Font size:

This course starts with the audit and concludes with you uncovering fraud in the classroom! In this case study-based four-day seminar you will work on two real life case studies and simulate every aspect of a fraud audit.

You will start with the fraud risk identification by examining documents, using background reports to search for clues, researching vendor existence, and leveraging advance techniques to obtain information to corroborate your suspicions of fraud.

You will learn how to investigate company fraud hotline tips and how to determine the credibility of the allegation. You will find out how to apply document analysis procedures to actual fraud documents, get tips on developing data mining techniques, conduct a fraud penetration analysis, and drill down to the specifics of such fraudulent activities as disbursement fraud and bribery and corruption.

Case studies will take you through real-world frauds and real-world investigatory techniques that have successfully exposed shell companies, conflicts of interest and pass thru vendor schemes. You will examine documents, build fraud audit plans, prepare written reports, conduct mock interviews, build data mining plans and prepare your work papers for court.

At the conclusion of the class you will understand how to identify the red flags which warrant an internal investigation. The course material provides sample written reports, fraud risk structure documents, fraud web site listings, and many more reference tools used to research fraudulent activity.

  1. Understanding How Fraud Occurs
    • What Constitutes Fraud
    • How To Write A Fraud Scenario
    • Understanding Each Element Of A Fraud Risk
    • Incorporating The Fraud Audit Matrix
  2. Conducting The Fraud Audit
    • Implementing A Fraud Audit Methodology
    • Building Fraud Audit Procedures
    • Linking Audit To The Investigation
    • How To Evaluate The Level Of Sophistication Of Fraud Concealment Strategies
    • Correlating Fraud Concealment To The Audit Procedure
    • Using Decision Trees To Build A Fraud Audit Plan
    • Suspicious Transaction Theory
  3. Fraud Audit: Bribery And Corruption
    • Developing An Audit Response To Bribery
    • Creating The Comprehensive Fraud Register
    • How Bribery Is Concealed
    • Proving The Elements Of Bribery
    • Key Legal Statutes
  4. Fraud Audit: Disbursement Fraud Schemes
    • Understanding The Five Inherent Schemes
    • Creating The Comprehensive Fraud Register
    • How To Link Schemes To The Embezzlement Theory
    • How To Identify Fraudulent Disbursements
    • Audit And Investigative Procedures
  5. Fraud Data Mining
    • Developing A Fraud Data Mining Plan
    • A Scheme Approach To Detecting Fraud
    • Fraud Data Mapping
    • Data Mining For Shell Companies
    • Data Mining For Corruption
  6. Writing Your Fraud Report
    • Elements Of Good Fraud Finding
    • How To Write Your Fraud Audit Report
    • Preparing Your Report For Legal Referral
    • Legal Considerations When Communicating A Fraud
  7. Company Hotlines
    • Analyzing Hotline Allegations
    • Determining The Credibility Of Hotline Allegations
    • Documenting The Organization’s Response To Allegations
  8. Performing The Internal Fraud Investigation
    • Steps Involved In Conducting An Internal Investigation
    • Developing The Preliminary Fraud Theory
    • How To Establish Intent
    • Using The Required Act Approach
    • Understanding The Rules Of Evidence
    • Preparing Your Case For Legal Referral
  9. Legal Elements Of Fraud
    • Criminal Vs. Civil
    • Identifying The Required Acts Of An Illegal Activity
    • Using Direct And Circumstantial Evidence
    • Establishing The Intent Factor
    • Fact Witness Vs. Expert Witness
  10. Interviewing
    • Preparing For The Interview Process
    • Leveraging The Fraud Scenario Approach
    • Managing A Reluctant Witness
    • Connecting The Fraud Scenario To The Illegal Act
  11. Interrogation
    • Securing The Admission
    • Legal Considerations
    • Using Physical Evidence, Admission Seeking Questions
    • Securing An Oral Confession
  12. Preparing Your Work Papers
    • Legal Considerations
    • Making Work Papers Legal Proof
    • Integrating Work Papers Into Final Reports
  13. Critical Fraud Policies
    • Fraud And Corruption Policies
    • Fraud Response Policy
    • Suspicious Transaction Policy
    • Internal Fraud Policies
Who Should Attend?
We recommend this seminar for Financial, Operational, IT, and External Auditors; Audit Managers; Fraud Investigators and Managers; Corporate Attorneys; Risk Management personnel; and Information Security professionals.

Fraud Auditing Boot Camp, or equivalent experience

Dates & Times
Classes start on the date(s) posted herein, and run from 8:30am to 5pm daily, except for the last day of class, which ends at 3pm.
Find a class and register in three easy steps:
  • 1. Select Location:
  • 2. Select Date Range:
  • 3. Select Class Type:
    • All Types
    • C Classroom
    • V Virtual Live
    • Cv In-Class Virtual
    • O Online
DC Washington5/14/2018 8:00:00 AM<span class="course-type type-c" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'ILT')" onmouseout="clearHoverInfo()">C</span>4 days2495.001587521
IL Chicago6/16/2018 8:00:00 AM<span class="course-type type-c" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'ILT')" onmouseout="clearHoverInfo()">C</span>4 days2495.001587522
NY New York10/15/2018 8:00:00 AM<span class="course-type type-c" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'ILT')" onmouseout="clearHoverInfo()">C</span>4 days2495.001587523
  • 1
arrow-eseek-eitems per page1 - 3 of 3 items