procedure used to determine the likelihood that data have been altered. The lawsuit filed against Ernst & Young by former New York State Attorney General Andrew Cuomo for allegedly assisting Lehman Brothers to cook its books has been described by some as one of of the largest accounting scandals in history.

 

Maybe it is and maybe it's not. But one thing is certain: Regulators and law enforcement are going after financial statement and accounting fraud in corporations, government agencies and accounting firms in a major way.

And the repercussions of such an investigation can be devastating both financially as well as impacting your organization's reputation.

To dodge the bullets, attend this one-time Webinar opportunity and learn the secrets of successful investigation and prevention of financial statement frauds in the following areas:

  • Recording of fictitious sales
  • Capitalizing of expenses
  • Misstatement of asset values
  • Improper/fraudulent disclosures
  • Illegal revenue transactions
  • Illegal side agreements
  • Much much more..

If you are an internal auditor, external auditor, chief financial officer, compliance officer or senior accounting executive or corporate counsel, this Webinar will give you tools and tactics to minimize the chances that regulators or law enforcement agencies may find reason to question your organization’s books and records.

 


 2012-1 What Auditors need to Know Today about Forensic Audit Investigation Using Data Analysis

 

 

Part of the AuditNet-FraudAware 2012 Webinar Series, "Detecting and Preventing Fraud Using Data Analysis" Training without Travel.

In this session you will learn:

 

 

  • Definition of forensic audit investigation: What it is and what it isn’t
     
  • Why computer data is so critical to a forensic audit investigation
     
  • How to plan your investigation
     
  • Recruiting counsel, HR and/ or others to support the investigation
     
  • Analyzing the data and preserving the evidence
     
  • When to contact law enforcement

 

 

 


2011-22 Planning, Acquiring, and Importing Data: A Basic Guide for Planning Data Analysis Projects

 

One of the challenges that auditors face with using data analysis is requesting, acquiring and importing data.
  • Data analysis is the act of transforming data with the aim of extracting useful information and
    facilitating conclusions.
  • Data mining is the process of automatically searching large volumes of data for patterns
    using tools such as classification, association
    rule mining, clustering, etc

One of the challenges that auditors face with using data analysis is requesting, acquiring and importing data. According to the IIA's latest Global Technology Audit Guide (GTAG 16), data access and preparation can be a challenging step within the audit process. Requests to IT departments can take weeks and the resulting data can often be incomplete or incorrect, making for an inefficient process.

 

In order to apply data analysis techniques in audit projects the auditor should follow a process. The auditor begins by determining the audit objectives and identifies organizational systems containing potentially relevant data. In order to obtain sufficient, reliable, and relevant evidence to achieve their audit objectives, the auditor then determines the relevant data needed to perform audit tests. The data is then requested from the organization’s IT department working with the data owner (department/functional entity staff). When data is extracted from an organization, the auditor must verify the integrity of the organization’s information system and IT environment from which the data is extracted. The auditor must determine the completeness and relevancy of data obtained by the organization. Acquiring and importing data is an important and required step in the process of applying data analysis in audit projects.

 

What you will learn:

  • A methodology for requesting data from owners
  • How to deal with IT
  • How to Import the data in various formats
  • Methods to assure the data reliability

 


 2011-21 Cyber-Crime: Protecting Against the Increasing Threat of Computer and Internet Fraud

Everyone knows that fraud is increasingly a high-tech crime. Fraudsters who may live down the block or half way across the world use off-the-shelf software or create their own “malware” to hack into organizations’ secure databases. Once they’re in, they steal massive volumes of proprietary data such as credit card information, customer Social Security cards and drivers license numbers and more. They either sell this “cyber-gold” on the black market or use it themselves to commit a wide range of identity thefts and frauds.

 

And don’t overlook the cyber threats within. Your own employees are sometimes as tech-savvy (and as dishonest) as malicious outsiders. And if they have access to customer databases, employee records or corporate secrets, your organization is a cyber-sitting duck.

 

 

The good news: There are affordable ways to protect your organization. You’ll learn about them in this special 75-minute Webinar
 

In this information-packed Webinar, part of the AuditNet-FraudAware Series, "Detecting and Preventing Fraud in Today's High-Crime Climate", you will get guidance from one of the country’s top anti-fraud experts on....

 

  • Most dangerous Internet and computer frauds to worry about now
  • Why not to underestimate the insider threat to information security
  • Costliest mistakes management makes in protecting confidential data
  • Case study: How not to implement an information security program
  • Proven expert insights for protecting against theft of trade secrets, industrial espionage and system sabotage

 


2011-20 Implementing CAATS
Integrating Data Analysis into your Audit Process

 

Why are auditors not fully utilizing data analysis in conducting audits? AuditNet has long held the opinion that data analytics are not as widely used as the profession would lead us to believe. In 2011 both the IIA and ISACA published guidance on data analysis. According to Data Analysis Technologies (GTAG 16):

 

Purpose-built data analytic technologies for audit have been around for over 20 years. Yet according to the PricewaterhouseCoopers 2010 State of the Internal Audit Profession Study, auditors for the most part are not taking advantage of them effectively.

 

The question of course is why internal auditors are not using data analysis in the audit process?

 

There are a number of reasons why auditors are not embracing technology to make their audit functions more efficient and effective.

 

This timely Webinar that will cover the following:

  • Reasons why auditors don’t use data analytics software
  • Options when it comes to data analytics software and how to ensure you make the right choice for your department
  • A step by step guide to ensure your data analytics deployment is a success
  • The 6 mistakes to avoid when implementing data analytics

 

Special Guest Panelist: Charlie Walker, the author of “The Ultimate Guide to Auditing with Excel” and the creator of TopCAATs, an Excel based CAATs package. Charlie presented earlier this year on What are CAATTs and Why Should Auditors Care? 
 

