Register by October 21 to save $95!

The can't miss anti-fraud training event for law enforcement and government professionals

November 21 | Washington, D.C.

Hosted by

Join industry experts and anti-fraud professionals in Washington D.C. for the 2016 ACFE Law Enforcement and Government Anti-Fraud Summit on November 21, 2016. Hosted by the ACFE Law Enforcement and Government Alliance, this event delivers the latest insights, techniques and tools to address anti-fraud challenges specific to law enforcement and government agencies.

  • Learn the latest trends in fraud prevention, detection and deterrence during five educational sessions led by anti-fraud leaders
  • Gain insights to best practices and learn about cutting-edge tools and techniques to detect fraud
  • Forge strong alliances with new and existing contacts who share similar challenges and goals
  • Earn 8 hours of CPE credit to maintain your CFE and other professional credentials


  • 7:30-8:00 AM
    Registration and Breakfast
  • 8:00-9:20 AM
    Educational Session 1
  • 9:20-9:35 AM
    Networking Break
  • 9:35-10:55 AM
    Educational Session 2
  • 10:55-11:10 AM
    Networking Break
  • 11:10 AM-12:30 PM
    Educational Session 3
  • 12:30-1:30 PM
  • 1:30-2:50 PM
    Educational Session 4
  • 2:50-3:05 PM
    Networking Break
  • 3:05-4:25 PM
    Educational Session 5

Schedule subject to change. Check back soon for complete details on sessions and speakers.


7:30-8:00 am
Registration and Breakfast
8:00-9:20 am


Current Hot Topics in Bribery and Corruption Investigations

Gain insight into several emerging and critical issues in the investigation of bribery and corruption. This session will discuss effective use of forensic data analytics to detect and investigate bribery and corruption schemes, public and nonpublic information useful in conducting investigations, and asset tracing techniques that can be applied to identify the money trail in complex schemes.

You Will Learn How To:

  • Improve your ability to design useful data analytics procedures that will be key to investigating bribery and corruption schemes
  • Understand a process and important steps for tracing assets involved in bribery and corruption schemes
  • Increase your awareness of key trends and common pitfalls in bribery and corruption investigations

Level: Overview
Recommended Prerequisites: None
Field of Study: Specialized Knowledge and Applications

9:20-9:35 am
Networking Break
9:35-10:55 am


FinCEN Tools Used by Law Enforcement in the U.S.

Law enforcement in the U.S. has a number of resources available for accessing data to help in the recovery of stolen funds. This session will explore how two of these resources, Section 314(a) of the U.S. Patriot Act and Ergmont, are used by the FBI, FinCEN and international Financial Intelligence Units to share financial intelligence. This session will also explore a case study of how the FBI uses technology to identify relevant Bank Secrecy Act intelligence using two automated programs, the BSAR Alert program and BSA keyword searches.

You Will Learn How To:

  • Determine the value of 314(a) to follow and identify illicit funds
  • Define the value of Egmont
  • Describe the ways the FBI is using technology to ensure case agents receive relevant BSA intelligence

Level: Overview
Recommended Prerequisites: None
Field of Study: Specialized Knowledge and Applications

10:55-11:10 am
Networking Break
11:10 am-12:30 pm


The Procurement Fraud Equation

Procurement fraud and abuse is, by its very nature, a product of human behavior and performed with willful intent. The fraudsters are operating in an environment familiar to them and within contracting processes and rules that expose government organizations to a higher risk of fraud. The session will use the equation as a practical visual depiction of the four elements of procurement fraud as shown in a mathematical formula. With an understanding of each element of the equation, along with their multipliers, fraud examiners, auditors and others can better reduce their detection efforts to be more productive, efficient and effective.

