Partner, Internal Audit, Risk & Compliance. Session Level: Intermediate WebRisk capital is funds invested speculatively in a business, typically a startup . From. Recommended Prerequisite: None He contributed significantly for the awareness of KPMG brand in Iraq and the services KPMG can provide in Technology, Organizational Development and Restructuring, Feasibility Studies, Public Sector Transformation, Public Private Partnerships, etc. He has worked within both public and private sectors across the Middle East ranging from local to international organisations. Anil is an inspired innovator, technologist and thought leader in Information Risk Management, Fraud and Forensic and IT Security. First of all, SarbanesOxley sought to enhance the integrity of corporate financial reporting and better regulate the accounting profession. LLC., President. This presentation will be a deep dive into how these sophisticated international telephone and computer scams work, how fraud investigators can gather evidence, how to identify the scammers' methodologies and the tools we have as investigators to derail these schemes. Over his 23 years of experience, he has demonstrated his passion for reducing environmental pollution and promoting a healthier environment. Session Level: Basic Session Level: Basic Whether you're conducting investigations, audits, risk assessments or training, you need to know what people think and feel but might not say. The sessions were enlightening and very informative and it was really good to be able to meet with colleagues and counterparts from within the industry. For last one and a half decade, he has been successfully mentoring ANB, a leading Risk Advisory consulting firm. This should also include a way to highlight and respond to apparent issues. Dima Ghawi, LLC, Leadership Keynote Speaker. He has delivered projects for banking, capital markets and insurance institutions as well as telecom organisations, oil & gas enterprises and government agencies in over 20 countries. This presentation is filled with takeaways as we look at some of the more popular tools, techniques and methodologies available to fraud investigators. For the past five years, Anas was leading the Corporate Governance for one of the largest Islamic Banks in the world and has over 15 years of experience in establishing Internal Audit and Corporate Governance functions for multiple organizations with the Public and Private sectors. His in-depth experience and resourceful know-how in environmental consultancy has led him to spearhead major projects in the past and present. Gain a competitive edge as an active informed professional in information systems, cybersecurity and business. This session will explore the intricacies of this case, the investigation, and the outcome, and offer attendees lessons learned that they can apply to prevent and respond to similar schemes. Can these digital wills affect our access to the data and who decides? Assisted in remediating the key gaps identified to ensure compliance with applicable regulatory requirement. The session will conclude with report writing and structure and preparing your case for court. JP Consulting, President. CPE: 1.0 | Ethics CPE:No Session Level: Intermediate He is a product champion for Auraa Augmented Risk and Audit Analytics a unique single platform solution for Integrated Risk Management, Governance, Audit, Compliance, and Analytics functions that streamlines risk and audit verticals for enterprises worldwide. Experienced Auditor with a demonstrated academic expertise in Accounting, and a professional expertise in the fields of Auditing and Strategic and Digital Transformation. The Home of the Security Bloggers Network, Home Cybersecurity CISO Suite IT Risk Management: How to Get Started with Risk Frameworks. From the theft of small business payrolls to a thwarted $1 billion bank heist by North Korean government hackers, every organization has become a target. But the demand was still low in the CRO position. Additionally, Dr. Seita is a member in a number of committees at the GCA, such as; the Training Committee, Leadership Committee and Strategic Plan Committee. The intention of this discussion is to bring to light the various anomalies that exist in the behavioral health realm with focus on identification of areas for improvement to ensure documentation excellence and appropriate billing practices. Recommended Prerequisite: None is paid by governments, semigovernments, stock exchanges, shareholders and regulators. The three favorite types of insurance are workers' compensation, general liability, and property / casualty insurance. Richard F. Chambers, CIA, CRMA, and CFE is founder of The Audit Trail Academy and serves as Senior Internal Audit Advisor for AuditBoard the leading cloud-based platform transforming how enterprises manage risk. Johannesburg Roads Agency (JRA) Vacancies Blog [4] Over 20 years of experience in audit, governance, risk management, internal controls and compliance, including US-based and regional experience. Chief risk officer A side effect of this information prioritizing is a much better transparency throughout the whole organization. Managed assurance and advisory activities across the Mubadala global portfolio platform. This updated model accounts for the increased complexity of modern business environments. This session provides an in-depth look at recent corruption and conflict of interest cases using the P.R.I.C.E framework. WebThe updated COSO framework. What do you need to know before reaching out to