-->

Sessions

17 CPE

In addition to notable keynote speakers, the 2019 ACFE Fraud Conference Middle East features four tracks covering current fraud issues, case studies and practical solutions. These sessions offer proven best practices and practical tips you can immediately incorporate into your anti-fraud programme.

Sunday, 24 February
09:00h-10:20h

+

2A: Unlocking Efficient Financial Investigations with Data Analytics
Nick Hourigan
Senior Managing Director, FTI Consulting



Henry Duggan
Managing Director, FTI Consulting

This session will explore the use of advanced data analytics in complex financial investigations. A case study of a recent high-value fraud claim will give insight into the interrogation of high-volume document and transactional data discovery, and show how bespoke algorithms can be used for tracing exercises involving complex financial information. The innovative use of technology in this case allowed investigators to uncover the true nature of trades and transfers in a vast and chaotic document population.

An automated tracing tool was able to cut through a million-record banking ledger, tying back to a transactional database formed from decades of banking statements. You will gain fascinating insight into the application of innovative technology, and understand how, why and where such techniques can be deployed.

You Will Learn How To:

  • Expand investigative powers through advanced analytics
  • Ensure that subject-matter expertise (e.g., financial crime) drives the direction of technology-enabled investigations
  • Deploy integrated forensic analytics and data science capabilities to ask directed and open questions of the data
  • Use visualisations for analytics and to empower and inform reviewers, auditors, and investigators

CPE: 1.6
Level: Advanced
Recommended Prerequisites: Knowledge of managing and conducting data-led investigations, and experience with forensic accounting and related financial investigations
Field of Study: Auditing

+

2B: Cross-Border Asset Tracing
Richard Trainer, CFE
Legal Director, Mishcon de Reya LLP

This session will examine two fascinating case studies to raise your awareness of the legal tools available in the global asset-tracing armory. The first involves a $63 million claim against the former seventh richest man in the world, with asset-freezing and disclosure orders in shadowy jurisdictions coordinated by London lawyers. The second will demonstrate how victims of fraud can use private criminal prosecutions to recover assets.

You Will Learn How To:

  • Recall the post-investigation phases of tackling fraud
  • Identify the relatively novel deployment of a Certified Fraud Examiner as a factual witness in litigation
  • Recognize tools available to victims of fraud to trace and secure assets globally, and privately pursue the criminal route to recovery

CPE: 1.6
Level: Advanced
Recommended Prerequisites: Knowledge and experience of the post-investigation phase of the fraud cycle
Field of Study: Specialised Knowledge

+

2C: Forensic Interviewing Techniques
Nicholas Cameron, CA
Partner, KPMG

This session will cover advanced forensic interviewing techniques that will help you prepare your line of questioning in different types of interviews, including witness and suspect interviews.

You Will Learn How To:

  • Ascertain the goals, objectives and purpose of the interview
  • Recognize the core skills of interviewing (rapport, questioning and listening)
  • Distinguish the different elements of the PEACE model for conducting interviews
  • Recall the purpose of taking interview notes
  • Differentiate factors to be considered when taking interview notes

CPE: 1.6
Level: Overview
Recommended Prerequisites: None
Field of Study: Communications and Marketing

+

2D: Fraud Risk Intelligence: Assessing the Unknown Fraud Risk
Iyad Mourtada, CFE, CIA, CRMA, CCSA
Managing Director, OpenThinking Academy

Fraud risk assessments allow auditors, risk managers and fraud examiners to identify and assess the risk of fraud inside their organizations and then decide the appropriate fraud prevention and detection methods to keep the risks under control. However, the quality of a fraud risk assessment depends on your ability to look for potential fraud risks, assess them properly and then rank them in the right order to manage them.

In this session, you will learn how to develop your fraud risk intelligence to improve your ability to conduct fraud risk assessments.

You Will Learn How To:

  • Determine ways to better identify, assess and rank fraud risks
  • Recognise unexpected fraud risk and how to manage them
  • Discern the importance of intuition in addition to financial and non-financial figures
  • Distinguish best practices in fraud risk assessment and fraud audit

CPE: 1.6
Level: Overview
Recommended Prerequisites: None
Field of Study: Specialised Knowledge

10:45h-12:10h

+

Opening General Session
12:10h-13:30h
Lunch/Prayer
13:30h-14:50h

+

3A: Panel Discussion: Identifying and Managing Fraud Risks in the Energy Industry
Moderator: Ryan C. Hubbs, CFE, CIA, CCEP
Global Anticorruption and Fraud Manager, Schlumberger
ACFE Regent

In this panel discussion, you will learn about fraud risks unique to the energy industry and best practices to prevent, detect and investigate such frauds. Hear from industry leaders from different organizations on how they are combatting fraud risks in their companies. Questions from the audience are encouraged in this discussion session.

