Training Course
Syllabus:
Recognizing and Investigating Payments Fraud
This interactive workshop focuses on how to recognize and investigate common forms of payments fraud. Using examples of real cases, attendees learn how to recognize red flags and understand the investigation process. The course covers all forms of payments; check fraud, wire transfer fraud, ACH fraud, mobile fraud and card fraud. Each section will discuss common forms of fraud in that payment system, mitigation and investigation techniques, plus provide tips for attendees on how to avoid many scams. Attendees are encouraged to bring along their own situations for group discussion. This workshop is highly interactive and includes opportunities for attendees to work through mock investigations to determine the best resolution. Learning Objectives: Recognize common forms of payments fraud Interpret red flags of fraud Acquire common investigation techniques Analyze sound business practices to reduce exposure and loss Breakdown evidence collection and preservation techniques (electronic and physical) Build an investigation strategy from given mock fraud scenarios Areas Covered: Examples of common forms of payments fraud Identifying red flags of potential fraud Investigation techniques Sound business practices that help reduce exposure to fraud Evidence collection and preservation Hands-on group exercises to develop an investigation strategy for mock fraud situations Resources, take-away, and group discussions DAY 01(8:30 AM - 4:30 PM) 08.30 AM - 09.00 AM: Registration 09.00 AM: Session Start Payments fraud Discuss common forms of payments fraud, identify corresponding red flags, and discuss effective mitigation controls Consumer Advance Fee Frauds Account Takeover Senior exploitation Other relevant frauds in effect around the time of the program Businesses, Financial Institutions and Financial Firms Business Email Compromise Ransomware / Malware Embezzlement / Insider Fraud Profile of an embezzler Common practices that reduce exposure Account Takeover Social engineering Current trends of counterfeit checks Compromising card frauds Other relevant frauds in effect around the time of the program Investigation techniques and tips Occupational fraud / internal fraud External fraud Sound business practices that help reduce exposure to fraud Risk Assessment and audit findings Control gaps analysis / Business Impact Analysis Monitoring (internal and external) Account security Investigations Evidence collection and preservation Digital evidence Physical evidence Taking witness statements Filing reports and working with law enforcement Maintaining case files Tips on testifying DAY 02(8:30 AM - 4:00 PM) Day 1 questions & discussion Hands-on group exercises Apply Day 1 knowledge to case studies and group exercises Analyze case studies to determine risk and exposure Identify frauds Document appropriate controls to mitigate risk Develop an investigation strategy Conclude with valuable resources, take-away, and group discussions |