QuickBooks, Google, Apple or even Facebook when the account holder has passed away? Review and Revision consider how well the enterprise risk management components are functioning over time. In general, the companies transfer risk by purchasing different kinds of insurance. CPE: 1.5 | Ethics CPE: No Regardless of whether you are a data analytics professional, working auditor, investigator or Certified Fraud Examiner, this session will provide value through the exposure to examples of some of the more common (and not-so-common) fraud detection scenarios. During the presentation, participants will learn about volume-, value- and velocity-based fraud detection scenarios and how most fraud detection scenarios can be classified into one or more of these three categories. the scenarios in When risk taking is authorized, risk limits are bounds placed on that risk-taking decision. In addition, Abhisek is the business and quality leader for IT External Audit service offering for KPMG Lower Gulf & Saudi Levant. Multiple regulatory stakeholders must come to the table and set the course for the future. The unique nature of Ponzi-based frauds involves characteristics that can make a scheme more difficult to detect and enable it to run longer than other fraud schemes. Well use several case studies to demonstrate both the complexity and importance of these types of cases. Box 90919Dubai. Siddharth leads multiple engagements for clients in Internal Audit, Model Business Processes, Enterprise Risk Management, ICOFR, Process reengineering, COSO implementation and other Risk Advisory services. He oversees the development of executive education and training for Academies in the region and has delivered multiple training programmes in Internal Audit, Corporate Governance and Risk Management. In 2012, the University of Jordan honoured him with the Distinguished Researchers Award. [33] This framework includes five interrelated components which are found in the most ERM frameworks. Having specific IT risk management frameworks named within your policy will also keep your legal team happy. However, the ability to receive ransom payments (typically via cryptocurrency) continues to provide incentives to would-be cybercriminals. Field of Study: Personal Development When the potential for risk is large, the CRO must report to the CEO and/or the board of directors for future action. Citrin Cooperman, Partner. Join this overview of technologies and approaches to harness next-generation concepts today. [6], Please review the use of non-free content according to. He is also an Audit Partner in KPMGs Financial Services Practice and the Audit Innovation Leader for the Lower Gulf, and specializes in banking and asset management, serving a wide range of clients. Session Level: Overview Risk management in corporate governance Hamdan has assisted many other non federal entities in assessing and enhancing the anti-fraud frameworks to be in line with regulatory requirements as well as leading practices. Acting Director, Internal Audit Department, General Directorate of Residency and Foreigners Affairs, Director and Founder at K10 Vision Limited, Managing Director, Security and Privacy, Protiviti Middle East. Fraud professionals are emerging and operating like legitimate businesses, with strategies, revenue goals, market niches, marketing plans and operational programs. [40] A main priority of the CRO is to ensure that the company complies with SOX to ensure they are following government regulations. Associate Director, KPMG Lower Gulf Limited. During this session, we will discuss how companies can use technology to solve operational efficiency issues, optimize spend by influencing behavior and mitigate spend risk. Two perspectives on how to use COBIT 5 in a risk context are shown in He is based in Hamburg and has worked in several countries worldwide. CPE: 1.5 | Ethics CPE: No Rami is a Partner and the RSM MENA Risk Advisory Leader, and a member of the RSM Global Risk Advisory Committee, with more than 26 years of experience in the region, serving organizations both public and private sector clients in a range of industries. of enterprise IT. espionage, and support for innovation. Our certifications and certificates affirm enterprise team members expertise and build stakeholder confidence in your organization. Fadi Sidani is the Group Chief Internal Audit Officer at Beeah. IT Risk Management: How to Get Started with Risk Frameworks By making smart use of our subconscious inclination to play games and improve our game playing skills, we can bring about safer, more hygienic and therefore less risky behavior. Establish a risk-aware culture among all employees at all levels. Due to the fact that bank regulators have actually encouraged banks now for a longer time to adopt an enterprise risk management approach, the need of a CRO to manage risk across the whole organization has increased. Prior to joining KPMG Lower Gulf, Maryam had 4 years of experience in providing Internal Audit, Corporate Governance, Business Process Improvement, Valuation, and Structured Finance related advisory services in KPMG in the United States. Apart from this fact, a better risk reporting can be reached by prioritizing the content of risk reporting that should go to the different instances like the senior management or the board of directors. Over his 23 years of experience, he has demonstrated his passion for reducing environmental pollution and promoting a healthier environment. 