Log In
  • Virtual Conference

    Couldn't Be in Las Vegas?

    Don't miss out on world-class anti-fraud training. Watch on-demand recordings from the 29th Annual ACFE Global Fraud Conference and earn CPE by registering for the Virtual Conference. Register now.

    Purchase the Virtual Conference and:

    • Choose from 16 breakout sessions, watch recordings, pass the final exam and earn 1.5 CPE per session
    • Access on-demand video recordings of 75+ Main Conference Sessions (only 16 are eligible for CPE)
    • Earn up to 24 CPE

    Live Schedule (Eligible for CPE)

    Monday, June 18
    10:15-11:30 AM

    Monday, June 18 | 10:15-11:30 AM


    Level: Intermediate

    Recommended Prerequisite: General knowledge of the risks associated with cybersecurity-related incidents

    Field of Study: Information technology

    This session will discuss what to do when you learn you or your organization has been the victim of a cybersecurity incident. It will address how to establish an intelligence network, and monitor your personal and your organization’s digital exposure. Finally, it will cover the three types of communications necessary to survive a cyber incident.

    You Will Learn How To:

    • Distinguish the types of cybersecurity incidents that can cause the most harm
    • Identify tools that are available for early detection
    • Evaluate the three types of communication needed after an attack
    • Navigate through developing a cyber escalation matrix
    jhealy headshot
    Jack Healey, CFE, CPA/CFF

    CEO, Bear Hill Advisory Group

    Jack Healey is an expert in operational, financial and organizational crisis management, strategies and tactics. His unique background as a trained operation and financial expert, fraud examiner, audit partner, negotiator and former COO/ CFO of a publically traded company brings a unique perspective which addresses the operational, governance and human behavior which lead to crisis events. He developed the Business Crisis Diagnostic and Prevention Model™ which provides businesses with the framework necessary to identify impending business crises before they occur. This model can help identify the hidden risks inherent in an organization in order to develop containment plans prior to the loss of profits, reputation or associate well-being. This model has been used effectively by his clients to resolve complicated business crises and manage the consequences associated with fraud, product recall, data breach, workplace violence and activist shareholders.

    Monday, June 18 | 10:15-11:30 AM


    Level: Intermediate

    Recommended Prerequisite: Working knowledge of fraud and fraud schemes; some understanding of white-collar crime

    Field of Study: Behavioral Ethics

    This session begins with a discussion of Edwin Sutherland’s 1939 description of white-collar criminality and how applicable the concept remains today. It will delve into the ethics and psychology of white-collar criminals using case studies and analysis of fraudsters’ character and motivations. Models of criminology, along with the roles that narcissism, sociopathy and greed play in fraud are addressed. The session will include excerpts from ACFE video interviews with Roomy Khan and Nathan Mueller, along with an interview of “Pharma Bro” Martin Shkreli — three convicted fraudsters who illustrate important clues to finding and preventing fraud.

    You Will Learn How To:

    • Apply criteria for aberrant behavior and psychopathology to white-collar criminals
    • Assess the motivations that white-collar criminals have in common
    • Analyze the roles that character and behavior play in predicting tendencies to white-collar crime
    • Recognize how and where character and ethical breaches can signal the existence of white-collar crime
    Pocalyko Headshot
    Michael Pocalyko CFE, MPA, PI, CA

    CEO, SI

    Michael Pocalyko is CEO of SI, a Washington D.C.-based professional services firm and government contractor in the information technology, cybersecurity, investigations and intelligence sectors, concentrating in fraud, corruption, corporate board-level inquiries, international financial investigations and white-collar crime. A decorated Navy pilot and retired commander, he previously chaired the boards of Erdevel Europa in Luxembourg and Saudi Arabia, TherimuneX Pharmaceuticals and Advanced Environmental Resources, Inc. An experienced corporate director of both NASDAQ publicly-listed and private corporations, he was audit committee chairman at Herley Industries and Challenger Corporation, and is a Sarbanes-Oxley audit committee financial expert.