 

 

 

 

Your presenters and moderators for this event include:

  • Jim Kaplan, CIA, CFE, President of Auditnet
  • Peter Goldmann, President of White-Collar Crime 101/FraudAware

2011-19 Planning, Acquiring, and Importing Data
A Basic Guide for Planning Data Analysis Projects

Sponsored by CaseWare IDEA

One of the challenges that auditors face with using data analysis is requesting, acquiring and importing data.
  • Data analysis is the act of transforming data with the aim of extracting useful information and
    facilitating conclusions.
  • Data mining is the process of automatically searching large volumes of data for patterns
    using tools such as classification, association
    rule mining, clustering, etc

One of the challenges that auditors face with using data analysis is requesting, acquiring and importing data. According to the IIA's latest Global Technology Audit Guide (GTAG 16), data access and preparation can be a challenging step within the audit process. Requests to IT departments can take weeks and the resulting data can often be incomplete or incorrect, making for an inefficient process.

 

In order to apply data analysis techniques in audit projects the auditor should follow a process. The auditor begins by determining the audit objectives and identifies organizational systems containing potentially relevant data. In order to obtain sufficient, reliable, and relevant evidence to achieve their audit objectives, the auditor then determines the relevant data needed to perform audit tests. The data is then requested from the organization’s IT department working with the data owner (department/functional entity staff). When data is extracted from an organization, the auditor must verify the integrity of the organization’s information system and IT environment from which the data is extracted. The auditor must determine the completeness and relevancy of data obtained by the organization. Acquiring and importing data is an important and required step in the process of applying data analysis in audit projects.

 

What you will learn:

  • A methodology for requesting data from owners
  • How to deal with IT
  • How to Import the data in various formats
  • Methods to assure the data reliability

 

 


 

 

2011-18 Techniques for Supporting Fraud Litigation

 

When a fraud case involves legal action against a suspected perpetrator, the organization’s legal team may require the support of internal auditors in preparing their case. Auditors may be called to testify in connection with this role. Doing so is rarely straightforward. It requires the use of specific tactics and techniques. This webinar will provide you with expert information on what to expect and how to be prepared when the attorneys recruit auditors or other key insiders to initiate legal action in a fraud case.

 

Your moderators:
Jim Kaplan, CIA, CFE, Auditnet
® President and Founder
Peter Goldmann, President of White-Collar Crime 101/FraudAware

 

Special guest presenter: Anthony Jordan, CPA, CFF, Partner, StoneTurn Group, a consulting firm specializing in financial investigations, financial analysis and related services. Tony is former Boston District Office Accounting Branch Chief of the Securities and Exchange Commission, where he oversaw all accounting related investigations.

 

Supplemental Files

  • When the Feds Come Knocking-White Collar Crime Fighter Newsletter Article
  • Special Report: Computer and Internet Crime: Expert Insight and Advice to Protect Your Organization

  • How to Encourage Whistleblowers to Blow the Whistle exclusive article from White-Collar Crime Fighter

 


 

2011-17 Investigating Fraud – The Critical Role of Auditors, Accountants, Compliance Officers and HR

 

Investigating Fraud – The Critical Role of Auditors, Accountants, Compliance Officers and HR
Management may or may not initiate a full-fledged fraud investigation after a whistleblower or auditor reports compelling evidence of a fraud. However, when it does, a professional investigator may benefit from key managers and executives within the organization to ensure that the investigation is completed efficiently and effectively. Specifically, internal auditors, accountants, compliance officers and human resources executives can play a critical direct role. They can provide valuable support for investigations with...

  • Audit tests
  • Data mining skills
  • Financial evidence
  • Employee data
  • More

This important Webinar will provide expert insight into how non-investigators inside your organization can help to find out exactly how a fraud happens and who the perpetrator was.

 

 

Your moderators:
 

Jim Kaplan, CIA, CFE, President of Auditnet
Peter Goldmann, President of White-Collar Crime 101/FraudAware

 

Special Guest Panelist: Special Guest Panelist:

 

Special Guest Panelist: Special Guest Panelist: Richard Cascarino MBA, CIA, CISM, CFE
Richard is CEO of Richard Cascarino & Associates, author of the Auditor's Guide to Information Systems Auditing, specialties include Risk Management, Internal Audit, IT Audit, Fraud and Forensic Audit, Corporate Governance, Strategic use of IT, IT Security.

 

Supplemental Files

 

  • Fraud and Internal Controls: Understanding Employee Embezzlement in the Workplace -- by Joseph Dervaes, CFE, CIA, former Audit Manager for Special Investigations in the Washington State Auditor's Office.
  • When the Feds Come Knocking-White Collar Crime Fighter Newsletter Article
  • AuditNet Fraud Susceptibility Worksheet (value $75)



2011-16 Expert Advice on Detecting and Preventing Embezzlement, Kickbacks, Bribery and Collusion

This Webinar is especially timely as the economy continues to falter. Weak economies are known to substantially increase the frequency of employee embezzlement, kickback schemes, bribery and other very costly frauds.

 

Watch this Webinar to learn:


• How employees embezzle funds, perpetrate or perpetuate kickback schemes, accept or pay bribes and collude with co-workers or outsiders to defraud the organization.
• Case studies: How employee fraud causes devastating financial and reputational damage to organizations
• Fraud-auditing techniques for detecting red flags of embezzlement, inventory theft, corruption and collusion
• How to train employees to be your organization’s “eyes and ears” for spotting signs of insider misconduct
• Best anti-fraud controls for minimizing the risk of common employee frauds -- in tough times and good.

 

Your moderators:
 

Jim Kaplan, CIA, CFE, President of Auditnet
Peter Goldmann, President of White-Collar Crime 101/FraudAware

 

Special Guest Panelist: Special Guest Panelist:

 

Paul McCormack, CFE, Paul has over 16 years of fraud investigation and detection experience working in a number of industries including banking, real estate, transportation, manufacturing and insurance. He currently serves as Vice President with Connectics where he is responsible for the firm’s fraud and intellectual property theft prevention practice. Paul has held positions with Innovar Partners, Ernst & Young, Delta Air Lines, PricewaterhouseCoopers, Putnam Hayes & Bartlett, and SunTrust Bank where he managed deposit, check, bank card and internal fraud detection.

