Log In

Schedule

Tap the down arrow to display the filter panel. Everything on the schedule is shown by default, so to filter the results, tap the checkboxes. Scroll down to see your results.

Sunday
11:00 AM-4:00 PM

Registration Opens

1:00-5:00 PM

Sunday, June 23 | 1:00-5:00 PM


CPE Credit: 4.2

Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

Corruption and money laundering often go hand in hand. This session will teach you how to detect, investigate and report these schemes using shared controls. You will examine recent case studies to identify types of corruption and the proceeds, and also identify the methods fraudsters try to launder these proceeds. The session will focus on controls to prevent and detect money laundering, including data analytics. You will also discuss best practices to investigate money laundering and corruption, and how to report your findings.

Course Outline:

  • Block 1: Corruption and Money Laundering
  • Block 2: Leveraging Analytics and Controls to Prevent and Detect Money Laundering
  • Block 3: Investigating and Reporting Money Laundering

You Will Learn How To:

  • Ascertain the connection between corruption and money laundering
  • Apply best practices to detect money laundering
  • Identify investigation methods for money laundering and corruption
Schidlow Headshot
Michael Schidlow, CFE, CAMS-Audit

Head of Financial Crime Risk Training and Emerging Risk Advisory, Global Internal Audit, HSBC Bank

Michael Schidlow currently serves as the Head of Financial Crime Risk Training for HSBC Bank’s Global Internal Audit Function. In this role, Schidlow designs and delivers bespoke training courses on anti-money laundering (AML), terrorist financing, anti-bribery/corruption (ABC), and anti-financial crime best practices. Schidlow also leads the function’s Emerging Risk Advisory for North America, Latin America, and for the Global Financial Crime Risk teams. He consults on audit planning and audit scoping based on regulatory issues, enforcement actions, and external environment monitoring.

Sunday, June 23 | 1:00-5:00 PM


CPE Credit: 4.2

Level: Advanced

Recommended Prerequisite: Professional experience as an interviewer

Field of Study: Communications and Marketing

When you conduct interviews, either in person or over the phone, so many things can go unnoticed. In this Pre-Conference session, you will learn how people are comfortable telling certain lies, as well as how an interviewee’s choice of words can provide important clues as to whether the interviewee is being truthful or holding information back.


Also, fraud examiners have been taught to rely on nonverbal behaviors to help detect deception, but what happens if your interpretation of these is flawed? Test your ability to detect deception while discussing the latest scientific research. You will learn how to apply various social-psychological behaviors to promote honesty. You will also watch videos and read statements from real confessions that have sparked debate about both their validity and accuracy. You will dissect the interviewer’s role, critiquing what went right and wrong while also discussing how to use these findings in fraud interviews.

Course Outline:

  • Block 1: Detecting Deception: The Body Tells a Story, but Can You Read It Accurately?
  • Block 2: Fraud Awareness and Statement Analysis
  • Block 3: Dissecting a Confession: Lessons for Fraud Examiners

You Will Learn How To:

  • Discern clues to someone’s truthfulness based on their word choices
  • Recognize recent scientific research about deception detection based on nonverbal behaviors
  • Identify strengths and weaknesses of real-life interviews

bhood headshot
Bret Hood, CFE

Director, 21st Century Learning & Consulting

Retired Special Agent (SA) Bret Hood is a 25-year veteran of the FBI. In his time with the FBI, Hood worked high-profile white-collar, money laundering, public corruption, counter-terrorism and organized crime cases. For his last 15 years, Hood was a master instructor for the FBI. Since retirement in 2016, Hood has served as the director of 21st Century Learning & Consulting LLC providing consulting and instructional services to organizations around the world. He is also a former adjunct professor of leadership and ethics for the University of Virginia.

Sunday, June 23 | 1:00-5:00 PM


CPE Credit: 4.2

Level: Intermediate

Recommended Prerequisite: Knowledge of compliance program implementation, assessment or monitoring

Field of Study: Behavioral Ethics

On February 8, 2017, the Evaluation of Corporate Compliance Programs (Evaluation Guidance) appeared unannounced on the U.S. Department of Justice (DOJ) Fraud Section’s website. This was the latest addition to the canon of corporate compliance guidance that includes resources such as the United States Attorney’s Manual, the United States Sentencing Guidelines, the DOJ’s A Resource Guide to the U.S. Foreign Corrupt Practices Act, the OECD’s Anti-Corruption Ethics and Compliance Handbook for Business, as well as publications from the United Nations Office on Drugs and Crime, and the World Bank.


The Evaluation Guidance notes that the DOJ Fraud Section does not use a rigid formula to assess the effectiveness of corporate compliance programs, as it recognizes that each company has a unique profile and will undertake the appropriate solutions to reduce its risks. However, the Evaluation Guidance suggests common questions that can be asked to arrive at an individualized determination.


Drawing from the Evaluation Guidance’s main sample topics and questions, this Pre-Conference session will provide you with best practices to evaluate your organization’s corporate compliance program. Major areas of focus include in-depth exploration of training and communication, confidential reporting and investigations, incentives and disciplinary measures, third-party management, and mergers and acquisitions.

Course Outline:

  • Block 1: Performance Incentives That Drive Accountability
  • Block 2: Training and Communications to Promote a Speak-Up Culture
  • Block 3: Exercising Due Diligence over Third-Party and Merger Transactions

You Will Learn How To:

  • Align performance incentives and disciplinary measures resulting from investigations to drive organizational accountability and better manage ethical risks
  • Design and implement training and communication programs that effectively promote employee reporting and a “speak-up” culture
  • Leverage proactive compliance due diligence during the M&A process to identify pre-merger and post-transaction risks

efeldman headshot
Eric R. Feldman, CFE, CIG, CCEP-I

Senior Vice President and Managing Director, Corporate Ethics and Compliance Programs, Affiliated Monitors, Inc.
ACFE Regent

Eric Feldman, CFE, CIG, CCEP-I, Senior Vice President and Managing Director, Corporate Ethics and Compliance Programs, joined Affiliated Monitors after retiring from the Central Intelligence Agency (CIA) in 2011. Feldman had a distinguished 32-year career with both the Executive and Legislative branches of the federal government. He served in executive positions with the Offices of Inspector General at the Department of Defense, Defense Intelligence Agency, and CIA, and he was the longest serving Inspector General of the National Reconnaissance Office (NRO) from 2003–2009. At the NRO, he presided over a highly successful procurement fraud prevention and detection program, widely recognized by the Department of Justice as a model throughout the federal government.


Feldman was elected to the Board of Regents for the Association of Certified Fraud Examiners (ACFE) for 2019–2020. He is also a member of the teaching faculty of the ACFE and a frequently sought-after speaker and author on the topics of procurement fraud detection and prevention, bribery and corruption, corporate business ethics and compliance, and managing an Inspector General function. He has given presentations at national conferences of the ACFE, the Association of Inspectors General, and the ABA Procurement Fraud Institute, as well as regional fraud and compliance conferences in Europe, Asia, and the Middle East. Feldman is the recipient of the 2018 James A. Baker Speaker of the Year Award presented by ACFE.

5:00-9:00 PM

Registration Opens

5:30-7:00 PM

Sunday, June 23 | 5:30-7:00 p.m.


Join fellow women in the anti-fraud industry to network, ask questions and share ideas in a relaxed setting.

wnr-1 wnr-2
6:00-6:45 PM

Sunday, June 23 | 6:00-6:45 p.m.


New ACFE members and first-time attendees to the ACFE Global Fraud Conference are invited to attend a special networking event before the Welcome Reception. Join us to network with your peers and meet ACFE leaders and staff, Regents and local chapter officers, all of whom will share insights on how to get the most out of membership and your conference experience.

rec-1 rec-2
7:00-9:00 PM
NETWORKING

Welcome Reception

Sunday, June 23 | 7:00-9:00 p.m.


Join us in the Anti-Fraud Exhibit Hall on Sunday, June 23, as the ACFE hosts a complimentary Welcome Reception for conference attendees. This is the perfect opportunity for you to meet other attendees and take a sneak peek at the latest anti-fraud solutions as you enjoy refreshments and light hors d'oeuvres.

wr-1 wr-2
Monday
7:30-8:30 AM

Registration and continental breakfast

7:30 AM-3:35 PM

Exhibit Hall open

8:30-9:45 AM

Monday, June 24 | 8:30-9:45 AM


Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

The Main Conference begins with the official opening ceremonies, a welcome from ACFE President and CEO, Bruce Dorris, and the conference's first keynote speaker, U.K. Serious Fraud Office Director, Lisa Osofsky.

losofsky headshot
Lisa Osofsky

Director, U.K. Serious Fraud Office

Lisa Osofsky became the Director of the Serious Fraud Office (SFO), August 28, 2018. In this role, she is responsible for all investigations and prosecutions for some of the U.K.’s most serious and complex fraud and bribery cases. Before joining the SFO, Osofsky served as EMEA Regional Chair based in Exiger’s London office. In this role, she served as the EMEA lead on the Anti-Money-Laundering and Sanctions monitorship of HSBC Bank, as well as other monitorship work centred in Europe.

Previously she was the Regulatory Advisor at Control Risks. Prior to that Osofsky was the Executive Director of the Business Intelligence Group and the Money Laundering Reporting Officer at Goldman Sachs International, London. Preceding her time with Goldman Sachs, Osofsky served as the Deputy General Counsel (DGC) and Ethics Officer for the U.S. FBI. Osofsky was also a Special Attorney in the Fraud Section of the Criminal Division of the U.S. Department of Justice (DOJ) and stationed at the SFO in London. Osofsky began her career in Chicago as a law clerk to federal judge James B. Moran; she then served as an Assistant U.S. Attorney. Before becoming DGC of the FBI, Osofsky served in the DOJ’s Office of International Affairs. Osofsky received her B.A., Phi Beta Kappa, magna cum laude, from Amherst College, and her J.D. from Harvard Law School.

bdorris headshot
Bruce Dorris, J.D., CFE, CPA

President and CEO, Association of Certified Fraud Examiners

Bruce Dorris is the President and Chief Executive Officer for the Association of Certified Fraud Examiners (ACFE). He also serves as an advisory member to the ACFE Board of Regents. Dorris has conducted anti-fraud training for the United Nations, the American Bankers Association, colleges and universities around the world, as well as with the FBI, GAO and other federal and state law enforcement agencies in the U.S. Dorris has been with the ACFE for 11 years, previously serving as Vice President and Program Director, and is proud to be involved in the continued growth and professional direction of the world’s largest anti-fraud organization.

Prior to joining the ACFE, Dorris earned his Juris Doctor from the Paul M. Hebert Law Center at Louisiana State University in 1993 and is licensed to practice law in state and federal courts in Texas and Louisiana. He served as a prosecutor in Louisiana for 13 years, focusing primarily on financial crime investigations.

10:15-11:30 AM

Monday, June 24 | 10:15-11:30 AM


CPE: 1.5

Level: Basic

Recommended Prerequisites: None

Field of Study: Specialized Knowledge

This session is a repeat of the sold-out session at the 29th Annual ACFE Global Fraud Conference in Las Vegas. You are encouraged to attend if you missed last year's session, or need a refresher. It will explore the challenges CFEs face when conducting investigations that involve adolescents, teens and millennials as the victims, suspects or witnesses. You will learn about their unique communication methods, both verbal and digital, and see how their use of technology changes their perception of time and space, and their default sense of self.

You Will Learn How To:

  • Navigate the challenges of investigations involving millennials
  • Examine the platforms that millennials use to communicate
  • Distinguish between digital immigrants and digital natives
  • Recognize the common types of exploitation and harassment that adolescents and millennials face in their digitally connected world

dellington headshot
Derek Ellington, CFE, CEDS, PI

Ellington Digital Forensics

Derek Ellington is a nationally known Certified Fraud Examiner, specializing in computer crimes. He is also a Certified Computer Forensic Examiner, an ACEDS Certified E-Discovery Specialist and a licensed private investigator. He has testified more than 150 times in all manner of courts and jurisdictions. He is a popular speaker and contributor to legal publications, and regularly trains law enforcement first responders on processing digital crime scenes. Over the last five years, his lab has processed more than 1,500 cases ranging from civil to criminal and family law. Many of their cases involve adolescents or young adults as suspects, witnesses or victims, and he and his team have developed unique understandings and strategies in dealing with cases involving millennials.

Monday, June 24 | 10:15–11:30 AM


CPE Credit: 1.5

Level: Intermediate

Recommended Prerequisite: Knowledge of common compliance and risk management issues in organizations

Field of Study: Specialized Knowledge

Whistleblowing is an essential component of fraud detection. However, the practice of whistleblowing has not been widely accepted by corporate Africa. The session will unveil the cultural barriers and offer solutions on how to encourage whistleblowing as an acceptable corporate behavior. You will review research into whistleblowing trends in business across Africa and the peculiar roles that culture, and external factors play in people's choices to speak up or remain silent when they observe wrongdoing in the workplace.

You Will Learn How To:

  • Assess the link between cultural orientation and whistleblowing in Africa
  • Identify strategies to overcome cultural barriers affecting whistleblowing in Africa
  • Compare successes and failures that have been recorded on whistleblowing initiatives in Africa
Rabiu Olowo, CFE, ACMA, CGMA

Head of Internal Audit & Control, FrieslandCampina, Nigeria - Africa

Rabiu Olowo is one of Africa’s leading anti-fraud instructors and internal audit practitioners with a specialization in fraud prevention and detection controls, as well as conducting internal investigations.


Olowo is an experienced chief audit executive who has worked with multinational companies such as GlaxoSmithKline and FrieslandCampina. He has experience with managing internal audit engagements, compliance programs, financial control procedures and fraud risk assessments, as well as the development of an anti-bribery and corruption framework in sub-Saharan Africa.


Olowo is the chair of RabloWoods Counter Fraud Learning Centre, the sole authorized training facility for the ACFE in West Africa, where he has helped hundreds of aspiring anti-fraud professionals across private, public and law enforcement organizations.

Monday, June 24 | 10:15-11:30 AM


CPE: 1.5

Level: Basic

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

“Through the looking glass” is a metaphorical expression meaning: on the strange side, in the twilight zone, or in a strange, parallel world. While the internet can be considered a strange, parallel world, it can also be an informative, interesting, yet scary place when conducting different types of investigations. There are various technologies and methods that you can use to protect your identity and information while conducting internet-based investigations. This session will illustrate these technologies and methods to keep you safe when investigating online.

You Will Learn How To:

  • Identify the methods criminals use to find your data
  • Compare various technologies and software tools to protect your identity while investigating online
  • Examine various methods to employ to hide your own tracks

rduquette headshot
Ryan Duquette, CFE

Partner - Security, Privacy and Risk Consulting, RSM Canada

Ryan Duquette focuses on litigation support, cyber-incident response, privacy and technology risks, digital forensics and cyberfraud matters. Duquette has been an investigator for more than twenty years and was previously a police officer focusing on cybercrime and fraud cases. Duquette works closely with clients involved in workplace investigations and civil litigation matters including intellectual property theft, HR investigation and data breaches.

He is a sessional lecturer at the University of Toronto teaching digital forensics; is a former director for the Toronto chapter of the Association of Certified Fraud Examiners; has been qualified as an expert witness on numerous occasions; and is a frequent presenter at fraud, digital forensics, cybersecurity and investigative conferences worldwide.

Monday, June 24 | 10:15-11:30 AM

CPE: 1.5

Level: Advanced

Recommended Prerequisites: Knowledge of and experience with the fundamentals of interviewing

Field of Study: Communication and Marketing

This session will review the fundamentals of planning an interview and the importance of observing physical behavior to assess the validity of the information provided by the interviewee. It will also address factors that lead to the stress that individuals experience when being deceptive, and the physical and verbal indicators of that stress. The importance of question formulation and simplicity of language is also examined with examples provided of good and bad questions.


The session will also highlight active listening and how word analysis can be used in assessing whether a person is being truthful or deceptive. The concepts covered during the session will be supported by analysis of video clips of interviews and transcripts of statements from publicly available sources.

You Will Learn How To:

  • Recognize the importance of simplicity in question formulation
  • Identify behaviors indicative of deception
  • Determine the use of word analysis in detecting deception and its importance in developing lines of inquiry
  • Identify the value of active listening

rcockerell headshot
Robert Cockerell

Partner, KordaMentha Forensic

Robert Cockerell has been involved in the investigation of some of the most complex and serious fraud, corruption and drug matters in Australia, ranging from a $118 million fraud on a major Australian bank to the importation of 79 pounds of heroin. A former detective chief inspector with the Victoria Police, he was twice presented with the highest award for investigative excellence by the Victoria Police.

A partner at KordaMentha Forensic, one of the largest forensic practices in Australia, he is an acknowledged expert in fraud and corruption investigations, detecting deception through interviews and forensic reviews of business practices. Cockerell has conducted forensic engagements in Australia, Asia and Europe.

Monday, June 24 | 10:15-11:30 AM


CPE: 1.5

Level: Overview

Recommended Prerequisites: None

Field of Study: Specialized Knowledge

In this roundtable session, you will meet with your peers and discuss emerging trends and risks related to fraud and corruption. The session will be limited to 100 attendees, on a first-come, first-served basis, to allow for maximum engagement and interaction. A facilitator will guide you through discussion questions, but the primary lessons will come from sharing experiences and best practices with your peers.

You Will Learn How To:

  • Identify emerging issues and trends in bribery and corruption
  • Apply best practices for combatting new and emerging fraud risks
  • Benchmark your organization’s fraud risks against those of other organizations

Roger Darvall-Stevens, MBA, MA, CFE

Partner/Director, National Head of Fraud & Forensic Services, Australia, RSM

Roger Darvall-Stevens is the national head of fraud & forensic services, Australia, at RSM, and has more than 25 years of experience in forensic investigations and forensic accounting, fraud, bribery and corruption control – prevention, detection, response (as well as impropriety or improper conduct), related training (e.g., employee awareness, interview techniques, investigation response), forensic IT, compliance (including foreign bribery and corruption risk), and corporate security.


Darvall-Stevens is well credentialed, being a licensed investigator in multiple locations across Australia and New Zealand, former police detective (areas include fraud, counterterrorism), a Certified Fraud Examiner and ACFE Regent Emeritus, and an Authorized Trainer for the CFE Exam Review Course in Australia.

Monday, June 24 | 10:15-11:30 AM


CPE Credit: 1.5

Level: Advanced

Recommended Prerequisite: Knowledge of financial ratios, experience with professional auditing

Field of Study: Auditing

There is much discussion around the topics of analytics, artificial intelligence and emerging technologies for fraud detection, and with good reason. However, it is also important to understand how to use financial and nonfinancial ratios for fraud detection and prevention. This session will focus on the application of multi-variable, mixed source and traditional financial ratios to identify both existing fraud schemes and the pressures that could lead to fraud risk. It will also discuss strategies for applying ratio analysis to fraud prevention efforts.

You Will Learn How To:

  • Apply ratio analysis to identify risks of financial statement fraud, corruption and asset misappropriation schemes
  • Strategically implement ratios into the audit process to identify fraud risks
  • Assess the challenges of applying ratios to fraud detection and how to overcome these challenges
Jeremy Clopton, CFE, CPA, ACDA, CIDA

Director, Upstream Academy

Jeremy Clopton, Director at Upstream Academy, gained his real-world experience from his work with one of the top accounting and consulting firms in the country, where he led the firm-wide Big Data and Analytics and Digital Forensics practices. During his 12 years there, Clopton gained extensive experience in data analytics, fraud prevention and business intelligence, but his real passion was going beyond providing the services clients asked for — to help them determine what they needed for future success. Before he was recruited by Upstream, Clopton launched his own consulting company focused on developing more successful cultures by asking better (more strategic) questions. He created the SQ Method, a framework designed to help firms overcome challenges and more successfully adopt new technology, analyze and utilize data, encourage innovation, and drive employee engagement. A dynamic and insightful presenter, Clopton speaks both in the U.S. and abroad at industry events and is a faculty member for the Association of Certified Fraud Examiners. His dedication to not just meeting, but exceeding, client expectations makes him a favorite for participants.

Monday, June 24 | 10:15-11:30 AM


CPE Credit: 1.5

Level: Advanced

Recommended Prerequisite: Knowledge of overbilling schemes and experience with fraud data analytics

Field of Study: Specialized Knowledge

In this session, you will learn how to build a fraud audit approach to detect complex vendor overbilling schemes. First, it will describe a methodology to identify and describe vendor overbilling fraud risk statements. Using fraud data analytics, you will learn how to locate the schemes hidden in your data files. Lastly, learn how to build your fraud audit test procedures. The session will use a practical example throughout to illustrate the concepts.

You Will Learn How To:

  • Identify vendor overbilling fraud risk statements
  • Discern fraud audit programs for vendor overbilling schemes
  • Identify fraud data analytic techniques to locate vendor overbilling schemes
Leonard Vona, CFE, CPA

CEO, Fraud Auditing, Inc

Leonard W. Vona is the CEO of Fraud Auditing. He is a forensic accountant with more than 40 years of diversified auditing and forensic accounting experience, including a distinguished 18-year private-industry career. Vona is the author of three books published by Wiley, Fraud Risk Assessment: Building a Fraud Audit Program, The Fraud Audit: Responding to the Risk of Fraud in Core Business Systems, and Fraud Data Analytics Methodology: The Fraud Scenario Approach to Uncovering Fraud. Vona lectures nationally and internationally on fraud risk assessments, fraud auditing, fraud data analytics and fraud prevention. His firm advises clients in areas of litigation support, financial investigations, fraud auditing, fraud data analytics and fraud prevention.

Monday, June 24 | 10:15-11:30 AM


CPE: 1.5

Level: Basic

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

The dark web is often seen as a mysterious and malevolent creature, built out of the myths and legends created by popular media and clickbait headlines. In reality, the dark web is home to a vibrant and thriving criminal ecosystem, with a resilient fraud trade at the center of the action. Inaccurately portrayed as a playground for hitmen and human traffickers, the dark web is, instead, a place where fraudsters leverage tools, tactics, and technology to build scalable business models, collect and co-opt sensitive data, and exploit organizations around the clock. What is the dark web fraud economy? What drives it? What can we do about it?


This session will go beyond high-level introductions to the idea of the dark web and provide you with a tactical view of what the dark web is, how it works, and how fraudsters function, trade, and scheme together in the criminal underground. This session connects the dots, demonstrating how compromised data and community tradecraft create the fraud lifecycle we see today. You will come away understanding how the fraudsters do what they do, how the dark web helps, and how things are changing — for better and for worse.

You Will Learn How To:

  • Recognize dark web technology and terminology
  • Determine key drivers of the dark web fraud economy
  • Identify at-risk data types and areas of most frequent exposure
  • Assess gaps between criminal data valuation and corporate data valuation
  • Relate dark web fraud activity to the fallout from current fraud schemes

ewilson headshot
Emily Wilson, CFE

VP of Research, Terbium Labs

Emily Wilson is the VP of Research at Terbium Labs, a dark web intelligence company. Wilson directs Terbium's strategic research programs, where she focuses on the dark web, the criminal economy for personal information and stolen payment cards, and the increasing overlap between fraud and cybercrime. Before her current role, she served as director of analysis at Terbium Labs, where she managed Terbium’s operational analysis team in identifying and investigating sensitive client data on the dark web. Wilson is a Certified Fraud Examiner, a regular guest on industry shows like "The Cyberwire Podcast", and frequently speaks at conferences, industry events, and trainings.

Monday, June 24 | 10:15-11:30 AM


CPE: 1.5

Level: Basic

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

Organizations of all size and industry now rely on vendors and other third parties for crucial business processes — which exposes those organizations to data security risk (fraud, data theft, espionage) like never before. The risk itself isn’t a surprise but assessing and remediating it can be maddeningly difficult.

You Will Learn How To:

  • Review the current state of oversight that most companies have over business partners handling their confidential data
  • Consider why weak oversight is a failure of policy and procedures rather than of IT security
  • Understand the risk assessment processes and other resources that companies can use to monitor data security risk among their vendors and other third parties

Matt Kelly

Editor and CEO, Radical Compliance

Matt Kelly is editor and CEO of RadicalCompliance.com, a blog and newsletter that follows corporate governance, risk and compliance issues at large organizations; it includes the “Compliance Jobs Report,” a weekly update on compliance professionals moving around the industry. He also speaks on compliance, governance and risk topics frequently.


Kelly was named as “Rising Star of Corporate Governance” by the Millstein Center for Corporate Governance in the inaugural class of 2008. He was also recognized in Ethisphere’s “Most Influential in Business Ethics” list in 2011 and 2013. In 2018, he won a Reader’s Choice award from JD Supra as one of the top ten authors on corporate compliance.


Kelly previously was editor of Compliance Week, a newsletter on corporate compliance, from 2006 through 2015. He lives in Boston, Massachusetts, and can be reached at mkelly@RadicalCompliance.com or on Twitter at @compliancememe.

Monday, June 24 | 10:15-11:30 AM


CPE: 1.5

Level: Intermediate

Recommended Prerequisite: Knowledge and experience with fundamentals of fraudster characteristics

Field of Study: Behavioral Ethics

Most organizations provide ethics training, but does it make a difference? Is it just “checking a box” or does it change behaviors? Often, ethics training focuses on case studies and examples of organizations that made unethical decisions that led to fraud or scandal. But we already know the outcome and therefore we also know the right answer. We aren’t learning how to evaluate situations and prevent them; we are only examining specific scenarios and their failures. For ethics training to drive positive behavior, it must teach ethical decision-making skills. It requires understanding subconscious influences, significance of context, power of language, framing of issues and causes of ethical blindness. This session will explain why corporate ethics training must go beyond informing employees of laws and organizational policies and instead focus on equipping employees with the skills to make sound ethical decisions.

You Will Learn How To:

  • Evaluate the decision-making process
  • Assess why people behave unethically
  • Identify the significance of context and the forms of context that influence decisions
  • Determine when issue-framing creates distortion and ethical blindness
  • Examine how an organization’s “language” influences and drives behaviors

Mary Breslin, MBA, CFE, CIA

Partner, Verracy

Mary Breslin, MBA, CFE, CIA, is the founder of Verracy Training and Consulting. She has more than 20 years’ experience in internal auditing, fraud examination, management and accounting for companies such as ConocoPhillips, Barclays Capital, Costco Wholesale, Jefferson Wells and Boart Longyear. She specializes in internal audit transformations, operational and financial auditing, fraud auditing, investigations, and corporate accounting. She has international experience and has managed audit programs in more than 30 countries.


Breslin attended Rutgers University and received her BS in accounting and an MBA from the University of Phoenix. She is a Certified Fraud Examiner and Certified Internal Auditor (CIA).

Monday, June 24 | 10:15-11:30 AM


CPE Credit: 1.5

Level: Intermediate

Recommended Prerequisites:

  • Knowledge and experience in conducting internal investigations
  • Experience in conducting cross-functional investigations
  • Basic familiarity with case management systems and investigation documentation

Field of Study: Specialized Knowledge

An effective case management system can drive transformational change to an investigation function. It can enhance cross-functional collaboration, innovation, and efficient and effective reporting to leadership. The session will cover the key design elements of a case management system (e.g., the structural elements required to meet fundamental investigation needs). It will discuss how teams can leverage this technology to improve collaboration and drive enhanced analytics and insight. The session will also explore how technology can drive innovation in investigation process and methodology in an increasingly complex environment. You can apply these principles to improve the risk management capabilities of your organization.

You Will Learn How To:

  • Identify the key design elements of a case management system
  • Analyze how case management systems can enable cross-functional collaboration
  • Examine the implementation of reporting capabilities across various attributes
  • Develop understanding of how technology can drive innovation in methodology
Aditya Yerramilli, CFE, CPA, CGMA

Forensic Program Manager, Google Inc.

Aditya Yerramilli is the forensics program manager for Global Ethics and Compliance at Google Inc., where he is responsible for leveraging data and transaction analytics, as well forensic methodology, to support Google’s global compliance and investigation programs.

He is an experienced investigator who was actively involved in designing Google's internal case management system. He has also leveraged technology and analytics to improve efficiency and effectiveness of the investigation program. Yerramilli has experience in analyzing investigation data to report on insights and trends to senior leadership. Yerramilli has helped develop and design cross-functional investigation processes, guidelines and investigation/helpline management best practices.

Monday, June 24 | 10:15-11:30 AM


CPE: 1.5

Level: Intermediate

Recommended Prerequisites: A basic understanding of money laundering and/or fraud investigations

Field of Study: Specialized Knowledge

Fraud schemes often generate large sums of money that need to be laundered to be used in the marketplace. Anti-fraud professionals are encountering the interconnected nature of fraud and money laundering and need the skills to identity and investigate both matters. You must know the red flags of both money laundering and fraud schemes, be able to coordinate with AML teams, update controls for both AML and fraud, and design the best program for fraud and AML teams. These case studies will review a common interconnected AML/fraud scheme that financial institutions face. Using these case studies, the session will address best practices for AML and anti-fraud teams, the pros and cons of fully integrating teams, and strategies for updating controls when issues cross both functional areas.