    Greelis Headshot
    Michael Greelis, Ph.D. LPC, LMFT

    Licensed Professional Counselor

    Michael Greelis, Ph.D., is a psychotherapist in Fairfax County, Virginia. He has been in private practice for 25 years, using techniques of interpersonal, cognitive and existential psychotherapy. He is a graduate of the University of California, Santa Barbara, and earned his doctorate from George Mason University, specializing in community and agency counseling. He has worked clinically with serious mental illness, psychological trauma, behavioral problems involving oppositional behavior and conduct issues, family conflict, bipolar disorder, depression and anxiety disorders.

    1:50-3:05 PM

    Monday, June 18 | 1:50-3:05 PM


    Level: Basic

    Recommended Prerequisite: None

    Field of Study: Auditing

    The estimate that 5% of revenue is lost to fraud is a well-known and accepted number. Organizations are increasingly spending more time and effort on fraud awareness and protection. In the past few years, expectations for internal audit have changed dramatically — no longer is fraud awareness sufficient. Today, management and the board expect auditors to actively participate in the prevention and detection of fraud in their organization. Leadership rightfully has those expectations, and no group is better positioned to help fight fraud in an organization than internal audit. Auditors should be the best defense an organization has to fight fraud, if they know how to identify the red flags and actively look for fraud. However, the internal audit industry is still developing fraud fighting skills.

    This session will cover fraud fighting techniques internal audit can immediately incorporate into their day-to-day auditing approach to catching the Bad Guys and start moving the needle in their own organization to reduce the estimated 5% of revenue lost to fraud.

    You Will Learn How To:

    • Apply specific tests and methods to identify fraud red flags in audit programs
    • Understand how internal audit can be one of the most significant fraud deterrents in an organization
    • Embed specific tests and methods to identify fraud red flags in audit programs
    • Analyze and evaluate internal incentive programs that could lead to fraud
    mbreslin headshot
    Mary Breslin, CFE, CIA

    President, Empower Audit Training and Consulting

    Mary Breslin has more than 20 years of experience in internal auditing, fraud examination, management and accounting for companies such as ConocoPhillips, Barclays Capital, Costco Wholesale, Jefferson Wells and Boart Longyear. She specializes in internal audit transformations, operational and financial auditing, fraud auditing and investigations, and corporate accounting.

    In addition to audit, fraud and accounting, she has significant international experience and has managed audit programs in more than 30 countries. Prior to becoming a full time instructor, Breslin held the title of Vice President and Chief Audit Executive in a global financial services company, where she transformed a checklist audit function into a value-add audit department which delivered measurable business results through the use of risk based auditing, data analytics, continuous education and skill development for her leadership team and staff. Through her senior audit leadership roles, Breslin has implemented numerous baseline internal audit functions and year-one Sarbanes-Oxley programs, both domestically and abroad.

    Monday, June 18 | 1:50-3:05 PM


    Level: Intermediate

    Recommended Prerequisite: Basic understanding of ethics and compliance programs, internal controls and fraud risk assessments

    Field of Study: Behavioral Ethics

    How do you know if your organization is about to take a nose-dive into an ethical dilemma? What are the steps you can take to prevent turmoil in your organization? What is the connection between ethics and fraud? These are the questions that will be covered in this session. It will look at how to measure your organizations ethical temperature, as well as how that will feed into your fraud risk assessment process. The session will also explore how you can use technology to scale this program to fit the needs of your organization.

    You Will Learn How To:

    • Identify the red flags of a ruinous corporate culture
    • Establish your ethical baseline
    • Assess weaknesses in an internal control framework
    • Perform a fraud risk assessment using internal and external information
    • Present your results during and after the fraud risk assessment
    SMorang Headshot
    Steve C. Morang, CFE, CIA, CRMA

    Senior Manager, Frank Rimerman & Co LLP

    Steve Morang is passionate about leading the battle to fight fraud. He is a global leader in fraud prevention, detection, investigation, ethics and compliance. Over the past 15 years Morang has developed multiple methodologies to help organizations stay ahead of the latest trends in fraud. His areas of specialization include enterprise risk management and fraud risk assessment workshops using specialized balloting technology to enhance value as well as the building and evaluation of custom compliance programs concerning FCPA, U.K. Bribery Act and various other U.S. Government orders and regulations.

    Morang has been featured in publications such as Forbes, American Banker and Fraud Magazine. He is the author of the "Big Frauds" column of Fraud Magazine and an Adjunct Professor of Fraud & Ethics at Golden Gate University. Morang is also President of the San Francisco Chapter of the ACFE and Chair of the ACFE Higher Education Committee.