 

Supplemental Files

  • Fraud and Internal Controls: Understanding Employee Embezzlement in the Workplace -- by Joseph Dervaes, CFE, CIA, former Audit Manager for Special Investigations in the Washington State Auditor's Office.
  • “Putting the Freud in Fraud: Focus on the Human Element”, article by Jonathan Marks, CPA/CFF, CFE, CITP, Crowe Horwath LLP, published in White-Collar Crime Fighter.
  • AuditNet COSO Entity Level Control Risk Assessment Matrix Workbook (Value $75)


2011-15 Proactive Fraud Detection With Data Mining and Monitoring

How strong are your organization's anti-fraud controls? “Strong enough”, is what many auditors, security and compliance officers will tell you.... Until they receive a tip about a fraud. That’s when they suddenly learn the hard way that controls thought to be in place and effective were circumvented by the fraudster, oftentimes without detection.
 
The time to test the adequacy of controls is before a fraud happens. The longer it takes to detect the fraud, the lower the chance for recovery and the higher the cost of damages.

 

Stakeholders are reacting by demanding a higher priority be placed on the implementation of anti-fraud controls that get the job done.

Not just compliance focused but performance based controls. That means not only putting controls in place... It means continuously monitoring them to ensure that necessary steps are taken to ensure that fraudsters don’t find ways around them.
 

This session will use a real fraud case to demonstrate how to optimize your fraud approach by combining anti-fraud controls with powerful data mining and continuous monitoring techniques.

 

Learning objectives include:

  • Defining a COSO based Anti-fraud framework
  • Examining internal audit's role
  • Providing examples of working papers
  • Demonstrating how to use data mining
  • Discussing the role of continuous monitoring
  • How to evaluate and identify existing controls to mitigate fraud risks
  • Detail best practices to prevent and detect issues before they become a corporate scandal

Special Guest Panelist: Don Sparks

 

Donald E. Sparks, CISA, CIA, ARM, currently Vice President of Industry Relations for Audimation Services Inc., has 30 years of experience in finding significant errors and fraud using data analysis software in the property casualty insurance industry including 12 years as a chief audit executive and corporate director. He also worked for The IIA, where he was responsible for reviving Global Audit Information Network (GAIN) benchmarking services and introducing Flash Surveys and live-streaming video monthly web casts. Most recently, Sparks served as a director in public accounting, where he worked with several clients to achieve Sarbanes-Oxley Section 404 IT compliance controls.


 

2011-14 Detecting and Preventing Cash Skimming & Larceny

Under the broad category of “Asset Misappropriation”, the Association of Certified Fraud Examiners (ACFE) lists cash theft/skimming and larceny as two of the most serious subcategories of employee fraud. These crimes involve pilfering incoming cash receipts, such as sales revenues and accounts receivable collections. If your organization lacks tight controls of these two areas, it is a virtual certainty that employees with access to these funds will sooner or later begin to steal them.

 

Join this Webinar to learn:
• The difference between skimming and larceny
• How these frauds are most commonly carried out
• Who the likeliest perpetrators are
• How to assess your existing controls over incoming cash and remediate deficiencies
• Essential audit and investigative techniques for reducing your organization’s exposure to cash theft and larceny.

 

Your moderators:
Jim Kaplan, CIA, CFE, President of Auditnet
Peter Goldmann, President of White-Collar Crime 101/FraudAware

 

Special Guest Presenter:

Paul McCormack, CFE, Paul has over 16 years of fraud investigation and detection experience working in a number of industries including banking, real estate, transportation, manufacturing and insurance. He currently serves as Vice President with Connectics where he is responsible for the firm’s fraud and intellectual property theft prevention practice. Prior to joining Connectics, Paul held positions with Innovar Partners, Ernst & Young, Delta Air Lines, PricewaterhouseCoopers, Putnam Hayes & Bartlett, and SunTrust Bank where he managed deposit, check, bank card and internal fraud detection.

 

Supplemental Files
White Paper: Insider Procure-To-Pay Fraud Detection and Prevention
“Putting the Freud in Fraud: Focus on the Human Element”, article by Jonathan Marks, CPA/CFF, CFE, CITP, Crowe Horwath LLP, published in White-Collar Crime Fighter.
AuditNet COSO Entity Level Control Risk Assessment Matrix Workbook (Value $75)

 


 

2011-13 Recovering Fraud Losses through Commercial Crime Insurance

These schemes engage every likely angle, captivating benefit of any potential weakness in your company’s monetary controls. From untrue workers, mannequin accounts owed, non-existent suppliers to absolute theft of money, securities and possessions. Fraud and misappropriation in the workplace is on the rise, happening in even the best work environment.

 

It is unfortunately, all too easy to “blow” a fidelity or commercial crime insurance claim when one or more employees is caught having embezzled, accepted kickbacks, taken bribes or committed any number of computer crimes and other frauds. Your organization is paying hefty premiums to cover the potentially large losses that can result from an employee’s dishonest activity. But it’s critical to know how insurance companies assess claims to avoid having a claim rejected.

You’ll learn:

 

1. Why your organization needs commercial crime insurance in the first place
2. How much insurance you need. Because crime-related losses are not typically covered by most property insurance policies, crime protection insurance is a necessary component for any business. Unfortunately, the majority of businesses don't purchase enough crime protection.
3. Critical steps to take — and traps to avoid— when you discover an employee theft— to ensure maximum recovery on your insurance claims
tive steps to use when an employee fraud is first discovered
5. Much more

 

Supplemental Files

  • White Paper: Insider Procure-To-Pay Fraud Detection and Prevention

  • Special Report: Computer and Internet Crime: Expert Insight and Advice to Protect Your Organization ($85 value)

  • AuditNet COSO Entity Level Control Risk Assessment Matrix Workbook (Value $75)

  • Commercial Crime Coverage Policy

  • FIB Standard Form 24

 


2011-12 Process-Level Internal Controls:
the First Line of Defense in Your Anti-Fraud Program