You Will Learn How To:

  • Recognize the increasingly interconnected nature of money laundering and fraud on a tactical level
  • Identify research and coordination techniques for fraud and AML teams
  • Determine key learnings from fraud and AML incidents and how to update controls
  • Compare the pros and cons of fully integrating fraud and AML functions

jmartin headshot
Joseph Martin, CAMS

BSA Officer, Credit Union 1

Joseph Martin is an experienced AML professional who leads the BSA/AML/OFAC compliance and fraud investigations teams at one of Alaska’s largest financial institutions. Previous to his current role, Martin held AML positions at Caesars Entertainment, Kharon, Exiger, and Kroll and served in the U.S. Marine Corps from 2001 to 2009.

In conjunction with multiple technology partners, Martin designed one of the most technologically advanced, transparent and efficient marijuana banking programs in the country with the goal of having Alaska’s cannabis market completely banked and cashless by 2020.

Monday, June 24 | 10:15-11:30 AM


CPE: 1.5

Level: Advanced

Recommended Prerequisite: Experience with or the expectation of managing and leading other fraud examiners

Field of Study: Behavioral Ethics

Everyone believes themselves to be ethical, but our brains work in mysterious ways. In this session, you will learn how your brain can subconsciously work to disguise, alter, and transform different facts and events causing you to inadvertently make unethical decisions. By understanding phenomena such as bounded ethicality, motivated blindness and ethical fading, you will learn how to mitigate the automatic behaviors that make good people do bad things.

You Will Learn How To:

  • Recognize bounded ethicality and motivated blindness
  • Ascertain the effects of power on ethical behavior
  • Discern the effects of rivalry and competition on ethical behavior
  • Identify how executives turn ethical decisions into business decisions without even realizing it
  • Determine methods to maintain ethicality even as you rise in the organizational hierarchy

bhood headshot
Bret Hood, CFE

Director, 21st Century Learning & Consulting

Retired Special Agent (SA) Bret Hood is a 25-year veteran of the FBI. In his time with the FBI, Hood worked high-profile white-collar, money laundering, public corruption, counter-terrorism and organized crime cases. For his last 15 years, Hood was a master instructor for the FBI. Since retirement in 2016, Hood has served as the director of 21st Century Learning & Consulting LLC providing consulting and instructional services to organizations around the world. He is also a former adjunct professor of leadership and ethics for the University of Virginia.

Monday, June 24 | 10:15-11:30 AM


CPE: 1.5

Level: Basic

Recommended Prerequisites: This session is designed to review material required to pass the CFE Exam. Independent study with the CFE Exam Prep Course prior to attendance is strongly recommended.

Field of Study: Business Law

This session will cover the following topics:

  • Overview of the legal system
  • The criminal justice system
  • The civil justice system
  • Basic principles of evidence
  • Individual rights during examinations

You Will Learn How To:

  • Apply the core legal concepts upon which the CFE credential is built
  • Assess the legal rights and limitations within your fraud examinations
  • Identify legislature that applies to fraud examinations

gill headshot
John D. Gill, J.D., CFE

Vice President - Education, Association of Certified Fraud Examiners

John Gill is the Vice President – Education at the Association of Certified Fraud Examiners. He oversees the production and development of all the books, manuals, self-study courses and seminar and conference materials produced by the ACFE. He serves on the faculty of the ACFE and is a co-instructor of the CFE Exam Review Course. He is a co-author of the Fraud Examiners Manual and serves as the editor-in-chief for the CFE Exam and the CFE Exam Prep Course. He is also a contributing author to Fraud Magazine.

11:40 AM-12:30 PM

Group Lunch

12:30-1:20 PM
KEYNOTE

Keynote Address

Monday, June 24 | 12:30 PM-1:20 PM


Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

Join former White House Chief Information Officer and cybersecurity expert Theresa Payton as she discusses how cybercrime impacts the anti-fraud profession.

rbusch headshot
Theresa Payton

Former White House Chief Information Officer and Cybersecurity Authority

Theresa Payton was the first female to serve as White House Chief Information Officer where she oversaw IT operations for the U.S. President during a period of unprecedented technological change and escalating threats. She was named by IFSEC Global as the 4th among the top 50 of the world’s cybersecurity professionals and by Security Magazine as one of the top 25 Most Influential People in Security. Payton is one of America’s most respected authorities on security and intelligence operations.

Payton has co-authored two books including Protecting Your Internet Identity: Are You Naked Online? and Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family. She has been a repeat guest on the Today Show, Good Morning America, Fox Business Shows, Fox News Shows, CBS Morning and Evening News, BBC TV News and Radio, CBSN, CNN, NBC News, MSNBC and NPR.

Currently, as the founder, president and CEO of a world-class cybersecurity consulting company, Fortalice Solutions, LLC and co-founder of Dark3, a cybersecurity product company, she remains the expert that organizations call for discretion, proactive solutions and incident response/crisis management.

1:50-3:05 PM

Monday, June 24 | 1:50-3:05 PM


CPE: 1.5

Level: Advanced

Recommended Prerequisite:

  • Significant experience in remediating gaps and deficiencies through the design and enhancement of internal controls, policies and procedures, and training
  • Familiarity with elements and the mission of a fraud risk management program

Field of Study: Specialized Knowledge

Root cause analysis is a tool to help identify not only what and how an event occurred, but also why it happened. It is a key element of a fraud risk management program and now a best practice of an organization’s compliance program. When you determine why an event or failure occurred, you can recommend workable corrective measures that deter future fraud events of the type observed. It’s important you think critically by asking the right questions, applying the proper level of skepticism and, when appropriate, examining the information from multiple perspectives.

You Will Learn How To:

  • Identify root causes (not just causal factors) using proven techniques
  • Initiate a root cause analysis incident exercise
  • Assess Socratic questioning and how it can be used in the root cause analysis process
  • Implement three lines of defense as part of the root cause analysis, which will help the audit committee and senior management understand where the breakdowns occurred
jmarks headshot
Jonathan Marks, CFE, CPA, CGMA, CITP

Partner - Forensic Services, Baker Tilly

Jonathan T. Marks is a partner in Baker Tilly’s Forensic and Litigation practice. He has more than 30 years of experience working closely with his clients, their boards, senior management, and law firms on global (cross-border) fraud and misconduct investigations, including global bribery, corruption, and compliance matters. Marks assists his clients in mitigating future potential issues by conducting root-cause analysis, developing remedial procedures, and designing or enhancing governance, global risk management, and compliance systems along with internal controls and policies and procedures. He is a well-regarded author and speaker who has gained international recognition for developing the Fraud Pentagon™ and other thought leadership that has enhanced the profession. Marks is a highly regarded speaker, author, and thought leader. He presents internationally on an array of fraud, ethics, and forensic accounting topics. Marks was an adjunct professor at Rider University and today is a guest lecturer at Lehigh University.

Tuesday, June 25 | 1:50–3:05 PM


CPE: 1.5

Level: Basic

Recommended Prerequisites: None

Field of Study: Specialized Knowledge

Financial exploitation is the fastest growing form of elder abuse in the U.S. Studies have shown that only approximately 2-4% of cases are reported to authorities. But even when these cases are reported, first responders and their investigative counterparts lack the skills and experience to effectively investigate them. New initiatives and funding sources to combat financial exploitation are becoming available across the globe. This session will discuss elder abuse schemes and how you can assist with everything from investigation support to expert witness testimony.

You Will Learn How To:

  • Identify various forms of elder abuse and prevalence rates
  • Recognize financial exploitation and its impact on victims and families
  • Ascertain the growing collaboration among government agencies, financial institutions, and community partners to address financial exploitation
  • Identify key contacts in your community to start a conversation on how you can help

kwebber headshot
Karen Webber, CFE, CPA

President, Webber CPA, PLLC

Karen Webber is a forensic accountant, Certified Public Accountant (CPA) and Certified Fraud Examiner (CFE) in Rochester, New York. She has worked on financial exploitation cases for older and vulnerable adults for the last 10 years. She and her staff at Webber CPA, PLLC, consult with law enforcement, attorneys, government agencies, and other service organizations to provide financial evidence and expert witness testimony on elder exploitation cases. Webber plays an integral role in the expansion of elder exploitation multi-disciplinary teams across New York, and travels nationally to provide training and education on the important role of forensic accountants in financial exploitation investigations.

Monday, June 24 | 1:50-3:05 PM

CPE: 1.5

Level: Intermediate

Recommended Prerequisite: An understanding of workplace examinations and establishing predicate in criminal cases

Field of Study: Specialized Knowledge

This session will explore when and how to collect evidence so potential criminal investigations are not compromised. Topics will include the reasons for maintaining the chain of custody for physical evidence and how to maintain that chain of custody using appropriate logs; what NOT to do with possible evidence; when to back away and call law enforcement; and how to maintain evidence once you’ve seized it. The session will give you guidance about the appropriate times to call in other forensic specialists such as forensic computer experts. At the end of the session, you’ll have the information and tools you need to be confident that appropriate prosecution authorities can pursue criminal charges.

You Will Learn How To:

  • Recognize different types of evidence that are common in fraud examinations
  • Identify factors that affect whether evidence is admissible at trial
  • Recall best practices for collecting evidence

bmohr headshot
Beth Mohr, CFE, CAMS, CCCI, PI

Managing Partner, McHard Accounting Consulting

Beth A. Mohr joined McHard Accounting Consulting LLC in 2010, and became Managing Partner in January 2011. McHard Accounting Consulting exclusively practices forensic and investigative accounting. Mohr conducts forensic accounting and other complex investigations for the McHard firm all over North America. She is a Certified Fraud Examiner, Certified Anti-Money Laundering Specialist (CAMS) and a Certified Cyber Crimes Investigator (CCCI). She has testified as an expert witness in three states on a variety of matters. Mohr has a Master’s of Public Administration from the University of New Mexico. She is a private investigator licensed by the states of New Mexico, Arizona and California. Mohr has written articles for a variety of publications, including Fraud Magazine, and various bar journals.

Mohr served as an investigator for the City of Albuquerque’s Independent Review Office, where she investigated allegations of police misconduct against the Albuquerque Police Department (APD). Mohr is a retired police officer from the City of San Diego, California. She worked with the Whatcom County (Washington) public defender’s office, investigating international smuggling and white-collar cases, well as conducting cause of death investigations, homicide and death penalty mitigation investigations.

Monday, June 24 | 1:50-3:05 PM


CPE Credit: 1.5

Level: Advanced

Recommended Prerequisite: Experience conducting investigative interviews

Field of Study: Communications and Marketing

The world of investigative interviewing and the methods taught to corporate interviewers and law enforcement practitioners are at a critical crossroads. Courts are increasingly questioning the tactics used by investigators to obtain confessions. Many investigators are taught interview tactics derived from the REID technique, which encourages them to focus on verbal and nonverbal cues of lie detection, and employ tactics focused primarily on obtaining a confession. Many of these techniques equip investigators with tools to obtain a confession, but such confessions are highly scrutinized by the courts.


This session will explain the risks associated with the admission-seeking investigative mindset, including an examination of the current studies on lie-detection research and emerging trends in the interviewing profession. This includes the PEACE model of interviewing. In addition, you will have the opportunity to view real-life compelling interview confession footage to help you put theory into practice.

You Will Learn How To:

  • Compare current interview methodologies to determine which tactics are most effective in varying circumstances
  • Evaluate emerging trends in investigative interviewing
  • Assess strategies that are suitable for a corporate interview environment to elicit ethical and legal confessions
Scott Porter, CPA, DIFA, CFF

Senior Investigator, Chartered Professional Accountants of Ontario

Scott Porter has been a Senior Investigator of Professional Conduct at CPA Ontario for the past 12 years, where he conducts numerous interviews with CPAs alleged of committing professional misconduct, including fraud. Prior to that, Porter served as a manager with PriceWaterhouseCoopers’ forensic accounting group for eight years.


Porter has done multiple presentations to investigators across Canada and the U.S. on conducting effective interviews.


Porter co-authored the article Teaching Interviewing Techniques to Forensic Accountants is Critical, which was published in the Journal of Forensic & Investigative Accounting. Porter is also a member of the journal’s Editorial Advisory Board.

Monday, June 24 | 1:50-3:05 PM


CPE Credit: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

When an employee leaves, you understand that you will lose that person’s experience and institutional knowledge. But what if they take more than that? A whopping 87% of employees who leave a job take data with them that they created on the job, and 28% take data created by others in the company — including corporate presentations, strategy documents and intellectual property. That’s a lot of data leaving the company, and most people take it with the intent to share it, sometimes with a competitor or to start a competing business. So how can a company stop exiting employees with sticky hands? This session will share best practices not only to seek out these culprits after they’ve left, but also to prevent the information from leaving in the first place.

You Will Learn How To:

  • Recognize evidence of data theft by exiting employees
  • Identify methods to prevent data theft
  • Compare procedures for processing a departing employee's devices, including preserving data from: cloud platforms, MS Office and other computer software, chat applications, email, games, operating systems, social media networks, online activity, deleted files, and more
Barry Schwartz

SVP, Advisory Services, Business Intelligence Associates

Barry Schwartz, a former senior executive with extensive legal and consulting experience, brings more than 36 years of experience to BIA’s clients. He has familiarity working with teams of lawyers, scientists and entrepreneurs as well as practical expertise with FDA matters and extensive knowledge of the medical device and industrial industries. As director of BIA’s Advisory Services, he adds a critical component to client projects by guiding the projects at a high level, usually working with senior members of the client’s internal and external teams to achieve the project goals. As such, his primary responsibility is using his knowledge and experience to provide consulting and advisory services to BIA’s clients, including litigation and discovery, document retention and management, regulatory compliance and IT security. Today Schwartz assists corporations and attorneys in the fields of compliance, data management and electronic discovery for complex litigation and acts as a lead forensic responder to several Fortune 1000 companies.

Adam Feinberg

EVP, Professional Services, Business Intelligence Associates

Adam Feinberg has an extensive background in technology and has been the lead on many high-profile digital investigations and audits. In addition to computer forensics and electronic discovery experience, he has experience in intrusion detections and related investigations, intellectual property theft investigations, internal corporate investigations and audits, and systems security audits and vulnerability assessments. He was a co-instructor of computer forensic certification training courses offered to IT and corporate security professionals, law enforcement and government agencies, military personnel and Fortune 500 clients.

Monday, June 24 | 1:50-3:05 PM


CPE Credit: 1.5

Level: Basic

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

According to the ACFE's 2018 Report to the Nations, 22% of fraud cases caused losses of more than $1 million. While cases vary, it’s often the right mix of people, processes and technology that create the perfect storm for fraud. Because organizations rely on a complex network of IT systems, processes and a neverending flow of information to conduct business, questionable or suspicious activities can be concealed in many different ways and places — making them difficult to identify. This session will highlight the advantages of automating your approach to fraud monitoring and how to create an early warning detection framework to proactively identify potential fraud.

You Will Learn How To:

  • Apply data automation to key control areas for continuous monitoring
  • Identify best practices to develop standardized workflows for sustainable control monitoring and issue remediation
  • Compose effective communications from findings through dynamic dashboards and powerful narratives
  • Assess real-life stories and concrete examples of how to access and analyze data from different business systems

Monday, June 24 | 1:50-3:05 PM


CPE Credit: 1.5

Level: Intermediate

Recommended Prerequisite: Knowledge and basic understanding about the role of data in healthcare systems

Field of Study: Specialized Knowledge

Health care organizations should develop a process to help manage data, formulate an information strategy, and execute their mission with the right person at the helm. Unfortunately, much of available IT spending is currently geared toward moving and storing data. While these efforts are necessary to create and analyze big data, CIOs face increasing pressure on concurrent data demands.

In this session, you will learn how shifts toward data mapping and mining can save health care providers time and money, which can contribute to better outcomes. Population health management is a rapidly growing area in the health care industry. The way the providers’ data is stored and analyzed plays a significant role not only in effectively managing the population, but also in improving the quality of care provided. Investing in data strategy will provide dividends in reducing the cost associated with providing care and managing population health.

You Will Learn How To:

  • Define data strategy
  • Identify how to operationalize a data strategy
  • Compare controls and resources to sustain the data strategy
  • Identify measures and goals to validate the progress and reevaluate the strategy based on progress
  • Recognize why organizations might be proactive or reactive to emerging market trends
  • Recall discipline models that include internal audit, compliance, risk management and forensic support
rbusch headshot
Rebecca Busch, RN, CFE, CRMA, CHPA

Founder and CEO, Medical Business Associates, Inc

Rebecca Mendoza Saltiel Busch, RN, MBA, CFE, CCM, is the founder and CEO of Medical Business Associates, Inc. (MBA), established in 1991 as a minority, woman-owned medical data auditing and healthcare consulting firm. In addition to authoring six books, Busch has seven U.S. data analytic design patents (pharmaceutical applications), one patent pertaining to electronic health record case management systems, and other patents pending. She serves as an adjunct professor for a healthcare fraud, examination, risk management, and compliance certificate program. Busch has served on various boards, where she used her professional experience and leadership skills to achieve results with integrity, effectively integrating community stakeholders, while maintaining focus on corporate missions. Busch is the recipient of the 2015 Women of Influence Award from the Chicago Business Journal. Recognized as an expert in her field, Busch has developed data management practice standards for emerging CDOs, medical data scientists and auditors that ultimately support and defend complex issues impacting the bottom line. She currently provides technical investigative, audit and review expertise to various government agencies.

Monday, June 24 | 1:50-3:05 PM


CPE: 1.5

Level: Overview

Recommended Prerequisites: None

Field of Study: Specialized Knowledge

Most organizations focus their cyber prevention and detection efforts on external threats such as hackers and malware. This is understandable since such incidents are the most common and the most publicized, but they are not actually the most expensive or dangerous to an organization.


This session will use actual data breach losses and case studies to explore how rogue employees have quietly become a material risk to organizations. This will include overviews of how insider threats operate, how you can prevent and identify such activity, and how underground markets are used to sell the stolen goods. This session will include real-world examples of how control failures lead to data breaches that should have been prevented. Finally, you will review the costs of cyberattacks to an organization and considerations when quantifying cyberattacks under an insurance policy.

You Will Learn How To:

  • Compare statistical analysis of the prevalence and damages from rogue employees performing data theft
  • Identify the most common techniques of malicious insiders and how to detect them
  • Recall how the perpetrators use the underground market and cryptocurrencies to profit anonymously
  • Recognize the cost of cyberattacks to an organization
  • Consider how to quantify cyberattacks under and insurance policy

jcplante headshot
Jean-Charles Plante, CFE, CPA, CA-IFA, CFF

Vice President, RSM Canada

Jean-Charles (JC) Plante is a vice president in the litigation and valuation services group of RSM Canada, providing forensic accounting, investigation and loss quantification services to businesses impacted by expropriations, commercial disputes, class actions and commercial insurance claims. He also assists legal counsel in quantifying damages in personal injury, matrimonial and other litigation. Prior to joining the firm, Plante worked in the forensic, dispute and valuation services teams at several national accounting firms. He has also spoken on issues surrounding fraud, commercial disputes, insurance claims and personal injury at several conferences and provided litigation support on matters before several federal and provincial courts, government enquiries, tribunals, commissions and arbitrations.

Monday, June 24 | 1:50-3:05 PM


CPE: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

In this roundtable session, you will meet with your peers and discuss issues relating to fraud risk management. The session will be limited to 100 attendees, on a first-come, first-served basis, to allow for maximum engagement and interaction. A facilitator will guide you through discussion questions, but the primary lessons will come from sharing experiences and best practices with your peers.

You Will Learn How To:

  • Identify challenges, trends, and emerging issues in fraud risk management
  • Compare best practices for assessing and managing fraud risks with your peers
  • Discuss shared and unique experiences with other participants

David Cotton, CFE, CPA, CGFM

Chairman, Cotton & Company LLP

Dave Cotton is chairman of Cotton & Company LLP, Certified Public Accountants, headquartered in Alexandria, Virginia. The firm was founded in 1981 and has a practice concentration in assisting federal and state government agencies, inspectors general, and government grantees and contractors with a variety of government program-related assurance and advisory services. Cotton has testified as an expert in governmental accounting, auditing, and fraud issues before the U.S. Court of Federal Claims and other administrative and judicial bodies.


Cotton served on the Advisory Council on Government Auditing Standards, the IIA Anti-Fraud Programs and Controls Task Force and co-authored Managing the Business Risk of Fraud: A Practical Guide. He also served on the American Institute of CPAs Anti-Fraud Task Force and co-authored Management Override: The Achilles Heel of Fraud Prevention. Cotton is the past-chair of the AICPA Federal Accounting and Auditing Subcommittee and has served on the AICPA Governmental Accounting and Auditing Committee and the Government Technical Standards Subcommittee of the AICPA Professional Ethics Executive Committee. Cotton chaired the Fraud Risk Management Task Force, sponsored by COSO and the ACFE, and is a principal author of the COSO-ACFE Fraud Risk Management Guide. Cotton was the recipient of the ACFE 2018 Certified Fraud Examiner of the Year Award, the AGA’s 2012 Educator Award and AGA’s 2006 Barr Award.

Monday, June 24 | 1:50-3:05 PM


CPE: 1.5

Level: Intermediate

Recommended Prerequisite: General understanding of ethics hotline/helpline management

Field of Study: Behavioral Ethics

Just because there is an anonymous reporting mechanism in place doesn’t mean that employees or third parties will feel comfortable enough to use it. Individuals might feel uncomfortable speaking up if they fear retaliation, think their allegations won’t be taken seriously or suspect the company won’t take action. A demonstrated ethical culture helps employees and third parties do the right thing and speak up when misconduct is observed. In this session, you will explore the relationship between an ethical, "Speak Up" culture and hotline reporting volume, and identify steps you can put in place to help people trust your hotline.

You Will Learn How To:

  • Recognize social conformity and how it plays a role in misconduct in the workplace
  • Examine the reasons why people don't feel comfortable speaking up when they observe misconduct
  • Appraise the components of an ideal Speak Up culture
  • Identify recommendations for ensuring a Speak Up culture where employees can trust the hotline

Elizabeth Simon, CFE, CPA

Director, Ethics & Compliance, CCI Records Coordinator, Cox Communications
ACFE Regent

Elizabeth Simon, CFE, CPA, is the director of ethics and compliance and records coordinator for Cox Communications Inc. She’s responsible for managing the ethics hotline and overseeing ethics-related investigations, conducting compliance risk assessments and ensuring that Cox is complying with the laws and regulations relevant to the company. She also oversees the company’s Records & Information Management Program and leads other compliance-related projects.


Simon was previously the Senior Internal Auditor for Kimberly-Clark in Roswell, GA, with responsibility for developing data analytics around the Foreign Corrupt Practices Act and other internal audits. She’s also worked at PwC and EY. There, she conducted external audits and worked on forensic accounting investigations. She also built out the Sarbanes-Oxley compliance program at Global Payments

Monday, June 24 | 1:50-3:05 PM


CPE: 1.5

Level: Intermediate

Recommended Prerequisite: Understanding of anti-fraud programs

Field of Study: Specialized Knowledge

This session will explore how companies are strengthening their corporate integrity and anti-fraud program through a metrics-driven approach. Through leading continuous monitoring, machine learning and risk-scoring techniques, companies are operationalizing their integrity goals and gaining new insights into transaction risks that link to employee, vendor or customer behaviors. Taking a metrics-driven approach to corporate integrity enables companies to measurably strengthen their governance models, improve corporate culture through targeted, more relevant training and corporate communications, as well as improve policies and procedures that prevent and detect fraud. This session will discuss several case studies and forensic data analytics examples, as well as explore the four key components to operationalizing business integrity.

You Will Learn How To:

  • Identify the four key elements of operationalizing business integrity and how to measure them
  • Compare practical examples and use cases of leading data analytics techniques used in anti-fraud and compliance monitoring activities
  • Determine how transaction risk scoring can lead to improved employee training, corporate communications and measurable fraud risk reduction

Vincent M. Walden, CFE

Partner, Forensic & Integrity Services, EY

Vincent Walden is a partner specializing in forensic technology, business intelligence and fraud detection analytics. Walden leads a national team of skilled forensic technology and data mining professionals. With a focus on anti-fraud analytics, forensic data mining, third-party due diligence and electronic discovery services, Walden has more than 17 years of experience handling the information management, forensic analysis and electronic discovery needs for large-scale, complex litigations, investigations and proactive anti-fraud and compliance programs. Walden is experienced with providing clients leading anti-fraud-based innovation, research and analytics, including anti-bribery and corruption analytics, Fraud Triangle analytics and statistical anomaly detection. He has been featured in many publications including Fraud Magazine, Internal Auditor Magazine, Compliance Week, Forbes, The Economist, ABC News Online, CNBC and other leading publications.

Monday, June 24 | 1:50-3:05 PM


CPE: 1.5

Level: Basic

Recommended Prerequisites: None

Field of Study: Specialized Knowledge

This session will analyze the $200 million Maria Duval mail fraud as a case study for how scams targeting seniors are perpetrated and become so difficult to stop. It will also cover a pharmaceutical fraud that aggressively targeted nursing homes. The presenters will discuss ways they’ve seen scammers attempt to conceal their identities and target older victims, and how — as investigative journalists — they were able to cut through the layers of shell companies and front people to identify the real fraudsters. You will learn about searching public records and other helpful tools to track criminal activity from reporters who have extensive experience with them.

You Will Learn How To:

  • Compare new, practical investigative tools
  • Identify how to break through the secrecy of shell companies and front people
  • Ascertain how to find valuable human sources
  • Recognize ways to find hidden public records

bellis headshot
Blake Ellis

Senior Writer, CNN Investigates

Blake Ellis is an award-winning investigative reporter for CNN. Her work has exposed everything from widespread sexual abuse in nursing homes to one of the longest-running scams in history. It has also inspired legislative action and government investigation.

Ellis, and her longtime reporting partner, Melanie Hicken's groundbreaking investigation into the secret world of government debt collectors won the prestigious Heywood Broun Award of Distinction and inspired lawmakers to take action with legislation aimed at closing the loophole highlighted in the stories. They were finalists for a Peabody Award for CNN's coverage of guns in America, and the two journalists have been honored by the International Association of Broadcasting, the National Press Club, the National Endowment for Financial Education, the Radio Television Digital News Association and the National Association of Consumer Advocates. Ellis was also a recipient of awards from the Society of American Business Editors and Writers and the Newswomen's Club of New York. Ellis regularly appears on CNN and other television and radio networks to discuss her investigations.



mhicken headshot
Melanie Hicken

Senior Writer, CNN Investigates

Melanie Hicken is an award-winning investigative reporter for CNN. Her work has exposed everything from widespread sexual abuse in nursing homes to one of the longest-running scams in history. It has also inspired legislative action and government investigation.

Hicken and her longtime reporting partner, Blake Ellis's groundbreaking investigation into the secret world of government debt collectors won the prestigious Heywood Broun Award of Distinction and inspired lawmakers to take action with legislation aimed at closing the loophole highlighted in the stories. They were finalists for a Peabody Award for CNN's coverage of guns in America, and the two journalists have been honored by the International Association of Broadcasting, the National Press Club, the National Endowment for Financial Education, the Radio Television Digital News Association and the National Association of Consumer Advocates. Hicken regularly appears on CNN and other television and radio networks to discuss her investigations.

Before joining CNN, Hicken worked for the Los Angeles Times Community News group, where she won awards for her local government coverage and investigative reports. She is a graduate of Syracuse University's Newhouse School and holds a master's degree in business and economic reporting from New York University.

Monday, June 24 | 1:50-3:05 PM


CPE: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Personal Development

Do you feel stagnant in your career? Are you unsure about how to take the next steps toward your professional goals? If so, then this session is for you. Achieving success in your career does not typically happen by accident. In this session, you will learn how to take control of your career journey. You will learn about the importance of building your personal brand, owning your narrative and being deliberate about shaping your career journey to achieve your goals. You will be introduced to creative tools and ideas that you can use to help you get in touch with who you are, who you want to be, and how to get there.

You Will Learn How To:

  • Ascertain your personal brand
  • Build a Career Journey map to navigate your career
  • Determine your personal narrative
  • Identify the right connections to help you achieve your goals

bkessler headshot
Bethmara Kessler, CFE, CISA

Consultant, Advisor and ACFE Faculty Member
ACFE Regent

Bethmara Kessler is a global thought leader, lecturer, consultant and advisor to businesses on the topics of fraud, audit, compliance, enterprise risk management, shared services delivery strategies, process transformation and is on the ACFE Faculty and Advisory Council. Kessler is the former Head of Integrated Global Services for the Campbell Soup Company. Her career spans over 30 years in positions that include Chief Compliance Officer, Chief Audit Executive and Enterprise Risk Management Head. Her extensive experience also includes leadership roles in audit, risk management, information technology and corporate investigations in companies including EY, Avon Products, Nabisco, EMI Group, LBrands, The Fraud and Risk Advisory Group and Warner Music Group.