2nd Edition - Enterprise risk management: from incentives to controls. Mahendra has lead internal audit, ADAA regulation no. He has over 13 years of International experience in Technology and Cyber risk, IT advisory, IT Audit, Attestation services, ERP controls reviews, GRC Implementations and IT Risk Assurance. Eric Feldman, CFE, CIG, CCEP-I The COSO framework was updated in 2017, with a name change to "Enterprise Risk Management -- Integrating with Strategy and Performance." CPE: 1.5 | Ethics CPE: Yes The COSO ERM framework focuses on embedding risk into all organizational decisions. Fraudsters often think they are the smartest person involved in the situation and if they are aware of or anticipate an investigation you can find yourself engaged in chess match of competing strategies trying to reveal or obfuscate the fraud. Finally, we will talk about the emerging field of digital legacy "wills" that enable a person to indicate before they die how their data is to be handled after their death. Performance -- which identifies risks that affect strategic-planning processes. The two co-presenters will share stories and cultural experiences through engaging discussions, providing the audience with actionable take-aways to apply to their areas of practice. Open-source intelligence (OSINT) is a well-covered area of expertise that encompasses many areas of content. Abhisek Bhattacharyya, Partner leads the IT Internal Audit and IT Attestation Services for KPMG, Lower Gulf. The benefits of quantitative risk management are that youre able to provide the board with actual numbers and costs, which allows for better decisions on how to manage risks on their part. 1 This presentation will cover a wide range of investigations, the problems they presented and how they were addressed. In this session, we will dive into the changes in the upcoming FRMG. Hoboken, NJ: Wiley. covered by many different risk management frameworks, including the Committee of Sponsoring Organizations of the Treadway [15][16] By hiring CROs, companies have started to protect the executives more. He also has been Board member of the European Confederation of Institutes of Internal Auditing (ECIIA) since 2014 and President from September 2015 until October 2017. The rows in the cube are the five components. After these events, more and more CROs were hired. CPE: 1.5 | Ethics CPE: No [38] Session Level: Intermediate Procurement integrity is typically defined as honest, fair, impartial, transparent and legal contracting. Performance identifies, assesses severity, and prioritizes risks which may impact the achievement of strategy and business objectives. Fadi has also been supporting regulators to further improve the reporting guidelines and frameworks like GRI, UNDP, KSA MEP. and mitigation. CPE: 1.5 | Ethics CPE: No The professional staff at the IAA, as well as Chairman Abdulqader Obaid Ali, were the consummate hosts and presented materials that went to the essence of internal auditing in the 21st Century, from the importance of becoming conversant with AI technologies to the reason for pursuing all types of fraud. He worked closely in various sectors such as; Public Sector, Financial Institutions, Oil and Gas, Healthcare, Real Estate Development in addition to the International Development Agencies including World Bank, IFC, UN, etc. Session Level: Basic adnan.gcu@gmail.com. The consequences of investment fraud can be severe. GRC Consultant, Diligent and ZeeDimension. Before, he was Head of Group Audit at DZ BANK AG, one of the three largest banks in Germany for more than 17 years. Neda was involved in secondary financing, escrow agreements, inter-credit agreements, distressed debt, and shareholder agreements in compliance with global banking laws. I also hold several committees positions within the tourism board of Dubai. Governance and Culture establishes organizational processes and defines desired cultures to measure and Mohammed has more than 14 years of experience in the field of internal auditing, internal control and governance, and he is a Certified Internal Auditor (CIA) and holds a Certificate in Controls Self-Assessment (CCSA). He has led the development of a number of complex and bespoke IT systems, including secure systems in financial services, which help clients capture, manage and analyse operational and financial data. Dr. Hashem Stietiya is the Director of Research & Development Head of Environmental Consulting at Beeahs Consultancy, Research & Innovation (CRI) business unit. Session Level: Intermediate Siddharth has worked expensively in rolling out the legal compliance solution in India and is leading the same in UAE. Field of Study: Specialized Knowledge He is the recipient of the 2017 Middle East Security Award in the category of Rising Stars in Security and Risk and the 2016 Security Advisor Middle East award in the Retrieved December 01,2017, Nagaraj has experience of working with all major sectors including but not limited to Oil & Gas, Travel & Tourism , Construction & Real Estate, Financial Services, Retail, Public Sector, Education, Sovereign funds, etc. Its no longer the case that risk and finance can be seen independent. Together, they develop guidance documents to aid organizations with risk assessment, internal controls and fraud prevention. Workman Forensics, LLC, CEO. Rami started his career with Ernst & Young, then led the Internal Audit function to a multi-national entity across the MENA region. And they are playing the long game, not just looking for the quick payout. I was responsible for managing a global team located in the US, EU and Asia. Partner, Head Governance, Risk and Compliance