This Webinar will take the ambiguity out of the term “internal controls” and give you brass tacks, “how-to” guidance on how to implement anti-fraud controls with teeth in key business processes

 

 

 

 

What you will learn:

  • The disturbing facts about anti-fraud controls: Why fraud still pays

  • How to identify vulnerabilities in existing anti-fraud controls in accounts payable, payroll, procurement, T&E and other key functions

  • The Critical Components of Internal Controls

  • Segregation of Duties: What it REALLY means and how to use it as a powerful foundation for effective process-level anti-fraud controls

  • Who should be in charge of building your organization’s anti-fraud controls

  • Case studies: When organizations do controls right

  • How to do a proper anti-fraud controls self-assessment

Supplemental Files

  • White Paper: Insider Procure-To-Pay Fraud Detection and Prevention

  • Special Report: Computer and Internet Crime: Expert Insight and Advice to Protect Your Organization ($85 value)

  • AuditNet COSO Entity Level Control Risk Assessment Matrix Workbook (Value $75)


 

2011-11 Locating Hidden Assets in Fraud Cases (Forensics)

 

Putting fraudsters behind bars is satisfying for victims and prosecutors. And restitution is almost always a punishment meted out to these embezzlers, cash thieves, check fraudsters and others once they’re caught, convicted and sentenced.

But when it comes to getting hold of the ill-gotten financial gains that perpetrators have socked away somewhere is rarely easy. Investigators who specialize in asset recovery have their own ways of getting the job done. Now you can learn from these experts...

  • Types of fraud where hidden assets are most likely to come into play (embezzlement? Financial statement fraud? Inventory schemes? Others?)

  • Who the perpetrators are-- senior executives ... middle managers ... Accountants ... and others

  • Most common types of assets investigators look for (cash, inventory, raw materials, etc)

  • Red flags of hidden asset schemes

  • Audit/investigative techniques to locate hidden assets in fraud cases.

Special Guest Panelist: Joseph P. Dooley, CPA/CFF/CITP, CFE, CIPP, Managing Director, Stroz Friedberg


2011-10 Healthcare Vendor Fraud: Detection and Prevention

 

 
This important Webinar will let you in on healthcare fraudsters' best-kept secrets ...  and give you the detection and prevention tools to catch these criminals—BEFORE losses pile up.
 
What you will learn:

 

• Who are the dishonest vendors—It’s not always clear!
• Most common phony healthcare vendor frauds now
• Case studies: Surprising ways that vendors rip off hospitals, clinics and other providers
• How insiders collude with vendors to embezzle funds, divert inventory and steal confidential data
• Best healthcare vendor fraud prevention practices
 

Who would benefit from this Webinar?
Hospital, clinic, and other provider CFO’s, controllers, insurance company claims professionals, third part administrators, internal auditors, administrators, accounts payable professionals, attorneys, procurement personnel, investigators, compliance directors, ethics officers, regulators and IT managers


OverheadCostAllocationtoInventory.png Overhead Costs Allocation to Inventory image by dharma-putra2011-9 Detecting, Preventing and Auditing Inventory & Fixed Asset Fraud Using Data Analysis

 

Inventory continues to be an irresistible target for internal and external fraudsters. Between outright theft from your warehouses, diversion of deliveries, kickbacks from vendors and a host of financial statement fraud schemes, inventory fraud and manipulation is in dire need of attention and action on the part of internal auditors, senior management, controllers, finance executives and security managers.


What you will learn:

  • Phantom inventory: How to know what’s really in your warehouses and what’s not

  • How managers conceal inventory and capital asset theft by reporting fraudulently inflated values

  • Case studies of inventory/fixed asset theft and concealment

  • Easy but effective data analytics tests that reveal red flags of inventory theft and asset value misstatement

  • What to do once your data analytics work has uncovered signs of inventory fraud


 

 

2011-8 Detecting, Preventing and Auditing

Receivables and Revenue Fraud Using Data Analysis

 

Sponsored in part by

Accounts Receivable/Revenue Recognition

What you will learn:

  • How to detect and prevent lapping schemes

  • The anatomy of revenue recognition schemes such as channel stuffing, fake sales, round-tripping and more

  • How to obtain the best accounts receivable and revenue data to perform optimal data mining-based audits

  • Step-by-step data mining techniques for monitoring accounts receivable and revenue recording activity

  • How data mining helps to pinpoint control weaknesses and best ways to eliminate them


2011-7 Tips and Techniques for Conducting an Effective Fraud Risk Assessment

 

 

 

 

Contrary to popular belief, conducting a successful Fraud Risk Assessment (FRA) is NOT hugely complex, labor intensive or costly.  
 

Don't pass up this unique opportunity to learn from one of THE top experts how to reap the valuable benefits of a Fraud Risk Assessment without hassle and at minimal expense. After attending this important Webinar you'll know...
  • How your fraud risk assessment can slash your organization's fraud losses

  • Why it is essential to conduct the Fraud Risk Assessment  at least annually

  • How to set the right objectives

  • Who should conduct

  • Step-by-step guidance for conducting a successful FRA

  • How to get maximum risk-prevention impact

  • Traps to avoid when planning and conducting

Special expert presenter: Richard Cascarino, MBA, CIA, CFE, CISM, Richard Cascarino & Associates


2011-6 Detecting, Preventing and Auditing Payables, P-Card and Expenditure Fraud Using Data Analysis

 

Sponsored in part by

 

This “how-to” Webinar is being offered again in response to the high and rapidly increasing demand for knowledge about how to efficiently and inexpensively detect Accounts Payable fraud using today’s top audit automation tools.

 

Our special guest presenter, Jarod Apperson, Supervisor at RGL Forensics, will demonstrate the powers of data-analytics tools for catching Accounts Payable and other internal fraudsters with your own data. Jarod will demonstrate how to....

  • Uncover check fraud in accounts payable
  • Detect duplicate billing schemes
  • Detect and prevent expense reimbursement scams
  • Flag bogus invoices
  • Identify Purchasing Card and other employee expense scams and schemes

 

You will receive a link to the recording, handouts and bonus material.


