Understanding How Fraud Occurs - what constitutes fraud - awareness, theory and methodology factors - understanding the fraud sophistication factor - incorporating the fraud audit matrix
Conducting the Fraud Audit - implementing a fraud audit methodology - building fraud audit procedures - linking audit to the investigation - how to evaluate the level of sophistication of fraud concealment strategies - correlating fraud concealment to the audit procedure - using decision trees to build a fraud audit plan - suspicious transaction theory
Performing the Internal Fraud Investigation - steps involved in conducting an internal investigation - developing the preliminary fraud theory - how to establish intent - using the required act approach - understanding the rules of evidence - preparing your case for legal referral
Fraud Data Mining - developing a fraud data mining plan - a scheme approach to detecting fraud - fraud data mapping - using business applications for data mining - creating work papers from data mining - using inclusion or exclusion theories
Legal Elements of Fraud - criminal vs. civil - identifying the required acts of an illegal activity - using direct and circumstantial evidence - establishing the intent factor - fact witness vs. expert witness
Document Collection and Analysis - red flags of document alteration and creation - understanding scientific examination of documents - how to recognize forged approvals - legal considerations in gathering documents
Writing Your Fraud Report - elements of good fraud finding - how to write your fraud audit report - preparing your report for legal referral - legal considerations when communicating a fraud
Interviewing - preparing for the interview process - leveraging the fraud scenario approach - managing a reluctant witness - connecting the fraud scenario to the illegal act
Interrogation - securing the admission - legal considerations - using physical evidence, admission seeking questions - securing an oral confession
Company Hotlines - analyzing hotline allegations - determining the credibility of hotline allegations - documenting the organization’s response to allegations
Using Fraud Penetration Testing - fraud penetration: a new concept - understanding the drill-down process - designing audit procedures to pierce concealment strategies - assessing business processes for fraud opportunity - fraud audit programs at the mega-risk level
Preparing Your Work Papers - legal considerations - making work papers legal proof - integrating work papers into final reports
Fraud Audit: Bribery and Corruption - developing an audit response to bribery - how bribery is concealed - proving the elements of bribery - key legal statutes
Fraud Audit: Disbursement Fraud Schemes - understanding the five inherent schemes - how to link schemes to the embezzlement theory - how to identify fraudulent disbursements - audit and investigative procedures
Case Studies and Class Exercises
REGISTRATION QUESTIONS? For questions about your registration, government and team discounts, or multiple registrations, please call Linda Ronconi at (508) 879-7999, ext. 501 or e-mail mis@misti.com.
IN-HOUSE SEMINARS This seminar is available in-house. For more information about bringing this or other MIS seminars to your organization, please call Mimi Hatch at (410) 692-2465 or e-mail mhatch@misti.com.