Services, KPMG Lower Gulf. The team deserves accolades and praise for a very well managed conference. Varun has over 14 years of experience in financial, operational, and compliance audits, risk assessment and corporate governance services at Protiviti. Neda conducted a control gap analysis of the compliance management, AML Controls and client onboarding/KYC of a financial institution in Abu Dhabi. As with many aspects of our lives, the COVID-19 pandemic changed the way investigative interviews were conducted. Bruce Pitt-Payne In his spare time, he particularly enjoys reading up on the Internet of Things, and IT security. Copyright 2022 UAE Internal Auditors Association, March 7th (Preconference) and 8th and 9th (Conference), Senior Director of Cooperation and Compliance Department at the Dubai Electronic Security Center, Director, Internal Audit Department of Economy and Tourism, Ayesha is driving departmental and sectorial strategy, and objectives in line with Department of Economy and Tourism, Lead the development of departmental policies and procedures, program governance in line with best practices IIA IPPF, COBIT, COSO, ISMS27001 & ISR, ISO22301 BCM & NCEMA, open data, local regulations, and Dubai Tourism strategy 2025. Dimitrios has 30 years of hands-on information security experience gained working in enterprise InfoSec groups and consulting, service and solution providers. Scott is a Tribeca Disruptor Foundation Fellow, a disruptive innovation awards program of Tribeca Film Festival. Experience working within the area of procurement/contract oversight and/or contract management. Review and revision -- which focus on reviewing organization performance to determine how ERM components are functioning and if any changes should be made. This included reviewing their current policies, developing additional policies, conducting fraud risk assessments, implementing Hotline reporting channels and associated procedures, and developing and conducting awareness sessions. He has nearly 20 years of international leadership experience in transportation, infrastructure, and government sectors. After a near miss or an actual crisis managers are often alarmed and focus more on all aspect of risk during the ongoing inspection. Nagaraj was the lead on conducting end to end IPO readiness assessment for Fiveholdings. Join the discussion about your favorite team! PMI) Project Risk Management, International Organization for Standardization(ISO)/International Electrotechnical The investigation exposed a web of corruption, staggering financial mismanagement, hidden personal relationships and conflicts of interest inside an agency that transported tens of thousands of children to school each day. CPE: 1.5 | Ethics CPE: No Recommended Prerequisite: Knowledge of the basic principles of risk management; basic knowledge of the elements of fraud prevention, detection and response associated with fraud strategy Dr. Saeed is a futurist, thought leader, author and a public keynote speaker. CPE: 1.0 | Ethics CPE: No Fadi has also been supporting regulators to further improve the reporting guidelines and frameworks like GRI, UNDP, KSA MEP. Integration of risk management in the whole company's business process becomes necessary. Paritosh has experience in servicing large financial institutions globally. Internal auditors from all over the Middle East & MENA Region will converge on Dubai to gain new perspectives, insights, Knowledge, Networking and Leading practices relevant to all levels and industries. Former President of ECIIA European Confederation of Institutes of Internal Auditing, Chief Audit Executive, Hamburg Commercial Bank. It will also point out some critical factors in selecting a monitor in order to achieve the best outcome. Criminal abuse of cryptocurrencies was at an all-time high in 2021 at $14 billion, up from $7.8 billion in 2020, according to some reports. Will you be ready? [20] Having to understand the compliance with government regulations such as SarbanesOxley of 2002, it is common for CRO's to have also held a chief financial officer position prior to becoming a chief risk officer. Recommended Prerequisite:None Recently, there have been an increased number of significant resolutions of matters involving anti-trust, healthcare, and consumer issues at both the state and federal levels. The agenda on Innovation and Best Practices was innovative on its own. She spent most of her professional experience in managing relevant projects for a wide portfolio of Government and semi-government clients within the UAE covering several industries such as Real Estate, Projects, Hospitality, Media, Education, Government regulatory agencies, and Financial Services. His experience in environmental management in the Middle East makes him instrumental to the process of understanding the needs of clients at Beeah, and accomplishing them through scientifically established methodologies. [1] Just prior to joining KPMG Lower Gulf, Simon was a Partner at another Big 4 Forensic Practice where he specialized in complex investigations, compliance and anti-fraud engagements across a broad spectrum of clients. (2013). Mike is also an Adjunct Professor for Pace University where he teaches the IIA Learning System for the Certified Internal Auditor Exam. He heads the Telecom vertical at ANB and services clients across 25+ countries in Middle East, SE Asia and Africa. Recommended Prerequisite: None Strongly networked worldwide, recognized at all levels of Government and in the corporate world as a credible, ethical and