Monday, June 24 | 1:50-3:05 PM


CPE: 1.5

Level: Basic

Recommended Prerequisites: This session is designed to review material required to pass the CFE Exam. Independent study with the CFE Exam Prep Course prior to attendance is strongly recommended.

Field of Study: Business Law

This session will cover the following topics:

  • The law related to fraud testifying
  • Securities fraud
  • Money laundering
  • Bankruptcy (insolvency) fraud
  • Tax fraud

You Will Learn How To:

  • Apply the core legal concepts upon which the CFE credential is built
  • Recognize common fraud schemes that affect individuals and organizations around the world

gill headshot
John D. Gill, J.D., CFE

Vice President - Education, Association of Certified Fraud Examiners

John Gill is the Vice President – Education at the Association of Certified Fraud Examiners. He oversees the production and development of all the books, manuals, self-study courses and seminar and conference materials produced by the ACFE. He serves on the faculty of the ACFE and is a co-instructor of the CFE Exam Review Course. He is a co-author of the Fraud Examiners Manual and serves as the editor-in-chief for the CFE Exam and the CFE Exam Prep Course. He is also a contributing author to Fraud Magazine.

3:35-4:50 PM

Monday, June 24 | 3:35-4:50 PM


CPE: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

Fraud happens in owner-contractor and contractor-subcontractor relationships, and it's committed by employees of any type or size of contracting firm. Last year’s Kroll Annual Global Fraud and Risk Report showed that 70% of construction companies experienced at least one incidence of fraud. There are almost unlimited ways that you can be defrauded in the construction industry, but there are many ways that you can protect yourself from those who want to steal from you and hurt your business.


This session will discuss how to identify fraud indicators in construction costs, detect material costs that seem inflated compared to market value and review best practices for project controls.

You Will Learn How To:

  • Identify fraud indicators in construction projects
  • Identify material costs that seem inflated compared to their market value
  • Ascertain best practices on project controls, as well as “trust through verification”

mfucilli headshot
Michael Fucilli, CFE, CIA, CRMA

Auditor General, Metropolitan Transportation Authority

Michael J. Fucilli, CFE, CIA, CRMA, is the Chief Audit Executive for the largest public-sector transit authority in North America, with operating revenues in excess of $15 billion. He has 38 years of internal auditing experience that includes financial services, public sector, governance, risk and compliance, technology and SOX reporting. Fucilli has an audit staff of 85 professionals and is president of the IIAs’ Internal Audit Foundation and the IIA vice chairman. He has also held previous positions in banking and defense contracting. He is a frequent speaker on governance, risk and fraud.

Monday, June 24 | 3:35-4:50 PM


CPE: 1.5

Level: Overview

Recommended Prerequisites: None

Field of Study: Specialized Knowledge

In this roundtable session, you will meet with your peers and discuss issues relating to health care fraud. The session will be limited to 100 attendees, on a first-come, first-served basis, to allow for maximum engagement and interaction. Facilitators will guide you through discussion questions, but the primary lessons will come from sharing experiences and best practices with your peers.

You Will Learn How To:

  • Identify emerging trends and red flags of healthcare fraud
  • Compare best practices for leading health care fraud cases with your peers
  • Benchmark your anti-fraud initiatives against those at other health care organizations
  • Discuss shared and unique experiences with other participants

Jacqueline Bloink, MBA, CFE, RHIA, CHC, CPC

Consultant, Jacqueline Bloink LLC

Jacqueline Nash Bloink has worked in the healthcare industry since the mid-90s. Her passion is healthcare compliance and fighting healthcare fraud. She holds a MBA in Healthcare Management and is She is a Certified Fraud Examiner (CFE), a Registered Health Information Management Administrator (RHIA), is certified in Healthcare Compliance (CHC and CPCO), a Professional Coder and Coder Instructor (CPC and CPC-I) and Medical Reimbursement Specialist (CMRS).


Bloink is a published author and national speaker on the topic of healthcare compliance and healthcare fraud – including co-presenting with CMS and the OIG on the topic of healthcare compliance. Some of her career roles have included medical practice administration; coding and billing manager at a physician teaching hospital; corporate responsibility auditor for a large healthcare network; and compliance director for the largest provider group in Arizona. Bloink is currently an adjunct Professor for the University of Arizona and a consultant that specializes in assisting businesses, organizations and legal teams with various projects that involve provider education, healthcare coding, compliance or fraud.


Jerri Rowe, MBA, CFE, RHIA, CPC

Auditor, Jerri Rowe, LLC

With over 25 years in the healthcare industry Jerri Rowe has extensive managerial experience in both the administrative and clinical arenas with an emphasis on proper medical coding and billing to avoid fraud, waste and abuse.


Currently, she is self-employed as an external auditor for physician practices and facilities specializing in Auditing, Risk coding (Hierarchal Condition Categories/Risk Adjustment Factor – HCC/RAF), E&M coding, and fraud prevention. Rowe also educates those entering the field, teaching medical billing and coding online and serves as a subject matter expert for McGraw Hill as Content Contributor in creating teaching resources to accompany medical coding texts.

Monday, June 24 | 3:35-4:50 PM


CPE Credit: 1.5

Level: Intermediate

Recommended Prerequisite: Knowledge of blockchain encryption, cryptocurrency and online commerce; knowledge of sources of public information available online

Field of Study: Information Technology

Since its development by the Office of Naval Research and release nearly two decades ago, Tor has directed communications and commerce with the purpose of concealing the identities of its users against network surveillance or analysis. The imperfect anonymity provided by Tor, and the rest of the dark web, is exploited by users with unlawful intent to aid in the commission of, and commerce related to, a variety of crimes. While on social media and the rest of the internet or conducting other business with a reputable public persona, some users assume that the anonymity of the dark web allows them to vanish or take cover in another identity, conduct transactions in cryptocurrency and hide all traces of their criminal activities. Yet, it is an imperfect anonymity and one that does not resist analysis under all circumstances. In this session, you will see live demonstrations of how to uncover the connections between dark web activity and a human being in the real world using freely available tools and techniques.

You Will Learn How To:

  • Identify resources for cryptocurrency tracking
  • Identify indications of cryptocurrency mechanisms
  • Evaluate and map out cryptocurrency exchanged for attribution
  • Apply practical, freely available tools to the challenge of connecting a dark web identity to a real-world human perpetrator
Kirby Plessas

President and CEO, Plessas Experts Network Inc.

Kirby Plessas is the founder and CEO of Plessas Experts Network, Inc. (PEN), an open source intelligence (OSINT) internet technology and information extraction company that specializes in training, researching and consulting services for law enforcement, government and private-sector organizations.


Prior to founding PEN in 2008, Plessas served in the U.S. military as an Arabic linguist supporting the Department of Defense. Plessas applied her military intelligence through the use of OSINT experience at the Defense Intelligence Agency. She was selected to participate and help create an innovation center for conducting OSINT and was declared a Technical Expert by the Department of Homeland Security.


Plessas works to share her love and expert skill of OSINT by delivering hands-on training courses worldwide. She has taught workshops relying heavily on the live internet to Department of Justice agencies, private industry investigators, a major credit card company and other members of law enforcement. She has also served as a panel expert at various conferences.

Monday, June 24 | 3:35-4:50 PM


CPE Credit: 1.5

Level: Intermediate

Recommended Prerequisite: Knowledge of basic interview processes

Field of Study: Communications and Marketing

This session will explore common cognitive biases that can create blind spots and unintended attention gaps within the interview environment. It will define and discuss how these cognitive biases manifest within the interviewer. This session will provide you with the self-awareness to be cognizant of and address these common biases and improve your interview skills.

You Will Learn How To:

  • Identify common cognitive biases
  • Recognize the affects your biases can have on your interviewing skills
  • Apply strategies to mitigate your biases during interviews
Steven Patterson, CFE

Steven Patterson, CFE, has more than 16 years of experience in internal auditing, forensic accounting and fraud investigation. During this time he oversaw and led multiple comprehensive fraud investigations and special inquiries including executive, employee and vendor fraud, maximizing recovery efforts while working with internal process owners and outside law enforcement agencies. He also has experience completing a wide variety of financial audits, special management requests, inventory reviews, contract and HR reviews, Sarbanes-Oxley and external year-end assistance work.


He presents and trains locally and nationally about interviewing, fraud investigation and investigative reasoning. He is a founding member and current president of the ACFE Charleston Chapter.

Monday, June 24 | 3:35-4:50 PM


CPE: 1.5

Level: Intermediate

Recommended Prerequisite: Basic knowledge of fraud and money laundering schemes

Field of Study: Specialized Knowledge

This session will provide an introduction to cryptocurrency and a definition of cryptocurrency as a subset of virtual currencies. It will also cover how and why the criminal element is attracted to using cryptocurrency, case studies and investigation techniques particular to cryptocurrency.

You Will Learn How To:

  • Recognize different cryptocurrency wallets; paper, hardware and software wallets
  • Identify a bitcoin address
  • Discern how to handle cryptocurrency evidence
  • Compare tips on tracking, tracing and monitoring cryptocurrency

tanaya headshot
Teresa Anaya, CFE, CAMS

Director, Blockchain Intelligence Group

With 25 years of experience, Teresa Anaya’s career has focused on accounting, information technology with the last 10 years in fraud, money laundering and terrorist financing investigations. Anaya draws her knowledge and experience from her work performing investigations for global financial institutions as well as investigations to determine reasons for bank failure for the FDIC in the aftermath of the financial crisis of 2008. Her area of expertise is in the financial institution vertical, specific to global Know Your Customer standards, transaction monitoring and suspicious activity reporting. Anaya is a Certified Fraud Examiner, Certified Anti-Money Laundering Specialist, ITIL 3 Certified and a Certified Bitcoin Professional.

Monday, June 24 | 3:35-4:50 PM


CPE Credit: 1.5

Level: Intermediate

Recommended Prerequisite: Knowledge of audit scoping, planning and execution

Field of Study: Auditing

Auditors provide reasonable assurance, not absolute assurance, that processes are effective. IIA standard 2120.A2 notes that, "The internal audit activity must evaluate the potential for the occurrence of fraud and how the organization manages fraud risk." One way to ensure this standard is met is by ensuring that every audit looks at fraud risks. This session will provide techniques used to brainstorm fraud schemes and assess fraud risks to ensure that fraud is included in each audit scope and testing for specific fraud schemes is part of each audit.

You Will Learn How To:

  • Identify fraud schemes pertinent to a given audit area
  • Assess an organization’s fraud risk
  • Recognize red flags, metrics and other fraud indicators
  • Implement fraud risk tests in an audit
Richard Fowler, CFE, CIA, CISA, CRMA

IT Audit Manager, Huntington Ingalls Industries

Richard Fowler, CFE, CISA, CIA has 12 years of experience as part of the Internal Audit team at Huntington Ingalls Industries. His expertise lies in evaluating automated controls, reviewing production operation efficiency, framing data analytics and identifying fraud tests. Fowler has previously worked with other internal audit groups in industries such as technology, banking, retail and state government. Prior to his internal audit career, Fowler worked as an engineer, DBA and computer programmer. Fowler has a bachelor’s degree in physics and a master’s degree in mechanical and aerospace engineering.

Monday, June 24 | 3:35-4:50 PM


CPE: 1.5

Level: Intermediate

Recommended Prerequisite: Knowledge of data analysis and data visualization

Field of Study: Specialized Knowledge

Anti-fraud analytics have evolved from asking simple, rule-based questions of data, to letting the data tell a story through visualization, predictive models, anomaly detection, pattern recognition and text-mining techniques. Data visualization serves as a digital art form that can intuitively display connections in your data and help you zero in on bad actors. In this session, you will discover how data visualization leveraging simple tools can help your organization prevent and detect fraud more effectively.

You Will Learn How To:

  • Determine what data visualization is and how it can be used to prevent and detect fraud
  • Identify the different tools that can be leveraged for data visualization
  • Recognize and apply best practices for data visualization
  • Recognize the benefits of data visualization in preventing and detecting fraud

lmiller headshot
Linda Miller

Director, Fraud Risk Mitigation Practice Lead, Grant Thornton LLP

Linda Miller leads Grant Thornton’s fraud risk practice in the commercial and public sector. Prior to joining Grant Thornton, Miller spent 10 years with the Government Accountability Office (GAO), most recently as an Assistant Director with GAO’s Forensic Audits and Investigative Services team. She was the principle author of GAO’s recently issued Framework for Managing Fraud Risks in Federal Programs, which describes leading practices that agency managers can use to develop a fraud risk management program.

Monday, June 24 | 3:35-4:50 PM


CPE Credit: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

This session will showcase numerous cyber-enabled crime use cases. You will gain an understanding of many of the common attack methods and where in the cyber kill chain financial institutions are most vulnerable.

You Will Learn How To:

  • Identify common (and uncommon) attack typologies and desired outcomes
  • Analyze case studies, including research from BAE Systems’ internal threat intelligence team
  • Compare mitigation techniques to prevent funds from exiting the institution
  • Relate regulatory obligations when attacked
rgoldfinger headshot
Robert Goldfinger

Global Expert of Financial Crimes Solutions, BAE Systems Applied Intelligence

Robert Goldfinger is a global expert of financial crimes solutions for BAE Systems Applied Intelligence. Goldfinger has nearly three decades of leadership experience in both the public and private sectors. This experience includes leadership roles at technology companies, a financial institution and a government agency. He brings a unique combination of management expertise and operational and investigation leadership across business environments requiring both technology and investigative solutions.

Lukayn Hunsicker

Global Head of Banking Fraud Product Management, BAE Systems Applied Intelligence

Lukayn Hunsicker is the global head of banking fraud product management for BAE Systems Applied Intelligence. Hunsicker serves as a subject-matter expert in the areas of financial crime and fraud, delivering and maintaining fraud prevention solutions for BAE Systems’ diverse customer base. He has more than 15 years of experience in the financial services and software industries. Prior to joining BAE Systems in 2016 he was vice president, fraud product management for a top-tier global processor where he oversaw multiple product lines related to fraud and risk management. In addition, he has held product consulting roles pertaining to cybersecurity, risk and insurance.


Monday, June 24 | 3:35-4:50 PM


CPE: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

In this panel session, you’ll hear from experts from different industries discussing challenges and best practices in corporate compliance.

You Will Learn How To:

  • Assess common challenges that compliance professionals face
  • Compare best practices in compliance

Ken Yormark, CFE

Managing Director, K2 Intelligence

Ken Yormark is a managing director for K2 Intelligence, where he leads the U.S.-based forensic accounting team. With more than 25 years of experience, he is an expert in complex global investigations and forensic and investigative services. Yormark has managed and conducted numerous, often high-profile securities fraud, anti-corruption/Foreign Corrupt Practices Act (FCPA) and Ponzi scheme investigations involving public and private companies in all industries around the globe. He has presented to regulatory and law enforcement agencies, boards, senior management, in-house and outside counsel and auditors.


In his practice, Yormark focuses on forensic accounting, financial investigations, securities litigation and anti-corruption risk assessments. He is skilled at validating and reconstructing fraudulent conveyances and assessing the vulnerability of management and accounting systems.

Monday, June 24 | 3:35-4:50 PM


CPE: 1.5

Level: Basic

Recommended Prerequisites: None

Field of Study: Behavioral Ethics

In many countries, corporations may be held liable for fraudulent and other illegal acts of their directors, officers, employees and agents. Establishing a legal regime that provides for corporate liability is an important means of addressing fraud and other white-collar offenses, as there are public benefits that can flow from indicting a corporation in appropriate cases.


This session will address issues of corporate ethical behavior with reference to case studies and examples of laws, regulations and guidelines that apply to different functions of a corporation. It will also seek to explore other means through which corporations may influence ethical behavior and further the compliance agenda.

You Will Learn How To:

  • Recognize the law regarding corporate liability and case studies of corporations held liable for illegal acts of their directors, officers, employees and agents
  • Compare compliance programs undertaken by corporations that have been sanctioned and how such programs influence corporate ethical behavior
  • Identify core principles and guidelines for ethical conduct of different functions in an organization, such as management, in-house counsel and compliance professionals
  • Ascertain practical considerations and challenges for compliance professionals to influence corporate ethical behavior

wtan headshot
Weiyi Tan, CFE, CIPM

Speaker information coming soon.

Monday, June 24 | 3:35-4:50 PM


CPE: 1.5

Level: Intermediate

Recommended Prerequisite: Knowledge of and/or experience with the fundamentals of auditing third-parties for fraud and corruption, conducting third-party risk assessments, or performing third-party due diligence

Field of Study: Specialized Knowledge

Using third parties can provide a competitive advantage in the global marketplace. However, doing so also increases the risk and exposure to potential violations of anti-bribery and anti-corruption laws. Effective third-party due diligence is key to mitigating third-party risk and enhancing anti-corruption risk management as an increasing number of ABAC (anti-bribery, anti-corruption) laws across the globe require organizations to conduct business transparently, honestly, with integrity and to the highest ethical standards. Organizations are mandated to comply with and conduct their business in accordance with applicable anti-bribery and anti-corruption laws, and to cause their subsidiaries, affiliates, officers, directors, employees and third-party agents to behave accordingly. For organizations that have hundreds to thousands of third parties, performing adequate due diligence can be challenging, expensive, time consuming and overall ineffective. This session focuses on simplifying the third-party anti-bribery and corruption due diligence process by using effective reviewing and monitoring techniques to select the best third party to grow the business safely while mitigating risk.

You Will Learn How To:

  • Simplify the due diligence process while still obtaining the desired results
  • Employ effective due diligence techniques
  • Create an effective due diligence and ongoing monitoring program that is adjustable to different organization sizes
  • Identify common red flags when performing due diligence
  • Better manage third-party relationships through the development of an effective compliance program

Natasha Williams, CFE, CIA, GRCA, GRCP

Senior Manager, Global Compliance, Bio-Rad Laboratories

Natasha E. Williams, CFE, CIA, GRCA, GRCP, is a certified professional with more than twenty years combined experience in auditing, banking, compliance, risk assessment, fraud examination and accounting. She served nearly half a decade with KPMG LLP working on various consulting and start-up SOX engagements prior to joining Bio-Rad Laboratories in 2005. Her specialty is auditing, compliance, risk management, fraud prevention and detection and overall development of strong internal controls. Williams manages a global team and has supervised audits in more than fifty countries across the globe. She has experience consulting for small start-ups, as well as working with large, matrixed, complex, multi-location and global companies.


In 2016, Williams joined the Board of Directors of the International Center for Reciprocal Training, an educational start-up in Palo Alto, California, lending her expertise and sharing her eagerness to motivate and inspire the next generation of multinational professionals; assisting them to build aptitude, increase their business acumen and to develop the talent and interpersonal skills necessary to be a proficient professional in the global workforce.

Monday, June 24 | 3:35-4:50 PM


CPE: 1.5

Level: Intermediate

Recommended Prerequisites:

  • Experience in FCPA and anti-corruption investigations
  • Exposure to external audit report and opinion issuance
  • Exposure to multi-jurisdiction and attorney-client privilege issues pertaining to confidentiality

Field of Study: Specialized Knowledge

The Car Wash Operation (Operação Lava Jato) hit the top of the U.S. Department of Justice (DOJ) list of FCPA penalties paid by companies involved in corruption schemes. Odebrecht and Petrobras alone paid $2.6 billion and $1.8 billion, respectively, to regulators for their roles in massive corruption. However, the Car Wash Operation also hit companies from Singapore, the Netherlands and the U.K., and it reached more than 30 countries. Presidents and politicians in more than 10 countries were sentenced to jail.


The challenges of a complex and multi-jurisdictional investigation and the impact of its findings for accountants, attorneys and external auditors created a new paradigm for CFEs in Brazil, and the lessons learned can help CFEs around the world. The investigation included forensic technology tools, background searches, interviews, transaction tests, data analysis, reporting and a complex management system. Learn from the experience of someone who lived inside this turmoil for the last four years.

You Will Learn How To:

  • Plan, execute and manage a complex investigation
  • Apply best practices for reporting to investigations committees and external auditors

Marcelo Gomes, Ph.D.

Partner, Strategic and Risk Compliance, KPMG

Marcelo Gomes is a KPMG partner for the Strategic and Compliance Risk practice and the country leader for the Dispute Advisory Services in Brazil. Gomes has more than thirty years of experience in fraud investigation, compliance, accounting expert witness and litigation support. His focus is in cases dealing with corporate occupational abuses, moral and sexual harassments, assessment, implementation, training and monitoring of compliance programs, as well as litigation support in commercial contracts, shareholders disputes, M&A´s post-closing disputes, and damages and losses evaluation.


He has extensive experience coordinating engagements in major projects with Brazilian or transnational companies. His experience includes different industries like infrastructure, insurance, energy, health care, financial institutions and telecommunications.


Bruno Massard, CFE, CCEP-I

Director, Strategic and Compliance Risk Practice, KPMG

Bruno Massard is a director in the Strategic & Compliance Risk Practice. Bruno joined KPMG in May 2015 and has more than 13 years of expertise working with Brazilian multi-national companies. Massard’s experience includes auditing internal processes, reviewing and testing SOX controls, as well as corporate governance. Massard has extensive experience in leading fraud investigations, as well as anti-corruption compliance engagements, anti-bribery & corruption (“AB&C”) due diligence engagements and FCPA and UK-Bribery Act engagements.

Massard is a Certified Fraud Examiner and also holds a specialization in compliance from FGV’s Law School and is certified by SSCE/CCEP-I. Additionally, he is licensed in EBANC/ DSC 10.000 (Brazilian compliance certification).

Monday, June 24 | 3:35-4:50 PM


CPE: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Personal Development

Networking is a critical skill for establishing new contacts, identifying potential employment opportunities, creating strategic partnerships and enhancing business development. In general, there are very few opportunities to develop this skill outside of engaging in the activity directly. Without sufficient training in networking, many people mistakenly approach networking as if it were a timed competition, trying to leave with as many business cards as possible and thus lose sight of the purpose of the exercise. As a result, networking can create a lot of stress when it comes time to actually meet and engage with potential connections.


This session will equip you with advice, methods and, best of all, practice with networking. You will be given the tools to put their best foot forward, set intentions for networking and practice using those tools with guidance. This session will provide a blend of both instruction and practice with making introductions and establishing a connection, as well as steps for following up, which can then be deployed through the remainder of the conference and onward through your career.

You Will Learn How To:

  • Implement a successful networking method that minimizes the potential stress and maximizes the potential outcome
  • Develop a strategic and measured approach to making connections
  • Identify tools to prepare for, initiate conversations with, and follow up with potential new connections

Schidlow Headshot
Michael Schidlow, CFE, CAMS-Audit

Head of Financial Crime Risk Training and Emerging Risk Advisory, Global Internal Audit, HSBC Bank

Michael Schidlow currently serves as the Head of Financial Crime Risk Training for HSBC Bank’s Global Internal Audit Function. In this role, Schidlow designs and delivers bespoke training courses on anti-money laundering (AML), terrorist financing, anti-bribery/corruption (ABC), and anti-financial crime best practices. Schidlow also leads the function’s Emerging Risk Advisory for North America, Latin America, and for the Global Financial Crime Risk teams. He consults on audit planning and audit scoping based on regulatory issues, enforcement actions, and external environment monitoring.

Monday, June 24 | 3:35-4:50 PM


CPE: 1.5

Level: Basic

Recommended Prerequisites: This session is designed to review material required to pass the CFE Exam. Independent study with the CFE Exam Prep Course prior to attendance is strongly recommended.

Field of Study: Communications and Marketing, Specialized Knowledge

This session will cover the following topics:

  • Interview theory and application
  • Tracing illicit transactions
  • Sources of information

You Will Learn How To:

  • Implement effective interview techniques in your investigation
  • Compare common information sources in fraud examinations
  • Apply the core investigative concepts upon which the CFE credential is built

bhood headshot
Bret Hood, CFE

Director, 21st Century Learning & Consulting

Retired Special Agent (SA) Bret Hood is a 25-year veteran of the FBI. In his time with the FBI, Hood worked high-profile white-collar, money laundering, public corruption, counter-terrorism and organized crime cases. For his last 15 years, Hood was a master instructor for the FBI. Since retirement in 2016, Hood has served as the director of 21st Century Learning & Consulting LLC providing consulting and instructional services to organizations around the world. He is also a former adjunct professor of leadership and ethics for the University of Virginia.

Tuesday
7:00-7:50 AM

Tuesday, June 25 | 7:00–7:50 AM


CPE: 1

Level: Overview

Recommended Prerequisite: None

Field of Study: Behavioral Ethics

Psychopathy is a personality disorder traditionally characterized by persistent anti-social behavior; impaired empathy and remorse; and brazen, disinhibited, and egotistical traits. Although psychopaths are of concern to the criminal justice system, many more have managed to evade or elude conviction and incarceration by perpetrating financial crimes and fraud.

This session will illustrate the latest fraud detection techniques used in the arrest and conviction of a Ponzi scammer who preyed on victims in three separate scams, conning them out of tens of millions of dollars. It will also include highlights from the case as it appeared on the TV show American Greed. Best practices will be demonstrated using the Hare Psychopathy Checklist-Revised (PCL-R).

You Will Learn How To:

  • Recognize the biological, social, psychological, and environmental factors responsible for the development and maintenance of psychopathy in the white-collar psychopath, as seen through the lens of the Psychopathy Checklist Revised
  • Identify signs of psychopathy from the conviction of a Ponzi scammer who preyed on victims in three separate, sequential scams
  • Explore the propensity for fraud and unethical behavior in white-collar psychopaths and discuss differentiation with their criminal psychopath counterparts

mrapier headshot
Mary Lynn Rapier, Ph.D., CFE, MAS

Licensed Clinical and Forensic Psychologist, Mary Lynn Rapier, Ph.D., A Psychology Corporation

As a licensed clinical psychologist specializing in substance abuse treatment, Dr. Rapier has consulted for treatment facilities nationwide, and has worked within the legal system to help her patients combat addiction and reclaim their lives. At the forefront of substance abuse treatment, she has years of hands-on experience that has led to her participation in combating fraud in violation of the California Insurance Fraud Prevention Act, Cal. Ins. Code §1871.7.


In addition to her MA and Ph.D. in clinical psychology (with a concentration in organizational systems) she earned a second master’s degree in criminology, law, and society. As a forensic psychologist, she has specialized in concierge-type services within the criminal justice system for corporate, private, and public sectors, and individuals and their families during all phases of the criminal justice process.


John Waugh, CFE, CAMS

Assistant Special Agent in Charge, U.S. Department of Veterans Affairs, Office of Inspector General

John Waugh has 20 years of federal law enforcement experience and expertise in major financial crimes investigations. The most notable of these, “the Supernote” investigation, resulted in the convictions of several high-profile international targets, millions of dollars in forfeited assets and the designation of a foreign financial institution as a money laundering concern by the U.S. Treasury Department.


Waugh was on the TV show American Greed for the arrest and conviction of a Ponzi scammer who conned victims out of tens of millions of dollars. As a member of the VA-OIG, Waugh developed a strategic initiative to combat identity theft and the theft of veteran’s benefits. This initiative has resulted in the identification of an organized criminal syndicate operating overseas, targeting both the VA and the Social Security Administration. Waugh’s current project is to combine healthcare claims data analysis with financial intelligence records, social media sites and open-source intel to target the latest healthcare fraud schemes affecting the VA.

Tuesday, June 25 | 7:00–7:50 AM


CPE: 1

Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

Join us for this conversational session with Steven D’Antuono, head of the FBI’s Financial Crimes Section, as he discusses emerging fraud schemes and developments from the perspective of U.S. law enforcement. Learn what the FBI is monitoring and what trends they are seeing in white-collar crimes.

You Will Learn How To:

  • Recognize emerging fraud risks and trends
  • Identify ways to prevent and detect new schemes
  • Compare the risks of these frauds for your organization

Steven D'Antuono

Chief - Financial Crimes Section, Federal Bureau of Investigation

Speaker bio coming soon.

7:30-8:30 AM

Registration and continental breakfast

7:30 AM-3:35 PM

Exhibit Hall open

8:30-9:45 AM

Tuesday, June 25 | 8:30-9:45 AM


Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

Tuesday morning's general session will feature two speakers.