    3:35-4:50 PM

    Monday, June 18 | 3:35-4:50 PM


    Level: Intermediate

    Recommended Prerequisite: Basic knowledge and understanding of the interview process as it relates to fraud investigation

    Field of Study: Communications and Marketing

    This session will focus on difficult situations that you might encounter when conducting an interview and how to effectively deal with them. Interviewing techniques for 50+ suspects will be presented, along with how you can handle antagonistic suspects, and when and how to turn up the heat. The session will also address when to use physical evidence, how to prepare evidence and how to take notes without making the interviewee nervous.

    You Will Learn How To:

    • Analyze tactics for interviewing a hostile suspect
    • Assess techniques for dealing with multiple suspects on an inside job
    • Determine how one can apply pressure legally
    • Identify ways to use physical evidence effectively
    • Recall steps to prepare a signed, written confession
    Sherman McGrew, J.D., CFE

    Program Analyst, Transportation Safety Administration, (TSA)

    Sherman McGrew is a native of Brooklyn, New York. He entered military service in 1979, retiring as a U.S. Army Lieutenant Colonel in 2010. He is a graduate of the U.S. Army Command and General Staff College and has had three active duty deployments, to include two combat tours in Iraq in 2003 and 2008. In 2008 he worked extensively with the U.K. Military and the U.K. Civilian Police Contingent in Basra, Iraq.

    He entered law enforcement in 1987 and retired as a Captain with the Waterbury, Connecticut Police Department in 2009, having also served as a Patrolman, Detective, Sergeant, and Lieutenant. He has conducted literally thousands of interviews with suspects and has lectured on interview and interrogation to both police, military and international audiences. As a detective, he extensively investigated financial crimes, securing convictions while at all times respecting the rights of the accused.

    He holds a Bachelor Degree from the University of Connecticut, a Masters in Forensic Science from the University of New Haven and a Law Degree from The University of Connecticut School of Law. He is admitted to both the Connecticut Bar and the U.S. Federal Bar as an attorney. He also was a commander of the Waterbury Police SWAT team and founded and commanded the Waterbury Police Academy for four years.

    Monday, June 18 | 3:35-4:50 PM


    Level: Intermediate

    Recommended Prerequisite: A basic understanding of internal reporting and compliance systems

    Field of Study: Behavioral Ethics

    This session will examine how the whistleblower provisions in Dodd-Frank have created a dynamic “new normal” and curbed the serial wrongdoing on Wall Street. Based on the presenter’s experience, you will learn best practices for establishing and monitoring whistleblowing and compliance systems.

    You Will Learn How To:

    • Determine the ways a culture of integrity helps prevent possible violations of the law
    • Identify common pitfalls and best practices for dealing with whistleblowers
    • Recognize why employees in the know might remain silent, even when investors and the general public are harmed
    • Examine the rise of corporate whistleblowers since Dodd-Frank and their transformational impact on law enforcement and corporate conduct
    • Recognize what to do if your organization is hit with a front-page corporate scandal
    Myron Marlin
    Myron Marlin

    Senior Managing Director, Strategic Communications, FTI Consulting

    Myron Marlin is a Senior Managing Director in the Strategic Communications segment at FTI Consulting, and is based in Washington, D.C. He also is part of the segment’s Financial Communications and Public Affairs practices.

    Marlin brings to FTI Consulting more than 20 years of communications experience handling crisis and issues management; financial transactions; government and regulatory affairs; high-stakes litigation; and mergers and acquisitions (M&A). He also has significant experience working across the commercial, financial and public sectors.

    Prior to FTI Consulting, Marlin served for nearly five years as director of communications at the U.S. Securities and Exchange Commission (SEC), under chairs, Mary Jo White, Elisse B. Walter and Mary L. Schapiro. While there, he coordinated communications strategy on a range of significant issues, including the agency’s landmark policy of seeking admissions in certain enforcement cases, and major rulemaking stemming from the Dodd-Frank Act and the JOBS Act. He also served as a key communications adviser to the SEC chair, and counseled senior officials through congressional testimony, media interviews and other speaking engagements.

    jthomas headshot
    Jordan Thomas, Esq.