professional business leader. Older adults will outnumber children in fewer than 15 years, and getting ahead of EFE is necessary for financial institutions to prevent and detect it. How to Use COSOs Integrated Framework. Field of Study: Specialized Knowledge Moore Colson & Company, Partner. These processes include, but are not limited to: Figure 2 shows the scope of Recommended Prerequisite: Basic knowledge/understanding of biometrics technology Well planned & diligently executed it provided a unique forum for learning renewal and bringing one self to the state-of-art. would think that, IT being critical to an organizations operations, the risk related to IT and IT security would be Mike is also an Adjunct Professor for Pace University where he teaches the IIA Learning System for the Certified Internal Auditor Exam. Uncertainty creates space for other parties to construct their own narratives that try to explain away their mistakes and discrepancies with various excuses. Additionally, you will learn about protections afforded to a whistleblower complainant and how confidentiality is maintained during and after a whistleblower investigation. The position became more common after the Basel Accord, the SarbanesOxley Act, the Turnbull Report. Field of Study: Specialized Knowledge Bret Hood, CFE Recommended Prerequisite: Basic knowledge of fraud risk assessments What happens when a global bank is faced with significant financial crime concerns, along with interest from multiple regulators, law enforcement and the public? Risk Officers who work for banks earn slightly more at $180,970. Copyright 2022 Association of Certified Fraud Examiners, Inc. 2022 Compensation Guide for Anti-Fraud Professionals, Occupational Fraud 2022: A Report to the Nations, Fields of Study and NASBA-Approved CPE Credit Vary by Session, Access on-demand video recordings of nearly 80 conference sessions, Have the flexibility to start or stop a course and pick-up right where you left off, Recognize how ethics and decisions are intertwined, Navigate the provisions of the Federal False Claims Act (FCA) and its implications for whistleblowers, Apply lessons learned from a real-life FCA case, Recall the history and explain the basics of ransomware, Determine how Colonial Pipeline was hacked, Recognize the vulnerabilities that hackers target, Name practical recommendations to help your organization protect itself from hackers, Identify the quality standards related to fraud reports, Review various report-quality enhancements, Investigate various types of fraud attacks with different biometric techniques, Apply biometric approaches to identify frauds such as account takeovers and social engineering attempts, Analyze biometrics information and perform historical analysis, Apply the concept of gamification and using mobile apps to drive change in people's behavior, Assess how gamification affects group behavior, while leaving room for a mix of competition and collaboration, Identify new forms of risk analysis and behavioral intervention that are potentially more effective than the current tools and techniques, Develop an understanding of money laundering, Recognize the different stages of a money laundering process, Identify how understanding the linkage between fraud and money laundering can improve your chances of success, Assess global views on how to best build analytics into your contract compliance, prevention or detection approach, Examine practical examples of analytical searches currently being used with contracting data, Plan, conduct and evaluate investigative interviews within fraud investigations, Make investigative decisions and record the rationale, Recall the PEACE framework of investigative interviewing, Assess the scheme and address the multiple control failures that led to the district and its leaders demise, Recognize various methods used in carrying out bribery and kickback schemes, Apply best practices for identifying information used in gaining indictments, Implement appropriate remediation efforts, Recognize what diverse employees are looking for and how to integrate these needs into your management styles, Determine ways to create a safe and inclusive workplace culture, Define unconscious bias and understand its effect in the workplace, Navigate the expansion of digital currencies, including virtual currency and cryptocurrency, Compare the types of digital wallets that exist and how they are used in alternative payment models, such as e-wallets, mobile wallets and crypto-asset wallets, Assess some of the top alternative payment systems and what investigators should be aware of, Consider the potential for prosecution, if so warranted, Examine first-hand examples of fraudulent transactions and related documents, Recognize and plan for the difficulties in cross-border asset recovery situations, Identify ways to avoid frauds and unethical behavior in businesses operating in more than one location/geography, Identify usable tools for fraud prevention, detection and investigation, Apply OSINT tools in the investigative context, Acquire insight from case studies into how OSINT can be used for fraud prevention, detection and investigation, Identify both what a benchmark is trying to achieve and what risks exist in a benchmark that might drive aberrant behavior, Determine what steps to take to ensure benchmarks are properly developed, Enable the monitoring of benchmarks and ensuring that the actual benchmark objective is being met and identifying if there are unintended consequences, Apply lessons learned from real-life