You Will Learn How To:

  • Compare fraud risks in the energy sector
  • Identify methods to prevent and detect fraud in the energy industry

CPE: 1.6
Level: Overview
Recommended Prerequisites: None
Field of Study: Specialised Knowledge

+

3B: The Rise of Mobile Data and Leveraging Technology in Investigations
Anita Barker, FCA
Partner, Control Risks

The investigation of mobile devices can be overwhelming as data volume and usage increases rapidly. There is a shift from email to chat and text messages as primary business communications channels. This session will explore how technology and analytic techniques can help deliver results faster when investigating allegations of fraud or corruption, and will walk through a real-life example. It is intended for experienced investigators who want to learn how to leverage technology in an investigation.

You Will Learn How To:

  • Distinguish critical data and retrieve it quickly through early case management
  • Recognize when technology-assisted reviews can add value, especially for quick-turn cases
  • Visually relate content that is difficult to capture in linear review

CPE: 1.6
Level: Advanced
Recommended Prerequisites: Experience in conducting fraud and corruption investigations and familiarity with e-discovery platforms
Field of Study: Information Technology

+

3C: Up in the Air: Loyalty Program Fraud and Corporate Ethics
Amir Mousa, CIA, CRMA
Internal Audit Section Head, Al Ain Holding Group

Who should benefit from loyalty program points earned on business trips? Should the employees or the corporation benefit? This session will provide an overview of how internal fraudsters have been able to defraud their employers of millions of dollars through loyalty programs. The session will explore schemes used to take advantage of travel points, hotel points, credit card points and others. You will learn how to uncover the frauds and controls to prevent future frauds from occurring. This session will discuss how to approach an ethical dilemma your employees or coworkers might be experiencing and where to look for guidance. You will also watch videos of fraudsters explaining how they first crossed the ethical line.

You Will Learn How To:

  • Identify ways to uncover loyalty programs fraud
  • Recognize controls that can be implemented to prevent similar frauds
  • Ascertain the importance of thinking through ethical issues

CPE: 1.6
Level: Basic
Recommended Prerequisites: None
Field of Study: Specialised Knowledge

+

3D: Dark Web Threat Intelligence and Investigations
Ritesh Bhatia, CEH, DCPP, DCPLA
Director - Cybercrime Investigations, V4WEB

As the internet grows, the frauds in cyberspace are multiplying. Social engineering skills are being mastered and used all across the world, and data from successful breaches end up on the dark web. In this session, you will learn the dangers of cyberfrauds and how to investigate them on the dark web.

You Will Learn How To:

  • Identify new types of cybercrimes
  • Determine how data ends up on the dark web after a cybercrime
  • Ascertain how to investigate such cybercrime on the dark web

CPE: 1.6
Level: Overview
Recommended Prerequisites: None
Field of Study: Information Technology

15:20h-16:40h

+

4A: Improving Your Data Security and GDPR Compliance
Stephen Hill, Ph.D., MLPI, CIIP
Managing Director, Hill Bingham Ltd

Verizon’s 2017 Data Breach Investigations Report identified that 93% of cases took attackers minutes or less to compromise systems. Organisations, meanwhile, took weeks or more to discover that a breach had even occurred. The Online Trust Alliance discovered that 90% of data breaches could have been prevented using critical security best practices, as 29% were the result of employee error (intentional or accidental) due to a deficiency in internal controls.

Not only are organisations facing increasing challenges to safeguard their data, but pressure is on to comply with the new General Data Protection Regulation (GDPR). This new directive applies to all businesses and creates new guidelines and regulations to follow when handling and storing data. It is therefore crucial to ensure your business can comply; failure to do so can be costly.

High-profile data breaches including Sony, Yahoo and Uber are a wake-up call to organisations everywhere — so just how safe is your data? This session will demonstrate how to review the effectiveness of your data security safeguards and will focus on the GDPR and the significant changes that organisations need to adopt.