    Partner, Labaton Sucharow

    Jordan A. Thomas concentrates his practice on investigating and prosecuting securities fraud on behalf of whistleblowers and institutional clients. As Chair of the Firm's Whistleblower Representation practice, Thomas protects and advocates for whistleblowers throughout the world who have information about possible violations of the federal securities laws. A longtime public servant and seasoned trial lawyer, Thomas joined Labaton Sucharow from the Securities and Exchange Commission where he served as an Assistant Director and previously as an Assistant Chief Litigation Counsel in the Division of Enforcement.

    Tuesday, June 19
    10:15-11:30 AM

    Tuesday, June 19 | 10:15-11:30 AM


    Level: Intermediate

    Recommended Prerequisite: Knowledge of the various threat actors who may seek to breach information security for financial gain and/or competitive advantage

    Field of Study: Specialized Knowledge

    According to the 2018 Verizon Data Breach Investigations Report, more than 90% of successful security breaches start with some aspect of social engineering. By exploiting publicly available information and predictable human behavior, fraudsters manipulate their targets into taking certain actions that can lead to serious compromise and financial ruin.

    This session will break down the methodology of how social engineers collect targeting information, impersonate legitimate requesters and manipulate targets. Within the context of a case study, various social engineering techniques will be discussed and demonstrated.

    You Will Learn How To:

    • Compare social engineering techniques that can be deployed against a target
    • Identify security best practices to combat these threats, including the design and implementation of a social engineering awareness program
    • Evaluate the desire to make personal or company information publicly available against making yourself vulnerable to exploitation
    pwarmka headshot
    Peter Warmka, CFE, CPP

    Director of Business Intelligence, Strategic Risk Management LLC

    Following a distinguished career as a Senior Intelligence Officer within the Central Intelligence Agency (CIA), Peter Warmka joined Strategic Risk Management in 2010 as Director of Business Intelligence. In this capacity, he has led numerous due diligence investigations on behalf of corporate clients pursuing mergers and acquisitions that have uncovered significant fraud within target entities. Warmka’s professional expertise includes the areas of cybersecurity, intelligence collection, competitive intelligence and asset protection management. With his extensive background in social engineering, Warmka joined Webster University in 2015 as an Adjunct Professor, where he lectures on intelligence and counter-intelligence as it relates to cybersecurity.

    Tuesday, June 19 | 10:15-11:30 AM


    Level: Advanced

    Recommended Prerequisite: Intermediate understanding of Microsoft Excel and experience in fraud cases

    Field of Study: Auditing

    According to the ACFE's Report to the Nations on Occupational Fraud and Abuse, proactive data monitoring and analysis is among the most effective anti-fraud controls, but data analytic software can sometimes be costly. Microsoft Excel is one of the most powerful data analysis tools available and it can do much of the analysis necessary to perform professional engagements at a lower cost than other more expensive data analysis programs. In this session, you will discover some of the most powerful tools in Excel, and learn about an inexpensive add-on that can take your data analysis and final deliverables to the next level.

    You Will Learn How To:

    • Recognize ways to incorporate and use powerful data analysis tools in Excel
    • Navigate creating powerful exhibits in Excel
    • Recall how Excel can embed charts and tables into your reports
    tcouch headshot
    Tiffany Couch, CFE, CPA, CFF

    CEO/Owner, Acuity Forensics

    Tiffany Couch, CFE, CPA/CFF, is principal at Acuity Forensics, a Pacific Northwest forensic accounting firm with a national presence. She has more than 21 years of experience in the field of accounting with the last 14 years focused completely on forensic accounting-related engagements. Her expertise is in matters involving fraud investigation, forensic accounting, contract and regulatory compliance, internal control risk assessment, and complex litigation.

    She has provided expertise as a source to The New York Times, NPR, Wall Street Journal, Forbes Magazine, Financier Worldwide Magazine and First Business News. She’s also a regular contributor to Fraud Magazine and the Vancouver Business Journal, and has been interviewed for CNBC, KING 5-TV in Seattle, iHeartRadio and KGW-TV in Portland, and News Talk in Alberta, Canada. Couch is the recipient of the 2014 James R. Baker Speaker of the Year, presented by the ACFE to honor an individual who has demonstrated the true spirit of leadership in communication, presentation and quality instruction. She serves as a faculty member for the ACFE and recently completed a two-year term as Vice-Chair and Chair of the ACFE’s Board of Regents.