 

2011-5 Protecting Your Organization against Check and ACH Fraud

 

Fact: Check Fraud losses are rising at a rate of 6.5% a year
Fact: Check fraud is attempted against 90% of companies each year
Fact: Check fraud use is declining at a rate of 18%
Fact: ACH account hijacking is becoming a virtual epidemic
 

Key Lesson: Check fraudsters are still succeeding at their unlawful actions — despite the shrinking volume of checks with which to do their dirty work

The good news: There are numerous effective and cost-effective measures available to you to protect your organization against check and ACH fraud. Prevention hinges on implementing these measures and maintaining them by adhering to JP Morgan Chase’s , advice: “Constant Vigilance Is Key”.

What you’ll learn in this important Webinar:
• Check and ACH fraud schemes you may be surprised by
• Common mistakes that check fraudsters take advantage of
• Powerful ways to detect red flags of check and ACH fraud
• Which prevention measures work and which don’t

Special Guest Presenter: Paul McCormack CFE, bank fraud consultant and former fraud department head at SunTrust Bank

 


2011-4 Setting Up an Effective Fraud Awareness Training Program

 

It has been stated over and over again: Employee tips represent the most common way that internal fraud is detected. Not internal audits ... Not external audits ... Not even account reconciliation.

 

That sounds great but there’s a catch: The number of whistleblower tips is not nearly great enough to keep up with the fraudsters. Fraud is growing at a steady clip and that means organizations need more tips in order to get a step ahead of the fraudsters.

 

Problem is: Tips won’t come if employees don’t know what to look for. Sarbanes Oxley requires publicly traded companies to have a whistleblower hotline in place for employees to use when the spot suspicious conduct or actual fraud. But the tips will start coming only if you teach your employees what to look for...

 

MANAGEMENT’S EYES AND EARS

It’s no coincidence that employee tips are at the top of the list of ways that fraud is detected. More and more organizations are gaining better training results and huge savings from awareness training for their employees.

Example: For one large hospitality company, employee fraud awareness training produced a 329% ROI in the 1st year of the training.

 

MORE BENEFITS OF FRAUD AWARENESS TRAINING

• Makes employees alert to the signs of fraud by co-workers, supervisors and managers.
• Supports management’s effort to build Tone at the Top -- a culture of “doing the right thing.”
• Reduces turnover. Investing in employee training reduces high turnover by building morale. One restaurant chain cut its out-of-control turnover rate to below 100% after implementing a multi-course employee E-learning program.

 

BY ATTENDING THIS WEBINAR YOU’LL LEARN:
• How to start planning a successful employee fraud awareness training program
• Best methods for training employees in how to recognize red flags of fraud
• How to turn fraud awareness into whistleblower tips
• How to measure effectiveness of fraud awareness training
• Who should conduct training and when

 

Supplemental Files

 

Special Report “Introduction to Fraudulent Financial Reporting White Paper” by Peter Goldmann, MSc., CFE ($40 value)

FraudAware Fraud Awareness Training Framework

 


 

2011-3 Detecting, Preventing and Auditing Travel and Entertainment Employee Expense Fraud Using Data Analysis

 

Sponsored by

 

This important Webinar will give you expert insight into the T&E frauds your organization is most threatened by, including:

  • Submitting reimbursement claims TWICE for the same expenses

  • Using bogus receipts to get reimbursed for expenses never incurred

  • Making personal purchases just under the approval amount to avoid having to get approval

  • Abusing corporate credit and P-cards for personal expenses

  • Getting reimbursed for airfare that is never used

Supplemental Files

  • Special Report “Introduction to Fraudulent Financial Reporting White Paper” by Peter Goldmann, MSc., CFE ($40 value)
  • AuditNet's Exclusive T&E and P-Card Fraud Worksheet ($75 value)


2011-2 Fraud Detection, Prevention and Audit Using Data Analysis: Planning, Acquiring, and Importing the Data
One of the challenges that auditors face with using data analysis is requesting, acquiring and importing data.
  • Data analysis is the act of transforming data with the aim of extracting useful information and
    facilitating conclusions.
  • Data mining is the process of automatically searching large volumes of data for patterns
    using tools such as classification, association
    rule mining, clustering, etc

In order to apply data analysis techniques in audit projects the auditor should follow a process. The auditor begins by determining the audit objectives and identifies organizational systems containing potentially relevant data. In order to obtain sufficient, reliable, and relevant evidence to achieve their audit objectives, the auditor then determines the relevant data needed to perform audit tests. The data is then requested from the organization’s IT department working with the data owner (department/functional entity staff). When data is extracted from an organization, the auditor must verify the integrity of the organization’s information system and IT environment from which the data is extracted. The auditor must determine the completeness and relevancy of data obtained by the organization. Acquiring and importing data is an important and required step in the process of applying data analysis in audit projects.

 

What you will learn:

  • A methodology for requesting data from owners
  • How to deal with IT
  • How to Import the data in various formats
  • Methods to assure the data reliability

Supplemental Files

 

CAATTs Checklist for Solving the Data Problem (Reprinted with permission from Wiley and David Coderre)

Moving Forward with Data Analysis Systematic Software Selection and Implementation

Data Analysis Selection Matrix Workbook


2011-01 Detecting, Preventing and Auditing Payroll Fraud Using Data Analysis (March 23, 2011)

Sponsored by ACL

 

Ghost employee schemes ... Claiming for overtime not worked... Giving oneself a pay raise... Counterfeiting payroll checks...

 

These are just a few of the increasingly costly payroll schemes ALL organizations are up against today. And the problem is getting worse. According to the Association of Certified Fraud Examiners, the average payroll scheme cost $49,000 in 2008; by 2010 that figure had skyrocketed by almost 50% to $72,000.

 

Problem: Without the tools and techniques for detecting these frauds, an organization can be victimized by these schemes for two full years or longer!

