Fall Conference

2017 Fraud Conference – Hackers, Espionage & Conflict Oh My

Date    11/6/2017 – 11/7/2017       Registration 7:30 AM (MT)

Level   Update                              Course Begins  8:00 AM (MT)

Credits   16.0                                 Course Ends    4:25 AM (MT)

Member Fee         $250.00          Non-Member Fee   $250.00

Type

Live Group Seminar

Vendor

Idaho Society of CPAs and Boise Chapter of ACFE

Location

The location is the same as prior year’s conferences in the beautiful MK Plaza in Boise, ID.

MK Plaza

720 E Park Blvd.

Boise, ID 83712

Parking will be located across Park Blvd in the overflow parking for the Stonehouse Restaurant.     Please park in only unmarked stalls as any cars in St. Luke’s or other marked stalls are subject to towing.

Speakers 

Cary Moore, CFE, CISSP (), Liseli Pennings ()

Registration Information for the Upcoming Fraud Conference

To Register for this conference you will need to go to the Idaho Society of CPAs website at http://www.idcpa.org  .   Once there you will need to create an account using the members tab.  You do not need to register as a Society member to attend the conference you can simply register for Continuing Professional Education (CPE) only.

Once registered go the the Continuing Professional Education tab and search for the 2017 Fraud Conference – Hackers, Espionage & Conflict Oh My and follow the registration instructions.

Description

We have 2 great days with nationally acclaimed speakers that we know you will appreciate hearing from!

Day 1 – Losing data to fraud can be costlier than the loss of cash and other assets. To ensure data security, safeguard intellectual property and guard against cyber fraud, fraud examiners must stay informed of rapidly advancing technologies, emerging business trends and the methods employed by increasingly sophisticated information thieves. Join Cary Moore for an in-depth discussion during “Protecting Against Data Breaches & Cyberfraud.”

Day 2 – Conflicts of interest can present significant fraud risks for corporations, government agencies, fiduciaries, customers and suppliers. It is also one of the most difficult areas of fraud to investigate and obtain adequate evidence. Improper investigations can create counterclaims and civil actions against organizations and fraud examiners. Join Liseli Pennings as she clarifies these issues while guiding you through the crucial strategies needed to mitigate the threat of malicious data theft and minimize the risk of inadvertent data loss. While attending “Investigating Conflicts of Interest,” you will also learn useful steps for the creation of data security policies and related internal controls.

Highlights

Day 1 – November 6

Protecting Against Data Breaches And Cyberfraud

  • 8:00 a.m. – 9:20 a.m. – Corporate Espionage 101
    Corporate espionage, which refers to the use of illegal means to gather information for commercial purposes, is a major issue for the business world. This session examines corporate espionage, focusing on targets of corporate espionage, industries that make attractive targets for corporate espionage, various forms of corporate espionage, different ways to move data, insider threats, and case studies that highlight the motivations and methods behind these schemes.
    Corporate Espionage: Where Attackers Get Information 
    This session will explore the variety of techniques that fraudsters employ to obtain trade secrets, proprietary information and information that they can use to develop knowledge-based attacks.
  • 9:20 a.m. – 9:35 a.m. Break
  • 9:35 a.m. – 10:55 a.m. Legal Issues in Information Security
    Every country has laws and regulations that concern information security. This session examines some of the key legal issues concerning the protection of data and intellectual property.
  • 10:55 a.m. – 11:10 a.m. Break
  • 11:10 a.m. – 12:30 p.m. Cloud Computing 
    Organizations and individuals are increasingly storing data and applications on the cloud, but there are risks associated with using cloud-based infrastructure. This session examines cloud computing, focusing on the characteristics and models of cloud computing, compliance issues that arise in the cloud, security challenges with the cloud, and protecting data in the cloud.
  • 12:30 p.m. – 1:30 p.m. Lunch
  • 1:30 p.m. – 2:50 p.m. Managing the Risks of Bring Your Own Device Programs 
    Bring your own device (BYOD) refers to the concept whereby employees bring their own personal electronic devices to work and use them to work. Embracing BYOD offers several advantages to organizations, but it also creates challenges and risks. This session examines those advantages and risks and it discusses ways organizations can minimize risks associated with BYOD systems.
  • 2:50 p.m. – 3:05 p.m. Break
  • 3:05 p.m. – 4:25 p.m. Social Engineering
    This session will cover the means by which attackers use social engineering tactics to gain access to targets’ information resources. It will focus on why social engineering attacks succeed, the different categories of social engineers, the types of information that social engineers target, common red flags of social engineering schemes and measures to prevent becoming victims of social engineering attacks.