    Couch is the author of The Thief in Your Company, available at Amazon and the ACFE bookstore. 

    1:50-3:05 PM

    Tuesday, June 19 | 1:50-3:05 PM


    Level: Intermediate

    Recommended Prerequisite: Knowledge of and experience with the fundamentals of searching surface websites

    Field of Study: Specialized Knowledge

    The dark web is a den of iniquity operated by the technically sophisticated. The more Google-dependent we have become as fraud examiners, the less we understand what is going on behind the scenes and how to operate in this world. This session will introduce the dark web and channels that are used to institute private sales and exchanges.

    You Will Learn How To:

    • Navigate through dark web channels for content
    • Compare specialized search engines to attempt searching in this venue
    • Define the lingo of this underworld
    • Recognize steps to use Tor safely and effectively, while learning the vulnerabilities
    chetherington headshot
    Cynthia Hetherington, CFE

    President, Hetherington Group

    Cynthia Hetherington is the founder and president of Hetherington Group, a consulting, publishing, and training firm that leads in due diligence, corporate intelligence, and cyber investigations. She has authored three books on how to conduct investigations. Hetherington was also named the 2012 James Baker Speaker of the year for the Association of Certified Fraud Examiners.

    For more than 25 years, Hetherington has led national and international investigations in corporate due diligence and fraud, personal asset recovery, and background checks. With a specialization in the financial, pharmaceutical, and telecommunications industries, her investigations have recovered millions of dollars in high profile corruption cases, assisting on the investigations of the top two Ponzi cases in U.S. history.

    Tuesday, June 19 | 1:50-3:05 PM


    Level: Overview

    Recommended Prerequisite: None

    Field of Study: Specialized Knowledge

    This session will provide an in-depth examination of a factual six-year criminal investigation, personally conducted by the presenter, involving murder, fraud, money laundering, tracing and seizure of assets (proceeds of crime), and overcoming corruption at the highest levels of a foreign government.

    The session will also review the legal processes encountered in this multi-jurisdictional, international investigation, the forensic examination of evidence used to identify those involved in this multimillion-dollar employee fraud, and the methodology used in the investigative process and recovery of assets, all in an effort to bring those responsible to justice in a foreign jurisdiction.

    You Will Learn How To:

    • Analyze the overcoming of legal and quasi-legal obstacles stemming from an international, multi-jurisdictional investigation
    • Apply policies and procedures focused on fraud prevention and anti-money laundering
    • Recognize methodology concerning the identification and implementation of preventive measures and reduction to further risk exposure
    • Identify and use all available resources throughout the investigative process, insuring a "no stone unturned" approach
    jfilliter headshot
    Jeff Filliter, CFE, IAFCI

    President, J.R. Filliter Investigative Services

    Jeff Filliter is a seasoned investigator, with more than 40 years of experience with the Royal Canadian Mounted Police, Scotiabank and in private practice. He is the President of J. R. Filliter Investigative Services and holds an honors degree in administrative studies (BA), with distinction, has been a Certified Fraud Examiner (CFE) since 1995 and holds a Private Investigator licence for the Province of Ontario. Filliter is the author of The Shallowest of Men, a book that examines a six-year, multijurisdictional fraud and money laundering investigation.

    Filliter has a solid investigative and law enforcement background, specializing in domestic and international fraud, risk assessment and mitigation, due diligence, and asset tracing and recovery. He is an expert in asset tracing and recovery, financial and white-collar crime, fraud, money laundering, terrorist financing, forensic investigations, risk management and security. He has provided expert testimony in both civil and criminal proceedings globally, and has been declared a professional witness in the U.K. in relation to wire transfer fraud.

    3:35-4:50 PM

    Tuesday, June 19 | 3:35-4:50 PM


    Level: Intermediate

    Recommended Prerequisite: Knowledge of and experience with administration and oversight of contracts

    Field of Study: Specialized Knowledge

    Contract fraud costs organizations around the world billions of dollars each year. To protect your organization, you need to be on the lookout for contract fraud schemes. This session will highlight how real-world fraudsters think, act and try to fool you. It will also discuss several tools and techniques that will help you prevent or minimize potential contract fraud.