You Will Learn How To:

  • Identify the five personality risk profiles of a procurement fraudster/abuser
  • List the types of schemes most likely to be occurring
  • Explain why you need to understand vulnerabilities to goods and services
  • Recognize which risks are unique to specific procurement methods

Level: Overview
Recommended Prerequisites: None
Field of Study: Specialized Knowledge and Applications

12:30-1:30 pm
Networking Lunch
1:30-2:50 pm


Money Laundering and Offshore Companies: Perception vs. Reality

Recent news events such as the release of the Panama Papers have reinvigorated the debate about the use of offshore companies as vehicles for tax evasion and money laundering. Using real-life examples, this session will explore several case studies to illustrate what investigators should expect when investigating money laundering through offshore companies. This session will also summarize core information about offshore companies, their use in both legitimate and illegitimate business transactions, and the steps to take when money laundering or fraud investigations intersect with offshore companies.

You Will Learn How To:

  • Differentiate between legitimate and fraudulent uses
  • Follow the money
  • Pierce the secrecy veil

Level: Overview
Recommended Prerequisites: None
Field of Study: Specialized Knowledge and Applications

2:50-3:05 pm
Networking Break
3:05-4:25 pm


Untraceable Links: Technologies Used by Fraudsters to Hide Their Tracks

New mobile apps, underground networks and crypto-phones are appearing daily. More sophisticated technologies, such as mesh networks, allow mobile devices to use public Wi-Fi to communicate from one device to another without ever using the cellular network or the Internet. Anonymous and encrypted email services are under development to evade government surveillance. Learn how these new capabilities are helping to make anonymous communication easier for fraudsters, and how they can use this technology to hide their tracks.

You Will Learn How To:

  • Define mesh networks
  • Recognize the ways underground networks provide untraceable email
  • Identify encrypted email services and how they work

Level: Overview
Recommended Prerequisites: None
Field of Study: Computer Science


Gerard Zack, CFE, CPA, CIA, CCEP

Managing Director – Global Forensics

Gerard Zack is a managing director in the global forensics practice of BDO Consulting, a division of BDO USA, LLP, and is based in Washington, D.C. He has more than 30 years of experience providing fraud prevention, detection and investigation services, as well as forensic accounting, fraud risk assessment, auditing and risk management. He brings a rich investigative and audit background to provide proactive anti-fraud services for his clients, such as designing data analytics programs, fraud awareness training programs, and performing fraud and compliance risk assessments, all aimed at prevention and early detection of corrupt behavior. He has worked with businesses in many industries, nonprofit organizations, and government agencies globally. Prior to joining BDO, he ran his own anti-fraud services firm, Zack P.C., since 1990.

Gerry Zack is the 2009 recipient of the James Baker Speaker of the Year Award from the Association of Certified Fraud Examiners and is recognized as one of only nine ACFE Fellows.

Severina Ostrovsky

Senior Manager – Global Forensics

Severina Ostrovsky is a Senior Manager in the Global Forensics practice of BDO Consulting, a division of BDO USA, LLP and is based in Washington, D.C. She has significant experience in a broad range of domestic and international investigations spanning the federal government and commercial sectors.

Ms. Ostrovsky has experience developing intelligence on individuals and entities, with a focus on performing network analysis with Analyst Notebook/i2 in order to serve counter-terrorism efforts. She also has experience with the following types of matters: anti-money laundering, Foreign Corrupt Practices Act (FCPA) and bank secrecy, fraud investigations, global emerging market assessments, and asset tracing.

Prior to joining BDO, she held a business intelligence role at Deloitte LLP, managing global FCPA and anti-money laundering investigations and counter-terrorism nefarious network research for a commercial and federal government portfolio, among other projects. She also served as a consultant for Diligence LLC, co-managing projects and providing litigation support, due diligence analysis, fraud investigations, and emerging market studies.

Ms. Ostrovsky holds U.S. TS/SCI security clearance and is fluent in Russian, as well as proficient in Spanish.