You Will Learn How To:

  • Identify how the digital environment is challenging data protection
  • Recognise data security risks and emerging threats including social media
  • Discern and assess GDPR best practices
  • Distinguish the six principles and new challenges set by the regulation

CPE: 1.6
Level: Overview
Recommended Prerequisites: None
Field of Study: Specialised Knowledge

+

4B: Big Data Against Corruption: How Organisations and Governments Can Optimize Data Analytics in the Fight Against Corruption
Ghaz Shah
Senior Director, Alvarez & Marsal Middle East Limited

In today’s age, where massive storage spaces are available with ease, many organisations and governmental institutions are burdened with too much data to effectively mine and analyse.

Without proper data collection and processing, the risk of “garbage in and garbage out” is a costly concern. Big data can allow organisations to be one step ahead but, as with any initiative, requires proper planning and commitment.

This session will explore the actions available to organisations in their fight against corruption, what proactive measures need to be undertaken to collect and process data, how to flag and investigate concerns, what planning and actions are required for monitoring and supervision, and what factors impact the success of such massive projects.

You Will Learn How To:

  • Identify what constitutes big data
  • Compare methods to collect and process data, and the related challenges
  • Determine measures available to flag indicators of corruption and how to investigate them
  • Ascertain what constitutes best practice for ongoing anti-corruption monitoring and supervision

CPE: 1.6
Level: Intermediate
Recommended Prerequisites: Knowledge of what constitutes bribery and corruption and experience with the use of or applications of data analytics
Field of Study: Auditing

+

4C: Oversight in Conflict: Detecting Fraud in Challenging Environments
John F. Sopko
Inspector General, Special Inspector General for Afghanistan Reconstruction

This session will explore security and other existential challenges of operating in a place like Afghanistan, and highlight best practices developed by the Special Inspector General for Afghanistan Reconstruction (SIGAR) to conduct meaningful oversight in the face of these challenges. This session will focus on the mission of SIGAR to oversee the USD 132 billion reconstruction effort in Afghanistan, and the unique challenges of conducting oversight there.

Some of the challenges discussed include widespread security threats, restricted oversight access, corruption, and assessing the Afghan government’s capability to manage and account for international-assistance funding. You will hear examples of SIGAR’s reporting work on corruption, contract fraud, money laundering and wasteful spending. The session will conclude with best practices and lessons learned for conducting oversight, such as audits, investigations, and other work, in challenging environments.

You Will Learn How To:

  • Compare tools and best practices for conducting oversight in a challenging environment
  • Discern lessons learned for oversight in reconstruction and contingency operation efforts

CPE: 1.6
Level: Overview
Recommended Prerequisites: None
Field of Study: Specialised Knowledge

+

4D: Tracking, Tracing and Investigating Cryptocurrency
Teresa Anaya, CFE
Director, Blockchain Intelligence Group

This session will provide an overview of the basic concepts of cryptocurrency, including centralised versus decentralised, market size and types of coins. It will address initial coin offerings (ICOs), cryptocurrency ATMs, evidence considerations and peer-to-peer exchanges, along with at least one case study related to the Fentanyl/opioid crisis in the U.S.

You Will Learn How To:

  • Ascertain the basic concepts associated with cryptocurrency market size and differences of the dominant and privacy-focused cryptocurrencies
  • Recognise the reasons the criminal element uses cryptocurrency
  • Compare best practices for evidence handling
  • Compare how software can track, trace, monitor and bring to prosecution those involved in illicit activity utilizing cryptocurrency

CPE: 1.6
Level: Overview
Recommended Prerequisites: None
Field of Study: Specialised Knowledge

16:45h-17:15h
Optional Session: How to Pass the CFE Exam
Monday, 25 February
09:00h-10:20h

+

5A: Unlocking Efficient Financial Investigations with Data Analytics
Nick Hourigan
Senior Managing Director, FTI Consulting



Henry Duggan
Managing Director, FTI Consulting

This session will explore the use of advanced data analytics in complex financial investigations. A case study of a recent high-value fraud claim will give insight into the interrogation of high-volume document and transactional data discovery, and show how bespoke algorithms can be used for tracing exercises involving complex financial information. The innovative use of technology in this case allowed investigators to uncover the true nature of trades and transfers in a vast and chaotic document population.

An automated tracing tool was able to cut through a million-record banking ledger, tying back to a transactional database formed from decades of banking statements. You will gain fascinating insight into the application of innovative technology, and understand how, why and where such techniques can be deployed.

