top of page
Forensic Accounting for Fraud

Forensic Accounting for Fraud

Welcome to an illuminating journey into the realm of Forensic Accounting for Fraud. This Continuing Professional Education (CPE) event is a beacon for those wanting to delve deep into the intriguing world of forensic accounting with a specific focus on fraud detection and prevention.


Designed for auditors, accountants, and finance professionals, this seminar is your key to unlocking the secrets behind detecting financial deceit. You'll explore how forensic accounting is utilized as a powerful tool in the battle against fraud, shining a light on irregularities and hidden activities.


We'll navigate through the principles of forensic accounting, its methodologies, and its vital role in combating fraud. We'll dissect real-life case studies, engage in thought-provoking discussions, and ensure you leave with a firm grasp of how to apply these concepts in your professional life.


This isn't just about grasping theories; it's about honing practical skills that can be utilized in real-world scenarios. We aim to empower you with the knowledge and techniques required to detect and prevent fraudulent activities.


Each attendee will receive 2 CPE Hours (YB). A certificate of completion will be provided.


So, are you ready to unravel the mysteries of forensic accounting for fraud? Join us on this enlightening expedition, and broaden your skillset in an area that's increasingly crucial in today's business landscape. We're eager to share our expertise and insights with you!

  • Details on Event Presentation

    Being offered twice a quarter on Mondays at 1:00 p.m. to 3:00 p.m. Central Time.

    We can schedule private events on your timetable for two or more attendees.

  • CPE Event Highlights

    The seminar reviews and answers the following questions:

    • Internal Control Principles and Fraud Management

    • Forensic Accounting Skill Set

    • Understanding the people that commit fraud

    • Overview of fraud classification

    • Financial Statement Fraud Analysis

    • "Best Practice" Anti-Fraud Controls

    • Using Software Tools to examine "Big Data"

    • Using Software Tools to examine "Metadata"

  • Learning Objectives

    Attendees will:

    • Understand how forensic accounting is part of the internal auditor function.

    • Learn how to identify fraud risks

    • Review best practices in fraud prevention and detection programs

    • See what software tools are available for the forensic project.

  • Key Issues on the Agenda

    Section 1 - Internal Control Frameworks for Fighting Fraud

    • What is Corporate Fraud?

    • What is Forensic Accounting?

    • Forensic Accounting Skill Set

    • Forensic examination services

    • COSO "Fraud Risk Management" Model

    • External Auditor's Responsibilities

    Section 2 - The Fraud Perpetrators

    • Things that do not prevent fraud.

    • "Violators of Trust"

    • "The Fraud Triangle"

    • Who are the "Fraud Perpetrators"?

    • Where is the "Fraud"?

    • Behavioral Red Flags

    • Fraud Discovery

    Section 3 - Fraud Classification

    • Asset Misappropriation

    • Corruption

    • Financial Statement Fraud

    Section 4 - Financial Statement Fraud Schemes

    • Top Reasons to cook the Books!

    • Methods for testing for fraud

    • Examples of how financial fraud is committed

    • Forensic tests of financial transactions

    Section 5 - Preventing and Detecting Financial Statement Fraud

    • Prevention

    • Detection

    • Forensic Techniques

    • Forensics: Financial Ratio Analysis

    • Forensics: "Monday Tracing"

    • Benford's Law of Numbers

    • How to think like Mark Nigrini, PhD, MBA

    • Computer Forensics

    Section 6 - "Best Practice" Anti-Fraud Controls

    • How are frauds concealed?

    • Having a process to report fraud and other activities

    • Fraud Policy

    • Corporate Code of Conduct

    • Segregate Incompatible Duties

    • Internal Audits

    • Confirmations

    • Physical Security

    • Human Resources Policies

    • Vendor Management

    • "Tone at the Top"

    • Information Security

    • Controls over Money Laundering (AML)

    Section 7 - Software Tools and Techniques for Fighting Fraud

    • Fraud Examination Software

    • Forensic, Data Extraction and Analysis Tools

    • Case Management Software

    Section 8 - Creating a Fraud Risk Assessment

    • The Heat Map - 80% - 15% - 5% Rule

    • Where in the organization's functions will the fraud occur?

    Section 9 - Forensic Examinations

    • Electronic Data Recovery (EDR) Model

    • Metadata Extraction

    • Metadata Extraction Tools for PDF files

    • Metadata Extraction Tools for Image files

    • Metadata Extraction Tools for general files

    • History and Custody of Documents and Files

    • Document Examination

    • Social Media Research

    • T&E Forensic Analysis Example

    Section 10 - Summary and Wrap-up

bottom of page