ESSENTIALS OF SUCCESSFUL SELF DEFENSE

 

The good news: Now there’s a convenient, low-cost opportunity to learn how to protect your organization from payroll fraudsters using today’s user-friendly data mining and analytics software.

 

By attending the upcoming Webinar, “Detecting, Preventing and Auditing for Payroll Fraud Using Data Mining”,  you will get expert guidance on:

 

• Costliest forms of internal and external payroll fraud

• Who commits payroll fraud

• Gathering accurate data for effective payroll fraud data analysis

• Powerful and user-friendly audit automation tests and techniques for detecting red flags of  payroll frauds

• Using data analytics results to improve payroll fraud preventative controls

 

Angela Clancy, CA, Manager, RGL Forensics. Angela has over six years of international experience in investigative accounting which includes her current responsibilities as a Manager in forensic accounting and consulting firm of RGL Forensics.

 

Throughout her career she has utilized electronic data analysis to effectively to conduct a variety of accounting fraud investigations. She has been responsible for the development of training programs to assist in the application of investigative data management techniques.

 

Angela began her career in Melbourne, Australia where she focused her practice on the quantification of financial assets for a variety of industries. Her experience there included a concentration on mergers and acquisitions, fraud  investigation, due diligence assignments and compliance audits. Ms. Clancy joined RGL Forensics in 2008 and has since focused her attention on RGL’s fraud, insurance and litigation cases. This experience has seen her involved in, among other things, mortgage fraud,  vendor fraud and fraud kickback schemes.


 

2010-20 Detecting and Preventing Financial Statement Fraud

 

 

To dodge the bullets, download this Webinar and the supplemental material for the essentials of detecting and auditing for...

  • Recording of fictitious sales
  • Capitalizing of expenses
  • Misstatement of asset values
  • Improper/fraudulent disclosures
  • Illegal revenue transactions
  • Illegal side agreements

Plus you'll learn the secrets of successful investigation and prevention of financial statement frauds

 

If you are an internal auditor, external auditor, chief financial officer, compliance officer or senior accounting executive or corporate counsel, this Webinar will give you tools and tactics to minimize the chances that regulators or law enforcement agencies may find reason to question your organization’s books and records.


2010-19 Detecting and Preventing Fraud Using Data Analysis
Making the Power of Data Analysis Work For YOU!

Sponsored in part by

Why are auditors not fully utilizing data analysis in conducting audits? AuditNet has long held the opinion that data analytics are not as widely used as the profession would lead us to believe. In December 2009 the IIA published GTAG 13 Fraud Prevention and Detection in an Automated World.

 

According to the Guide;

 

It is imperative that auditors stay ahead of fraudsters in their knowledge of technology and available tools. With readily available software, using computers to isolate accounting fraud clues not only makes sense, it is an absolute necessity if auditors are to help fulfill their duty of independent oversight.

IIA’s December 2009 Global Technology Audit Guide, “ Fraud Prevention and Detection in an Automated World”

 

Problem: AuditNet conducted a software survey in 2009 and found that only slightly over one-third of auditors use audit software for data analytics.

 

Reason: We sense that there is a pervasive Analysis Software Auditor Paralysis or ASAP. This fear of audit software technology may be caused by many factors but despite the cause, we want to help auditors overcome the obstacles to using the powerful and affordable audit analytics software products that can vastly enhance your productivity and reduce costs.

 

This timely Webinar that will cover the following:

  • Reasons why auditors don't use data analysis software
  • Easy steps for integrating data analysis in your audit department
  • Best Practices for the Use of Data Analysis Software in Audit
  • A comprehensive solution to implementing data analytics in audit
  • Results of an updated 2010 AuditNet survey on the use of data analysis software by auditors.


2010-18 Detecting and Preventing Fraud in Today’s
High-Crime Climate

Computer and Information Security

 

 

In this information-packed Webinar, part of the AuditNet-FraudAware Series, "Detecting and Preventing Fraud in Today's High-Crime Climate", you will get guidance from one of the country’s top anti-fraud experts on....

 

  • Most dangerous Internet and computer frauds to worry about now
  • Why not to underestimate the insider threat to information security
  • Costliest mistakes management makes in protecting confidential data
  • Case study: How not to implement an information security program
  • Proven expert insights for protecting against theft of trade secrets, industrial espionage and system sabotage


2010-17 Detecting and Preventing Fraud in Today’s
High-Crime Climate

Inventory Theft and Manipulation: Essentials of Prevention and Detection

 

 

Inventory continues to be an irresistible target for internal and external fraudsters. Between outright theft from your warehouses, diversion of deliveries, kickbacks from vendors and a host of financial statement fraud schemes, inventory fraud and manipulation is in dire need of attention and action on the part of internal auditors, senior management, controllers, finance executives and security managers.

 

In this information-packed Webinar, part of the AuditNet-FraudAware Series, "Detecting and Preventing Fraud in Today's High-Crime Climate", you will get guidance from one of the country’s top anti-fraud experts on....

  • How shrewd employees steal inventory without ever getting caught
  • Mechanics of complicity between procurement staff and vendors to divert inventory
  • Manipulating inventory reporting: Do you warehouses store what the paperwork says they store?
  • Inventory valuation fraud: How management makes the books look better than they should
  • Best manual and automated audit procedures for detecting and preventing inventory fraud
  • Much much more!

 


2010-16 Detecting and Preventing Accounts Payable Fraud Using Data Mining

 

Sponsored in part by

 

Wed., November 3, 2010, 11AM -1PM EDT.

 

Our special guest presenter, Angela Clancy will again demonstrate the amazing powers of data-mining tools for catching fraudsters. This time she shows how to....