First, Theranos whistleblower Tyler Shultz will accept the Cliff Robertson Sentinel Award. First awarded to Oscar-Winning actor Cliff Robertson in 2003, the ACFE's Sentinel Award carries the inscription, "For Choosing Truth Over Self." This award is bestowed annually on a person who, without regard to personal or professional consequences, has publicly disclosed wrongdoing in business or government.


Next, Bastian Obermayer, the investigative journalist who received the Panama and Paradise Papers from an anonymous source, will give a first-hand account of the data leak and the offshore tax havens uncovered by the papers. Obermayer will also be accepting the Guardian Award. This award is presented annually to a journalist whose determination, perseverance and commitment to the truth has contributed significantly to the fight against fraud. Nominees are chosen based upon their contributions in exposing specific acts of fraud and white-collar crime, and/or through helping to shine a spotlight on issues central to fraud and the worldwide effort to prevent and detect it.

bobermayer headshot
Bastian Obermayer

Investigative Journalist, Panama Papers Recipient, 2017 Pulitzer Prize Winner Süddeutsche Zeitung

Bastian Obermayer works as deputy head of the investigative unit of the Munich-based Süddeutsche Zeitung.

He is the reporter who received the Panama Papers from an anonymous source. Obermayer is also author of several books, among them the best-selling account of the Panama Papers investigation, The Panama Papers: Breaking the Story of How the Rich and Powerful Hide Their Money.

He has received numerous honors for his work, including the 2017 Pulitzer Prize; the George Polk Award; the Barlett & Steele Award; and several German awards, including the Henri-Nannen-Preis, Theodor-Wolff-Preis, Helmut-Schmidt-Preis, Waechterpreis, Deutscher Reporterpreis and Otto-Brenner-Preis.

tschultz headshot
Tyler Shultz

Theranos Whistleblower

Tyler Shultz courageously blew the whistle at Theranos. Shultz complained to the public health regulators in New York and was a source for a series of Wall Street Journal articles exposing Theranos’ dubious blood-testing practices. Owing to his role in exposing the fraud, Shultz was featured in Bad Blood, the book about the scandal penned by John Carreyrou, the original author of the Wall Street Journal articles, as well as in Alex Gibney’s HBO documentary The Inventor. Currently, Shultz is the CEO and co-founder of Flux Biosciences, Inc., a Bay-Area startup. Flux Biosciences aims to bring medical-grade diagnostics into the homes of consumers by using cutting-edge technology to measure biomarkers related to stress, exercise and fertility. His efforts were recognized by Forbes when he was named to their “30 under 30” Health Care 2017 list.

10:15-11:30 AM

Tuesday, June 25 | 10:15-11:30 AM


CPE: 1.5

Level: Intermediate

Recommended Prerequisites: None

Field of Study: Specialized Knowledge

This session will dig deeper into the challenges CFEs face when conducting investigations that involve adolescents, teens and millennials as the victims, suspects or witnesses. Part 2 will discuss new information and trends, and take an in-depth look at some of the topics presented in Part 1.

You Will Learn How To:

  • Navigate the challenges of investigations involving millennials
  • Examine the platforms that millennials use to communicate
  • Distinguish between digital immigrants and digital natives
  • Recognize the common types of exploitation and harassment that adolescents and millennials face in their digitally connected world

dellington headshot
Derek Ellington, CFE, CEDS, PI

Ellington Digital Forensics

Derek Ellington is a nationally known Certified Fraud Examiner, specializing in computer crimes. He is also a Certified Computer Forensic Examiner, an ACEDS Certified E-Discovery Specialist and a licensed private investigator. He has testified more than 150 times in all manner of courts and jurisdictions. He is a popular speaker and contributor to legal publications, and regularly trains law enforcement first responders on processing digital crime scenes. Over the last five years, his lab has processed more than 1,500 cases ranging from civil to criminal and family law. Many of their cases involve adolescents or young adults as suspects, witnesses or victims, and he and his team have developed unique understandings and strategies in dealing with cases involving millennials.

Tuesday, June 25 | 10:15–11:30 AM


CPE Credit: 1.5

Level: Intermediate

Recommended Prerequisite: An understanding of how financial institutions collect and use KYC information and how they monitor customers to detect suspicious behavior indicative of money laundering and fraud

Field of Study: Information Technology

Organizations are feeling pressure to reduce the number of false positives and negatives generated by today's transaction monitoring systems and improve true positives. Improving accuracy requires institutions to leverage more structured and unstructured data, often overwhelming existing investigative teams.

This session will outline techniques used to reduce false positives in transaction monitoring, payment fraud and insurance fraud, while helping institutions look at new ways to segment customers and assign risk.

You Will Learn How To:

  • Identify how AI can support and improve the detection of suspicious behavior
  • Assess ways to leverage robotic process engineering, combined with analytics, to improve the investigative process
  • Appraise how data is being used in institutions to better assign risk, leading to fewer false positives
  • Recognize that more transparency in using AI is gaining the support of regulatory agencies
Clark Frogley, CAMS

Global Financial Crime Solutions Leader, IBM

Clark Frogley has worked with leading companies for more than 30 years to understand and reduce the impact of fraud, money laundering and terrorist financing. He has been a featured speaker at worldwide conferences.

Frogley investigated organized and financial crime with the FBI, and he served as the Assistant Legal Attaché in the U.S. Embassy in Japan. Over the next 18 years, he served in executive positions in financial crime with Goldman Sachs, Deutsche Bank and AIG. Frogley has led transformation initiatives in banking and insurance focused on AML, KYC and counter-fraud operations and investigations.

Frogley was a partner in EY’s AML and Financial Crime Practice, where he helped clients develop and improve their regulatory and risk programs. After joining IBM in 2015, Frogley has served as the global head of AML and Counter Fraud Services, and as a Vice President, leading the establishment and growth of a Financial Crime Practice in Japan.

Tuesday, June 25 | 10:15-11:30 AM


CPE: 1.5

Level: Basic

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

“Through the looking glass” is a metaphorical expression meaning: on the strange side, in the twilight zone, or in a strange, parallel world. While the internet can be considered a strange, parallel world, it can also be an informative, interesting, yet scary place when conducting different types of investigations. There are various technologies and methods that you can use to protect your identity and information while conducting internet-based investigations. This session will illustrate these technologies and methods to keep you safe when investigating online.

You Will Learn How To:

  • Identify the methods criminals use to find your data
  • Compare various technologies and software tools to protect your identity while investigating online
  • Examine various methods to employ to hide your own tracks

rduquette headshot
Ryan Duquette, CFE

Partner - Security, Privacy and Risk Consulting, RSM Canada

Ryan Duquette focuses on litigation support, cyber-incident response, privacy and technology risks, digital forensics and cyberfraud matters. Duquette has been an investigator for more than twenty years and was previously a police officer focusing on cybercrime and fraud cases. Duquette works closely with clients involved in workplace investigations and civil litigation matters including intellectual property theft, HR investigation and data breaches.

He is a sessional lecturer at the University of Toronto teaching digital forensics; is a former director for the Toronto chapter of the Association of Certified Fraud Examiners; has been qualified as an expert witness on numerous occasions; and is a frequent presenter at fraud, digital forensics, cybersecurity and investigative conferences worldwide.

Tuesday, June 25 | 10:15-11:30 AM


CPE: 1.5

Level: Advanced

Recommended Prerequisites: Knowledge of and experience with the fundamentals of interviewing

Field of Study: Communication and Marketing

This session will review the fundamentals of planning an interview and the importance of observing physical behavior to assess the validity of the information provided by the interviewee. It will also address factors that lead to the stress that individuals experience when being deceptive, and the physical and verbal indicators of that stress. The importance of question formulation and simplicity of language is also examined with examples provided of good and bad questions.


The session will also highlight active listening and how word analysis can be used in assessing whether a person is being truthful or deceptive. The concepts covered during the session will be supported by analysis of video clips of interviews and transcripts of statements from publicly available sources.

You Will Learn How To:

  • Recognize the importance of simplicity in question formulation
  • Identify behaviors indicative of deception
  • Determine the use of word analysis in detecting deception and its importance in developing lines of inquiry
  • Identify the value of active listening

rcockerell headshot
Robert Cockerell

Partner, KordaMentha Forensic

Robert Cockerell has been involved in the investigation of some of the most complex and serious fraud, corruption and drug matters in Australia, ranging from a $118 million fraud on a major Australian bank to the importation of 79 pounds of heroin. A former detective chief inspector with the Victoria Police, he was twice presented with the highest award for investigative excellence by the Victoria Police.

A partner at KordaMentha Forensic, one of the largest forensic practices in Australia, he is an acknowledged expert in fraud and corruption investigations, detecting deception through interviews and forensic reviews of business practices. Cockerell has conducted forensic engagements in Australia, Asia and Europe.

Tuesday, June 25 | 10:15-11:30 AM


CPE Credit: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

Social media is mostly used for personal enjoyment and for businesses to market their services. But criminals also use it to commit crime. How well do you protect your organization’s social media accounts? Are you connected with imposters and miscreants? This session will review high-profile cases where social media and other online tools were used by cybercriminals. It will also discuss the threats social media poses to you and your business, as well as some best practices you can follow to protect yourself.

You Will Learn How To:

  • Examine the risks of using social media
  • Evaluate how social media has been used in attacks against individuals and businesses
  • Identify best practices to protect yourself and your business
David Pollino

Chief Information Security Officer, Bank of the West

David Pollino, Bank of the West Chief Information Security Officer, is an experienced financial services executive with 20 years of combined experience in both information security and financial services. Pollino has held senior security positions at Charles Schwab, Washington Mutual and Wells Fargo.


Pollino is a key contributor to the customer-facing BOW blog, as well as an information security author. He has authored titles such as RSA Press: Wireless Security, The Hacker’s Challenge Books 1, 2 and 3 and Hacking Exposed: Wireless.


Pollino frequently speaks at security events and is quoted in the media on security issues. He also serves on board committees at the Boy’s and Girl’s Club of the Midlands.

Tuesday, June 25 | 10:15-11:30 AM


CPE: 1.5

Level: Intermediate

Recommended Prerequisite: Knowledge of audit scoping, planning and execution

Field of Study: Auditing

With evolution in technology, communications, and the business environment, auditing for fraud has changed and will continue to change in the coming years. In this panel session, you’ll hear from auditing experts from different industries discussing challenges and best practices for conducting audits in 2019 and beyond.

You Will Learn How To:

  • Assess common challenges that auditors face
  • Apply best practices in auditing for fraud

Allen Brown, CFE, CPA

Former Assistant Legislative Auditor, Louisiana Legislative Auditor’s Office

Allen Brown is the former Assistant Legislative Auditor for Local Government Services for the state of Louisiana Legislative Auditor’s Office. In this position he oversaw local government audits and directed the Investigative Audit group. During his tenure with the Louisiana Legislative Auditor he participated in hundreds of fraud investigations including one that resulted in the closing of a state agency. Brown retired from the Louisiana Legislative Auditor’s Office in January of 2014.

Tuesday, June 25 | 10:15-11:30 AM


CPE Credit: 1.5

Level: Advanced

Recommended Prerequisite: Knowledge of overbilling schemes and experience with fraud data analytics

Field of Study: Specialized Knowledge

In this session, you will learn how to build a fraud audit approach to detect complex vendor overbilling schemes. First, it will describe a methodology to identify and describe vendor overbilling fraud risk statements. Using fraud data analytics, you will learn how to locate the schemes hidden in your data files. Lastly, learn how to build your fraud audit test procedures. The session will use a practical example throughout to illustrate the concepts.

You Will Learn How To:

  • Identify vendor overbilling fraud risk statements
  • Discern fraud audit programs for vendor overbilling schemes
  • Identify fraud data analytic techniques to locate vendor overbilling schemes
Leonard Vona, CFE, CPA

CEO, Fraud Auditing, Inc

Leonard W. Vona is the CEO of Fraud Auditing. He is a forensic accountant with more than 40 years of diversified auditing and forensic accounting experience, including a distinguished 18-year private-industry career. Vona is the author of three books published by Wiley, Fraud Risk Assessment: Building a Fraud Audit Program, The Fraud Audit: Responding to the Risk of Fraud in Core Business Systems, and Fraud Data Analytics Methodology: The Fraud Scenario Approach to Uncovering Fraud. Vona lectures nationally and internationally on fraud risk assessments, fraud auditing, fraud data analytics and fraud prevention. His firm advises clients in areas of litigation support, financial investigations, fraud auditing, fraud data analytics and fraud prevention.

Tuesday, June 25 | 10:15-11:30 AM


CPE: 1.5

Level: Basic

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

The dark web is often seen as a mysterious and malevolent creature, built out of the myths and legends created by popular media and clickbait headlines. In reality, the dark web is home to a vibrant and thriving criminal ecosystem, with a resilient fraud trade at the center of the action. Inaccurately portrayed as a playground for hitmen and human traffickers, the dark web is, instead, a place where fraudsters leverage tools, tactics, and technology to build scalable business models, collect and co-opt sensitive data, and exploit organizations around the clock. What is the dark web fraud economy? What drives it? What can we do about it?


This session will go beyond high-level introductions to the idea of the dark web and provide you with a tactical view of what the dark web is, how it works, and how fraudsters function, trade, and scheme together in the criminal underground. This session connects the dots, demonstrating how compromised data and community tradecraft create the fraud lifecycle we see today. You will come away understanding how the fraudsters do what they do, how the dark web helps, and how things are changing — for better and for worse.

You Will Learn How To:

  • Recognize dark web technology and terminology
  • Determine key drivers of the dark web fraud economy
  • Identify at-risk data types and areas of most frequent exposure
  • Assess gaps between criminal data valuation and corporate data valuation
  • Relate dark web fraud activity to the fallout from current fraud schemes

ewilson headshot
Emily Wilson, CFE

VP of Research, Terbium Labs

Emily Wilson is the VP of Research at Terbium Labs, a dark web intelligence company. Wilson directs Terbium's strategic research programs, where she focuses on the dark web, the criminal economy for personal information and stolen payment cards, and the increasing overlap between fraud and cybercrime. Before her current role, she served as director of analysis at Terbium Labs, where she managed Terbium’s operational analysis team in identifying and investigating sensitive client data on the dark web. Wilson is a Certified Fraud Examiner, a regular guest on industry shows like "The Cyberwire Podcast", and frequently speaks at conferences, industry events, and trainings.

Tuesday, June 25 | 10:15-11:30 AM


CPE: 1.5

Level: Basic

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

Organizations of all sizes and industries now rely on vendors and other third parties for crucial business processes — which exposes those organizations to data security risk (fraud, data theft, espionage) like never before. The risk itself isn’t a surprise but assessing and remediating it can be maddeningly difficult.

You Will Learn How To:

  • Review the current state of oversight that most companies have over business partners handling their confidential data
  • Consider why weak oversight is more a failure of policy and procedures than of IT security
  • Understand the risk assessment processes and other resources that companies can use to monitor data security risk among their vendors and other third parties

Matt Kelly

Editor and CEO, Radical Compliance

Matt Kelly is editor and CEO of RadicalCompliance.com, a blog and newsletter that follows corporate governance, risk and compliance issues at large organizations; it includes the “Compliance Jobs Report,” a weekly update on compliance professionals moving around the industry. He also speaks on compliance, governance and risk topics frequently.


Kelly was named as “Rising Star of Corporate Governance” by the Millstein Center for Corporate Governance in the inaugural class of 2008. He was also recognized in Ethisphere’s “Most Influential in Business Ethics” list in 2011 and 2013. In 2018, he won a Reader’s Choice award from JD Supra as one of the top ten authors on corporate compliance.


Kelly previously was editor of Compliance Week, a newsletter on corporate compliance, from 2006 through 2015. He lives in Boston, Massachusetts, and can be reached at mkelly@RadicalCompliance.com or on Twitter at @compliancememe.

Tuesday, June 25 | 10:15-11:30 AM


CPE: 1.5

Level: Intermediate

Recommended Prerequisite: Knowledge and experience with fundamentals of fraudster characteristics

Field of Study: Behavioral Ethics

Most organizations provide ethics training, but does it make a difference? Is it just “checking a box” or does it change behaviors? Often, ethics training focuses on case studies and examples of organizations that made unethical decisions that led to fraud or scandal. But we already know the outcome and therefore we also know the right answer. We aren’t learning how to evaluate situations and prevent them; we are only examining specific scenarios and their failures. For ethics training to drive positive behavior, it must teach ethical decision-making skills. It requires understanding subconscious influences, significance of context, power of language, framing of issues and causes of ethical blindness. This session will explain why corporate ethics training must go beyond informing employees of laws and organizational policies and instead focus on equipping employees with the skills to make sound ethical decisions.

You Will Learn How To:

  • Evaluate the decision-making process
  • Assess why people behave unethically
  • Identify the significance of context and the forms of context that influence decisions
  • Determine when issue-framing creates distortion and ethical blindness
  • Examine how an organization’s “language” influences and drives behaviors

Mary Breslin, MBA, CFE, CIA

Partner, Verracy

Mary Breslin, MBA, CFE, CIA, is the founder of Verracy Training and Consulting. She has more than 20 years’ experience in internal auditing, fraud examination, management and accounting for companies such as ConocoPhillips, Barclays Capital, Costco Wholesale, Jefferson Wells and Boart Longyear. She specializes in internal audit transformations, operational and financial auditing, fraud auditing, investigations, and corporate accounting. She has international experience and has managed audit programs in more than 30 countries.


Breslin attended Rutgers University and received her BS in accounting and an MBA from the University of Phoenix. She is a Certified Fraud Examiner and Certified Internal Auditor (CIA).

Tuesday, June 25 | 10:15-11:30 AM


CPE: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

In this roundtable session, you will meet with your peers and discuss the role CFEs can play in organizations’ compliance programs, as well as the issues and challenges involved with aligning anti-fraud and compliance initiatives. The session will be limited to 100 attendees, on a first-come, first-served basis, to allow for maximum engagement and interaction. A facilitator will guide you through discussion questions, but the primary lessons will come from sharing experiences and best practices with your peers.

You Will Learn How To:

  • Identify challenges in engaging CFEs in compliance efforts
  • Apply best practices for integrating your organization’s compliance and anti-fraud programs

Elizabeth Simon, CFE, CPA

Director, Ethics & Compliance, CCI Records Coordinator, Cox Communications
ACFE Regent

Elizabeth Simon, CFE, CPA, is the director of ethics and compliance and records coordinator for Cox Communications Inc. She’s responsible for managing the ethics hotline and overseeing ethics-related investigations, conducting compliance risk assessments and ensuring that Cox is complying with the laws and regulations relevant to the company. She also oversees the company’s Records & Information Management Program and leads other compliance-related projects.


Simon was previously the Senior Internal Auditor for Kimberly-Clark in Roswell, GA, with responsibility for developing data analytics around the Foreign Corrupt Practices Act and other internal audits. She’s also worked at PwC and EY. There, she conducted external audits and worked on forensic accounting investigations. She also built out the Sarbanes-Oxley compliance program at Global Payments

Tuesday, June 25 | 10:15-11:30 AM


CPE: 1.5

Level: Advanced

Recommended Prerequisites:

  • Knowledge of money laundering and related finance concepts
  • Experience with money laundering investigations

Field of Study: Specialized Knowledge

The session will explore some of the most sophisticated and advanced means of laundering money. Hear directly from an anti-fraud expert who has seen much of the inside of the Deutsche Bank mirror trading, the Azerbaijani laundromat and Danske Bank's Estonian branch movement of $230 billion. This session will use these and other real-life cases to illustrate the clever ways criminals move money through the use of private and public hedge funds, law firm trust accounts, warehouse receipts, bills of lading, doppelganger companies and faux state-owned enterprises. It will also look to the future and discuss money laundering 3.0.

You Will Learn How To:

  • Assess the ongoing evolution of money laundering
  • Employ defenses against criminals targeting your financial institution
  • Identify red flags of money laundering scenarios that investigators should be able to spot

L. Burke Files, DDP, CACM

President, Financial Examinations & Evaluations Inc.

L. Burke Files is the president of Financial Examinations & Evaluations Inc., an international investigative and consulting firm specializing in asset recovery, due diligence, anti-money laundering, and intellectual property. Files is an international expert on money laundering and due diligence; he has run cases in more than 130 countries from tens of thousands to billions of dollars.


Files was previously a partner in a regional consulting firm specializing in business, financial and securities consulting and served as the director of corporate finance for an investment banking company. As a financial industry insider, Files is keenly aware of the type, and accuracy of information required to make informed, timely decisions.


He also volunteers as the president of the American Anti-Corruption Institute and the International Due Diligence Organization and teaches classes for them on due diligence, anti-corruption, and compliance.

Tuesday, June 25 | 10:15-11:30 AM


CPE: 1.5

Level: Advanced

Recommended Prerequisite: Experience with or the expectation of managing and leading other fraud examiners

Field of Study: Behavioral Ethics

Everyone believes themselves to be ethical, but our brains work in mysterious ways. In this session, you will learn how your brain can subconsciously work to disguise, alter, and transform different facts and events causing you to inadvertently make unethical decisions. By understanding phenomena such as bounded ethicality, motivated blindness and ethical fading, you will learn how to mitigate the automatic behaviors that make good people do bad things.

You Will Learn How To:

  • Recognize bounded ethicality and motivated blindness
  • Ascertain the effects of power on ethical behavior
  • Discern the effects of rivalry and competition on ethical behavior
  • Identify how executives turn ethical decisions into business decisions without even realizing it
  • Determine methods to maintain ethicality even as you rise in the organizational hierarchy

bhood headshot
Bret Hood, CFE

Director, 21st Century Learning & Consulting

Retired Special Agent (SA) Bret Hood is a 25-year veteran of the FBI. In his time with the FBI, Hood worked high-profile white-collar, money laundering, public corruption, counter-terrorism and organized crime cases. For his last 15 years, Hood was a master instructor for the FBI. Since retirement in 2016, Hood has served as the director of 21st Century Learning & Consulting LLC providing consulting and instructional services to organizations around the world. He is also a former adjunct professor of leadership and ethics for the University of Virginia.

Tuesday, June 25 | 10:15-11:30 AM


CPE: 1.5

Level: Basic

Recommended Prerequisites: This session is designed to review material required to pass the CFE Exam. Independent study with the CFE Exam Prep Course prior to attendance is strongly recommended.

Field of Study: Specialized Knowledge, Auditing, Information Technology

This session will cover the following topics:

  • Planning and conducting a fraud examination
  • Data analysis and reporting tools
  • Digital forensics
  • Covert examinations
  • Analyzing documents
  • Report writing

You Will Learn How To:

  • Design a fraud examination plan
  • Implement effective reporting techniques in your investigation
  • Apply the core investigative concepts upon which the CFE credential is built

gill headshot
John D. Gill, J.D., CFE

Vice President - Education, Association of Certified Fraud Examiners

John Gill is the Vice President – Education at the Association of Certified Fraud Examiners. He oversees the production and development of all the books, manuals, self-study courses and seminar and conference materials produced by the ACFE. He serves on the faculty of the ACFE and is a co-instructor of the CFE Exam Review Course. He is a co-author of the Fraud Examiners Manual and serves as the editor-in-chief for the CFE Exam and the CFE Exam Prep Course. He is also a contributing author to Fraud Magazine.

11:40 AM-12:30 PM

Group Lunch

12:30-1:20 PM

Tuesday, June 25 | 12:30-1:20 PM


Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

Join New York Times best-selling author and Hermitage Capital Management CEO, Bill Browder, as he tells the story of Sergei Magnitsky, who was killed in a Moscow prison after uncovering and exposing a $230 million fraud committed by Russian government officials.

bbrowder headshot
Bill Browder

CEO, Hermitage Capital Management

William (Bill) Browder, founder and CEO of Hermitage Capital Management, was the largest foreign investor in Russia until 2005, when he was denied entry to the country for exposing corruption in Russian state-owned companies.

In 2009, his Russian lawyer, Sergei Magnitsky, was killed in a Moscow prison after uncovering and exposing a $230 million fraud committed by Russian government officials. Because of their impunity in Russia, Browder has spent the last eight years conducting a global campaign to impose visa bans and asset freezes on individual human rights abusers, particularly those who played a role in Magnitsky’s false arrest, torture and death.

The U.S. was the first to impose these sanctions with the passage of the 2012 “Magnitsky Act.” A Global Magnitsky Bill, which broadens the scope of the U.S. Magnitsky Act to human rights abusers around the world, was passed at the end of 2016. The U.K. passed a Magnitsky amendment in April 2017. Magnitsky legislation was passed in Estonia in December 2016, Canada in October 2017 and in Lithuania in November 2017. Similar legislation is being developed in Australia, France, Denmark, Netherlands, South Africa, Sweden and Ukraine.

In February of 2015, Browder published the New York Times bestseller, Red Notice: A True Story of High Finance, Murder and One Man's Fight for Justice, which recounts his experience in Russia and his ongoing fight for justice for Sergei Magnitsky.

1:50-3:05 PM

Tuesday, June 25 | 1:50-3:05 PM


CPE Credit: 1.5

Level: Basic

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

Civil courts throughout the U.S. have used a range of tracing methodologies to identify commingled property when identification is not feasible. Contrary to what the name suggests, certain tracing methodologies do not permit practitioners to separate out untainted funds from tainted ones, or to follow the progress of a specific deposit from one account to another. Rather, these methodologies offer an equitable substitute for this difficult task. This session will explain the mechanics of equitable tracing methodologies and why the courts use one method over another.

You Will Learn How To:

  • Identify the various equitable tracing methodologies accepted by U.S. courts
  • Explain and understand the mechanics and processes in applying those methodologies to specific examples
  • Determine which methodology to apply based on context and relevant case law
Jason Wright, J.D., CFE

Director, Stout

Jason Wright conducts forensic accounting, complex commercial litigation, Foreign Corrupt Practices Act, intellectual property damages, royalty audits and regulatory engagements involving publicly held and private companies as well as municipalities and government entities. He has significant experience providing business and financial advice to trial lawyers, in-house counsel, audit committees and stakeholders throughout the dispute process in both domestic and international contexts. He has also provided testimony in federal and state court as well as during mediation. Wright has performed numerous complex financial analyses and has directly participated in several large-scale investigations. Wright has assisted named corporate compliance monitors in their duties under settlement agreements with various regulatory agencies and evaluated the ability of a large multinational corporation to pay a multi-billion dollar settlement fine. Wright is a member the Association of Certified Fraud Examiners, Candidate Affiliate Member of the American Institute of Certified Public Accountants, American Bankruptcy Institute, Chicago Bar Association, American Bar Association and Federal Bar Association.

Marylee Robinson, CFE

Director, Stout

Marylee Robinson specializes in providing expert testimony and litigation consulting services, and she has extensive experience providing fraud and forensic accounting services in white-collar crime cases with an emphasis on matters involving the analysis of voluminous documents and data. Her fraud and forensic accounting experience includes assistance to the Department of Justice in a series of investigations of corporate executives indicted for white-collar crimes in both the banking and health care industries. Robinson is frequently involved in the analysis and summarization of government payer healthcare claims as well as the summarization of the bank account activity of potential targets and/or defendants. Such analysis has been used to support money laundering and wire count charges in federal court as well as to assist in sentencing and forfeiture efforts. Robinson has been retained as an expert in multiple matters and has provided testimony in federal court. Robinson is a member of the Association of Certified Fraud Examiners, American Bar Association Section of Litigation Expert Witnesses Committee, American Institute of Certified Public Accountants, International Women’s Insolvency & Restructuring Confederation (IWIRC), Greater Maryland and the Maryland Association of Certified Public Accountants.

Tuesday, June 25 | 1:50–3:05 PM


CPE Credit: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Behavioral Ethics

Most organizations and governments promote a speak-up culture. “If you see something, say something,” as they say. With the large majority of fraud schemes being reported by tips, it’s imperative that both organizations and individuals are encouraged to report wrongdoing. But what are the costs of good-faith reporting? Implementing a broad compliance program that sustains a strong culture of compliance can be costly in both resources and manpower. Whistleblowers who come forward might lose a significant amount of personal and professional capital when reporting wrongdoing. Organizations that report violations might receive negative press, lower stock prices and increased regulatory exposure. Very seldom are the reporters recognized as the heroes, and therein lies the dichotomy. Doing the right thing has a cost and, unfortunately, sometimes that cost greatly exceeds the cost of doing nothing.


This session will explore the question, how do we change this? It will discuss organization expectations, barriers and challenges to reporting wrongdoing, and how you can help improve the culture of reporting.