    You Will Learn How To:

    • Assess the personality traits and psychology of fraudsters
    • Examine the different ways fraudsters try to fool you
    • Identify proactive strategies for minimizing fraud
    dmullinax headshot
    Don Mullinax, CFE, CIA, CGFM

    Former Assistant Director, Defense Contract Audit Agency

    Don Mullinax previously served as Chair of the ACFE’s Board of Regents and has over three decades of experience leading and conducting contract, forensic, and performance audits, fraud and misconduct investigations, and anti-fraud consulting engagements across a variety of industries including aviation, construction, consumer goods, defense, education, government, health care and retail. He has held a number of executive positions in both the private and public sectors, including Shareholder, Forensic Strategic Solutions, LLC; Principal, Deloitte & Touche; Inspector General, Los Angeles Unified School District; and Chief Investigator, U.S. Senate’s Permanent Subcommittee on Investigations.

    Tuesday, June 19 | 3:35-4:50 PM


    Level: Overview

    Recommended Prerequisite: None

    Field of Study: Specialized Knowledge

    Fraudsters are exploiting digital identities at increasing rates through data breaches, the proliferation of synthetic identities and the increase of digital products. Fraud rings adapt their techniques and targets to maximize their returns as we improve our controls. They have migrated from primary financial products (e.g., credit card), to secondary financial products (e.g., HSA), and are expanding into other sectors (e.g., mobile devices).


    In this panel you will hear fraud risk managers in the financial services and other sectors talk about risks related to identity and account takeover, emerging trends, risk drivers, identity verification techniques, authentication methods, and anomaly detection analytics that are being used to mitigate these risks.

    You Will Learn How To:

    • Assess emerging risks facing the financial and related sectors
    • Review the evolution of fraud rings and their tactics
    • Identify prevention and detection techniques to combat emerging risks
    bcastelli headshot
    Brian Castelli

    Partner, PwC Forensic

    Castelli is a partner at PwC and co-leads PwC's fraud prevention practice as part of the Financial Crimes Unit, which delivers strategic and operational expertise to C-suites and boards grappling with increasingly complex financial threats. He also leads PwC's Forensic Banking & Capital Markets practice area. For the last 18 years he’s helped leading banks, broker dealers and asset managers prevent, detect and investigate financial crime. This includes fraud, money laundering, bribery and corruption, securities trading violations and abuses, employee conduct and other threats. He speaks regularly on the role of technology and analytics in building a sustainable anti-fraud and anti-financial crimes program. Castelli has also been awarded a U.S. patent for fraud detection.

    Wednesday, June 20
    8:30-9:45 AM

    Wednesday, June 20 | 8:30-9:45 AM


    Level: Intermediate

    Recommended Prerequisite: None

    Field of Study: Specialized Knowledge

    This session will explore EY’s 2018 Global Forensic Data Analytics survey. It will review the findings and discuss use cases for machine learning, artificial intelligence, risk scoring and blockchain.

    You Will Learn How To:

    • Assess the survey findings
    • Recognize use cases for emerging issues
    vwalden headshot
    Vincent Walden, CFE

    Partner, EY

    Vincent Walden is a Partner at EY specializing in forensic technology, business intelligence and fraud detection analytics. He leads a national team of skilled forensic technology and data mining professionals. With a focus on anti-fraud analytics, forensic data mining, third-party due diligence and electronic discovery services, he has more than 17 years of experience handling the information management, forensic analysis and electronic discovery needs for large scale, complex litigations, investigations and proactive anti-fraud and compliance programs. He has been featured in many publications including Fraud Magazine, Internal Auditor Magazine, Compliance Week, Forbes, The Economist, The FCPA Report, ABC News Online, CNBC, Tech Data, and other leading publications.

    Wednesday, June 20 | 8:30-9:45 AM


    Level: Overview

    Recommended Prerequisite: None

    Field of Study: Specialized Knowledge

    This session will trace the anatomy of two previously unreported international fraud cases — one that took place entirely within the virtual world of Second Life and the other that was organized and carried out via Facebook. Both cases highlight the nontraditional ways that modern fraudsters, extremists and money launderers plan and execute their schemes via nontraditional platforms. The session will draw on the presenter’s experience investigating both incidents.