  • Generate recoveries through identification of fraudulent invoices

  • Analyze transactions to pinpoint override of invoice and PO approval

  • Detect the most common symptoms of phony vendor frauds

  • Detect employee manipulation of vendor master file

  • Understand Benford's Law and how to use it to analyze suspicious patterns in large payables databases


 

2010-15 October 19, 2010, Employee Fraud: Part 1: Embezzlement, Kickbacks, Bribery, Collusion

 

 

 

 

What you will learn:

  • How employees embezzle funds, steal inventory, perpetrate kickback schemes, accept or pay bribes and collude with co-workers or outsiders to defraud the organization

  • Case studies: How employee fraud nearly bankrupted one organization and got another into deep trouble with federal law enforcement agencies

  • Fraud-auditing techniques for detecting red flags of embezzlement, inventory theft, corruption and collusion

  • How to train employees to be your organization’s “eyes and ears” for spotting signs of insider misconduct

  • Best anti-fraud controls for minimizing the risk of common employee frauds

Special Guest Panelist: Nidhi Rao, CPA, CFE is a Director at BDO Consulting in New York where she leads the Fraud Prevention practice.  She has more than 14 years of experience conducting internal audits and forensic investigations involving complex accounting and auditing issues and alleged or suspected fraudulent activity for Fortune 500 companies. She has experience providing services to organizations in the hospitality, not for profit, government contractor, retail, restaurant, media and advertising industries.

 

 

FREE BONUSES for all attendees of this Webinar include:

  • Special Report “Introduction to Fraudulent Financial Reporting White Paper” by Peter Goldmann, MSc., CFE ($40 value)
  • Segregation of Duties Checklist: A Tool to Assist in Identifying Fraud Risks from BDO Consulting ($40 Value)

2010-14 October 20, 2010: Employee Fraud: Part 2: Cash Theft, Check theft, fraud and forgery, Trade Secrets Customer Information Theft.

 

 

 

What you will learn:

  • How employees steal cash, forge checks and misappropriate trade secrets and confidential customer data

  • Case study: Anatomy of an insider fraud scheme

  • Fraud-auditing techniques for detecting red flags of insider theft, check fraud and information security breaches

  • How to train employees to be your organization’s “eyes and ears” for spotting signs of insider misconduct

  • Stop the bleeding: Proven preventative measures for staying a step ahead of dishonest insiders

Special Guest Panelist: Stephen Pedneault, CPA, CFE, President, Forensic Accounting Services LLC, Steve has conducted numerous employee fraud investigations using conventional as well as automated audit and investigative tools and methods. He is a frequent speaker on how to detect and prevent employee fraud and is the author of several books including Anatomy of a Fraud Investigation: From Detection to Prosecution

 

Cost: $115

 

FREE BONUSES for all attendees of this Webinar include:

  • Special Report “Introduction to Fraudulent Financial Reporting White Paper” by Peter Goldmann, MSc., CFE ($40 value)

  • The Devil is in the Details: Evidence Gathering Mistakes to Avoid in Fraud Investigations by Stephen Pedneault ($20 value)

PURCHASE EMPLOYEE FRAUD 1 & 2 and Receive a Special Bonus Anti-Fraud Manual From One of the Great  Veteran Fraud Fighters: "Fraud and Internal Controls:  Understanding Employee Embezzlement in the Workplace" -- by Joseph Dervaes, CFE, CIA, former Audit Manager for Special Investigations in the Washington State Auditor's Office.

 

 


 

2010-13 Fraudulent Financial Reporting and Concealment of Fixed Asset and Inventory Fraud

Sponsored in part by

Wed., October 6, 2010, 11AM -1PM EDT.

 

Our special guest presenter, Angela Clancy will again demonstrate the amazing powers of data-mining tools for catching fraudsters. This time she shows how to identify employees who steal inventory and other assets, conceal their thefts and falsify the books to cover their tracks.

 

What you will learn:

  • Phantom inventory: How to know what’s really in your warehouses and what’s not

  • How managers conceal inventory and capital asset theft by reporting fraudulently inflated values

  • Case studies of inventory/fixed asset theft and concealment

  • Easy but effective data analytics tests that reveal red flags of inventory theft and asset value misstatement

  • What to do once your data analytics work has uncovered signs of inventory fraud

 


2010-12 Essentials of Effective Operations-Level Anti-Fraud Controls Wed., Sept. 29, 2010, 2PM – 3:15 PM Eastern.

 
This Webinar will take the ambiguity out of the term “internal controls” and give you brass tacks, “how-to” guidance on how to implement anti-fraud controls with teeth in key business processes
 

What you will learn:

  • The disturbing facts about anti-fraud controls: Why fraud still pays

  • How to identify vulnerabilities in existing anti-fraud controls in accounts payable, payroll, procurement, T&E and other key functions

  • The Critical Components of Internal Controls

  • Segregation of Duties: What it REALLY means and how to use it as a powerful foundation for effective process-level anti-fraud controls

  • Who should be in charge of building your organization’s anti-fraud controls

  • Case studies: When organizations do controls right

  • How to do a proper anti-fraud controls self-assessment

 


2010-11 Healthcare Vendor Fraud: Detection and Prevention Secrets

Wed., Sept. 22, 2010, 3PM – 4:15 PM Eastern.

 

This important Webinar will let you in on healthcare fraudsters' best-kept secrets ...  and give you the detection and prevention tools to catch these criminals—BEFORE losses pile up.
 
What you will learn:
  • Who are the dishonest vendors—It’s not always clear!
  • Most common phony healthcare vendor frauds now
  • Case studies: Surprising ways that vendors rip off hospitals, clinics and other providers
  • How insiders collude with vendors to embezzle funds, divert inventory and steal confidential data 
  • What the bosses don’t want you to know: How healthcare executives fraudulently enrich themselves
  • Red flags of healthcare billing schemes, sham vendor frauds, drug diversion schemes and other hugely costly scams
  • Most effective fraud detection tools and techniques 
  • Internal control best practices for protecting healthcare organizations from the growing population of dishonest suppliers and their accomplices.


 

2010-10 Detecting and Preventing Travel & Entertainment and P-Card Fraud Using Data Mining September 15, 2010

 

Do you know where your organization’s T&E dollars are going? Statistics from the Association of Certified Fraud Examiners show that the average T&E fraud results in $33,000 in losses. Do the math: If just 20 of you organization’s employees steals $33,000 in T&E funds, that adds up to $660,000. And—purchasing cards are a big part of the problem when employees abuse the cards to get reimbursed for personal T&E expenses.

