You Are Here: Home » Financial Forensics (Page 5)

Unlike most financial litigation training that tends to be general in scope, the Foundations of Financial Forensics Workshop, offered by the Consultants’ Training Instituteprovides attendees with an understanding of the professional responsibilities and legal underpinnings necessary to providing credible financial forensics services along with an overview of the highest growth areas of financial forensics practice.  The nationally recognized and seasoned financial forensic experts who teach the program also dive into the methodologies and approaches for calculating damages, financial investigative and forensic accounting techniques, skills development for communicating with judges, attorneys, and juries, and practice building strategies that are being employed by successful and emerging financial forensic analysts.

Navigating Fraud

Testing the high risk waters in today’s business environment The absence of a fraud risk management (FRM) program exposes a company to financial losses and legal liability if a fraud investigation is not properly handled and the employee is wrongfully discharged, or his or her privacy rights are violated. A FRM program addresses the above concerns and establishes controls every company should have to identi ...

Read more

Fraud Risk Management: Is Your Company Proactive?

The fictional character Fleet Walker provides real world advice Assessing, improving and monitoring anti-fraud programs are key elements of an effective internal control structure. Many companies have a long way to go to address the challenges of fraud and corruption. In this brief article, Professor Crumbley suggests that as a starting point, we consider the steps taken by Fleet Walker (a fictional charact ...

Read more

Financial Institutions See Increasing Threat with Disposable E-mail

In response to having their E-mail addresses constantly traded and sold only to end up being bombarded by spam, consumers have struck back at retailers and corporations. They’ve pulled the plug on the unwanted online marketing mayhem with what’s known as disposable E-mail addresses (DEA).  Accounts don’t require any personal registration information like a name, birthday or location.  They’re also not activ ...

Read more

Why It Makes Sense to Involve a Forensic Technologist in Electronic Discovery

Over 85 Percent of the World’s Information is Stored Electronically, and Over 50 Percent of that Information is Never Printed Out With over 85 percent of the world’s information stored electronically, and over 50 percent of that information never printed out, it’s more important than ever to make sure that electronic discovery related to pending litigation is performed thoroughly—and tracks information on m ...

Read more

How to Calculate Damages that Can Withstand a Challenge—Fraud Files

How Can You Defend "Reasonable Certainty"?  Here are Some Tips One of the common issues raised when an expert calculates damages is “reasonable certainty.”  It is not uncommon for opposing counsel to suggest that the expert’s calculated damages are speculative, explain the editors at the Fraud Files blog.   The calculation of damages necessarily requires estimates and assumptions.  Something has happened, a ...

Read more

Forensic Accountants Need to Know Private-Investigator Laws—Journal of Accountancy

Many States Require CPAs Practicing Forensic Accounting to Now be Licensed as Private Investigators.  The AICPA Provides an Online Guide. Jeff Drew at the Journal of Accountancy reports that the AICPA has made available to members an online guide detailing which states and cities require CPAs practicing forensic accounting to be licensed as a private investigator.  Here's more detail: ...

Read more

Key Points to Cover in Corporate Financial Status Reviews

The Impact of Fraud and Abuse Can Far Exceed the Value of Stolen Money—Civil Penalties Are Often Exorbitant Clients often look to their attorneys as trusted advisors on the issue of prevention of corporate fraud, waste, and abuse. In this article, Joe Epps identifies the impact occupational fraud and abuse has on a company; present governmental oversight issues associated with fraud and abuse; and several c ...

Read more

Financial Forensics in Arson Cases

Net Cash Flow is Often the Most Significant Single Factor in a Financial Condition Analysis A financial expert in an arson case answers four questions: What changes occurred in financial condition prior to the date of the fire? What was the financial condition at the date of the fire? What was the future financial picture if there had not been a fire? Was there a potential financial benefit from the fire?  ...

Read more

Fraud Triage: First Steps When Fraud Is Discovered

A Solid Checklist to Help Businesses Deal with the Immediate Hours after Discovery of Fraud The discovery of fraud within a company can be extremely unnerving and can introduce a certain amount of panic in business owners and accounting professionals. Here’s a checklist of things you should be sure to do—from contacting law enforcement and insurers to preserving evidence and communicating with employees. ...

Read more

How to Commit a $200 Million Scam: Inside the Year’s Most Shocking Credit Card Fraud —Daily Beast

The FBI Says it Busted an 18-Person Ring that Spanned 8 Countries and 28 States.  Make Up. Pump Up. Run Up. Daniel Gross at The Daily Beast explains:  It’s not the latest exercise fad. Rather, according to the Justice Department and the Federal Bureau of Investigation, it’s the three-step process through which an 18-person ring allegedly committed a stunning $200 million credit-card fraud.   Here're the bas ...

Read more

Protecting Your Electronic Intellectual Property

First, Define a Computer Use Policy for Your Firm How can you best protect against IP theft—or simple misuse—by employees? Karl Epps explains that a solid first step is defining a computer use policy establishing approved policies and protocols for removable media, offsite storage, remote access, and laptops. Here’s an overview of common problem areas and software and policies that can help best address the ...

Read more

Intellectual Property Forensic Analysis Valuation Considerations

Different Standards of Value Apply to Different Sort of Intellectual Property Valuations. Here’s Why it Matters—and How to Figure Which Standards Apply. Robert Reilly explains how different sorts of intellectual property (patents, trademarks, copyrights, and trade secret) valuations have different objectives depending on their varying purposed. It’s critical to understand those objectives in order to define ...

Read more

Investigating Embezzlement: Three Big ‘Don’ts’

Whether you are engaged in a business valuation or a forensic investigation, do you know exactly what to do if you suspect that an employee of the subject company is committing theft? Darrell Dorrell and Gregory Gadawski provide company owners, CFOs, valuators, and forensic accountants with a check list of how to proceed in fraud investigations. The key procedural ingredient is caution. Here’s why. ...

Read more

Book Review: Anatomy of a Fraud Investigation

Learn How the Pros Take Down an Embezzlement Scheme and Gather Tips on How to Best Defend Your Own Practice. Mark S. Warshavsky reviews Stephen Pedneault’s Anatomy of A Fraud Investigation. The book combines a step-by-step recounting of best practices with real-life drama as investigators discover, investigate, and resolve a fraud incident—a fantastic guide to how to defend against and uncover fraud. ...

Read more

ACFE Fraud Museum Displays Bernie Madoff’s Cigar Box, Enron Stock, Nigerian Fraud Letters, More —Accounting Today

Fraud's History is Impressive: From Over-the-Counter Cure-Alls to Florida Real Estate and Musical Talent Fraud The Association of Certified Fraud Examiners has built up a choice collection of fraud souvenirs under founder and chairman Dr. Joseph T. Wells. Visit the Accounting Today site to see  some of the most notable pieces, which include Bernie Madoff’s cigar box, an Enron stock certificate, a Nigerian F ...

Read more

What’s Your Fraud IQ?

How Much Do You Know about Protecting Personal and Corporate Information from Would-be Fraudsters? Find out what you know about how to analyze credit, what causes data breaches, what precautions to take when accessing hotspots in an airport with a laptop, current identity theft laws, and controlling physical access to restricted areas. ...

Read more

©2024 NACVA and the Consultants' Training Institute • Toll-Free (800) 677-2009 • 1218 East 7800 South, Suite 301, Sandy, UT 84094 USA

event themes - theme rewards

Scroll to top
G-MZGY5C5SX1
lw