You Will Learn How To:

  • Identify the expectations on individuals and organizations to report
  • Discuss the barriers, stigmas and challenges that currently exist to reporting wrongdoing
  • Assess several case studies where organizations and individuals got reporting right—and where they got it wrong
  • Recognize how we all can help improve the culture of reporting
Ryan C. Hubbs, CFE, CIA, CCEP

Global Anticorruption and Fraud Manager, Schlumberger
ACFE Regent

Ryan C. Hubbs is the global anticorruption and fraud manager for Schlumberger in Houston, Texas. Hubbs has more than 18 years of experience managing corporate investigations, forensic audits and compliance initiatives. He has conducted hundreds of sensitive internal engagements concerning fraud, corruption, contracts, vendors and suppliers, and employee-related issues. Hubbs also has extensive experience with organization-wide anti-fraud and compliance programs and measures, corporate investigation programs and protocols, and fraud data analytics. He has extensive experience investigating and researching anonymous shell company networks as well as developing analytics and process improvements to combat this emerging fraud risk area. Hubbs also previously served 13 years as a commissioned law enforcement officer in both Louisiana and Texas.


Hubbs currently sits on the ACFE's Board of Regents. He is also a member of the ACFE Faculty where he co-presents the CFE Exam Review Course, as well as specialized training. Hubbs co-wrote the guidance to the ACFE Standards and developed the ACFE Chapter Leaders Resource Guide. He has served ten years as an ACFE Chapter President and officer for both the New Orleans and Houston ACFE Chapters. In his role as President of the Houston ACFE Chapter he helped guide the chapter to be recognized as the ACFE’s 2014 Chapter of the Year and the recipient of the ACFE’s 2015 Chapter Newsletter of the Year. Hubbs’ continued involvement and contributions in the anti-fraud profession resulted in him being awarded the Greater Houston Fraud Impact Award in 2014.

Tuesday, June 25 | 1:50–3:05 PM


CPE Credit: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

In this roundtable session, you will meet with your peers and discuss issues relating to cross-border investigations. The session will be limited to 100 attendees, on a first-come, first-served basis, to allow for engagement and interaction. A facilitator will guide you through discussion questions, but the primary lessons will come from sharing experiences and best practices with your peers.

You Will Learn How To:

  • Identify challenges in cross-border investigations
  • Compare best practices for leading international cases with your peers
Anthony Campanelli, CPA, CFF, CGMA

Partner, Forensic, Deloitte Financial Advisory Services LLP

Anthony Campanelli is a partner in the New York forensic practice of Deloitte Financial Advisory Services LLP and has more than 21 years of experience in providing extensive investigation services to companies and law firms, on a wide range of matters, including forensic accounting and fraud investigations matters, litigation and arbitration services, and expert testimony. Campanelli specializes in the travel, hospitality and leisure industry, having performed a significant number of investigations in the industry.

Tuesday, June 25 | 1:50-3:05 PM


CPE Credit: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Business Law

In this session, you will learn about the gatekeeping strategies of court procedure designed to keep you from testifying. It will discuss how Daubert challenges should be considered in everything you do, in addition to how everything you say and write can be used against you. You will learn the strategies opposing attorneys use to attack the four pillars of expert testimony: the evidence, your methodology, your assumptions and you. The session will conclude with best practices to avoid common traps in expert testimony.

Frank Wisehart, CFE, CPA, CVA, MAFF

Partner, Baker Tilly Virchow Krause, LLP

Speaker bio coming soon.

Tuesday, June 25 | 1:50–3:05 PM


CPE Credit: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

Every day, organizations’ employees interact with the public and one another. The way this occurs has changed at an accelerated and alarming rate, due to social media and digital devices. Online and application-based marketing are driving forces behind any successful brand and business but at what costs and do we know the risks? Can you control what is said about your brand, who says it and if fiction is perceived as truth? How do account takeovers occur and what can be done to prevent this? This session will review alarming case studies and identify best practices to prevent similar occurrences.

You Will Learn How To:

  • Assess current trends in social media and application-based software
  • Recognize how your employees might indirectly affect your company’s brand, profile and risk without even knowing it
  • Determine best practices for BYOD (Bring Your Own Device)
  • Ensure you aren’t giving away your secret recipe or crown jewels
  • Identify techniques and relevant security protocols to prevent social engineering
  • Establish specific current password protocols
Keith Elliott

President and CEO, Reed Research

Keith Elliott is the President and CEO of Reed Research Investigations Limited, a professional investigation firm based out of Toronto, Canada. He holds an honors degree in law and security administration, and additional diplomas in private investigations, advanced interview techniques, and close protective services. As a seasoned professional investigator with more than 27 years of experience, Elliott has practical involvement in identifying risk and investigating frauds relating to criminal enterprise, employment, health care, insurance services, fake deaths, disability, cyber scams, and various payment platform online services. He has presented evidence and testified in precedent-setting cases in various courts across Ontario and Canada.

Tuesday, June 25 | 1:50–3:05 PM


CPE Credit: 1.5

Level: Intermediate

Recommended Prerequisite: Knowledge of audit scoping, planning and execution

Field of Study: Auditing

The way audits and forensics will be performed in next 3-5 years will be different from how they are performed today. To remain relevant, you must keep pace with the technology that businesses are adopting, such as robotic process automation, artificial intelligence and machine learning. Audit and forensic procedures will need to be redefined and made smarter and sharper. This session will explore how emerging technology will impact the future of the audit professional.

You Will Learn How To:

  • Identify challenges you will face while performing audits and forensic reviews by 2025
  • Recognize foundational changes to prepare for in your audit and forensic procedures
  • Assess the significance of negative testing in the age of robotic process automation, artificial intelligence and machine learning
Rajiv Gupta, CFE, CA, CISA, CCSA

Vice President & Chief Internal Auditor, Diageo India

Rajiv Gupta is an author, international speaker and a mentor. He is currently Vice President and Chief Internal Auditor at Diageo India. He has also worked as Head of Internal Controls for India and South West Asia at Coca-Cola and Assurance Manager with PwC in India and London. Gupta is an RPA (Robotics Process Automation) evangelist and subject matter expert in the field of forensic accounting and fraud prevention. He has more than 15 years of professional experience in designing fraud prevention programs, forensic accounting, automation of data analytics, internal controls, risk assessment and SOX/internal audits. He is a Chartered Accountant, Certified Fraud Examiner, Certified Information Systems Auditor, certified in COBIT v5 (F) and holds Diploma in Information Systems Audit (ICAI). He is the author of “Technical Guide on Internal Audit of Beverage Industry” published by Institute of Chartered Accountants of India (ICAI) in December 2013.

Gupta has been a guest speaker for the Association of Certified Fraud Examiners (ACFE), the Institute of Chartered Accountants of India (ICAI), the Information Systems Audit and Control Association (ISACA), Software Asset Management Strategy (SAMS) Europe and the National Academy for Direct Taxes (NADT). He has spoken on fraud prevention, fraud risk assessment, deep dive intelligence, financial statements fraud and other issues at professional conferences in Australia, Germany, Hongkong, Dubai, Scotland and India.

Tuesday, June 25 | 1:50–3:05 PM


CPE: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Auditing

How many times has a single email or correspondence broken your case wide open? Imagine the magnitude of evidence you could develop if that same data was analyzed on a grander scale and combined with other data sources to illuminate patterns and uncover trends. This session will explore how data mining and analytics can be beneficial to investigations.


Beyond traditional source of data, such as spreadsheets and tables, lie valuable alternative sources, such as document metadata, communications, security swipes, Internet of Things (IoT) logs and geotagged/coordinated data. Synthesizing this disparate information to develop a fact pattern or support an essential narrative can be cumbersome if done by hand. With data science techniques, however, you can leverage a multitude of large and unwieldy datasets in a short amount of time, while leaving no stone unturned. This session will introduce you to the basic concepts of analyzing traditional and alternative data in support of real-life investigations, as told by the former New York State Office of the Attorney General’s Director of Data and Analytics.

You Will Learn How To:

  • Recognize and provide examples of traditional and alternative data
  • Discern the general process of using data in cases or investigations
  • Identify whether a case or investigation could benefit from data

lkeller headshot
Lacey Keller

Data Science Managing Director, Gryphon Strategies

Lacey Keller is a Managing Director with Gryphon Strategies with almost a decade of research and analytics experience. She advises financial and law firms on how best to use traditional and alternative data for investments and investigations.

Previously, Keller was the founder and director of the Research and Analytics Department for the New York State Office of the Attorney General. During her tenure, she developed a formidable team, including the first data scientist hired by a state attorney general’s office, that leveraged cutting-edge technologies and analytical techniques to support investigations. Her team was instrumental in many of the most notable cases brought by the Office of the Attorney General, including the case brought against Spectrum (Time Warner Cable) for allegedly defrauding customers over internet speeds and performance. That team also helped author reports on Airbnb, gun trafficking and ticket pricing that national media outlets widely covered.

Tuesday, June 25 | 1:50–3:05 PM


CPE Credit: 1.5

Level: Basic

Recommended Prerequisite: None

Field of Study: Information Technology

We are surrounded by devices we love, but how much do they love us? As we become more disconnected from other human beings, we are becoming more connected to major companies that are collecting massive amounts of data about our lives. All of this information is great for advertisers and gold for fraudsters trying to steal identities. Cameras, microphones and devices that provide our exact latitude and longitude enable fraud to happen in real time and be livestreamed to the fraudster. This session will review the threats posed by the devices that surround us, and how you can reduce the exposure and privacy concerns these devices present.

You Will Learn How To:

  • Appraise the threats posed by the devices that surround us and how criminals can exploit them
  • Recognize how devices and communications can leak details of the investigation and help the attacker in new ways
  • Reduce exposure and privacy concerns these devices present to daily lives and business operations
cmoore Headshot
Cary Moore, CFE

Chief Executive Officer, MegaByte Security

With a career distinguished by 14 years of highly decorated service to the United States Air Force, of which seven were as a federal agent for the Air Force Office of Special Investigations (AFOSI), Cary Moore has more than 17 years of specialized experience in cybersecurity, enterprise forensics and technical surveillance countermeasures (TSCM). Focusing on counterintelligence and counterespionage, he brings a unique perspective to insider threats and protecting some of the most sensitive data.

Prior to his current role, he served as a senior vice president, cyber intelligence and emerging threats manager at Bank of America. As a banking-industry specialist, Moore developed new ways to rob a bank and banking customers, then devised controls to prevent such fraud from realization. Currently, he is an associate partner for the IBM Red Cell Team where he conducts dark Web intelligence-gathering operations to identify compromised accounts, and get in front of fraud. Moore is also chief executive officer of MegaByte Security, a private consulting firm specializing in the secure management of information systems in the age of cyber terrorism and warfare, developing customized training and solution plans for the private and federal public sectors.

Most recently, Moore earned his master’s in business administration from the University of Texas in San Antonio and works primarily out of his office near Blackwater Bay, Florida.

Tuesday, June 25 | 1:50–3:05 PM


CPE: 1.5

Level: Intermediate

Recommended Prerequisite:

  • Applied knowledge of how the elements of the Fraud Triangle can guide employee behaviors and lead to corporate fraud
  • Experience with fraud prevention programs

Field of Study: Behavioral Ethics

The last few years have shocked CEOs, boards of directors and shareholders. Scandals from Wells Fargo, Volkswagen, United Airlines and Uber (among others) demonstrate the unanticipated ethical impact of poorly conceived performance incentives. In this session, we unravel how these perverse incentives come to be, what to watch for, and how to better align corporate incentives and performance management to improve fraud prevention

You Will Learn How To:

  • Identify the unanticipated consequences of performance incentives that don't clearly align with corporate ethics and integrity principles
  • Determine the impact of corporate ethical culture as an internal control that can influence employee behavior
  • Compare recent fraud case studies where perverse incentives and unrealistic performance expectations contributed to fraudulent behavior with significant consequences for the company

efeldman headshot
Eric R. Feldman, CFE, CIG, CCEP-I

Senior Vice President and Managing Director, Corporate Ethics and Compliance Programs, Affiliated Monitors, Inc.
ACFE Regent

Eric Feldman, CFE, CIG, CCEP-I, Senior Vice President and Managing Director, Corporate Ethics and Compliance Programs, joined Affiliated Monitors after retiring from the Central Intelligence Agency (CIA) in 2011. Feldman had a distinguished 32-year career with both the Executive and Legislative branches of the federal government. He served in executive positions with the Offices of Inspector General at the Department of Defense, Defense Intelligence Agency, and CIA, and he was the longest serving Inspector General of the National Reconnaissance Office (NRO) from 2003–2009. At the NRO, he presided over a highly successful procurement fraud prevention and detection program, widely recognized by the Department of Justice as a model throughout the federal government.


Feldman was elected to the Board of Regents for the Association of Certified Fraud Examiners (ACFE) for 2019–2020. He is also a member of the teaching faculty of the ACFE and a frequently sought-after speaker and author on the topics of procurement fraud detection and prevention, bribery and corruption, corporate business ethics and compliance, and managing an Inspector General function. He has given presentations at national conferences of the ACFE, the Association of Inspectors General, and the ABA Procurement Fraud Institute, as well as regional fraud and compliance conferences in Europe, Asia, and the Middle East. Feldman is the recipient of the 2018 James A. Baker Speaker of the Year Award presented by ACFE.

Tuesday, June 25 | 1:50–3:05 PM


CPE: 1.5

Level: Intermediate

Recommended Prerequisite: Knowledge and experience conducting workplace investigations

Field of Study: Behavioral Ethics

Unconscious bias is a hot topic in today’s workplace. Learn from two seasoned investigators about how bias can creep into conducting an objective investigation. Join us for an engaging video experience demonstrating the power of unintended bias on our own behaviors and how we can control it through our own self-reflection and awareness. You will learn how to identify unintentional bias in your personal and professional lives, how to take steps to mitigate it and learn more about yourself in the process.

You Will Learn How To:

  • Describe what unconscious bias is
  • Identify the effects of bias on investigations
  • Assess your own biases and how they affect you personally

Roxane MacGillivray, CFE

Director of Enterprise Operations and International Ethics, Lockheed Martin

Roxane MacGillivray is a corporate senior manager with the Lockheed Martin Ethics and Enterprise Assurance organization. She is a thought leader in the field of ethics and compliance with expertise in workplace investigations and a background in equal employment, affirmative action and commercial litigation. In her current role, she conducts enterprise-wide ethics investigations and is responsible for producing innovative ethics officer training. MacGillivray has been a national speaker on ethics, investigative techniques and employee training. She holds a Bachelor of Arts degree in Legal Studies from the University of Central Florida.


Wendy Evans, CFE, CCEP

Senior Corporate Investigator, Corporate Ethics, Lockheed Martin

Wendy Evans is a corporate senior manager with the Lockheed Martin Ethics and Enterprise Assurance organization. Her career began in law enforcement, including service as an FBI agent (white-collar crime and counterintelligence assignments) and police officer. Evans is a Certified Fraud Examiner (CFE) and member of the Association of Certified Fraud Examiners. She is also a Certified Compliance and Ethics Professional (CCEP) with the Society of Corporate Ethics and Compliance. Evans is a member of the Ethics and Compliance Initiative (ECI), as well as other professional organizations. She has been a featured national speaker on ethics, compliance, security and investigative topics. Evans holds a Bachelor of Arts degree in Government Studies and Communications (Broadcasting) from Western Kentucky University.

Tuesday, June 25 | 1:50–3:05 PM


CPE: 1.5

Level: Intermediate

Recommended Prerequisite:Working knowledge of various corruption risk areas within domestic and international procurement systems; solid understanding of the fraud schemes that are targeting today's contracting processes

Field of Study: Specialized Knowledge

Increasing the integrity and transparency of global procurement systems is an ongoing effort of nearly all organizations and of international development investors. Each have recognized that increasing the effective use of public and private funds for procuring goods and services requires the existence of an adequate national procurement system that meets international standards and operates with a commitment to integrity free from corruption and fraud. Under the auspices of the World Bank and Organization for Economic Co-Operations and Development (OECD), a set of standards has been developed that provides guidance for enhancing integrity within procurement systems and the results they produce. Also helping to promote integrity within global procurement systems is the United Nations Convention against Corruption (UNCAC), specifically within Article 9(1) that calls for “transparency, competition and objective criteria in decision-making” for all procurement.


This session will introduce you to various global standards to heighten awareness of the responsibility for having integrity within your organization’s procurement systems, tools available to assess the integrity of your organization’s procurement systems, and high-risk areas and elements of public procurement systems.

You Will Learn How To:

  • Compare international standards for implementing a sound procurement system to promote procurement integrity
  • Identify key corruption and fraud risk areas in public contracting and how to reduce your procurement system’s vulnerabilities to them
  • Evaluate expectations of international investment banks regarding the core principles of integrity, transparency and fairness in procuring goods and services

Tom Caulfield, CFE, CIG, CIGI

Chief Operating Officer, Procurement Integrity Consulting Services

Tom Caulfield has more than 40 years of combined government and public service, including the U.S. Marine Corps, the U.S. Air Force, the National Reconnaissance Office, the Central Intelligence Agency, and the Counsel of Inspectors General. He ended his government service when he retired in 2015 as the Executive Director for the CIGIE Training Institute. During his government service, his assignments included a full range of responsibilities at both the senior executive and program management levels in law enforcement, criminal investigations, anti-fraud strategies, white-collar crime investigations, polygraph, counterintelligence, internal oversight, and professional development and training. Today, Tom is the COO of Procurement Integrity Consulting Services, LLC, a company specializing in developing, assessing, and structuring strategies to assure contracting integrity and anti-corruption both domestically and internationally.

Tuesday, June 25 | 1:50–3:05 PM


CPE: 1.5

Level: Intermediate

Recommended Prerequisites: Experience in investigations, audit or accounting

Field of Study: Specialized Knowledge

In September 2015 the external auditor of the City of South Mountain suspended its audit and refused to issue a report due to irregularities involving two city contractors. The matter was referred to a fraud examiner to resolve the issues identified by the external auditor.

This session presents inside information regarding techniques and approaches employed in the fraud examination of two government contractors, for a small municipality in Southern California. Detailed analysis and explanations will give deep insight into the forensic examination, approach and presentation. In addition, this session will address the format and content of the forensic report and other communications with city management and counsel. Legal aspects and evidentiary requirements for forensic audits will be discussed, as will defenses and counterattacks to forensic findings and professional opinions.

You Will Learn How To:

  • Identify challenges and pitfalls when dealing with government clients
  • Recognize specific procedures for forensic analysis and presentation in government engagements
  • Assess legal issues and evidentiary benchmarks for government engagements
  • Compare challenges and defenses to forensic evidence and professional findings in government engagements

David Wall, J.D., CFE, CPA

Principal, CliftonLarsonAllen LLP

David Wall has been employed in the areas of financial investigation and fraud examination in Southern California for more than 25 years. Wall is a fraud specialist, with credentials as a certified public accountant, Certified Fraud Examiner and licensed attorney.


Wall is a principal in the forensics practice of CliftonLarsonAllen LLP, a top-ten public accounting firm with offices nationwide. Wall leads forensic investigations in governmental entities, nonprofit organizations and middle-market corporations. He represents a number of prosecutorial offices, including the Riverside County District Attorney, and works on behalf of private litigants in state and federal litigation involving fraud, embezzlement, breach of fiduciary duty, fraudulent transfer and similar claims.


His specialties include the acquisition, reconstruction and analysis of financial records, and the presentation of observations and opinions to judges and juries.

Tuesday, June 25 | 1:50–3:05 PM


CPE: 1.5

Level: Overview

Recommended Prerequisites: None

Field of Study: Behavioral Ethics

One of the most sought-after soft skills for leaders is influential and persuasive intelligence. It’s a sign of leadership presence and takes emotional intelligence to the next level. The application of influential and persuasive intelligence is also a weapon in the fraudster’s arsenal of deceit and deception. This session will examine how influential and persuasive intelligence is a power-engagement tool in the hands of the presence-driven leader, as well as the con artist. The session will also explore the areas that play into the persuasive charm of the scammer.

You Will Learn How To:

  • Recognize how our brains make us complicit in succumbing to fraud/scams
  • Examine how using strong narratives pull us into compliance with requests from leaders and con artists
  • Describe how social networks are both protective and exploitative environments
  • Recognize how connections between and among family, friends, and acquaintances in social networks influence financial decisions
  • Apply elements of various “fraud susceptibility” indices as fraud victim predictors
  • Recognize weapons of deceit used by fraudsters that play to human frailties

Donn LeVie Jr., CFE

Position & Influence Strategist, Brand Leverage Catalyst, Donn LeVie Jr. STRATEGIES

Donn LeVie Jr, CFE, is a leadership positioning and influence strategist, professional speaker and the author of two award-winning books on strategies for influencing decision makers and positioning professional expertise and branded value. His career has spanned nearly three decades in management and leadership positions for Fortune 100 companies (Phillips Petroleum, Motorola, Intel Corp.), government service (NOAA) and academia (University of Houston Downtown College). LeVie has been a presenter and strategist at the ACFE Global Fraud Conference every year since 2010 and is a contributing staff writer for Fraud Magazine. He can be reached at donn@donnleviejrstrategies.com or donnleviejrstrategies.com.

Tuesday, June 25 | 1:50–3:05 PM


CPE: 1.5

Level: Basic

Recommended Prerequisites: This session is designed to review material required to pass the CFE Exam. Independent study with the CFE Exam Prep Course prior to attendance is strongly recommended.

Field of Study: Specialized Knowledge, Accounting

This session will cover the following topics:

  • Accounting concepts
  • Financial statement fraud
  • Asset misappropriation: fraudulent disbursements
  • Payment fraud
  • Asset misappropriation: inventory and other assets
  • Financial institution fraud
  • Health care fraud
  • Insurance fraud

You Will Learn How To:

  • Recognize common fraud schemes that affect individuals and organizations around the world
  • Identify red flags of common white-collar crimes
  • Apply the core accounting concepts upon which the CFE credential is built

Jeremy Clopton, CFE, CPA, ACDA, CIDA

Director, Upstream Academy

Jeremy Clopton, Director at Upstream Academy, gained his real-world experience from his work with one of the top accounting and consulting firms in the country, where he led the firm-wide Big Data and Analytics and Digital Forensics practices. During his 12 years there, Clopton gained extensive experience in data analytics, fraud prevention and business intelligence, but his real passion was going beyond providing the services clients asked for — to help them determine what they needed for future success. Before he was recruited by Upstream, Clopton launched his own consulting company focused on developing more successful cultures by asking better (more strategic) questions. He created the SQ Method, a framework designed to help firms overcome challenges and more successfully adopt new technology, analyze and utilize data, encourage innovation, and drive employee engagement. A dynamic and insightful presenter, Clopton speaks both in the U.S. and abroad at industry events and is a faculty member for the Association of Certified Fraud Examiners. His dedication to not just meeting, but exceeding, client expectations makes him a favorite for participants.

3:35-4:50 PM

Tuesday, June 25 | 3:35-4:50 PM


CPE Credit: 1.5

Level: Basic

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

This session will focus on white-collar crime, cyberfraud and how money laundering is used to hide the illegally gotten gains. It will begin with a primer of money laundering, AML laws, methods and the assessment of high-risk locales. You will also explore the details of several fraud cases, including the various ways money was laundered in each one.

You Will Learn How To:

  • Determine what money laundering is and how it works, including KYC and CDD requirements for banks and money-service businesses
  • Identify AML laws and how fraudsters can be prosecuted
  • Ascertain how to perform a risk assessment of countries that have lax AML laws and could be targets for dirty money
  • Recognize how money laundering is used in fraud cases
Dan Ramey, CFE, CPA, CFF, CVA

President, Houston Financial Forensics, LLC

Speaker bio coming soon.

Tuesday, June 25 | 3:35–4:50 PM


CPE: 1.5

Level: Intermediate

Recommended Prerequisites:

  • Knowledge of and experience with the fundamentals of the investigative process from initial intake to disposition and remediation
  • Basic understanding of IT systems and processes within your organization

Field of Study: Specialized Knowledge

Are you leveraging the tools and techniques available to detect and deter fraud in your organization? Detection of fraud markers early in the scheme lifecycle reduces the financial impact on an organization and fuels more efficient investigations.


Fraudsters are using technology to advance their schemes. As fraud fighters we must advance our techniques while not ignoring old-fashioned investigative work such as interviewing and human intelligence. This session will explore the practical application of artificial intelligence (AI) and other emerging technologies, such as drones. It will discuss case studies where AI has been leveraged to detect fraud previously not identified. You will leave this session with a better understanding of practical ways to implement advanced fraud detection within your organization.

You Will Learn How To:

  • Recognize the full spectrum of fraud detection tools and techniques
  • Ascertain how advanced technology is used to identify fraud markers
  • Determine emerging practices to increase the efficiency of your organization's fraud detection capabilities

jhurlimann headshot
John Hurlimann, CFE

Global Intelligence and Anti-Fraud Manager, Intel Corporation

John Hurlimann is the corporate intelligence and anti-fraud manager for Intel’s Corporate Security organization. He is a 26-year veteran of Intel. He is also a Certified Fraud Examiner with 15 years' experience in global investigations. Hurlimann leads the anti-fraud efforts at Intel leveraging the latest technology and techniques to identify and investigate fraud.

Hurlimann has extensive experience in investigating fraud, conflict of interest and kickback schemes, as well as specialized expertise in forensics and data analytics throughout Europe, Asia, and the Americas. He advanced through various technical and engineering roles at Intel before progressing into investigations. He frequently speaks on the topics of ethics, investigations and conflict of interest.

Tuesday, June 25 | 3:35–4:50 PM


CPE: 1.5

Level: Overview

Recommended Prerequisites: None

Field of Study: Specialized Knowledge

Building an effective fraud investigation program can be a daunting task for any organization. Funding, structure, personnel and leadership support are all challenging, especially when a company has yet to recognize the benefits that such a program has on its cost of operations. In this panel discussion, you will hear from anti-fraud experts at a range of companies who have successfully designed, implemented and maintained corporate fraud investigation programs. This panel will provide a strategy for creating a proactive anti-fraud program centered on compliance, deterrence and recovery. It will also provide insight into building a program from scratch or improving an existing program.

You Will Learn How To:

  • Justify to leadership the value of a fraud investigation program
  • Apply good-faith investigations to increase recoveries and enhance your anti-fraud program
  • Effectively operate in a matrix with investigators, auditors, analysts and operational colleagues

llane headshot
Leah D. Lane, CFE

Global Investigations Director, Texas Instruments, Inc.

Leah Lane has more than 20 years of combined public and private sector investigations and fraud examination experience. During her career, she has managed, worked and assisted in hundreds of investigations globally, involving allegations of Foreign Corrupt Practices Act violations, internal and external fraud, and employee misconduct.

Lane is currently the global investigations director at Texas Instruments, Inc. (TI), where she manages a group of investigators with global responsibility for investigations within TI. She is also responsible for fraud awareness campaigns.

Before joining Texas Instruments, Lane served as the audit fraud manager at JCPenney and as a security manager for the Americas at HP/EDS. At these positions, she was responsible for investigating and managing complex financial fraud and computer forensic matters. She began her investigative career as a special agent in the U.S. Customs Service, a position she held for more than seven years.

Tuesday, June 25 | 3:35-4:50 PM


CPE Credit: 1.5

Level: Basic

Recommended Prerequisite: None

Field of Study: Communications and Marketing

The fraud report represents the end result of an investigation that likely involved weeks of reviews, evaluations, analyses, interviews and discussions. It must be flexible enough to communicate complex information to various levels of people, while also being able to withstand judicial and attorney scrutiny. An excellent investigation might not withstand a poorly written fraud report. Quality fraud reports do not just happen. They require thought and effort. A well-written fraud report adds value by providing, among other things, information that is accurate, objective, relevant, clear, concise and complete.

You Will Learn How To:

  • Apply the ACFE Code of Professional Standards to your reports
  • Categorize the various elements of an effective fraud report
  • Assess and implement other report enhancements
jkeith headshot
Jonnie Keith, CFE, CIA, CGAP

President, JonSherr Enterprises

Jonnie Keith has been in auditing for more than 40 years. He retired in 2012 as the Assistant General Manager of Internal Audit with the Metropolitan Atlanta Rapid Transit Authority (MARTA). He served in that capacity for over 10 years and was responsible for administering the overall audit activities. He was also responsible for the review and approval of all internal audit correspondence including audit reports, executive summaries, and internal and external correspondence.

Tuesday, June 25 | 3:35–4:50 PM


CPE: 1.5

Level: Advanced

Recommended Prerequisites: Knowledge and experience with the fundamentals of blockchain, cryptography, hashing, and cryptocurrency

Field of Study: Specialized Knowledge

Distributed ledger technology, such as blockchain, presents unique investigative challenges. This session will cover key concepts such as distributed ledger technology, hashing, cryptography, blockchain transaction sequencing and forensics, distributed applications (dApps) and smart contracts, wallets and addresses, ways of transacting to include use of the various types of digital currency exchanges, privacy and stable coins, ICOs/STOs, investigative challenges, and much more.

