The accreditors of this session require that you periodically check in to verify that you are still attentive.
Please click the button below to indicate that you are.
Discover how a trusted employee led a $40M fraud scheme at a top university. Explore evolving insider fraud risks and how to develop a comprehensive program to handle threats. Discover ways to use analytics to detect anomalies and establish risk-based strategies informed by leading practices.
Key Takeaways:
• Insider fraud is a complex, real-world problem.
• Strategic program development that integrates anti-fraud measures can mitigate the risk of insider fraud threats.
• Advanced detection techniques and data analytics can pinpoint anomalous behaviors that identify insider threats.
Learning Objective
Explore the path of trusted insiders to becoming significant fraud risks and understand the evolving nature of insider threats. Learn the essential components of effective insider threat programs that integrate anti-fraud measures, including risk mitigation strategies and best practices. Discover how advanced analytical tools can detect typical insider threat behaviors.
Gain insights to enhance fraud prevention through standardized data-sharing and advanced technology. Learn how effective inter-agency collaboration can improve operational efficiency and governance to protect organizations against fraud…
Leadership is critical in times of change. With the advancement of technology, artificial intelligence and hybrid workforces, the leaders of today are more challenged than those who led in a world of bricks and mortar…
Uncover the power of internal controls in financial reporting and fraud prevention. Hear from agency insiders for insights into bridging the gap between financial managers and program managers. Learn to embed internal controls throughout the organization to achieve greater outcomes…
Privacy Policy Update: We value your privacy and want you to understand how your information is being used. To make sure you have current and accurate information about this sites privacy practices please visit the privacy center by clicking here.