You Will Learn How To:

  • Expand investigative powers through advanced analytics
  • Ensure that subject-matter expertise (e.g., financial crime) drives the direction of technology-enabled investigations
  • Deploy integrated forensic analytics and data science capabilities to ask directed and open questions of the data
  • Use visualisations for analytics and to empower and inform reviewers, auditors, and investigators

CPE: 1.6
Level: Advanced
Recommended Prerequisites: Knowledge of managing and conducting data-led investigations, and experience with forensic accounting and related financial investigations
Field of Study: Auditing

+

5B: Cross-Border Asset Tracing
Richard Trainer, CFE
Legal Director, Mishcon de Reya LLP

This session will examine two fascinating case studies to raise your awareness of the legal tools available in the global asset-tracing armory. The first involves a $63 million claim against the former seventh richest man in the world, with asset-freezing and disclosure orders in shadowy jurisdictions coordinated by London lawyers. The second will demonstrate how victims of fraud can use private criminal prosecutions to recover assets.

You Will Learn How To:

  • Recall the post-investigation phases of tackling fraud
  • Identify the relatively novel deployment of a Certified Fraud Examiner as a factual witness in litigation
  • Recognize tools available to victims of fraud to trace and secure assets globally, and privately pursue the criminal route to recovery

CPE: 1.6
Level: Advanced
Recommended Prerequisites: Knowledge and experience of the post-investigation phase of the fraud cycle
Field of Study: Specialised Knowledge

+

5C: Forensic Interviewing Techniques
Nicholas Cameron, CA
Partner, KPMG

This session will cover advanced forensic interviewing techniques that will help you prepare your line of questioning in different types of interviews, including witness and suspect interviews.

You Will Learn How To:

  • Ascertain the goals, objectives and purpose of the interview
  • Recognize the core skills of interviewing (rapport, questioning and listening)
  • Distinguish the different elements of the PEACE model for conducting interviews
  • Recall the purpose of taking interview notes
  • Differentiate factors to be considered when taking interview notes

CPE: 1.6
Level: Overview
Recommended Prerequisites: None
Field of Study: Communications and Marketing

+

5D: Fraud Risk Intelligence: Assessing the Unknown Fraud Risk
Iyad Mourtada, CFE, CIA, CRMA, CCSA
Managing Director, OpenThinking Academy

Fraud risk assessments allow auditors, risk managers and fraud examiners to identify and assess the risk of fraud inside their organizations and then decide the appropriate fraud prevention and detection methods to keep the risks under control. However, the quality of a fraud risk assessment depends on your ability to look for potential fraud risks, assess them properly and then rank them in the right order to manage them.

In this session, you will learn how to develop your fraud risk intelligence to improve your ability to conduct fraud risk assessments.

You Will Learn How To:

  • Determine how to better identify, assess and rank fraud risks
  • Recognise unexpected fraud risk and how to manage them
  • Discern the importance of intuition in addition to the financial and non-financial figures
  • Distinguish best practices in fraud risk assessment and fraud audit

CPE: 1.6
Level: Overview
Recommended Prerequisites: None
Field of Study: Specialised Knowledge

10:50h-12:10h

+

6A: Enhanced Due Diligence and Open-Source Investigation Methods and Tools
Abdallah Alomari, CFE, CAMS, CAPM, GRCP
Founder & General Manager, KYC Jordan

This session will focus on the different resources used in investigations, including techniques to narrow searches and get the information you need. You will learn about research databases and sources of information available in the Middle East to track assets, sources of wealth and corporate registry, among others. You will also learn about enhanced due diligence, what it covers, how to prepare it and how to use open-source investigations to fulfill its different parts. The session will end with nontraditional investigation tools, such as field investigators, geospatial reviews for site visits and reputation enquiry that will aid your due diligence.

You Will Learn How To:

  • Recall open-source research methodology
  • Discern the credibility of sources used in investigations
  • Identify the main parts of enhanced due diligence reporting
  • Determine when to use geospatial techniques and in-field investigators

CPE: 1.6
Level: Intermediate
Recommended Prerequisites: Fundamental knowledge in open-source investigation, enhanced due diligence and know your customer (KYC) practices
Field of Study: Information Technology

+

6B: Auditing Third-Party Business Partners
Hassan Metwally, CFE, CPA, CIA, CCEP
Global Compliance Auditor, Bio-Rad Laboratories

Auditing is not just about the books and records, but also evaluating what is being done to drive compliance from the company to third-party business partners to mitigate corruption risks. Different types of partners bring different risks. In this session, you will learn how to conduct a full-scope audit to understand what risks a third-party partner actually brings.