    You Will Learn How To:

    • Identify prescriptive actions such as methods for information sharing and customer identification
    • Recognize social-financial red flags
    SButler Headshot
    Scott Butler, CFE, CAMS

    Chief Compliance Officer, Linden Lab

    Scott Butler (CFE, CAMS-FCI) managed Facebook's first Payments Compliance program, assisting the company in obtaining their money transmitter licenses and crafting their initial set of policies and procedures. As Head of Fraud, Compliance and Payment Operations at Linden Lab, Butler is in charge of the Money Services Business that governs transactions within Second Life, the world's largest virtual goods economy. He began his career on Wall Street, working for Credit Suisse (New York, Hong Kong) and later at Deutsche Bank. He serves as a consultant for the financial crime-related television project, The Bank.

    10:05-11:20 AM

    Wednesday, June 20 | 10:05-11:20 AM


    Level: Intermediate

    Recommended Prerequisite: Understanding of internet investigations

    Field of Study: Specialized Knowledge

    This session goes beyond using social media for investigation purposes. It will explore other data resources that exist today. This session will discuss the often overlooked sites for when your investigation runs deep. Learn how to search sales sites like Craigslist or eBay. Identify alternate income activities through other service-based sites. Discover what multi-level marketing (MLM) sites are accessible and what information is available.

    You Will Learn How To:

    • Recognize effective ways to explore and search sales sites like Craigslist, Kijiji or eBay
    • Identify alternate income or employment activities like Uber, AirBnB, Rover or other service-based sites
    • Examine what multi-level marketing sites are accessible and what information is available
    Elliot Headshot
    Keith Elliott

    VP Operations and Business Development, Reed Research

    Keith Elliott has been a Licensed Private Investigator in varying capacities for more than 24 years. He has extensive experience with property-casualty, criminal, life, health and disability insurance investigations across Canada and internationally. He has presented evidence and testified in precedent-setting cases at the Supreme Court of Ontario and Financial Services Commission of Ontario.

    Wednesday, June 20 | 10:05-11:20 AM


    Level: Intermediate

    Recommended Prerequisite: A basic understanding of money laundering investigations

    Field of Study: Specialized Knowledge

    Money laundering is the act of taking criminal proceeds and disguising or distancing the proceeds from their illicit origin in order to use them to perform legal (or further illegal) acts. This session will explore the money laundering process and discuss common investigative techniques and tools available to fraud examiners.

    You Will Learn How To:

    • Identify the stages of the money laundering process
    • Compare common money laundering methods and schemes
    • Connect the Bank Secrecy Act and FinCEN data into money laundering investigations
    • Recognize front companies and other corporate vehicles often misused by money launderers
    • Identify common investigative techniques, statutes and other tools available to combat money laundering
    jzirkle headshot
    Jason Zirkle, CAMS

    Criminal Intelligence Analyst, Texas Department of Public Safety, Texas Ranger Division

    Jason Zirkle is an Intelligence Analyst with the Texas Ranger division of the Texas Department of Public Safety (DPS). At DPS, he works alongside Texas Rangers and DPS Special Agents, providing investigative support and financial analysis on major financial crime investigations, including money laundering, fraud, embezzling and theft, public corruption, identity theft, illegal gambling, and other white-collar crimes. He also provides financial expertise to non-financial DPS criminal cases, such as murder investigations, narcotics, and human smuggling and trafficking. Zirkle is the FinCEN Agency Coordinator for Texas DPS, and conducts training within DPS on FinCEN and financial crime.

    Virtual Conference

    Includes access to on-demand video recordings

    Admission Type

    Members

    Non-Members

    Early Pricing through April 11, 2018:

    $795

    $995

    Standard Pricing after April 11, 2018:

    $895

    $1195

    Did you attend, but miss a session that you wanted to see?

    Wish you could have been in two sessions at once, or want to revisit your favorite session? You can still add the On-Demand Recording package to your Main or Full Conference registration at a discounted price for access to all educational session videos.

    To purchase the Virtual Conference recordings call (800) 245-3321 / +1 (512) 478-9000.

Sign up for conference updates