You Will Learn How To:

  • Identify distributed ledger technology (DLT) and more about what it really is
  • Recognize the fundamental interaction of the cryptographic key pair (private and public keys) and hashing in a DLT transaction
  • Compare the different types of blockchains and the different types of consensus protocols
  • Discern the concept of blockchain forensics and investigative challenges
  • Ascertain the difference between virtual currency and cryptocurrency as well as the difference between crypto-coins and crypto-tokens

dutzke headshot
Dr. David Utzke CFE, CFI, CCE, CBE

Senior Agent, U.S. Government

Dr. David Utzke has a lifelong learning educational philosophy which includes advanced degrees in computer science/programming, forensic accounting, international finance, global macro-economics and cryptoeconomics with 25 years of experience in cryptocurrency technology. Utzke’s interest in cryptocurrencies began in 1990 with the introduction of the first centralized cryptocurrency called Digicash. In 2009, with the introduction of Distributed Ledger Technology (DLT), Utzke began the development of open-source blockchain forensic investigative techniques now used in his work as an agent with the U.S. government. He has led cryptocurrency initiatives involving several hundred cryptocurrency cases over the past five years, major enforcement actions, and trains and supports field agents in ongoing investigations. Utzke also continues to develop his computer coding skills in Solidity used in 2nd Gen DLT SCS (Smart Contract Scripting) and dApps (distributed applications) platforms.

Tuesday, June 25 | 3:35–4:50 PM


CPE Credit: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Auditing

The earliest red flags of a fraud are often the result of a company culture that has trended in a negative direction. This makes it imperative that an objective assessment of company culture be conducted and reported to senior management and the board. In this session, you will learn how to identify red flags related to culture, and tools and techniques to gather objective evidence of cultural improprieties.

You Will Learn How To:

  • Analyze fundamentals of conducting and reporting a cultural assessment
  • Identify cross-divisional areas with cultural red flags
  • Compare tools and techniques to identify cultural improprieties
  • Assess audit ratings of company culture
  • Present results to senior management and the board
Mariam Afzal, CFE, CPA

Manager, Internal Audit, United Airlines

Mariam Afzal, CFE, CPA, has more than eight years of experience in internal audit, which includes entity-wide strategic initiatives relating to anti-fraud and anti-corruption. She currently works for United Airlines where she leads the annual fraud risk assessment, manages the fraud risk register, partners with HR and Corporate Security on fraud investigations and culture audits, as well as collaborates with ethics and compliance for the whistleblower hotline. Additionally, Afzal leads teams domestically and internationally on operational, financial and compliance audits within the internal audit department.

Tuesday, June 25 | 2:25-4:50 PM


CPE Credit: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

In this roundtable session, you will meet with your peers and discuss the use of anti-fraud technology in your organizations. The session will be limited to 100 attendees, on a first-come, first-served basis, to allow for engagement and interaction. A facilitator will guide you through discussion questions, but the primary lessons will come from sharing experiences and best practices with your peers.

You Will Learn How To:

  • Identify challenges in implementing technology
  • Benchmark your use of anti-fraud technology with that of your peers
  • Discuss shared and unique experiences with other participants
James D. Ruotolo, CFE

Sr. Director, Products and Marketing for Fraud and Security Intelligence, SAS

James Ruotolo is the Director of Industry consulting with SAS where he helps financial services companies deploy analytics for AML, Fraud, Risk and Customer Intelligence. Previously, he served as the Director of Products and Marketing for Fraud and Security Intelligence solutions at SAS. In this role, he was responsible for leading product management, product marketing and customer programs for the global fraud and security intelligence solution portfolio.


Before joining SAS, he was the Director of SIU Strategic Operations for the Special Investigations Unit (SIU) for The Hartford Financial Services Group, where he built an analytical and intelligence operation within the SIU.


He is a Certified Fraud Examiner and an internationally recognized public speaker with a Bachelor’s degree in Criminal Justice and a Master’s degree in Economic Crime Management.

Tuesday, June 25 | 3:35-4:50 PM


CPE: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

Digital forensics has developed over the years to provide fraud examiners with tremendous capabilities to identify, preserve and examine digital evidence. This session will help you understand the fundamental process and potential results that a forensic analysis can give you, but we’ll also discuss the challenges of new technologies and the changes that will be needed to ensure successful fraud examinations in the future.


Walt Manning, CFE

President, Techno-Crime Institute

Walt Manning is an investigations futurist who researches how technology transforms crime, and the need for governments, legal systems, law enforcement and investigations to evolve to meet these challenges. Manning started his career working for the Dallas Police Department before going on to manage e-discovery and digital forensic services for major criminal and civil litigation matters worldwide.


Manning is an internationally recognized speaker and author, known for his ability to identify current and impending technology risks and advising clients and audiences on ways to minimize this risk. He has published many articles and has been widely quoted in the media as an expert on technology, crime and investigations.


Manning’s 40 years of experience in law enforcement, investigations and management has given him a unique perspective on visualizing the future of investigations, security, and new trends in techno-crimes.

Tuesday, June 25 | 3:35–4:50 PM


CPE: 1.5

Level: Intermediate

Recommended Prerequisites: A basic understanding of the federal grants process

Field of Study: Specialized Knowledge

U.S. government grants annually provide more than $700 billion that impacts every aspect of society. However, these dollars carry with them traditional fraud risks, including conflicts of interest, material false statements and theft, as well as unique issues such as commingling and research misconduct. To compound these challenges, the outcome of many grant awards is hard to measure and the oversight mechanisms common in contracts are often not present, or at times less effective, in a typical grant-funded program.


This session will explore traditional grant fraud schemes, risk factors that affect grant-funded programs, recent regulatory changes and emerging trends and risks related to the oversight of grant dollars.

You Will Learn How To:

  • Identify the three traditional fraud schemes, as well as other unique issues, that can impact grant-funded programs
  • Distinguish the fraud risk factors that affect grant-funded programs
  • Compare recent regulatory changes that will both assist and potentially hamper the prevention, detection and remediation of grant fraud
  • Recognize emerging trends and new areas of emphasis related to the oversight of grant dollars

kdieffenbach headshot
Kenneth Dieffenbach, CFE

Assistant Special Agent in Charge, U.S. Department of Justice OIG

Since 2003, Ken Dieffenbach has served as a special agent with the U.S. Department of Justice, Office of the Inspector General, Fraud Detection Office located in Arlington, Virginia. He has led dozens of complex and sensitive fraud and internal misconduct investigations and has made well over 100 presentations about fraud to a wide variety of audiences. He is an adjunct instructor at the Federal Law Enforcement Training Center, coordinates DOJ’s Fraud Task Force’s Grant Fraud Working Group, and has had articles published in the ACFE’s Fraud Magazine and the Non-Profit Times newspaper. In his current role, Dieffenbach is an Assistant Special Agent in Charge managing a nationwide team focused on contract fraud and proactive data analytics and is the Deputy Director of the Office of Data Analytics. His work has been recognized with numerous awards including the Attorney General’s Distinguished Service Award.

Prior to his current position Dieffenbach served over six years as an active duty officer special agent with the United States Air Force Office of Special Investigations. He received his undergraduate degree in business and accounting from the Citadel in Charleston, South Carolina, and his graduate degree in criminal justice from the University of Alabama at Birmingham.

Tuesday, June 25 | 3:35–4:50 PM

CPE: 1.5

Level: Basic

Recommended Prerequisites: None

Field of Study: Behavioral Ethics

It is important that public oversight organizations, such as Offices of Inspectors General, Internal Audit, and similar agencies, remain impartial to have the confidence and credibility of the public, elected leaders and the media. Conducting fraud examinations while being apolitical and objective can be challenging. This session will provide helpful suggestions to navigate the rough seas of state and local politics. It will discuss how to maintain professional relationships with elected and appointed leaders, maintain transparency with the media and public, and protect your credibility.

You Will Learn How To:

  • Identify how to guard credibility — the most important asset an oversight agency has
  • Compare methods to avoid the perception of political biases and partiality
  • Distinguish ways to engage with elected leaders and the media while remaining apolitical and objective
  • Recognize the value of transparency and its benefits, to include visibility and awareness, while protecting credibility

dharper headshot
David Harper, CFE, CIG, CFCI

Inspector General, Florida Department of Financial Services

David T. Harper is the Inspector General for the Florida Department of Financial Services, where he leads a team of investigators and auditors in providing oversight services to promote accountability, transparency and improved efficiencies, while deterring, detecting and investigating fraud, waste, abuse and misconduct. Previously he was the appointed Inspector General for the City of Albuquerque, where he led a similar mission to protect the public trust.

Harper retired in 2016 from a 40-year Air Force career with combined active duty and civil service. He spent 35 years as a Special Agent for the Air Force Office of Special Investigations (AFOSI), where he primarily oversaw and investigated allegations of fraud and financial crime. He had a variety of assignments in counterintelligence and fraud investigative positions in Los Angeles, New York City, Sacramento, Munich and Berlin, Germany. He was the Special Agent-in-Charge for the AFOSI Boston area office and concluded his federal career as the Chief of Economic Crime, at HQ AFOSI, Quantico, Virginia.

Tuesday, June 25 | 3:35-4:50 PM


CPE: 1.5

Level: Basic

Recommended Prerequisite: None

Field of Study: Behavioral Ethics

In this session, industry experts will discuss the evolution of financial crime and how financial institutions can embrace innovative approaches to proactively prevent fraud and combat crime-ring activity. Learn how financial institutions can leverage big data, machine-learning technology and 314(b) information sharing for effective fraud prevention. This includes proactive trend identification, reduction in false positive results and collaborative investigations of multi-institutional crime-ring activity.

You Will Learn How To:

  • Identify the limitations and challenges of conventional fraud prevention approaches that rely on limited data sets and approaches in today’s increasingly complex financial crime landscape
  • Assess how financial institutions can leverage big data, machine-learning technology, and 314(b) information sharing to mitigate losses and prevent fraud
  • Review a real-life crime-ring case, discovering how data and technology played a critical role to enhance detection, strengthen investigations and improve reporting to law enforcement

Scott Peddle

Product Manager - Payments Fraud, Verafin

Over several years at Verafin, Scott Peddle has excelled in a wide range of roles. This includes time as the leader of Verafin’s emerging threats research team and payments (wire & ACH) analytics team. These experiences have helped him develop an intimate knowledge of the challenges, and unique needs, faced by financial crime detection and BSA/AML compliance professionals at financial institutions across the country. He has been focused on the use on both AI and machine learning related technologies to help improve a financial institution’s effectiveness and efficiency in fighting financial crime.

Tuesday, June 25 | 3:35–4:50 PM


CPE: 1.5

Level: Basic

Recommended Prerequisites: None

Field of Study: Information Technology

Digital evidence has become an essential part of every legal matter, whether it be a criminal, civil or internal investigation. Using a case study, this session will demonstrate the methods used to determine that an email submitted as evidence in federal court had been forged. The methods demonstrated in this case study may be reliably referenced when reviewing any questionable digital documents, without the need for specialized software. This presentation will demonstrate the probative value of digital forensics in fraud investigations.

You Will Learn How To:

  • Recognize the value of digital forensics in fraud cases
  • Identify methods to examine digital files and metadata
  • Determine how to make and report on evidence-based conclusions
  • Recall a practical example of how these methods were applied

mdanner headshot
Matt Danner, CFE, CFCE

Senior Forensic Examiner, Flashback Data LLC

Matt Danner started his career in 2008 as a fraud and public integrity investigator in the special investigation units of the Texas Workforce Commission and the Texas State Auditor’s Office. During this time, Danner conducted hundreds of investigations related to complex financial schemes and coordinated investigations with federal law enforcement.

As senior forensic examiner, Danner works with clients including law enforcement, criminal and civil attorneys, prosecutors and defense counsels, corporations, and private citizens. His areas of examination include intellectual property theft, criminal defense, homicide, child exploitation, vehicular accidents, fraud and family law. Danner has testified as a digital forensics expert in state, federal and military court, and he frequently conducts presentations to government, legal and educational organizations.

Tuesday, June 25 | 3:35–4:50 PM


CPE: 1.5

Level: Overview

Recommended Prerequisites: None

Field of Study: Personal Development

You devote significant time and money to acquiring and improving your technical skills. But along the way, competent fraud examiners like you often neglect to acquire the necessary skills to sell yourself and your ideas to all those you come across. As technically capable as you are, you can achieve much more by learning how to motivate people to do what you want them to do. This session will discuss simple techniques you can easily adopt into your daily routine that will give you positive results immediately. Soon, these new techniques will become habits that will help you achieve what we all want: to be known, respected, trusted, and a true influencer.

You Will Learn How To:

  • Apply these 8 musts to winning people over
  • Demonstrate confidence while working a room
  • Create lifelong clients from prospects
  • Design best practices to hire, motivate and retain high performers

tgolden headshot
Tom Golden, CFE, CPA

Partner (retired), PwC

Tom Golden is a retired PricewaterhouseCoopers (PwC) Partner and former Partner-In-Charge of the Chicago Investigation & Forensic Services practice. Golden has a national reputation in forensic accounting and fraud investigations. He has been quoted in a number of major world-wide publications including Journal of Accountancy, USA Today, The Financial Times, Business Week and Chicago Tribune.


Golden was the lead author of the award-winning Wiley book A Guide to Forensic Accounting Investigation. He is a CFE and CPA, former chairman of the Board of Regents for the ACFE and is a Regent Emeritus. Golden was also an adjunct professor at DePaul University, Chicago after he developed and taught the school’s first forensic accounting graduate course in 2002.


He appeared in the 2017 documentary All the Queen’s Horses, a film about the largest municipal fraud in our nation’s history. In 2018, Golden turned his attention to the literary world with the publication of his first novel, Sunday Night Fears. He continues to lead high-profile financial crime investigations and is a frequent speaker, especially for ACFE Chapters.

Tuesday, June 25 | 3:35–4:50 PM


CPE: 1.5

Level: Basic

Recommended Prerequisites: This session is designed to review material required to pass the CFE Exam. Independent study with the CFE Exam Prep Course prior to attendance is strongly recommended.

Field of Study: Specialized Knowledge, Accounting

This session will cover the following topics:

  • Asset misappropriation: cash receipts
  • Theft of data and intellectual property
  • Consumer fraud
  • Identity theft
  • Computer and internet fraud
  • Bribery and corruption
  • Contract and procurement fraud

You Will Learn How To:

  • Recognize common fraud schemes that affect individuals and organizations around the world
  • Identify red flags of common white-collar crimes/li>
  • Apply the core accounting concepts upon which the CFE credential is built

gill headshot
John D. Gill, J.D., CFE

Vice President - Education, Association of Certified Fraud Examiners

John Gill is the Vice President – Education at the Association of Certified Fraud Examiners. He oversees the production and development of all the books, manuals, self-study courses and seminar and conference materials produced by the ACFE. He serves on the faculty of the ACFE and is a co-instructor of the CFE Exam Review Course. He is a co-author of the Fraud Examiners Manual and serves as the editor-in-chief for the CFE Exam and the CFE Exam Prep Course. He is also a contributing author to Fraud Magazine.

5:00-6:00 PM

Tuesday, June 25 | 5:00-6:00 p.m.


Build your professional and social circle while you unwind from the day during the Attendee Networking Reception. This event takes place following Tuesday's educational sessions and is complimentary for all attendees.

nw-1 nw-2
Wednesday
7:00-7:50 AM

Wednesday, June 26 | 7:00–7:50 AM


CPE: 1

Level: Intermediate

Recommended Prerequisite: Experience leading teams and navigating the related challenges in the workplace

Field of Study: Behavioral Ethics

Intelligence quotient (IQ) is useful in academia, but what about in our work environments? Is there something missing that IQ doesn’t address? Emotional intelligence (EI) allows us to identify, assess and manage our own emotions, as well as helps us to understand those of others. This session will help you recognize and understand emotions while guiding your actions.

You Will Learn How To:

  • Identify the concepts of the intentional leader
  • Evaluate EI and its usefulness in the workplace
  • Recognize how emotions affect us and our teams
  • Identify ways to improve your emotional quotient (EQ)

rbusch headshot
Raoul Ménès, CFE, FCPA, FCMA, FCMC

Principal, Ménès Consulting Group

Raoul Ménès is the founder and principal of Ménès Consulting Group, a management consultancy focused on risk-based internal audits (IA), governance and regulatory compliance, enterprise risk management (ERM), technology consulting, General Data Protection Regulation (GDPR) assessment and compliance, fraud risk management (FRM)/forensic accountancy, data analytics, anti-money laundering (AML) compliance, business transformation, ethics and corporate training.


For more than 25 years, he has helped organizations in the public, private and not-for-profit sectors optimize operational and financial controls and restructure accounting, finance and internal audit departments. In addition, he has extensive experience in fraud risk assessment and detection, interviewing and interrogation, investigation and audit and employee theft examinations.


He is the author of numerous thought papers and a global speaker on IA, ERM, GDPR, FRM, ethics, governance, regulatory compliance and leadership.


In 2004, he was awarded “Québec CMA of the Year” and in 2016, he was designated Fellow accountant (FCPA, FCMA) and management consultant (FCMC), intended to formally recognize his outstanding achievements in his career.

Wednesday, June 26 | 7:00–7:50 AM


CPE: 1

Level: Basic

Recommended Prerequisite: None

Field of Study: Business Law

In May 2018, the European Union's General Data Protection Regulation (GDPR) took effect and fundamentally changed how multinational companies collect and process personal data. At the same time, data interrogation become an integral component of fraud detection and prevention. This session will discuss how these trends intersect and how the new regulations shape the future of fraud investigations.

You Will Learn How To:

  • Assess the fundamental concepts of GDPR
  • Analyze how the regulations have been implemented and applied globally
  • Determine how the new regulations will influence fraud prevention
  • Compare fraud collection tools and techniques to ensure compliance

Bob Krawczyk, CFE, CPA

Managing Director, Mackinac Partners

Bob Krawczyk heads the Compliance, Fraud and Forensics Practice of Mackinac Partners, a leading restructuring advisory firm that also provides comprehensive business intelligence, due diligence, investigation and corporate security solutions. He has more than 25 years of experience in fraud and forensics, accounting controls and processes, and financial reporting. Krawczyk is a CFE and a CPA who has led numerous investigation engagements including fraudulent financial reporting and the misappropriation of assets.


Recently, Krawczyk led an international whistleblower investigation for a public company that uncovered fraud in several European countries. He also specializes in fraud remediation, the effects of fraud on GAAP accounting and SEC reporting, and the redesign and implementation of a company’s fraud prevention programs.


Prior to joining Mackinac Partners, Krawczyk served as Chief Financial Officer and Chief Accounting Officer of several publicly traded companies. As a Senior Manager at Deloitte he led audit and forensic engagements for clients in numerous industries including financial institutions, manufacturing companies, timeshare operators and real estate developers.

7:30-8:30 AM

Registration and continental breakfast

7:30 AM-12:20 PM

ACFE Bookstore and Technology Lounge open

8:30-9:45AM

Wednesday, June 26 | 8:30–9:45 AM


CPE Credit: 1.5

Level: Intermediate

Recommended Prerequisite: Knowledge of basic money laundering compliance issues

Field of Study: Specialized Knowledge

This session will explore trade-based money laundering (TBML). Although TBML is not as widely understood as other types of money laundering, it might be the most entrenched form of laundering and the one least susceptible to detection and disruption. TBML is insidious and can affect a variety of industries, from freight forwarders to gold brokers to financial institutions involved in trade finance.


This session will provide you the tools necessary to spot behaviors or transactions that could be red flags for TBML. The session will also review how TBML is distinguished from other types of money laundering. Several case studies will be examined and indicators will be extracted from those cases. Finally, the session will cover how technologies such as data analytics, artificial intelligence and blockchain might aid or disrupt those intending to shield illicit behaviors from detection.

You Will Learn How To:

  • Identify the red flags of trade-based money laundering
  • Examine how new technologies might aid or disrupt those intending to shield illicit financial flows from detection and disruption
  • Assess a trade-based money laundering case study
David Long, J.D., CFE, CAMS

Principal, NCFPS Digital Currency AML Consultants
and Associate Professor, Criminal Justice and Legal Studies, Brandman University

David M. Long is an Associate Professor of Criminal Justice and Legal Studies at Brandman University in Irvine, CA. He is also principal of NCFPS-Digital Currency AML Consultants. Long is a graduate of the University of Pennsylvania Law School and an experienced criminal investigator and licensed attorney. He is also a highly regarded consultant, trainer and speaker on money laundering and criminal finance in technology, real estate and trade. During nearly a decade of service as a federal agent with the Office of Labor Racketeering, he investigated cases related to the influence of organized crime in labor unions and pension funds. His cases centered on complex financial investigations involving money laundering, the Racketeer Influenced and Corrupt Organizations Act (RICO), public corruption, extortion, bribery and witness tampering. Long served with distinction as a special agent and received several awards for his service.

Wednesday, June 26 | 8:30–9:45 AM


CPE Credit: 1.5

Level: Basic

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

Since the 18th century, businesses have used loyalty programs to retain their customer bases. Marketing teams have learned how to leverage the customer data that can be garnered from tracking customer behavior. Hackers also see this data as useful, and there is a market for that data on the dark web. Point brokers gain access to loyalty program accounts by paying participants to sell their points — a tactic that constitutes a violation of the terms and conditions of the program in most cases. Who's breaking the contract? Is a crime being committed? Loyalty program fraud is often associated with other types of fraud such as selling stolen goods, human trafficking and money laundering. In this session, you'll also learn to spot loyalty fraud and establish a monitoring program using data analytics.

You Will Learn How To:

  • Recall the history of creating brand loyalty
  • Identify prevailing loyalty fraud methods and related prevention techniques
  • Determine ways to use data analysis for program monitoring and violation discovery
Samantha Weeks, CFE

Fraud and Risk Analysis Manager, RSA Security

Samantha Weeks has been a champion of internal controls, risk management and fraud detection for 15 years of her career and has been a Certified Fraud Examiner (CFE) since 2013. Her professional experience has made her a trusted advisor in fraud detection, prevention and quantitative risk analysis. Her industry experience includes airline, hotel, construction and retail. Weeks currently serves as fraud and risk analysis manager for RSA Security (Dell).


Weeks has conducted investigations and process reviews related to executive expenses, bribes and kickbacks, invoice payment processes, third-party performance and billing, contract compliance, fixed assets, cash reconciliations, digital currencies, trademark infringement and employee theft. She has provided support to law enforcement organizations such as the U.S. Secret Service, the Federal Bureau of Investigations and the U.S. Department of Homeland Security.

Wednesday, June 26 | 8:30–9:45 AM


CPE Credit: 1.5

Level: Intermediate

Recommended Prerequisite: Experience working on large, complex and/or cross-border investigations

Field of Study: Specialized Knowledge

Investigations are changing in multiple areas. Technology-specific investigative tools are more prevalent in the market, and access to information has greatly increased. The speed of leaks — real or misinformation into social media — can put an investigation at risk. Finally, the number of capable professionals in the investigative field has greatly increased with the growth of organizations such as the ACFE.


Yet, many investigators go about investigations in the same manner and with the same tools and teams they used a decade ago. In addition, organizations face challenges in evolving their investigative approach, including the use of tools, teams and vendors. With a continued increase in whistleblower activity and rising costs in the investigative field, now is the time to reevaluate how we perform investigations, who we involve and the mechanisms we use. This session will discuss the latest techniques to drive effectiveness in investigations and explore how efficiency is defined among the group.

You Will Learn How To:

  • Apply accounting data versus email to drive the investigation
  • Assess the benefits of technology-assisted review for electronic documents
  • Manage a team of multiple professionals during an investigation (e.g., attorneys, accountants, forensic technologists, contract reviewers, other experts)
  • Analyze organizational obstacles to make changes in the investigative process
dtorpey headshot
Dan Torpey

Partner, Assurance Services, EY

Dan Torpey is a CPA and forensic accountant and the U.S. Leader for EY’s Investigation & Compliance practice. He specializes in financial statement investigations and has also served as an expert witness in state, federal and international proceedings.

Wednesday, June 26 | 8:30–9:45 AM


CPE: 1.5

Level: Basic

Recommended Prerequisites: None

Field of Study: Communication and Marketing

This session will show you how to prepare bullet-proof fraud reports to better ensure that police will lay criminal charges. Often the private sector is frustrated with the police due to misunderstandings that lead to cases not proceeding to court. This session will discuss losing trust in the police, prosecutors and the court system. It will include a comprehensive study of strategic and innovative ways to investigate and prosecute financial fraud and how to prepare for a criminal or civil prosecution. The session will also include practical ways to encourage a strong strategic team: police, prosecutors, regulators and the private sector.

You Will Learn How To:

  • Evaluate how to prepare bullet-proof briefs for police
  • Assess current, complex frauds and recognize the need for collaboration among prosecutors, police, corporate investigators, regulators and the private sector
  • Identify methods of preparing and presenting police and court packages

Norman DeBoer, CFE

Police Officer, Waterloo Regional Police Service

Norman DeBoer has been a member of the Waterloo Regional Police Service for the past 29 years and is currently in rural patrol. He was in the major fraud branch for 14 years investigating major frauds. Prior to joining the fraud branch he was a divisional fraud officer and a tactical officer on the emergency response team.

Wednesday, June 26 | 8:30–9:45 AM


CPE Credit: 1.5

Level: Intermediate

Recommended Prerequisite: Knowledge of data analytics tools and techniques for structured and unstructured databases

Field of Study: Specialized Knowledge

Design thinking is a methodology for tackling complex problems that have large degrees of uncertainty. The process involves reframing problems in human-centric ways and adopting a hands-on approach to prototyping and testing solutions. The design-thinking approach is well-suited to designing anti-fraud programs and solutions, and allows teams to quickly understand threats and develop solutions. In this session, you'll learn what design thinking is, how it applies to fraud prevention and detection analytics, and see real-world examples of how it is being employed by organizations to develop impactful analytics.

You Will Learn How To:

  • Assess the design-thinking process
  • Apply design thinking to your own anti-fraud programs
  • Compare how other organizations apply design thinking in their anti-fraud programs
Kirstie Tiernan, CFE

Managing Director, Technology & Business Transformation, Analytics and Automation, BDO

Kirstie Tiernan is a managing director in the technology and business transformation services department in BDO’s Chicago office with more than 15 years of experience providing data analytics, technology consulting and risk management services. A Certified Fraud Examiner and an Oracle Certified Associate, Tiernan assists clients with using data across the organization from multiple sources, locations, systems, languages and functions.

Tiernan is experienced in managing big data analytics projects requiring the collection of entire ERP systems with experience in many accounting systems, including PeopleSoft, SAP and Oracle. Managing a team of database and data analytics experts, she provides clients with the necessary dashboards, statistical models and predictive analytics to turn data into information upon which key business decisions are made. Applying her expertise in artificial intelligence and machine learning, Tiernan regularly works with clients to prevent and detect organizational fraud.

Wednesday, June 26 | 8:30–9:45 AM


CPE Credit: 1.5

Level: Intermediate

Recommended Prerequisite: Knowledge of bribery and corruption risks associated with third-party intermediaries

Field of Study: Auditing

Partner audit programs focus on bribery and corruption risks associated with third-party intermediaries, primarily in the reselling of products and services. In this session, you will learn the best practices of a third-party audit process. It will highlight key elements of the audit program, including anti-bribery considerations when auditing and investigating reselling intermediaries in high-risk countries; follow-up processes for recommendations issued to business partners; and real-life lessons learned. The session will also provide an outlook on how data analytics can help monitor business partners.

You Will Learn How To:

  • Determine key aspects of auditing and investigating third-party business partners
  • Recognize bribery risks in business relationships with third-party intermediaries
  • Compare options of make or buy: using your own auditors versus outsourcing to audit firms
  • Evaluate the use of data analytics for third-party monitoring
Joachim Koopsingraven, CFE, CIA

Head of Partner Audit, SAP America Inc

Joachim Koopsingraven, CFE, CIA, earned business administration degrees from the University of Duisburg-Essen in Germany and Bond University in Australia. He started his career as an internal auditor for the German utility group RWE at their headquarters in Essen, Germany. He later joined the German business software manufacturer SAP, where he worked as an audit expert focusing on internal fraud investigations in their corporate audit department. After transferring to the U.S. more than two years ago, Koopsingraven now works for SAP America in their Newtown Square, Philadelphia location as the head of partner audits in the legal compliance and integrity office. Koopsingraven has been invited to speak at several events, including conferences for the German and U.S. chapters of the Institute of Internal Auditors (IIA), the Economics of Corruption lecture series at the University of Paderborn and an IT forensic conference in the U.S.

