About the ACFE | Become a CFE
This Pre-Conference session will introduce you to the concepts and the world around the Internet and its supporting tools for fraud investigation. The three modules will unravel Internet search engine jargon and uncover the sources of evidence available online. The course will improve your ability to work with the current Internet technologies and to understand the control and investigative systems presented and prepare for the future.
You Will Learn How To:
This Pre-Conference session will complement your existing fraud examination skills by providing proven interview techniques needed to obtain admissions and confessions. You’ll learn what to do when interviewing a fraud suspect, and how to do it in the difficult interviewing situations that regularly arise in fraud investigation.
Fraud examiners have an acute ability to catch thieves within a company, but many times they miss the mark on determining where the true risk of fraud lies within the organization. This session will examine many of the warning signs that fraudsters give us and identify ways to better manage fraud risks based on these signs.
Journalist's Margot Smit's career as an investigative journalist provides a unique perspective into the execution and impact of corporate fraud and corruption scandals - as well as how the media can contribute to combatting future frauds.
The development of a fraud risk management (FRM) program is a proactive approach to protect the organisation, promote compliance in the work environment and encourage transparency in the workplace. This session provides the key elements and a strategic approach — undertaken by Saudi Aramco — in the implementation of a risk-based anti-fraud program that reflects the company global presence. You will also explore two basic approaches for developing an effective compliance program and examine the three critical stages: planning, deployment and administration.
All acts of corruption contain an inherent conflict of interest and can remain undetected in an organisation for years, if indeed it is detected at all. Anatomising the corrupt act can illustrate how employee corruption can begin and evolve even from benign situations, and how good management can mitigate the risk of corruption occurring internally. In this session you will learn new strategies to prevent, manage and detect corruption risk within an organisation.
Appointed in 2012, Green is bringing a renewed focus on criminal investigations of fraud, bribery and corruption to the UK’s Serious Fraud Office, including the ongoing Libor scandal. Hear Green's insights into the current fight against fraud first-hand during this keynote address.
Business analytics and ‘big data’ are highly publicised terms, but what is the core value proposition? The advent of systems automation, enhanced by advanced analytics, has established the capacity for continuous fraud monitoring and detection solutions. This session will provide an overview of the main advanced analytics techniques available to tackle the problem of fraud, and a practical case will be examined in order to demonstrate the principles at work for a hands-on perspective.
How mature is your organisation in mitigating fraud risk? Learn how to develop a fraud risk governance framework, based on the three lines of defence model, and to make sure that this framework is functioning as intended by putting in place an anti-fraud control plan.
One of the objectives of the EU single market financial regulation is to increase investor protection by reducing financial statement fraud. The mandatory adoption of International Financial Reporting Standards (IFRS) by the European Commission provides a basis for combatting fraudulent financial reporting in European security markets. This session will provide details on the current status of financial and business reporting in Europe. You will also hear suggestions on how to prevent financial reporting fraud during a discussion of future developments and regulations.
One of the important links between internal auditing and occupational fraud is how the information is handled. This information falls into two categories information that somebody decides to give to the organisation (e.g. whistleblowers, management or the audit department) and information corroborated by investigation – that each raise unique questions of how to be processed and communicated. Discover an effective procedure, based on internal auditing skills, compliance program knowledge and organisational experiences, for managing fraud information in the internal audit department.
Get to know your fellow conference attendees while you unwind from the day's educational sessions. The Networking Reception offers a perfect opportunity to connect with anti-fraud professionals from around the region in a relaxed environment. Light hors d'oeuvres and drinks will be provided.
As one of Europe's leading cybercrime experts, Gercke offers insight into how fraudsters are using today's technology to innovate and execute new schemes.
Most companies set up Key Performance Indicators (KPI) but when it comes to fraud, it is more difficult to find indicators that meet their needs and to use them efficiently. Through real examples of Key Fraud Indicators (KFI) building processes, you will learn how to design your own KFI and how to look for significant and effective data. You will also discover innovative approaches that will help you get the best of these indicators in order to detect and prevent fraud.
The conventional sample selection methodology used in audits limits the possibility of discovering fraud, leaving many to be discovered based on a tip from an employee, vendor, etc. By considering correlation and tolerance levels and calculating the intrinsic value, the possibility of detecting fraud by analysing data can be significantly increased. The result of the risk and value-oriented sampling is a number of high quality samples whose variances cannot be easily reasoned by the auditee. Learn how this sampling methodology was used to identify fraud in cases of corruption, asset misappropriation, fraudulent statements and even illicit funds.
Session description coming soon.
As the use of the Internet and associated technologies has grown rapidly in recent years, so has the opportunity for computer-related crime. Unlawful activity can be committed or facilitated online with criminals trading and sharing information, masking their identity, gathering information on victims and communicating with co-conspirators. Websites, email, chat rooms and social networks can all provide vital evidence in an investigation of computer-related crime, and this session will assist investigators in their efforts to curb such crime.
Investigating one's own colleagues for fraud is an extremely difficult situation and poses unique challenges, particularly when the suspected fraudster may continue to be employed at the same company as the investigator. Explore how to tackle the internal investigation, detect falsehood and avoid the pitfalls when dealing with co-workers and friends.
About the ACFE