You Will Learn How To:

  • Identify the objectives of a monitoring and audit program
  • Discern the risks of conducting business with third parties

CPE: 1.6
Level: Intermediate
Recommended Prerequisites: Knowledge of and experience with the fundamentals of compliance and auditing
Field of Study: Auditing

+

6C: Soft Controls for Fraud Prevention: Ethics and Culture in Auditing
Muneer Al-Mughairy, MBA, CFE, CIA, CISA
Chief Internal Auditor, Oman International Development and Investment Company

Many fraud incidents take place as a result of failed internal controls. Hard (tangible) internal controls such as a segregation of duties, supervisory review, authority matrices and many others are easy to audit. However, soft (intangible) controls such as ethics, culture, board oversight and management style are more challenging to review. By looking at recent examples, such as Toshiba and Wells Fargo, you will see failures in soft controls and identify red flags.

You Will Learn How To:

  • Ascertain soft control requirements in the COSO framework and other standards, such as the United Nations Convention against Corruption
  • Identify red flags of failures in soft internal controls
  • Determine actions to review and assess the impact of these red flags on the organization
  • Identify challenges to examining soft controls and learn tools and techniques to overcome such challenges
  • Recognize best practices in reporting and escalating audit findings or red flags within the organization

CPE: 1.6
Level: Intermediate
Recommended Prerequisites: Experience in audit and ability to differentiate between hard and soft controls
Field of Study: Behavioral Ethics

+

6D: Panel Discussion: Enhancing Your Fraud Risk Management Strategy

Are you seeking to benchmark your organization’s fraud risk management strategy? Would you like to learn more about the challenges and successes other organizations have experienced in implementing a holistic anti-fraud program? In this session, you’ll hear from anti-fraud leaders in a variety of industries about how they’ve effectively organised the fraud risk management functions at their organizations. Participants will discuss best practices in program governance and oversight, the allocation of fraud risk among lines of defense, and the design and implementation of specific components of the program.

You Will Learn How To:

  • Categorise methods of fraud risk management
  • Recognise effective best practices to identify and manage fraud risks

CPE: 1.6
Level: Overview
Recommended Prerequisites: None
Field of Study: Management Advisory Services

12:10h-13:30h
Lunch/Prayer
13:30h-14:50h

+

7A: Improving Your Data Security and GDPR Compliance
Stephen Hill, Ph.D., MLPI, CIIP
Managing Director, Hill Bingham Ltd

Verizon’s 2017 Data Breach Investigations Report identified that 93% of cases took attackers minutes or less to compromise systems. Organisations, meanwhile, took weeks or more to discover that a breach had even occurred. The Online Trust Alliance discovered that 90% of data breaches could have been prevented using critical security best practices, as 29% were the result of employee error (intentional or accidental) due to a deficiency in internal controls.

Not only are organisations facing increasing challenges to safeguard their data, but pressure is on to comply with the new General Data Protection Regulation (GDPR). This new directive applies to all businesses and creates new guidelines and regulations to follow when handling and storing data. It is therefore crucial to ensure your business can comply; failure to do so can be costly.

High-profile data breaches including Sony, Yahoo and Uber are a wake-up call to organisations everywhere — so just how safe is your data? This session will demonstrate how to review the effectiveness of your data security safeguards and will focus on the GDPR and the significant changes that organisations need to adopt.

You Will Learn How To:

  • Identify how the digital environment is challenging data protection
  • Recognise data security risks and emerging threats including social media
  • Discern and assess GDPR best practices
  • Distinguish the six principles and new challenges set by the regulation

CPE: 1.6
Level: Overview
Recommended Prerequisites: None
Field of Study: Specialised Knowledge

+

7B: Big Data Against Corruption: How Organisations and Governments Can Optimize Data Analytics in the Fight Against Corruption
Ghaz Shah
Senior Director, Alvarez & Marsal Middle East Limited

In today’s age, where massive storage spaces are available with ease, many organisations and governmental institutions are burdened with too much data to effectively mine and analyse.

Without proper data collection and processing, the risk of “garbage in and garbage out” is a costly concern. Big data can allow organisations to be one step ahead but, as with any initiative, requires proper planning and commitment.