 

Bottom line: T&E frauds should NOT be taken lightly. Especially because there so many types of them.

 

Now there’s a convenient, low-cost opportunity to learn the essentials of how T&E and P-Card fraud is committed, who commits these frauds most often, and — most importantly—how to use the latest software tools and techniques to detect and prevent these crimes and substantially reduce your organization’s losses.

 

This important Webinar will give you expert insight into the T&E frauds your organization is most threatened by, including:

  • Submitting reimbursement claims TWICE for the same expenses

  • Using bogus receipts to get reimbursed for expenses never incurred

  • Abusing corporate credit and P-cards for personal expenses (Remember former Wal-Mart Co-Chairman Thomas Coughlin’s $1,300 alligator boots and personal hunting vacations paid for by the company?)

  • Getting reimbursed for airfare that is never used


2010-9 Essentials of Conducting an Effective Fraud Risk Assessment
 Tues. Aug 10, 2010, 2PM-3:15PM Eastern

 

Contrary to popular belief, conducting a successful Fraud Risk Assessment (FRA) is NOT hugely complex, labor intensive or costly.  
 

Don't pass up this unique opportunity to learn from one of THE top experts how to reap the valuable benefits of a Fraud Risk Assessment without hassle and at minimal expense. After attending this important Webinar you'll know...
  • How your fraud risk assessment can slash your organization's fraud losses

  • Why it is essential to conduct the Fraud Risk Assessment  at least annually

  • How to set the right objectives

  • Who should conduct

  • Step-by-step guidance for conducting a successful FRA

  • How to get maximum risk-prevention impact

  • Traps to avoid when planning and conducting


 

2010-8 Essentials of Effective Whistleblower Hotlines July 14, 2010

 

Detecting, Preventing and Auditing for Payroll Fraud Using Data Mining”,  will give you expert insight into the following:

  • Whether to “do it yourself" or use an outside provider
  • How to guarantee anonymity and confidentiality
  • Do’s and don’ts for getting maximum employee use of the hotline
  • Proven practices for handling fraud-related hotline tips (and traps to avoid)
  • Legal and regulatory pitfalls too many organizations make with their hotlines

 


2010-7 Detecting, Preventing and Auditing for Payroll Fraud Using Data Mining July 7, 2010

 

Detecting, Preventing and Auditing for Payroll Fraud Using Data Mining”,  will give you expert insight into the following:

 

• Costliest forms of internal and external payroll fraud

• Who commits payroll fraud

• Gathering accurate data for effective payroll fraud data analysis

• Powerful and user-friendly audit automation tests and techniques for detecting red flags of  payroll frauds

• Using data analytics results to improve payroll fraud preventative controls


 

2010-6 Detecting and Preventing Fraud in Travel & Entertainment June 23, 2010 $99

 

This important Webinar will give you expert insight into the T&E frauds your organization is most threatened by, including:

  • Submitting reimbursement claims TWICE for the same expenses
  • Using bogus receipts to get reimbursed for expenses never incurred
  • Abusing corporate credit and P-cards for personal expenses (Remember former Wal-Mart Co-Chairman Thomas Coughlin’s $1,300 alligator boots and personal hunting vacations paid for by the company?)
  • Getting reimbursed for airfare that is never used


 

2010-5 Detecting and Preventing Fraud in Accounts Receivable/Revenue Recognition Using Data Mining June 16, 2010

 

What you will learn:

  • How to detect and prevent lapping schemes

  • The anatomy of revenue recognition schemes such as channel stuffing, fake sales, round-tripping and more

  • How to obtain the best accounts receivable and revenue data to perform optimal data mining-based audits

  • Step-by-step data mining techniques for monitoring accounts receivable and revenue recording activity

  • How data mining helps to pinpoint control weaknesses and best ways to eliminate them


 

2010-4 Auditing for Financial Statement Fraud May 19, 2010

 

Regardless of the outcome of the fraud case against Goldman Sachs and other alleged contributors to the Great Financial Meltdown, one thing is certain: Regulators and law enforcement are going after financial statement and accounting fraud in corporations, government agencies and not-for-profit organizations in a major way.

The good news is that the experiences of the past provide valuable lessons for implementing better internal controls over financial reporting (ICFR) that DO deter and prevent book-cooking schemes of all kinds.

 

Get the latest expert advice from this high-impact Webinar!


 

2010-3 Detecting and Preventing Accounts Payable Fraud Using Data Mining Techniques.  Accounts Payable is your organization’s main gateway for disbursing funds. Whether it’s a vendor invoice payment, check disbursement, vendor master file control, account reconciliation, or travel expense reimbursement, fraudsters are constantly devising new ways to exploit control weaknesses to rip off your organization.

But—you can stay a step ahead of them with the latest generation of data extraction and analysis software. April 21, 2010, 11:00AM-1:00PM (Recording, PDF and Bonus Files Available after the event)

 


2010-2 Audit Software for Fraud Prevention and Detection: What You Need to Know. Learn from top experts how to choose the right fraud auditing software and how to get the biggest bang for your technology dollars in detecting and preventing fraud in the internal audit function. March 16, 2010, 2:00PM-3:15PM

 


2010-1 Internal Auditing and Fraud: How to Meet the New Fraud Detection Standards Don't risk your job by not knowing how to comply with the toughening rules for catching fraudsters at their own games. January 20, 2010, 2:00PM-3:15PM


2009-2 Auditing for and Preventing Fraud in Accounts Payable More than 60% of all fraud involves AP in one or more ways. Learn how to audit your AP operations to detect red flags of fraud and prevent losses. December 2, 2009, 2:00PM-3:15PM


2009-1 Fraud In Tough Times: How to Audit for the Costliest Schemes Threatening Your Organization Now. Don’t wait for fraud to damage your organization. Even in today’s budget-conscious economy, you can implement audit procedures to detect fraud EARLY — to initiate the investigative process BEFORE losses pile up. Held September 23, 2009