Gregory A. Coleman

Founder & CEO
Coleman Worldwide Advisors

Gregory Coleman is the FBI Special Agent responsible for the criminal investigation of Jordan Belfort. Belfort’s rise to power and subsequent arrest and conviction were chronicled in the movie, “The Wolf of Wall Street.” Coleman is a frequent keynote speaker and guest lecturer on “The Wolf of Wall Street” investigation as well as topics including international money laundering, risks associated with Bitcoin, and body language and statement analysis. Coleman has spoken to audiences in 14 countries and has significant experience giving presentations using simultaneous translation.

Coleman retired from the FBI with more than 25 years of experience investigating financial crimes and money laundering. Coleman Worldwide Advisors offers anti-money laundering (AML)/Bank Secrecy Act (BSA) training and consulting services to the financial community and other firms subject to anti-money laundering regulations.

Jay Bienkowski

Senior Vice President

Jay Bienkowski began his work in the anti-fraud field with the FBI in 1989 where he investigated and supervised investigations concerning money laundering, corporate fraud, financial institution fraud, economic crimes, public corruption, health care fraud, international terrorism, cybercrime, transnational organized crime, violent crime, intellectual property rights and the Foreign Corrupt Practices Act. From 2012 through January 2016, Bienkowski acted as the FBI’s Liaison to FinCEN, where he was responsible for all 314(a) requests and Egmont requests for the FBI as well as creating a new asset recovery system for business email compromise fraudulent wires.

Tom Caulfield, CFE, CIG, CIGI

Procurement Integrity Consulting Services, LLC

Tom Caulfield has more than 38 years of government service, including the U.S. Marine Corps, the U.S. Air Force, the National Reconnaissance Office and the Central Intelligence Agency. He ended his government service when he retired in 2015 as the Executive Director for the CIGIE Training Institute. During his government service, his assignments included a full range of responsibilities at both the senior executive and program management levels in law enforcement, criminal investigations, anti-fraud strategies, white-collar crime investigations, polygraph, counter-intelligence, internal oversight, and professional development and training. Today, Caulfield is the co-owner of Procurement Integrity Consulting Services, LLC, a company specializing in developing, assessing and structuring strategies to assure contracting integrity.

Walt Manning, CFE

Investigations MD

Walt Manning has more than 35 years of experience in both law enforcement and private consulting, focused on the fields of investigations, digital forensics and e-discovery. He retired with the rank of lieutenant after a 20-year career with the Dallas Police Department. After his years of investigative experience in both the public and private sectors, Manning founded Investigations MD with the simple goal of helping other investigators to be more successful.

Manning has been published in Fraud Magazine, Police Computer Review, Police Chief and Information Systems Security. He has coordinated and taught more than 100 seminars all over the world on subjects related to computer and Internet investigations as well as digital forensics.


Don’t miss your opportunity to attend the premier anti-fraud training event for law enforcement and government officers. Space is limited; register by October 21 to guarantee your spot and save $95**.

Register online
Call Member Services at +1 (512) 478-9000
Fax the Event Registration Form to +1 (512) 478-9297
Mail the Event Registration Form to 716 West Avenue, Austin, TX 78701, USA

ACFE Members
Early Registration** (Through October 21)
Standard Registration (After October 21)
Early Registration** (Through October 21)
Standard Registration (After October 21)

** Payment must be received by October 21, 2016 to receive early registration savings. Early registration discount may not be combined with existing discounts for ACFE Law Enforcement and Government Alliance members.

By registering for the 2016 ACFE Law Enforcement and Government Anti-Fraud Summit, you are agreeing to its Terms and Conditions.


Hyatt Regency Washington on Capitol Hill
400 New Jersey Avenue NW
Washington, D.C. 20001  
+1 (202) 737-1234

Rooms may be booked at the ACFE rate of $109* through October 23. To reserve a room, please contact the Hyatt Regency directly.

*Subject to availability.

Stay Updated

Be in the know with updates, announcements and special offers delivered straight to your inbox*:


*You can unsubscribe at any time. View our Privacy Policy for more information.

2016 ACFE Anti-Fraud Summit