Wednesday, June 26 | 8:30–9:45 AM


CPE Credit: 1.5

Level: Intermediate

Recommended Prerequisite: Knowledge of analytics and experience leading teams

Field of Study: Auditing

Organizations will often develop disparate fraud programs and systems without taking a systematic approach to understanding the fraud business needs and developing around those needs. This session will explore how to develop a fraud analytics program from the inception stage to production using industry-accepted best practices. It will review the fraud risk assessment process, the development and ranking of fraud business cases, and the development of those business cases into analytic business problems that can then be solutioned using standard analytics-development best practices.

You Will Learn How To:

  • Recognize the process for developing a fraud analytics program
  • Develop a high-level understanding of risk assessment process
  • Appraise the CRISP-DM process for developing analytic solutions
  • Compare modern software-development techniques to bring a system to production
Deleep Nair, CFE

Senior Analytics Solution Consultant, BAE Systems Applied Intelligence

Deleep Nair, CFE, is a senior analytics solution consultant with BAE Systems Applied Intelligence, where he currently works with insurance and banking clients to determine appropriate fraud analytic solutions for client needs.


Nair is an experienced project manager and data scientist with strong experience leading cross-disciplinary teams in planning and developing end-to-end analytic solutions. He has worked with large government agencies to develop analytic solutions for fraud and contraband detection.


Nair has a strong interest in combining analytics with fraud detection and is a graduate statistician. He holds a master's degree in biostatistics from the University at Albany School of Public Health.

Wednesday, June 26 | 8:30–9:45 AM


CPE: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

In this roundtable session, you will meet with your peers and discuss how cyber intelligence and anti-fraud professionals can collaborate most effectively. The session will be limited to 100 attendees, on a first-come, first-served basis, to allow for maximum engagement and interaction. A facilitator will guide you through discussion questions, but the primary lessons will come from sharing experiences and best practices with your peers.

You Will Learn How To:

  • Identify challenges in anti-fraud and cyber-intelligence professionals face in collaborating and coordinating their efforts
  • Compare best practices for ensuring cyber intelligence and fraud prevention activities complement each other

Amy Boawn, CFE, CAMS, CISM

Senior Associate, Booz Allen Hamilton

Amy Boawn is an Insider Threat Program Design and Implementation Manager and Fraud Fusion Subject Matter Expert for Booz Allen’s Cyber Defense Team. She is responsible for leading and assisting in the strategic oversight of insider threat program design, implementation, operational testing and evaluation. She also collaborates on the deployment of anomaly and user-based behavioral detection tools and develops threat models, use case scenarios and risk indicators. Boawn has over 20 years of financial industry experience, and prior to joining Booz Allen, she was part of a team that developed online fraud controls for a Fortune 100 financial services firm. During her time there, she led multiple projects that included the development of fraud policies and procedures, the design and customization of technology-driven solutions and the development of anti-fraud training programs. She holds multiple industry certifications, including Certified Fraud Examiner (CFE), Certified Anti-Money Laundering Specialist, Certified Information Security Manager and Insider Threat Program Manager (Certification issued by Carnegie Mellon University).

Wednesday, June 26 | 8:30–9:45 AM


CPE: 1.5

Level: Basic

Recommended Prerequisites: None

Field of Study: Specialized Knowledge

This session will provide an overview of third-party risk management programs. It will also examine the three-lines-of-defense model and it’s use in third-party risk management. Finally, this session will address the importance of fraud prevention within the model, common vendor fraud schemes and controls you can implement to prevent these schemes.

You Will Learn How To:

  • Identify the third-party threats that are traditionally overlooked in many organizations
  • Recognize the three-lines-of-defense model and the importance of CFEs in the second line of defense
  • Identify common vendor fraud schemes and effective anti-fraud controls to consider
  • Create an effective vendor inventory to combat fraud and strengthen an organization's third-party risk program

eirving headshot
Emily Irving, CFE, CTPRP

Vice President - Third-Party Risk, BlackRock

Emily Irving is a member of BlackRock's Risk and Quantitative Analysis Group in the Third-Party Risk team. Irving is a seasoned manager and risk professional with more than 19 years of experience managing people and processes and 16 years’ combined experience in risk management and fraud prevention. In her career, Irving has created and implemented enterprise-wide third-party risk management programs for financial industry companies—improving processes and implementing technology to validate the appropriateness of third-party controls and to identify potential risks prior to on-boarding and throughout the life of significant relationships. Irving joined BlackRock in July of 2018. Before taking on her current role, Irving was recruited to design, implement and oversee global programs at both Wellington Management LLC and Pioneer Investments.

TRACK J

11J Honestly Dishonest (Session Full)

Wednesday, June 26 | 8:30–9:45 AM


CPE: 1.5

Level: Overview

Recommended Prerequisites: None

Field of Study: Behavioral Ethics

Why do good people make bad decisions? This ethics session will change your ideas regarding how honest people behave. Using behavioral economics, neuroscience and videos, this interactive session will have you rethinking what you thought you knew about people.

You Will Learn How To:

  • Recognize the importance of tone at the top for any organization
  • Identify inexpensive or free tweaks that might deter fraud
  • Determine how people justify their behavior and look at themselves at the end of the day
  • Recognize that money can be replaced but trust is much harder to regain

kpaxton headshot
Kelly Paxton, CFE

Principal, K Paxton LLC

Kelly Paxton has more than 13 years of law enforcement experience and is a Certified Fraud Examiner, Private Investigator and social media intelligence analyst.

Paxton started her career in law enforcement as a special agent for the U.S. Customs Office of Investigations in 1993. She was recruited by U.S. Customs for her expertise in finance. Paxton worked white-collar fraud, money laundering and narcotics cases. She also was responsible for the district’s undercover operations and financial reporting of these operations. Paxton worked as a contract investigator doing more than 1,000 security background investigations for the Office of Personnel Management and Department of Homeland Security.

Paxton has worked in the public and private sector. Her investigations include embezzlement, conflict of interest, intellectual property, Open Source Intelligence and fraud. She is also the proud owner of Pinkcollarcrime.com, a passion of hers, about embezzlers in the workplace.

Wednesday, June 26 | 8:30–9:45 AM


CPE: 1.5

Level: Intermediate

Recommended Prerequisites:

  • Understanding of what personal identifying information is
  • Understanding of how data flows through an organization

Field of Study: Specialized Knowledge

You are accustomed to finding things out and looking for the weaknesses in a system. Often those weaknesses must be matched to internal controls or regulatory schemes to assess the adequacy of compliance. Whether the commodity under study is money, inventory or data, the principles are the same: get granular, develop a thorough understanding of every part of the system and be prepared to identify how well the commodity in question is secured.

This session will familiarize you with the very different privacy regulatory schemes in the U.S. and the European Union, Privacy Shields, the GDPR, the data lifecycle, and other privacy principles. It will also review the role of the Chief Privacy Officer (CPO), how a CPO interacts with other personnel in the organization and how to survive in a digital privacy world where the rules keep changing and the risks keep growing.

You Will Learn How To:

  • Identify the function of the Chief Privacy Officer
  • Identify how the skills of a CFE are a natural preparation for being a CPO
  • Determine the basics of privacy regulatory schemes in the United States and elsewhere
  • Recall the data lifecycle
  • Recognize how to survive as a CPO

kcitarella headshot
Kenneth Citarella, J.D., CFE

Senior Managing Director and Chief Privacy Officer, Guidepost Solutions LLC

Kenneth C. Citarella is a senior managing director for the investigations and cyber forensics practice. He joined Guidepost Solutions in 2010 as a project manager to investigate fraudulent claims for the Gulf Coast Claims Facility in its administration of the $20 billion BP compensation fund.

Citarella manages several of the integrity monitorship projects Guidepost Solutions performs for the Port Authority of New York and New Jersey and the New Jersey Department of Transportation. Using a team of attorneys, forensic accountants and investigators, Guidepost Solutions monitors all aspects of major public works construction projects to prevent fraud, waste and abuse.

Wednesday, June 26 | 8:30–9:45 AM


CPE: 1.5

Level: Intermediate

Recommended Prerequisites: None

Field of Study: Specialized Knowledge

Through the examination of large-scale laboratory kickback schemes, this session will discuss the Federal Anti-Kickback Statute, methods of investigation using public records and health plan data, and potential case outcomes. The case study involves an investigation of several national laboratories who had allegedly engaged in schemes to increase patient referrals by offering payments to physicians and practitioners on a per-specimen basis for lab tests that may not have been medically necessary. The investigation found evidence that more than 2,000 physicians and practitioners across the country received these alleged improper payments. The investigation also identified other issues in medical records, exposing system-wide risks and leading to potential recoveries.

You Will Learn How To:

  • Compare kickback schemes involving diagnostic laboratories and physicians/practitioners
  • Identify public records and resources for use in health care fraud investigations
  • Identify documentation requirements for laboratory services and common findings
  • Recognize objectives for health care fraud investigations from multiple perspectives (health plan versus law enforcement)
  • Ascertain how to apply investigative findings to system-wide risk

Daniel McManus, M.S., CFE, CPC-A

Senior Investigator, Premera Blue Cross

Daniel McManus is a senior investigator for Premera Blue Cross. McManus has ten years of experience working in investigative and oversight positions in Medicaid, Medicare and commercial health plans. He has led investigations into fraudulent billing, illegal kickbacks, physical abuse, improper prescribing and computer crimes. His cases have resulted in criminal investigations, multiple convictions and regulatory sanctions. McManus is a Certified Fraud Examiner and Certified Professional Coder. He holds bachelor’s degrees in psychology and criminology from the University of Florida and a master’s degree in economic crime management from Utica College.

Wednesday, June 26 | 8:30–9:45 AM


CPE: 1.5

Level: Intermediate

Recommended Prerequisites: Knowledge of fundamental fraud examination techniques

Field of Study: Specialized Knowledge

You have been hired for a defense engagement to verify losses in multiple cases, only to find that incorrect assumptions, insufficient evidence, and mathematical errors were found, all of which could have impacted the lives of suspects in a myriad of ways. When is it appropriate to take a defense case? How does the role of the CFE change, if at all? This session will use actual documents, schedules, and reports from state and local cases, diving into issues discovered including common errors, lack of sufficient evidence, and fact patterns that lead to significantly different outcomes for our clients. How might our discoveries help you shore up your cases — making them even stronger?

You Will Learn How To:

  • Recognize the important role of a CFE in a defense case
  • Identify typical errors or facts of law that should be considered in all fraud engagements
  • Ascertain ethical challenges potentially faced by a CFE

tcouch headshot
Tiffany Couch, CFE, CPA, CFF

CEO/Owner, Acuity Forensics

Tiffany Couch, CFE, CPA/CFF, is principal at Acuity Forensics, a Pacific Northwest forensic accounting firm with a national presence. She has more than 21 years of experience in the field of accounting with the last 14 years focused completely on forensic accounting-related engagements. Her expertise is in matters involving fraud investigation, forensic accounting, contract and regulatory compliance, internal control risk assessment, and complex litigation.

She has provided expertise as a source to The New York Times, NPR, Wall Street Journal, Forbes Magazine, Financier Worldwide Magazine and First Business News. She’s also a regular contributor to Fraud Magazine and the Vancouver Business Journal, and has been interviewed for CNBC, KING 5-TV in Seattle, iHeartRadio and KGW-TV in Portland, and News Talk in Alberta, Canada. Couch is the recipient of the 2014 James R. Baker Speaker of the Year, presented by the ACFE to honor an individual who has demonstrated the true spirit of leadership in communication, presentation and quality instruction. She serves as a faculty member for the ACFE and recently completed a two-year term as Vice-Chair and Chair of the ACFE’s Board of Regents.

Couch is the author of The Thief in Your Company, available at Amazon and the ACFE bookstore. 

Wednesday, June 26 | 8:30–9:45 AM


CPE: 1.5

Level: Basic

Recommended Prerequisites: This session is designed to review material required to pass the CFE Exam. Independent study with the CFE Exam Prep Course prior to attendance is strongly recommended.

Field of Study: Specialized Knowledge, Management Services, Auditing

This session will cover the following topics:

  • Corporate governance
  • Management's fraud-related responsibilities
  • Auditors' fraud-related responsibilities
  • Fraud risk assessment
  • Fraud risk management

You Will Learn How To:

  • Analyze the principal causes of fraud
  • Identify red flags indicative of fraudulent practices
  • Apply the core fraud prevention and detection concepts upon which the CFE credential is built

bkessler headshot
Bethmara Kessler, CFE, CISA

Consultant, Advisor and ACFE Faculty Member
ACFE Regent

Bethmara Kessler is a global thought leader, lecturer, consultant and advisor to businesses on the topics of fraud, audit, compliance, enterprise risk management, shared services delivery strategies, process transformation and is on the ACFE Faculty and Advisory Council. Kessler is the former Head of Integrated Global Services for the Campbell Soup Company. Her career spans over 30 years in positions that include Chief Compliance Officer, Chief Audit Executive and Enterprise Risk Management Head. Her extensive experience also includes leadership roles in audit, risk management, information technology and corporate investigations in companies including EY, Avon Products, Nabisco, EMI Group, LBrands, The Fraud and Risk Advisory Group and Warner Music Group.

10:05-11:20 AM

Wednesday, June 26 | 10:05–11:20 AM


CPE: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

In this roundtable session, you will meet with your peers and discuss issues relating to fraud in financial institutions. The session will be limited to 100 attendees, on a first-come, first-served basis, to allow for maximum engagement and interaction. A facilitator will guide you through discussion questions, but the primary lessons will come from sharing experiences and best practices with your peers.

You Will Learn How To:

  • Identify common fraud risks and emerging trends in financial institutions
  • Compare best practices for investigating frauds in financial institutions
  • Benchmark your financial institution’s anti-fraud initiatives against those at other organizations

Wednesday, June 26 | 10:05–11:20 AM


CPE Credit: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Behavioral Ethics

Most organizations and governments promote a speak-up culture. “If you see something, say something,” as they say. With the large majority of fraud schemes being reported by tips, it’s imperative that both organizations and individuals are encouraged to report wrongdoing. But what are the costs of good-faith reporting? Implementing a broad compliance program that sustains a strong culture of compliance can be costly in both resources and manpower. Whistleblowers who come forward might lose a significant amount of personal and professional capital when reporting wrongdoing. Organizations that report violations might receive negative press, lower stock prices and increased regulatory exposure. Very seldom are the reporters recognized as the heroes, and therein lies the dichotomy. Doing the right thing has a cost and, unfortunately, sometimes that cost greatly exceeds the cost of doing nothing.


This session will explore the question, how do we change this? It will discuss organization expectations, barriers and challenges to reporting wrongdoing, and how you can help improve the culture of reporting.

You Will Learn How To:

  • Identify the expectations on individuals and organizations to report
  • Discuss the barriers, stigmas and challenges that currently exist to reporting wrongdoing
  • Assess several case studies where organizations and individuals got reporting right—and where they got it wrong
  • Recognize how we all can help improve the culture of reporting
Ryan C. Hubbs, CFE, CIA, CCEP

Global Anticorruption and Fraud Manager, Schlumberger
ACFE Regent

Ryan C. Hubbs is the global anticorruption and fraud manager for Schlumberger in Houston, Texas. Hubbs has more than 18 years of experience managing corporate investigations, forensic audits and compliance initiatives. He has conducted hundreds of sensitive internal engagements concerning fraud, corruption, contracts, vendors and suppliers, and employee-related issues. Hubbs also has extensive experience with organization-wide anti-fraud and compliance programs and measures, corporate investigation programs and protocols, and fraud data analytics. He has extensive experience investigating and researching anonymous shell company networks as well as developing analytics and process improvements to combat this emerging fraud risk area. Hubbs also previously served 13 years as a commissioned law enforcement officer in both Louisiana and Texas.


Hubbs currently sits on the ACFE's Board of Regents. He is also a member of the ACFE Faculty where he co-presents the CFE Exam Review Course, as well as specialized training. Hubbs co-wrote the guidance to the ACFE Standards and developed the ACFE Chapter Leaders Resource Guide. He has served ten years as an ACFE Chapter President and officer for both the New Orleans and Houston ACFE Chapters. In his role as President of the Houston ACFE Chapter he helped guide the chapter to be recognized as the ACFE’s 2014 Chapter of the Year and the recipient of the ACFE’s 2015 Chapter Newsletter of the Year. Hubbs’ continued involvement and contributions in the anti-fraud profession resulted in him being awarded the Greater Houston Fraud Impact Award in 2014.

Wednesday, June 26 | 10:05–11:20 AM


CPE: 1.5

Level: Intermediate

Recommended Prerequisite:

  • Knowledge of business research fundamentals
  • Literate in global business ethics

Field of Study: Information Technology

International due diligence is vital for business success and management. It can be a straightforward task, if you know how to use the right resources from the plethora of information available. In this session, you will review available databases and open sources for a variety of countries to conduct international due diligence and background checks.

You Will Learn How To:

  • Examine sources for information including the top foreign corporate databases for researching overseas companies and their principals
  • Navigate a list of databases serving foreign countries
  • Identify global resources helpful in consolidating multiple country searches

chetherington headshot
Cynthia Hetherington, CFE

President, Hetherington Group

Cynthia Hetherington is the founder and president of Hetherington Group, a consulting, publishing, and training firm that leads in due diligence, corporate intelligence, and cyber investigations. She has authored three books on how to conduct investigations. Hetherington was also named the 2012 James Baker Speaker of the year for the Association of Certified Fraud Examiners.

For more than 25 years, Hetherington has led national and international investigations in corporate due diligence and fraud, personal asset recovery, and background checks. With a specialization in the financial, pharmaceutical, and telecommunications industries, her investigations have recovered millions of dollars in high profile corruption cases, assisting on the investigations of the top two Ponzi cases in U.S. history.

Wednesday, June 26 | 10:05-11:20 AM


CPE Credit: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Business Law

In this session, you will learn about the gatekeeping strategies of court procedure designed to keep you from testifying. It will discuss how Daubert challenges should be considered in everything you do, in addition to how everything you say and write can be used against you. You will learn the strategies opposing attorneys use to attack the four pillars of expert testimony: the evidence, your methodology, your assumptions and you. The session will conclude with best practices to avoid common traps in expert testimony.

Frank Wisehart, CFE, CPA, CVA, MAFF

Partner, Baker Tilly Virchow Krause, LLP

Speaker bio coming soon.

Wednesday, June 26 | 10:05–11:20 AM


CPE Credit: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

Every day, organizations’ employees interact with the public and one another. The way this occurs has changed at an accelerated and alarming rate, due to social media and digital devices. Online and application-based marketing are driving forces behind any successful brand and business but at what costs and do we know the risks? Can you control what is said about your brand, who says it and if fiction is perceived as truth? How do account takeovers occur and what can be done to prevent this? This session will review alarming case studies and identify best practices to prevent similar occurrences.

You Will Learn How To:

  • Assess current trends in social media and application-based software
  • Recognize how your employees might indirectly affect your company’s brand, profile and risk without even knowing it
  • Determine best practices for BYOD (Bring Your Own Device)
  • Ensure you aren’t giving away your secret recipe or crown jewels
  • Identify techniques and relevant security protocols to prevent social engineering
  • Establish specific current password protocols
Keith Elliott

President and CEO, Reed Research

Keith Elliott is the President and CEO of Reed Research Investigations Limited, a professional investigation firm based out of Toronto, Canada. He holds an honors degree in law and security administration, and additional diplomas in private investigations, advanced interview techniques, and close protective services. As a seasoned professional investigator with more than 27 years of experience, Elliott has practical involvement in identifying risk and investigating frauds relating to criminal enterprise, employment, health care, insurance services, fake deaths, disability, cyber scams, and various payment platform online services. He has presented evidence and testified in precedent-setting cases in various courts across Ontario and Canada.

Wednesday, June 26 | 10:05–11:20 AM


CPE Credit: 1.5

Level: Intermediate

Recommended Prerequisite: Knowledge of audit scoping, planning and execution

Field of Study: Auditing

The way audits and forensics will be performed in the next 3-5 years will be different from how they are performed today. To remain relevant, you must keep pace with the technology that businesses are adopting, such as robotic process automation, artificial intelligence and machine learning. Audit and forensic procedures will need to be redefined and made smarter and sharper. This session will explore how emerging technology will impact the future of the audit professional.

You Will Learn How To:

  • Identify challenges you will face while performing audits and forensic reviews by 2025
  • Recognize foundational changes to prepare for in your audit and forensic procedures
  • Assess the significance of negative testing in the age of robotic process automation, artificial intelligence and machine learning
Rajiv Gupta, CFE, CA, CISA, CCSA

Vice President & Chief Internal Auditor, Diageo India

Rajiv Gupta is an author, international speaker and a mentor. He is currently Vice President and Chief Internal Auditor at Diageo India. He has also worked as Head of Internal Controls for India and South West Asia at Coca-Cola and Assurance Manager with PwC in India and London. Gupta is an RPA (Robotics Process Automation) evangelist and subject matter expert in the field of forensic accounting and fraud prevention. He has more than 15 years of professional experience in designing fraud prevention programs, forensic accounting, automation of data analytics, internal controls, risk assessment and SOX/internal audits. He is a Chartered Accountant, Certified Fraud Examiner, Certified Information Systems Auditor, certified in COBIT v5 (F) and holds Diploma in Information Systems Audit (ICAI). He is the author of “Technical Guide on Internal Audit of Beverage Industry” published by Institute of Chartered Accountants of India (ICAI) in December 2013.

Gupta has been a guest speaker for the Association of Certified Fraud Examiners (ACFE), the Institute of Chartered Accountants of India (ICAI), the Information Systems Audit and Control Association (ISACA), Software Asset Management Strategy (SAMS) Europe and the National Academy for Direct Taxes (NADT). He has spoken on fraud prevention, fraud risk assessment, deep dive intelligence, financial statements fraud and other issues at professional conferences in Australia, Germany, Hongkong, Dubai, Scotland and India.

Wednesday, June 26 | 10:05–11:20 AM


CPE: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Auditing

How many times has a single email or correspondence broken your case wide open? Imagine the magnitude of evidence you could develop if that same data was analyzed on a grander scale and combined with other data sources to illuminate patterns and uncover trends. This session will explore how data mining and analytics can be beneficial to investigations.


Beyond traditional source of data, such as spreadsheets and tables, lie valuable alternative sources, such as document metadata, communications, security swipes, Internet of Things (IoT) logs and geotagged/coordinated data. Synthesizing this disparate information to develop a fact pattern or support an essential narrative can be cumbersome if done by hand. With data science techniques, however, you can leverage a multitude of large and unwieldy datasets in a short amount of time, while leaving no stone unturned. This session will introduce you to the basic concepts of analyzing traditional and alternative data in support of real-life investigations, as told by the former New York State Office of the Attorney General’s Director of Data and Analytics.

You Will Learn How To:

  • Recognize and provide examples of traditional and alternative data
  • Discern the general process of using data in cases or investigations
  • Identify whether a case or investigation could benefit from data

lkeller headshot
Lacey Keller

Data Science Managing Director, Gryphon Strategies

Lacey Keller is a Managing Director with Gryphon Strategies with almost a decade of research and analytics experience. She advises financial and law firms on how best to use traditional and alternative data for investments and investigations.

Previously, Keller was the founder and director of the Research and Analytics Department for the New York State Office of the Attorney General. During her tenure, she developed a formidable team, including the first data scientist hired by a state attorney general’s office, that leveraged cutting-edge technologies and analytical techniques to support investigations. Her team was instrumental in many of the most notable cases brought by the Office of the Attorney General, including the case brought against Spectrum (Time Warner Cable) for allegedly defrauding customers over internet speeds and performance. That team also helped author reports on Airbnb, gun trafficking and ticket pricing that national media outlets widely covered.

Wednesday, June 26 | 10:05–11:20 AM


CPE Credit: 1.5

Level: Basic

Recommended Prerequisite: None

Field of Study: Information Technology

We are surrounded by devices we love, but how much do they love us? As we become more disconnected from other human beings, we are becoming more connected to major companies that are collecting massive amounts of data about our lives. All of this information is great for advertisers and gold for fraudsters trying to steal identities. Cameras, microphones and devices that provide our exact latitude and longitude enable fraud to happen in real time and be livestreamed to the fraudster. This session will review the threats posed by the devices that surround us, and how you can reduce the exposure and privacy concerns these devices present.

You Will Learn How To:

  • Appraise the threats posed by the devices that surround us and how criminals can exploit them
  • Recognize the ways devices and communications can leak details of the investigation and help the attacker in new ways
  • Reduce exposure and privacy concerns these devices present to daily lives and business operations
cmoore Headshot
Cary Moore, CFE

Chief Executive Officer, MegaByte Security

With a career distinguished by 14 years of highly decorated service to the United States Air Force, of which seven were as a federal agent for the Air Force Office of Special Investigations (AFOSI), Cary Moore has more than 17 years of specialized experience in cybersecurity, enterprise forensics and technical surveillance countermeasures (TSCM). Focusing on counterintelligence and counterespionage, he brings a unique perspective to insider threats and protecting some of the most sensitive data.

Prior to his current role, he served as a senior vice president, cyber intelligence and emerging threats manager at Bank of America. As a banking-industry specialist, Moore developed new ways to rob a bank and banking customers, then devised controls to prevent such fraud from realization. Currently, he is an associate partner for the IBM Red Cell Team where he conducts dark Web intelligence-gathering operations to identify compromised accounts, and get in front of fraud. Moore is also chief executive officer of MegaByte Security, a private consulting firm specializing in the secure management of information systems in the age of cyber terrorism and warfare, developing customized training and solution plans for the private and federal public sectors.

Most recently, Moore earned his master’s in business administration from the University of Texas in San Antonio and works primarily out of his office near Blackwater Bay, Florida.

Wednesday, June 26 | 10:05–11:20 AM


CPE: 1.5

Level: Intermediate

Recommended Prerequisite:

  • Applied knowledge of how the elements of the Fraud Triangle can guide employee behaviors and lead to corporate fraud
  • Experience with fraud prevention programs

Field of Study: Behavioral Ethics

The last few years have shocked CEOs, boards of directors and shareholders. Scandals from Wells Fargo, Volkswagen, United Airlines and Uber (among others) demonstrate the unanticipated ethical impact of poorly conceived performance incentives. In this session, we unravel how these perverse incentives come to be, what to watch for, and how to better align corporate incentives and performance management to improve fraud prevention

You Will Learn How To:

  • Identify the unanticipated consequences of performance incentives that don't clearly align with corporate ethics and integrity principles
  • Determine the impact of corporate ethical culture as an internal control that can influence employee behavior
  • Compare recent fraud case studies where perverse incentives and unrealistic performance expectations contributed to fraudulent behavior with significant consequences for the company

efeldman headshot
Eric R. Feldman, CFE, CIG, CCEP-I

Senior Vice President and Managing Director, Corporate Ethics and Compliance Programs, Affiliated Monitors, Inc.
ACFE Regent

Eric Feldman, CFE, CIG, CCEP-I, Senior Vice President and Managing Director, Corporate Ethics and Compliance Programs, joined Affiliated Monitors after retiring from the Central Intelligence Agency (CIA) in 2011. Feldman had a distinguished 32-year career with both the Executive and Legislative branches of the federal government. He served in executive positions with the Offices of Inspector General at the Department of Defense, Defense Intelligence Agency, and CIA, and he was the longest serving Inspector General of the National Reconnaissance Office (NRO) from 2003–2009. At the NRO, he presided over a highly successful procurement fraud prevention and detection program, widely recognized by the Department of Justice as a model throughout the federal government.


Feldman was elected to the Board of Regents for the Association of Certified Fraud Examiners (ACFE) for 2019–2020. He is also a member of the teaching faculty of the ACFE and a frequently sought-after speaker and author on the topics of procurement fraud detection and prevention, bribery and corruption, corporate business ethics and compliance, and managing an Inspector General function. He has given presentations at national conferences of the ACFE, the Association of Inspectors General, and the ABA Procurement Fraud Institute, as well as regional fraud and compliance conferences in Europe, Asia, and the Middle East. Feldman is the recipient of the 2018 James A. Baker Speaker of the Year Award presented by ACFE.

Wednesday, June 26 | 10:05–11:20 AM


CPE: 1.5

Level: Intermediate

Recommended Prerequisite: Knowledge and experience conducting workplace investigations

Field of Study: Behavioral Ethics

Unconscious bias is a hot topic in today’s workplace. Learn from two seasoned investigators about how bias can creep into conducting an objective investigation. Join us for an engaging video experience demonstrating the power of unintended bias on our own behaviors and how we can control it through our own self-reflection and awareness. You will learn how to identify unintentional bias in your personal and professional lives, how to take steps to mitigate it and learn more about yourself in the process.

