Live Session - How it works
- Username and Password will be sent to you within 24 hours prior to the webinar.
- Presentation handouts in pdf format will be emailed to along with the login instructions or few hours before the meeting starts.
- Login to the session by clicking on “Join the Meeting” in the login instructions and then dial the number to connect to the meeting audio or use your Computer to connect to audio. Please use the name and the email address you used at the time of registration to join the meeting.
- Get answer to your queries through interactive Q&A sessions. The Q and A sessions are at the end of the meeting. The expert will complete his/ her presentation and then the phone lines will be open for the audience to discuss your questions.
- Please let us know your thoughts and views at the end of webinar, your valuable feedback will help us improve our Training programs.
- Certificate of attendance is emailed to you within 6 working days from the date the webinar was completed. If you don’t receive an email within 6 days. Please email our email@example.com
Recorded Session - How it works
- Login Information with Password to view the webinar will be emailed to you within 48 hours from the date the Live webinar was completed. The link to the recording is for a single person use only and it is valid for 6 months or the actual duration the recording was purchased.
- Please click on the link to access the Recording and type in the password provided in the email.
- Presentation and other handouts will be emailed to you in a pdf format.
Training CD - How it works
- Free shipment within 2 working days, from the date the webinar was completed. The presentation and other handouts will be emailed to you in a pdf format if we are unable to attach them in the CD or USB.
(For more information about our products contact +1- 248-233-2049)
If you are unable to attend the meeting Live then you can opt in for the Live Recording instead. Access the recording of the webinar for 6 months. Contact our support for any questions. To prepare an invoice to pay by Check or Wire email us at firstname.lastname@example.org.
Group Internet Based | 1.5 (1 CPE for 50 minutes) | Accounting (1.5 CPE) / Finance (1.5 CPE)Intermediate | Prerequisites - None | No advance preparation
For many organizations, the procure-to-pay cycle offers extensive opportunity for increased operational efficiency. However, it also provides potentially numerous opportunities for fraudsters to exploit control deficiencies in all three stages—purchasing, receiving and disbursements.
One common management mistake in the P2P cycle is adhering to a reactive anti-fraud posture. A criminal act committed in, for example, the purchasing department through a kickback scheme, may be detected and dealt with on an “emergency” basis. Meanwhile, equally, if not more costly frauds may be going unnoticed in the receiving and account payable areas.
Anti-fraud experts urge a proactive, comprehensive P2P anti-fraud approach. It should be include assessing fraud risks in all three phases ... conducting regular audits that comprise testing for these risks and ... following up with effective internal control design and monitoring.
Why you should attend:
Fraud is growing by a staggering 20 percent per year, according to the respected international fraud investigation firm, Kroll. The majority of all fraud, according to the Association of Certified Fraud Examiners is committed by employees.
Because most of the funds flowing out of the organization do so through the procure-to-pay cycle, it stands to reason that much of the growing fraud threat is centered on these critical closely-linked business functions.
This underscores the urgent need for management to understand the vast variety of frauds in P2P and to apply the necessary detection, audit, reporting and prevention measures.
Participants will be able to:
- Understand how the most common procurement, receiving and disbursement fraud are perpetrated, including the latest technology-driven crimes that are costing organizations millions of dollars
- Understand why purchasing, receiving and accounts payable employees commit fraud
- Recognize the all-important red flags of common P2P frauds
- Develop a knowledge base of P2P fraud detection tools and techniques
- Begin creating a framework of effective anti-fraud controls
Who Should Attend:
- Purchasing managers and senior staff
- Accounts payable managers
- Shipping and receiving/supply chain managers
- Accounting and audit practitioners
- CFO’s and senior finance staff
- Internal and external audit professionals
- Senior financial management seeking to reduce their vulnerability to costly frauds
- Compliance and ethics managers
- CFO’s/senior financial managers
- Security personnel
Partial Course Agenda
- Statistical overview of the fraud problem generally, and T&E fraud specifically
- Who commits fraud
- Overview of most common P2P fraud schemes
- Case studies of purchasing, receiving and disbursement fraud
P2P FRAUD DETECTION AND PREVENTION
- Red flags of key P2P frauds
- Conducting a Fraud Risk Assessment of the P2P Cycle
- Audit techniques to identify P2P fraud red flags
- Digging deeper for indicators of actual fraud
- Reporting to Management
- Remediating internal control deficiencies in the P2P process
- Case studies of procurement, receiving and disbursement fraud
Peter Goldmann is President of FraudAware LLC, the publisher of White-Collar Crime Fighter, a widely read bi-monthly newsletter for internal auditors, controllers, corporate counsel, financial operations managers and investigators. The newsletter is in its 15th year of publication under Peter’s leadership.
Peter is the author of Fraud in the
Markets: Why it Happens and How to Fight It, published by John Wiley
& Sons. The book is an in-depth account of the role that fraud
played in bringing about the financial crisis of 2008.
Peter is also the author of four other anti-fraud books covering accounts payable fraud, accounts receivable fraud, as well as two workbooks on fraud and cyber-risk and control, also published by Wiley.
Peter also developed FraudAware, the leading fraud and cyber-crime awareness training program. A user-friendly learning tool, FraudAware uses seminar, Webinar and E-Learning formats to train employees and managers at all levels in how to detect, prevent and report incidents of fraud, information theft and other forms of financial and electronic suspicious conduct.
Fraud Aware courses, which are customized for individual corporate, non-profit and government agency clients, reinforces organizations’ whistleblowing programs by enabling employees to detect illegal activity that can then be reported to supervisors or managers or by using the organization’s confidential hotline in accordance with established policy.
In addition, Peter has conducted numerous on-site fraud and cyber-crime detection and prevention workshops for internal auditors, attorneys, HR executives and compliance officers at Fortune 500 companies including Siemens Corp., Marriott International, Sony Denny’s Corp, as well as large not-for-profit organizations. He has also been a guest lecturer for college accounting and auditing courses.
Peter has 25 years of experience as a business journalist and trainer, having launched, edited and published numerous business trade periodicals covering small business, international trade, management strategy, cyber-crime (Cyber-Crime Fighter) banking and personal finance. He is a Certified Fraud Examiner (CFE) and a member of the Editorial Advisory Committee of the Association of Certified Fraud Examiners (ACFE).
He has been a columnist for the ACFE’s newsletter, The Fraud Examiner and is a frequent contributor to other leading industry publications on anti-fraud and cyber-crime topics. He has appeared on Fox Business News, The Wall Street Journal This Morning, The New York Times and Internal Auditor magazine. Peter holds a Bachelor’s degree from the University of Michigan and a Master’s from the London School of Economics.