This session will explore the actions available to organisations in their fight against corruption, what proactive measures need to be undertaken to collect and process data, how to flag and investigate concerns, what planning and actions are required for monitoring and supervision, and what factors impact the success of such massive projects.

You Will Learn How To:

  • Identify what constitutes big data
  • Compare methods to collect and process data, and the related challenges
  • Determine measures available to flag indicators of corruption and how to investigate them
  • Ascertain what constitutes best practice for ongoing anti-corruption monitoring and supervision

CPE: 1.6
Level: Intermediate
Recommended Prerequisites: Knowledge of what constitutes bribery and corruption and experience with the use of or applications of data analytics
Field of Study: Auditing

+

7C: Oversight in Conflict: Detecting Fraud in Challenging Environments
John F. Sopko
Inspector General, Special Inspector General for Afghanistan Reconstruction

This session will explore security and other existential challenges of operating in a place like Afghanistan, and highlight best practices developed by the Special Inspector General for Afghanistan Reconstruction (SIGAR) to conduct meaningful oversight in the face of these challenges. This session will focus on the mission of SIGAR to oversee the USD 132 billion reconstruction effort in Afghanistan, and the unique challenges of conducting oversight there.

Some of the challenges discussed include widespread security threats, restricted oversight access, corruption, and assessing the Afghan government’s capability to manage and account for international-assistance funding. You will hear examples of SIGAR’s reporting work on corruption, contract fraud, money laundering and wasteful spending. The session will conclude with best practices and lessons learned for conducting oversight, such as audits, investigations, and other work, in challenging environments.

You Will Learn How To:

  • Compare tools and best practices for conducting oversight in a challenging environment
  • Discern lessons learned for oversight in reconstruction and contingency operation efforts

CPE: 1.6
Level: Overview
Recommended Prerequisites: None
Field of Study: Specialised Knowledge

+

7D: Tracking, Tracing and Investigating Cryptocurrency
Teresa Anaya, CFE
Director, Blockchain Intelligence Group

This session will provide an overview of the basic concepts of cryptocurrency, including centralised versus decentralised, market size and types of coins. It will address initial coin offerings (ICOs), cryptocurrency ATMs, evidence considerations and peer-to-peer exchanges, along with at least one case study related to the Fentanyl/opioid crisis in the U.S.

You Will Learn How To:

  • Ascertain the basic concepts associated with cryptocurrency market size and differences of the dominant and privacy-focused cryptocurrencies
  • Recognise the reasons the criminal element uses cryptocurrency
  • Compare best practices for evidence handling
  • Compare how software can track, trace, monitor and bring to prosecution those involved in illicit activity utilizing cryptocurrency

CPE: 1.6
Level: Overview
Recommended Prerequisites: None
Field of Study: Specialised Knowledge

15:15h-16:40h

+

Closing General Session
Ian Yip
Chief Technology Officer, Asia-Pacific, McAfee

CPE: 1.7
Level: Overview
Recommended Prerequisites: None
Field of Study: Specialised Knowledge


Tuesday, 26 February
09:00h-14:20h

+

Investigating Shell Companies
Ryan C. Hubbs, CFE, CIA, CCEP
Global Anticorruption and Fraud Manager, Schlumberger
ACFE Regent

The revelations of the Panama Papers, UnaOil scandal and the recent Paradise Papers leaks have highlighted that shell companies should be a focus for fraud examiners and compliance professionals. Shell companies are increasingly being used to evade sanctions, facilitate money laundering, enable the transfer of illegal proceeds and disguise corruption. This session will discuss identifying, investigating and preventing contact with potential shell companies and their beneficiaries.

Course Outline:

  • 09:00-09:50 Shells, Their Use in International Frauds, and Their Characteristics, Part 1
  • 10:10–11:00 Shells, Their Use in International Frauds, and Their Characteristics, Part 2
  • 11:20–12:10 Investigating Shell Companies and Shell Networks, Part 1
  • 13:30–14:20 Investigating Shell Companies and Shell Networks, Part 2

You Will Learn How To:

  • Ascertain what shell companies are and how they can serve both legitimate and illegitimate purposes
  • Identify common characteristics of shell companies and what makes them appealing to fraudsters
  • Determine how to investigate shell companies and follow the trail to uncover larger shell networks

CPE: 4
Level: Overview
Recommended Prerequisites: None
Field of Study: Specialised Knowledge

12:10h-13:30h
Lunch/Prayer

Thank You for Attending

2019 ACFE Fraud Conference Middle East