You Will Learn How To:

  • Describe what unconscious bias is
  • Identify the effects of bias on investigations
  • Assess your own biases and how they affect you personally

Roxane MacGillivray, CFE

Director of Enterprise Operations and International Ethics, Lockheed Martin

Roxane MacGillivray is a corporate senior manager with the Lockheed Martin Ethics and Enterprise Assurance organization. She is a thought leader in the field of ethics and compliance with expertise in workplace investigations and a background in equal employment, affirmative action and commercial litigation. In her current role, she conducts enterprise-wide ethics investigations and is responsible for producing innovative ethics officer training. MacGillivray has been a national speaker on ethics, investigative techniques and employee training. She holds a Bachelor of Arts degree in Legal Studies from the University of Central Florida.


Wendy Evans, CFE, CCEP

Senior Corporate Investigator, Corporate Ethics, Lockheed Martin

Wendy Evans is a corporate senior manager with the Lockheed Martin Ethics and Enterprise Assurance organization. Her career began in law enforcement, including service as an FBI agent (white-collar crime and counterintelligence assignments) and police officer. Evans is a Certified Fraud Examiner (CFE) and member of the Association of Certified Fraud Examiners. She is also a Certified Compliance and Ethics Professional (CCEP) with the Society of Corporate Ethics and Compliance. Evans is a member of the Ethics and Compliance Initiative (ECI), as well as other professional organizations. She has been a featured national speaker on ethics, compliance, security and investigative topics. Evans holds a Bachelor of Arts degree in Government Studies and Communications (Broadcasting) from Western Kentucky University.

Wednesday, June 26 | 10:05–11:20 AM


CPE: 1.5

Level: Intermediate

Recommended Prerequisite:Working knowledge of various corruption risk areas within domestic and international procurement systems; solid understanding of the fraud schemes that are targeting today's contracting processes

Field of Study: Specialized Knowledge

Increasing the integrity and transparency of global procurement systems is an ongoing effort of nearly all organizations and of international development investors. Each have recognized that increasing the effective use of public and private funds for procuring goods and services requires the existence of an adequate national procurement system that meets international standards and operates with a commitment to integrity free from corruption and fraud. Under the auspices of the World Bank and Organization for Economic Co-Operations and Development (OECD), a set of standards has been developed that provides guidance for enhancing integrity within procurement systems and the results they produce. Also helping to promote the integrity within global procurement systems is the United Nations Convention against Corruption (UNCAC), specifically within Article 9(1) that calls for “transparency, competition and objective criteria in decision-making” for all procurement.


This session will introduce you to various global standards to heighten awareness of the responsibility for having integrity within your organization’s procurement systems, tools available to assess the integrity of your organization’s procurement systems, and high-risk areas and elements of public procurement systems.

You Will Learn How To:

  • Compare international standards for implementing a sound procurement system to promote procurement integrity
  • Identify key corruption and fraud risk areas in public contracting and how to reduce your procurement system’s vulnerabilities to them
  • Evaluate expectations of international investment banks regarding the core principles of integrity, transparency and fairness in procuring goods and services

Tom Caulfield, CFE, CIG, CIGI

Chief Operating Officer, Procurement Integrity Consulting Services

Tom Caulfield has more than 40 years of combined government and public service, including the U.S. Marine Corps, the U.S. Air Force, the National Reconnaissance Office, the Central Intelligence Agency, and the Counsel of Inspectors General. He ended his government service when he retired in 2015 as the Executive Director for the CIGIE Training Institute. During his government service, his assignments included a full range of responsibilities at both the senior executive and program management levels in law enforcement, criminal investigations, anti-fraud strategies, white-collar crime investigations, polygraph, counterintelligence, internal oversight, and professional development and training. Today, Tom is the COO of Procurement Integrity Consulting Services, LLC, a company specializing in developing, assessing, and structuring strategies to assure contracting integrity and anti-corruption both domestically and internationally.

Wednesday, June 26 | 10:05–11:20 AM


CPE Credit: 1.5

Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

This session will walk you through a real-life Texas Ranger elder fraud and murder investigation, told by a financial crime analyst who was directly involved in the investigation. The session will begin by showing how the perpetrator selected the elderly victim after learning of the victim’s sizable estate. It will cover how the perpetrator “befriended” the victim and began plotting to liquidate his estate. It will cover the day of the murder, and the subsequent actions taken by the perpetrator to deprive the estate from the victim’s actual family and beneficiaries. The session will also touch on a twist to the investigation, and the perpetrator’s possible original motive: using the victim’s estate to cover up a sizable prior embezzlement. The session will end by discussing the arrest and trial, including details of trial testimony by a CPA and a financial crime analyst.

You Will Learn How To:

  • Recognize the red flags of elder financial exploitation
  • Identify the methods by which the perpetrator selected the victim and carried out the crime
  • Assess several case studies where organizations and individuals got reporting right—and where they got it wrong
  • Compare tips for court and trial testimony by CFEs and other financial crime specialists
Jason Zirkle, CAMS

Criminal Intelligence Analyst, Texas Department of Public Safety, Intelligence and Counterterrorism Division

Jason Zirkle is an Intelligence Analyst with the Texas Ranger division of the Texas Department of Public Safety (DPS). At DPS, he works alongside Texas Rangers and DPS Special Agents, providing investigative support and financial analysis on major financial crime investigations, including money laundering, fraud, embezzling, public corruption, identity theft, illegal gambling and other white-collar crimes. He also provides financial expertise to non-financial criminal cases, such as murder investigations, narcotics, and human smuggling and trafficking.


Zirkle is the FinCEN Agency Coordinator for the DPS, and conducts training within DPS on FinCEN and financial crime, updates senior DPS personnel on the latest money laundering and illicit finance trends and works directly with multiple federal law enforcement agencies.


Zirkle is a Certified Crime Analyst and a Certified Anti-Money Laundering Specialist (CAMS). He received his B.S. in Criminal Justice from Texas State University. Prior to DPS, he was an Army intelligence analyst, with combat deployments to Iraq and Kosovo.

Wednesday, June 26 | 10:05–11:20 AM


CPE: 1.5

Level: Overview

Recommended Prerequisites: None

Field of Study: Behavioral Ethics

One of the most sought-after soft skills for leaders is influential and persuasive intelligence. It’s a sign of leadership presence and takes emotional intelligence to the next level. The application of influential and persuasive intelligence is also a weapon in the fraudster’s arsenal of deceit and deception. This session will examine how influential and persuasive intelligence is a power-engagement tool in the hands of the presence-driven leader, as well as the con artist. The session will also explore the areas that play into the persuasive charm of the scammer.

You Will Learn How To:

  • Recognize how our brains make us complicit in succumbing to fraud/scams
  • Examine how using strong narratives pull us into compliance with requests from leaders and con artists
  • Describe how social networks are both protective and exploitative environments
  • Recognize how connections between and among family, friends, and acquaintances in social networks influence financial decisions
  • Apply elements of various “fraud susceptibility” indices as fraud victim predictors
  • Recognize weapons of deceit used by fraudsters that play to human frailties

Donn LeVie Jr., CFE

Position & Influence Strategist, Brand Leverage Catalyst, Donn LeVie Jr. STRATEGIES

Donn LeVie Jr, CFE, is a leadership positioning and influence strategist, professional speaker and the author of two award-winning books on strategies for influencing decision makers and positioning professional expertise and branded value. His career has spanned nearly three decades in management and leadership positions for Fortune 100 companies (Phillips Petroleum, Motorola, Intel Corp.), government service (NOAA) and academia (University of Houston Downtown College). LeVie has been a presenter and strategist at the ACFE Global Fraud Conference every year since 2010 and is a contributing staff writer for Fraud Magazine. He can be reached at donn@donnleviejrstrategies.com or donnleviejrstrategies.com.

Wednesday, June 26 | 10:05–11:20 AM


CPE: 1.5

Level: Basic

Recommended Prerequisites: This session is designed to review material required to pass the CFE Exam. Independent study with the CFE Exam Prep Course prior to attendance is strongly recommended.

Field of Study: Specialized Knowledge, Behavioral Ethics

This session will cover the following topics:

  • Understanding criminal behavior
  • White-collar crime
  • Fraud prevention programs
  • Ethics for fraud examiners

You Will Learn How To:

  • Detect and prevent fraudulent behavior within and outside of your organization through fraud risk assessment and management
  • Identify best practices for fraud prevention programs
  • Apply the core fraud prevention and detection concepts upon which the CFE credential is built

gill headshot
John D. Gill, J.D., CFE

Vice President - Education, Association of Certified Fraud Examiners

John Gill is the Vice President – Education at the Association of Certified Fraud Examiners. He oversees the production and development of all the books, manuals, self-study courses and seminar and conference materials produced by the ACFE. He serves on the faculty of the ACFE and is a co-instructor of the CFE Exam Review Course. He is a co-author of the Fraud Examiners Manual and serves as the editor-in-chief for the CFE Exam and the CFE Exam Prep Course. He is also a contributing author to Fraud Magazine.

11:30 AM-12:20 PM
KEYNOTE

Closing Session

Wednesday, June 26 | 11:30 AM-12:20 PM


Level: Overview

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

Convicted fraudster Tom Hughes* is a former accountant who has been to prison twice for stealing money from his clients. In this session, he will discuss how he betrayed those who trusted him with their business and investments.

*The ACFE does not compensate convicted fraudsters.

Guest Speaker: Convicted Fraudster*

Tom Hughes

Convicted fraudster Tom Hughes* is a former accountant who has been to prison twice for stealing money from his clients.

*The ACFE does not compensate convicted fraudsters

gill headshot
John D. Gill, J.D., CFE

Vice President - Education, Association of Certified Fraud Examiners

John Gill is the Vice President – Education at the Association of Certified Fraud Examiners. He oversees the production and development of all the books, manuals, self-study courses and seminar and conference materials produced by the ACFE. He serves on the faculty of the ACFE and is a co-instructor of the CFE Exam Review Course. He is a co-author of the Fraud Examiners Manual and serves as the editor-in-chief for the CFE Exam and the CFE Exam Prep Course. He is also a contributing author to Fraud Magazine.

Thursday
7:30-8:30 AM

Registration and continental breakfast

7:30 AM-3:35 PM

ACFE Bookstore and Technology Lounge open

7:30 AM-4:30 PM
POST-CONFERENCE

On-Site CFE Exam

Thursday-Friday, June 27-28 | 7:30 AM-4:30 PM

Do you want to take the CFE Exam in person? Stay after the conference and complete your exam in Austin. The exam will be offered during the Post Conference (registration required). The on-site exam is administered in written form. You will read the questions and mark your answers on a Scantron answer sheet. An Association of Certified Fraud Examiners (ACFE) staff member will grade the exams on-site and provide results within a few minutes.

Benefits of attending:

  • Remove daily distractions and dedicate two days to completing your CFE Exam
  • Take the written exam on-site. Go home knowing you've passed your CFE Exam
  • A CFE Exam Review Course instructor and the CFE Exam Coach will be on-site to answer any questions about the exam or the exam process
  • Coffee, refreshment breaks, daily continental breakfast and one group lunch (lunch not served Friday, June 28)
  • BONUS! If you pass all four sections of the exam while you are at the event, you will receive a free frame for your CFE Certificate. A $150 value!

A completed CFE Exam application and an active ACFE membership are required to take the exam on-site.


CFE Exam Schedule

Thursday, June 27:

  • 7:30-8:30 AM: Continental Breakfast
  • 8:30-9:00 AM: Pick up Exam
  • 9:00-11:30 AM: Investigation Section Exam
  • 11:30 AM-12:30 PM: Group Lunch
  • 12:30-1:30 PM: Break/Study Time
  • 1:30-2:00 PM: Pick up Exam
  • 2:00-4:30 PM: Law Section Exam

Friday, June 28:

  • 7:30-8:30 AM: Continental Breakfast
  • 8:30-9:00 AM: Pick up Exam
  • 9:00-11:30 AM: Financial Transaction Section Exam
  • 11:30 AM-12:30 PM: Lunch On Your Own
  • 12:30-1:30 PM: Break/Study Time
  • 1:30-2:00 PM: Pick up Exam
  • 2:00-4:30 PM: Fraud Prevention Section Exam
8:30 AM-4:55 PM

Thursday-Friday, June 27-28 | 8:30 AM-4:55 PM


CPE Credit: 16

Level: Basic

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

To be successful in the fight against fraud, auditors and investigators must work together. The Auditing/Investigating Fraud Seminar brings these two perspectives together for a series of joint general sessions and breaks into separate sessions for each of the respective professional roles. Through the exploration of various anti-fraud topics and the sharing of best practices across disciplines, you will sharpen your existing skills and learn the techniques necessary for effective fraud prevention, detection and investigation.

You Will Learn How To:

  • Plan and conduct a fraud risk assessment
  • Recognize the warning signs of occupational fraud schemes
  • Conduct informational and admission-seeking interviews
  • Use the internet as an investigative tool during fraud examinations
  • Obtain information from internal sources and public records
  • Recognize auditors’ fraud-related responsibilities and the sources of relevant professional standards
  • Use analytical techniques to uncover the red flags of fraud
  • Navigate legal issues related to fraud examination
  • Prepare effective fraud examination reports


tcouch headshot
Tiffany Couch, CFE, CPA, CFF

CEO/Owner, Acuity Forensics

Tiffany Couch, CFE, CPA/CFF, is principal at Acuity Forensics, a Pacific Northwest forensic accounting firm with a national presence. She has more than 21 years of experience in the field of accounting with the last 14 years focused completely on forensic accounting-related engagements. Her expertise is in matters involving fraud investigation, forensic accounting, contract and regulatory compliance, internal control risk assessment, and complex litigation.

She has provided expertise as a source to The New York Times, NPR, Wall Street Journal, Forbes Magazine, Financier Worldwide Magazine and First Business News. She’s also a regular contributor to Fraud Magazine and the Vancouver Business Journal, and has been interviewed for CNBC, KING 5-TV in Seattle, iHeartRadio and KGW-TV in Portland, and News Talk in Alberta, Canada. Couch is the recipient of the 2014 James R. Baker Speaker of the Year, presented by the ACFE to honor an individual who has demonstrated the true spirit of leadership in communication, presentation and quality instruction. She serves as a faculty member for the ACFE and recently completed a two-year term as Vice-Chair and Chair of the ACFE’s Board of Regents.

Couch is the author of The Thief in Your Company, available at Amazon and the ACFE bookstore. 

llane headshot
Leah D. Lane, CFE

Global Investigations Director, Texas Instruments, Inc.

Leah Lane has more than 20 years of combined public and private sector investigations and fraud examination experience. During her career, she has managed, worked and assisted in hundreds of investigations globally, involving allegations of Foreign Corrupt Practices Act violations, internal and external fraud, and employee misconduct.

Lane is currently the global investigations director at Texas Instruments, Inc. (TI), where she manages a group of investigators with global responsibility for investigations within TI. She is also responsible for fraud awareness campaigns.

Before joining Texas Instruments, Lane served as the audit fraud manager at JCPenney and as a security manager for the Americas at HP/EDS. At these positions, she was responsible for investigating and managing complex financial fraud and computer forensic matters. She began her investigative career as a special agent in the U.S. Customs Service, a position she held for more than seven years.

Thursday-Friday, June 27-28 | 8:30 AM-4:55 PM


CPE Credit: 16

Level: Overview

Recommended Prerequisite: None

Field of Study: Information Technology

Losing data to fraud can be more costly than the loss of cash and other assets. To ensure data security, safeguard intellectual property and guard against cyberfraud, fraud examiners must stay informed of rapidly advancing technologies, emerging business trends and the methods employed by increasingly sophisticated information thieves.

This 2-day, post-conference course will clarify these issues while guiding you through the crucial strategies needed to mitigate the threat of malicious data theft and minimize the risk of inadvertent data loss. You will also learn useful steps for the creation of data security policies and related internal controls.

You Will Learn How To:

  • Explain the ways data can be stolen by employees and information thieves
  • Enact data security measures and be prepared in the event of a data breach
  • Contend with data theft maneuvers such as social engineering, hacking and espionage
  • Identify various sources of data loss, both internal and external
  • Recognize the impacts of converging trends such as cloud computing and BYOD
  • Recognize the legal and regulatory concerns related to data security



cmoore Headshot
Cary Moore, CFE

Chief Executive Officer, MegaByte Security

With a career distinguished by 14 years of highly decorated service to the United States Air Force, of which seven were as a federal agent for the Air Force Office of Special Investigations (AFOSI), Cary Moore has more than 17 years of specialized experience in cybersecurity, enterprise forensics and technical surveillance countermeasures (TSCM). Focusing on counterintelligence and counterespionage, he brings a unique perspective to insider threats and protecting some of the most sensitive data.

Prior to his current role, he served as a senior vice president, cyber intelligence and emerging threats manager at Bank of America. As a banking-industry specialist, Moore developed new ways to rob a bank and banking customers, then devised controls to prevent such fraud from realization. Currently, he is an associate partner for the IBM Red Cell Team where he conducts dark Web intelligence-gathering operations to identify compromised accounts, and get in front of fraud. Moore is also chief executive officer of MegaByte Security, a private consulting firm specializing in the secure management of information systems in the age of cyber terrorism and warfare, developing customized training and solution plans for the private and federal public sectors.

Most recently, Moore earned his master’s in business administration from the University of Texas in San Antonio and works primarily out of his office near Blackwater Bay, Florida.

POST-CONFERENCE

Fraud Risk Management

Thursday-Friday, June 27-28 | 8:30 AM-4:55 PM


CPE Credit: 16

Level: Intermediate

Recommended Prerequisite: Familiarity with common fraud schemes and risks

Field of Study: Management Services

With organizations losing an estimated 5% of their annual revenues to fraud, the need for a strong anti-fraud stance and proactive, comprehensive approach to combating fraud is clear. As organizations increase their focus on risk, they should take the opportunity to consider, enact and improve measures to detect, deter and prevent fraud.

This post-conference course will explain how you can integrate anti-fraud initiatives into your organizations risk management programs to:

  • Identify, assess and manage fraud risks from all sources
  • Support fraud risk management initiatives by establishing an anti-fraud culture and promoting fraud awareness throughout the organization
  • Develop a system of internal controls to address the entity’s fraud risks
  • Address and respond to any identified instances of fraud

You Will Learn How To:

  • Identify fraud risks and the factors that influence them
  • Analyze existing risk management frameworks and their application to managing fraud risk
  • Develop and implement the necessary components of a successful fraud risk management program
  • Identify the elements of a strong ethical corporate culture
  • Promote fraud awareness to employees at all levels of the organization

Ethics This course satisfies the ACFE’s requirement of two Ethics CPE hours per year. To read more about the Ethics CPE requirement for CFEs, please visit ACFE.com/EthicsCPE.



bkessler headshot
Bethmara Kessler, CFE, CISA

Consultant, Advisor and ACFE Faculty Member
ACFE Regent

Bethmara Kessler is a global thought leader, lecturer, consultant and advisor to businesses on the topics of fraud, audit, compliance, enterprise risk management, shared services delivery strategies, process transformation and is on the ACFE Faculty and Advisory Council. Kessler is the former Head of Integrated Global Services for the Campbell Soup Company. Her career spans over 30 years in positions that include Chief Compliance Officer, Chief Audit Executive and Enterprise Risk Management Head. Her extensive experience also includes leadership roles in audit, risk management, information technology and corporate investigations in companies including EY, Avon Products, Nabisco, EMI Group, LBrands, The Fraud and Risk Advisory Group and Warner Music Group.

11:25 AM-12:25 PM

Group lunch

Friday
7:30-8:30 AM

Registration and continental breakfast

7:30 AM-3:35 PM

ACFE Bookstore and Technology Lounge open

7:30 AM-4:30 PM
POST-CONFERENCE

On-Site CFE Exam

Thursday-Friday, June 27-28 | 7:30 AM-4:30 PM

Do you want to take the CFE Exam in person? Stay after the conference and complete your exam in Austin. The exam will be offered during the Post Conference (registration required). The on-site exam is administered in written form. You will read the questions and mark your answers on a Scantron answer sheet. An Association of Certified Fraud Examiners (ACFE) staff member will grade the exams on-site and provide results within a few minutes.

Benefits of attending:

  • Remove daily distractions and dedicate two days to completing your CFE Exam
  • Take the written exam on-site. Go home knowing you've passed your CFE Exam
  • A CFE Exam Review Course instructor and the CFE Exam Coach will be on-site to answer any questions about the exam or the exam process
  • Coffee, refreshment breaks, daily continental breakfast and one group lunch (lunch not served Friday, June 28)
  • BONUS! If you pass all four sections of the exam while you are at the event, you will receive a free frame for your CFE Certificate. A $150 value!

A completed CFE Exam application and an active ACFE membership are required to take the exam on-site.


CFE Exam Schedule

Thursday, June 27:

  • 7:30-8:30 AM: Continental Breakfast
  • 8:30-9:00 AM: Pick up Exam
  • 9:00-11:30 AM: Investigation Section Exam
  • 11:30 AM-12:30 PM: Group Lunch
  • 12:30-1:30 PM: Break/Study Time
  • 1:30-2:00 PM: Pick up Exam
  • 2:00-4:30 PM: Law Section Exam

Friday, June 28:

  • 7:30-8:30 AM: Continental Breakfast
  • 8:30-9:00 AM: Pick up Exam
  • 9:00-11:30 AM: Financial Transaction Section Exam
  • 11:30 AM-12:30 PM: Lunch On Your Own
  • 12:30-1:30 PM: Break/Study Time
  • 1:30-2:00 PM: Pick up Exam
  • 2:00-4:30 PM: Fraud Prevention Section Exam
8:30 AM-4:55 PM

Thursday-Friday, June 27-28 | 8:30 AM-4:55 PM


CPE Credit: 16

Level: Basic

Recommended Prerequisite: None

Field of Study: Specialized Knowledge

To be successful in the fight against fraud, auditors and investigators must work together. The Auditing/Investigating Fraud Seminar brings these two perspectives together for a series of joint general sessions and breaks into separate sessions for each of the respective professional roles. Through the exploration of various anti-fraud topics and the sharing of best practices across disciplines, you will sharpen your existing skills and learn the techniques necessary for effective fraud prevention, detection and investigation.

You Will Learn How To:

  • Plan and conduct a fraud risk assessment
  • Recognize the warning signs of occupational fraud schemes
  • Conduct informational and admission-seeking interviews
  • Use the internet as an investigative tool during fraud examinations
  • Obtain information from internal sources and public records
  • Recognize auditors’ fraud-related responsibilities and the sources of relevant professional standards
  • Use analytical techniques to uncover the red flags of fraud
  • Navigate legal issues related to fraud examination
  • Prepare effective fraud examination reports


tcouch headshot
Tiffany Couch, CFE, CPA, CFF

CEO/Owner, Acuity Forensics

Tiffany Couch, CFE, CPA/CFF, is principal at Acuity Forensics, a Pacific Northwest forensic accounting firm with a national presence. She has more than 21 years of experience in the field of accounting with the last 14 years focused completely on forensic accounting-related engagements. Her expertise is in matters involving fraud investigation, forensic accounting, contract and regulatory compliance, internal control risk assessment, and complex litigation.

She has provided expertise as a source to The New York Times, NPR, Wall Street Journal, Forbes Magazine, Financier Worldwide Magazine and First Business News. She’s also a regular contributor to Fraud Magazine and the Vancouver Business Journal, and has been interviewed for CNBC, KING 5-TV in Seattle, iHeartRadio and KGW-TV in Portland, and News Talk in Alberta, Canada. Couch is the recipient of the 2014 James R. Baker Speaker of the Year, presented by the ACFE to honor an individual who has demonstrated the true spirit of leadership in communication, presentation and quality instruction. She serves as a faculty member for the ACFE and recently completed a two-year term as Vice-Chair and Chair of the ACFE’s Board of Regents.

Couch is the author of The Thief in Your Company, available at Amazon and the ACFE bookstore. 

llane headshot
Leah D. Lane, CFE

Global Investigations Director, Texas Instruments, Inc.

Leah Lane has more than 20 years of combined public and private sector investigations and fraud examination experience. During her career, she has managed, worked and assisted in hundreds of investigations globally, involving allegations of Foreign Corrupt Practices Act violations, internal and external fraud, and employee misconduct.

Lane is currently the global investigations director at Texas Instruments, Inc. (TI), where she manages a group of investigators with global responsibility for investigations within TI. She is also responsible for fraud awareness campaigns.

Before joining Texas Instruments, Lane served as the audit fraud manager at JCPenney and as a security manager for the Americas at HP/EDS. At these positions, she was responsible for investigating and managing complex financial fraud and computer forensic matters. She began her investigative career as a special agent in the U.S. Customs Service, a position she held for more than seven years.

Thursday-Friday, June 27-28 | 8:30 AM-4:55 PM


CPE Credit: 16

Level: Overview

Recommended Prerequisite: None

Field of Study: Information Technology

Losing data to fraud can be more costly than the loss of cash and other assets. To ensure data security, safeguard intellectual property and guard against cyberfraud, fraud examiners must stay informed of rapidly advancing technologies, emerging business trends and the methods employed by increasingly sophisticated information thieves.

This 2-day, post-conference course will clarify these issues while guiding you through the crucial strategies needed to mitigate the threat of malicious data theft and minimize the risk of inadvertent data loss. You will also learn useful steps for the creation of data security policies and related internal controls.

You Will Learn How To:

  • Explain the ways data can be stolen by employees and information thieves
  • Enact data security measures and be prepared in the event of a data breach
  • Contend with data theft maneuvers such as social engineering, hacking and espionage
  • Identify various sources of data loss, both internal and external
  • Recognize the impacts of converging trends such as cloud computing and BYOD
  • Recognize the legal and regulatory concerns related to data security



cmoore Headshot
Cary Moore, CFE

Chief Executive Officer, MegaByte Security

With a career distinguished by 14 years of highly decorated service to the United States Air Force, of which seven were as a federal agent for the Air Force Office of Special Investigations (AFOSI), Cary Moore has more than 17 years of specialized experience in cybersecurity, enterprise forensics and technical surveillance countermeasures (TSCM). Focusing on counterintelligence and counterespionage, he brings a unique perspective to insider threats and protecting some of the most sensitive data.

Prior to his current role, he served as a senior vice president, cyber intelligence and emerging threats manager at Bank of America. As a banking-industry specialist, Moore developed new ways to rob a bank and banking customers, then devised controls to prevent such fraud from realization. Currently, he is an associate partner for the IBM Red Cell Team where he conducts dark Web intelligence-gathering operations to identify compromised accounts, and get in front of fraud. Moore is also chief executive officer of MegaByte Security, a private consulting firm specializing in the secure management of information systems in the age of cyber terrorism and warfare, developing customized training and solution plans for the private and federal public sectors.

Most recently, Moore earned his master’s in business administration from the University of Texas in San Antonio and works primarily out of his office near Blackwater Bay, Florida.

POST-CONFERENCE

Fraud Risk Management

Thursday-Friday, June 27-28 | 8:30 AM-4:55 PM


CPE Credit: 16

Level: Intermediate

Recommended Prerequisite: Familiarity with common fraud schemes and risks

Field of Study: Management Services

With organizations losing an estimated 5% of their annual revenues to fraud, the need for a strong anti-fraud stance and proactive, comprehensive approach to combating fraud is clear. As organizations increase their focus on risk, they should take the opportunity to consider, enact and improve measures to detect, deter and prevent fraud.

This post-conference course will explain how you can integrate anti-fraud initiatives into your organizations risk management programs to:

  • Identify, assess and manage fraud risks from all sources
  • Support fraud risk management initiatives by establishing an anti-fraud culture and promoting fraud awareness throughout the organization
  • Develop a system of internal controls to address the entity’s fraud risks
  • Address and respond to any identified instances of fraud

You Will Learn How To:

  • Identify fraud risks and the factors that influence them
  • Analyze existing risk management frameworks and their application to managing fraud risk
  • Develop and implement the necessary components of a successful fraud risk management program
  • Identify the elements of a strong ethical corporate culture
  • Promote fraud awareness to employees at all levels of the organization

Ethics This course satisfies the ACFE’s requirement of two Ethics CPE hours per year. To read more about the Ethics CPE requirement for CFEs, please visit ACFE.com/EthicsCPE.



bkessler headshot
Bethmara Kessler, CFE, CISA

Consultant, Advisor and ACFE Faculty Member
ACFE Regent

Bethmara Kessler is a global thought leader, lecturer, consultant and advisor to businesses on the topics of fraud, audit, compliance, enterprise risk management, shared services delivery strategies, process transformation and is on the ACFE Faculty and Advisory Council. Kessler is the former Head of Integrated Global Services for the Campbell Soup Company. Her career spans over 30 years in positions that include Chief Compliance Officer, Chief Audit Executive and Enterprise Risk Management Head. Her extensive experience also includes leadership roles in audit, risk management, information technology and corporate investigations in companies including EY, Avon Products, Nabisco, EMI Group, LBrands, The Fraud and Risk Advisory Group and Warner Music Group.

11:25 AM-12:25 PM

Lunch on your own

Sign up for conference updates