Day 2 – November 7

Investigating Conflicts of Interest

  • 8:00 a.m. – 9:20 a.m. Introduction and Legal Elements of Conflicts of Interest 
    Conflict of interest cases are among the most difficult white-collar offenses to investigate; they generally occur at the upper levels of an organization and involve several characteristics that present unique challenges to a fraud examiner. This session introduces the elements of conflicts of interest, examines why they occur and discusses the legal elements involved in investigating such schemes.
  • 9:20 a.m. – 9:35 a.m. Break
  • 9:35 a.m. – 10:55 a.m. Typical Conflict of Interest Situations 
    The specific conflict scenarios described in this session all have common elements, and illustrate the general moral and legal maxim that a person cannot serve “two masters.” The scenarios presented are variations of the rule that a fiduciary, agent or employee must act in good faith, with full disclosure, in the best interest of the principal. You will also learn how to detect conflicts of interest and what red flags to look for.
  • 10:55 a.m. – 11:10 a.m. Break
  • 11:10 a.m. – 12:30 p.m. Investigation Methodology 
    This session will cover the methodology and approach that can be used in investigating conflicts of interest cases. You will discuss how to plan for the investigation, who should be on the investigation team, specific interviewing tips and techniques for conflicts of interest investigations and other considerations to keep in mind while working a conflict of interest case.
  • 12:30 p.m. – 1:30 p.m. Lunch
  • 1:30 p.m. – 2:50 p.m. Document Collection, Organization and Analysis 
    Internal company records, public records and non-public external documents are almost always important in a conflict of interest case. Once the relevant data and documents have been obtained, the investigation team must analyze the content before moving forward with the investigation. In this session, you will learn about different sources of information, as well as techniques and best practices for collecting, organizing, and analyzing the evidence you gather.
  • 2:50 p.m. – 3:05 p.m. Break
  • 3:05 p.m. – 4:25 p.m. Civil Actions and Civil Litigation
    Victims of conflicts of interest can pursue civil actions to recover their losses from the perpetrator. This session explores the process of undertaking these civil actions and provides tips for fraud examiners on how to work with attorneys to make the case successful. In addition, you’ll learn how to protect yourself against civil claims that defendants might use to impede the investigation or to create side issues at trial.

Objectives

Day 1 – November 6

Protecting Against Data Breaches And Cyberfraud

  • Explain the ways data can be stolen by employees and information thieves
  • Enact data security measures and be prepared in the event of a data breach
  • Contend with data theft maneuvers such as social engineering, hacking and espionage
  • Identify various sources of data loss, both internal and external
  • Recognize the impacts of converging trends such as cloud computing and BYOD
  • Recognize the legal and regulatory concerns related to data security

Day 2 – November 7

Investigating Conflicts of Interest

  • Implement investigative techniques for conflict of interest engagements
  • Conduct the flow of conflict of interest investigations
  • Deal with witnesses and the legal implications of these unique investigations
  • Prepare witness statements, documents and electronic evidence
  • Obtain appropriate evidence and preserve it to build a conflict of interest case

Prerequisites

None

Additional Information

 

  • Times listed are MST
  • Online registration closes 2 business days prior to seminar
  • Registration includes printed manual
  • Qualifies for 15 POST credit hours
    • 7.5 per day
  • Qualifies for 16 CPE credit hours
    • 8 per day
    • 2 general ethics credits received on day 1 only
  • Local College Students – The first 5 students may register for only $75 – must call Gwynne @ 208.344.6261 and register via phone.