Originally offered April 11, 2017
Webinar Duration: 60 Minutes | Course Level: Basic
Field of Study: Specialized Knowledge
Recommended Prerequisite: None
Advanced Preparation: None | CPE Credit: 1
Learn the benefits of creating a customized compliance program and step beyond a “check-the-box” approach. This webinar will review anti-fraud compliance program best practices, effective social media and cyber controls, and best practice actions you can take after fraud has been
identified. You will learn about the latest industry trends to address you and your company’s compliance needs.
In this webinar you will learn how to:
- Determine anti-fraud compliance program (AFCP) best practices
- Recall social media and cyber controls used in a contained compliance program
- Recognize best practice actions to take after identifying fraud
Cynthia Hetherington, CFE, MLS, MSM
Cynthia Hetherington has more than 20 years of experience in research, investigations and corporate intelligence. She is the founder of Hetherington Group, a consulting, publishing and training firm focusing on intelligence, security and investigations. She was the leader of Aon Consulting’s
Corporate Strategic Intelligence group. Cynthia was also named the 2012 James Baker Speaker of the Year for the Association of Certified Fraud Examiners.
Hetherington applies her expertise in library science and information systems to provide clients with strategic insight into research and complex investigations. During her career, she has assisted a vast number of clients with Internet investigations related to employee theft and intellectual property loss.
Hetherington has also applied her research skills while conducting online and database research to uncover well-hidden relations among fraudulent associates, their assets and secrets. She has experience overseeing international investigations for Fortune 500 companies and other organizations in the Middle
East, Europe and Asia.
A widely published author, Hetherington authored The Guide to Online Due Diligence
Investigations (2015), Manual to Online Public Records (2008), and Business
Background Investigations (2007) published by Facts on Demand Press. She is the publisher of Data2know.com: Internet & Online Intelligence
Newsletter and has co-authored articles on steganography, computer forensics, Internet investigations and other security-focused monographs. She is also recognized for providing corporate security officials, military intelligence units, and federal, state, and local agencies with training on
online intelligence practices.
Highly regulated firms rely on Thomson Reuters to identify the hidden risk of doing business with a customer or third party and protect against regulatory & reputational risk. We provide Know Your Customer (KYC) and Know Your Third Party (KY3P) customer
identification solutions for any market or organization -- as well as capabilities for client on-boarding, screening software, enhanced due diligence and transaction monitoring – leveraging leading products such as CLEAR and World-Check.
Information you provide during the registration of this webinar will
be provided to the sponsor, Thomson Reuters, and may be used to send you information,
special offers or promotions from Thomson Reuters.