examples and case studies to scenarios at your organization as part of fraud risk assessments, Determine the role that leaders and board members should be playing to manage the risk of fraud for their business, Identify the habits of leaders and boards that get it right when it comes to fraud risk management, and those that get it wrong, Implement practical tips to gain access to and influence your leaders and boards anti-fraud action agenda, Identify common payroll fraud schemes used against businesses and nonprofits, Determine specific, effective audit steps and procedures to identify errors, irregularities and fraud in payroll systems, Apply a template for implementing best practices in payroll processing, Identify the 7 deadly ethical sins and if they are happening at your organization, Examine real-life cases for each of the 7 deadly ethical sins in action and dissect the why behind each case to learn the lessons, Determine ways leaders can prevent and detect each of the sins, Discover how the HFPP is assisting commercial healthcare plans, government payers, and law enforcement to identify suspicious healthcare billings, Examine the HFPP unique cross-payer data analytics and learn how HFPP Partners leverage HFPP analytic results to protect their healthcare programs, Recall the definition of ESG and its impact and relevance to organizations, Recognize the types of risks and contributing factors related to ESG fraud, Navigate the relevant ESG frameworks and rating systems, Identify the steps organizations can take to mitigate ESG fraud risk, Identify the types of electronic data used during an investigation, Assess eDiscovery and forensic techniques and technologies, Examine technical challenges and data privacy requirements, Compare whistleblower standards in different regions, Determine best practices for advancing whistleblowing around the world, Identify similarities and differences in whistleblowing programs globally, Recall the requirements of the PPP and EIDL program, Assess how fraudsters were able to exploit vulnerabilities in PPP and EIDL to steal millions, Examine how data analytics were used to identify fraudsters and prioritize investigations, Navigate examples of PPP/EIDL fraud schemes, typologies and current trends, Determine best practices in pandemic loan fraud investigations, Identify the situations where monitors are used and most important factors in selecting a monitor, Identify the techniques monitors use to execute their responsibilities and assess the strength of a company's ethical culture, Determine how organizations can leverage the imposition of a monitor to improve their anti-fraud posture, Identify the investment types where fraud is most common and where greater due diligence is essential, Assess why investors are vulnerable to fraudulent investment schemes, Recognize the red flags or warning signs of investment fraud, Draw on a systematic, repeatable process for investigating investment fraud, Identify criteria used in determining the seriousness of a complaint, Determine the processes and documentation involved in analysis and determination of whistleblower status, Apply best practices for maintaining whistleblower confidentiality, Recognize how synthetic identities are used in various ways to commit fraud, Detect and deter synthetic identities in your environment, Develop controls and remediation of synthetic identities, Analyze data sets to link and build machine learning capabilities, Discover what biometrics are and how they are currently implemented, Recognize how biometrics will replace passwords in the future, Determine what a long game fraud is using real-world case studies, Examine how these long-term fraud schemes fit into the Fraud Triangle, Identify what can be incorporated into fraud protection programs to address the risk, Prepare for the EU Whistleblower Protection Directive, Detect retaliation throughout the whistleblowing process using some new and novel techniques, Identify and define corruption and conflict of interest according to various legal, operational and professional definitions, Classify the five major components of the P.R.I.C.E framework as they relate to corruption and conflicts of interest, Examine each component of the P.R.I.C.E framework and connect it to various stages of investigating allegations of corruption and conflicts of interest, Identify and correlate the elements of the P.R.I.C.E framework with common U.S. federal criminal laws and international anti-corruption treaty conventions, Apply the P.R.I.C.E framework using a series of official corruption and conflict-of interest case studies, Define a significant global financial crime investigation, Determine who and what to investigate in such cases, Recognize the importance of an investigation governance structure, Consider the end-to-end steps in this kind of investigation and how all the parts fit together, Recognize the realities of investigation closure, Assess the effectiveness of the investigative team in avoiding bias and employing curiosity, Construct investigative plans to include curiosity as a mitigation strategy for bias, Defend examinations against allegations of subconscious bias, Prove or disprove various fraud hypotheses using evidence developed through curiosity.

Flask Tutorial Python 3, Chatham County Tax Collector, Planet Xchange Knoxville, Displaced Person Fugitive Crossword Clue, Methods And Media Of Health Education, Is Google Patents Reliable, Ethical Acculturation, Open Fabric Crossword Clue, Trusas Calvin Klein Hombre, Cancer Woman Soulmate,