Conducting investigations online goes a great deal farther than conducting Google searches. With the constant changes on the WWW and in Web 2.0 applications, fraud investigators needs to constantly learn and adapt the newest methodologies for conducting their online investigations.
This course is intended to teach participants how to effectively and discreetly use internet resources, create proper search strategies and run advanced social network investigations for fraud examinations, asset location and due diligence investigations.
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Benjamin Ang
When Companies are hit by cyber security breaches, they and their directors may have legal liabilities to employees, customers, regulators and the authorities. This presentation gives special emphasis to Singapore law.
Cybersecurity and Legal lessons after Apple v FBIBenjamin Ang
After the case of Apple v FBI was not resolved in court, question of security vs privacy in the cybersecurity field still remain. Is encryption good or bad or is there a better way to balance the interests of law enforcement, business, end users and regulators? This presentation gives special emphasis to Singapore law.
NATO Cyber Security Conference: Creating IT-Security Start-UpsBenjamin Rohé
introduction about the cyber security startup landscape, what are the drivers, why businesses and governments need to act, some predictions for 2015 and beyond, investment market and Palantir mini-case-study, market growth, 3 startup tips from founders, some references and additional material
Cyber Threat Intelligence (CTI) primarily focuses on analysing raw data gathered from recent and past events to monitor, detect and prevent threats to an organisation, shifting the focus from reactive to preventive intelligent security measures.
SafeGuard provides comprehensive background screening and substance abuse testing services that help businesses mitigate risks, realize greater morale and productivity, and see decreases in accidents, absenteeism, downtime, turnover, and theft.
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Benjamin Ang
When Companies are hit by cyber security breaches, they and their directors may have legal liabilities to employees, customers, regulators and the authorities. This presentation gives special emphasis to Singapore law.
Cybersecurity and Legal lessons after Apple v FBIBenjamin Ang
After the case of Apple v FBI was not resolved in court, question of security vs privacy in the cybersecurity field still remain. Is encryption good or bad or is there a better way to balance the interests of law enforcement, business, end users and regulators? This presentation gives special emphasis to Singapore law.
NATO Cyber Security Conference: Creating IT-Security Start-UpsBenjamin Rohé
introduction about the cyber security startup landscape, what are the drivers, why businesses and governments need to act, some predictions for 2015 and beyond, investment market and Palantir mini-case-study, market growth, 3 startup tips from founders, some references and additional material
Cyber Threat Intelligence (CTI) primarily focuses on analysing raw data gathered from recent and past events to monitor, detect and prevent threats to an organisation, shifting the focus from reactive to preventive intelligent security measures.
SafeGuard provides comprehensive background screening and substance abuse testing services that help businesses mitigate risks, realize greater morale and productivity, and see decreases in accidents, absenteeism, downtime, turnover, and theft.
We are a specialized company in immigration screening and providing our services to various governments in Asia, Middle East and Europe. We also providing background verifications to numerous corporations for their employment screening needs and originators of one of the world’s largest International Criminality, Fraud and Risk repositories which is being used by various HR and PES companies around the world.
DataFlow Pakistan established in 2007, providing comprehensive domestic coverage with on-the-ground presence in more than 8 cities across Pakistan.
DataFlow Pakistan is managed by the founders who have collectively more than 100 years of experience of working in the risk management, investigations and consulting space in the Asia Pacific region. Our board of directors based out of Singapore maintains supervision over the operations of DataFlow and provide the valuable guidance and direction to the company.
Area of Services
• Immigration Screening - Student Visa, Work Permits and Migration applications
• Enhanced Background Screening - Employee, Vendor and Business Partner Screening
• Document Verification - We counter Document Frauds by providing verification of many types of issued documents pertaining to academic qualification, employment history, and financial support claims such as bank statements, loan letters, sponsor letter, saving certificates etc.
• Pakistan Specific Fraud Data – Dual /Fake ID holders, Criminal/Civil/Banking Court data, Tax/Loan Defaulters data, Banned Companies data, Negative Public notices, Regulatory and Financial embezzlement data
• International Criminality Data - One of the World’s largest International Criminality, Risk and Fraud databases focused on Emerging Markets (200+ Million records , 209 countries covered, 300+ Sources, Daily updates)
A free webinar that offers advice on what information you can and cannot use from a social media background screening. Learn common pitfalls of social media background checks and how to avoid legal risks.
To view the entire webinar recording, visit: http://i-sight.com/social-media-background-screening/
We offer services such as Partner and Marital Investigation, Teenage Surveillance and Drug Detection,etc. Contact us if you are searching for a Private Investigation Services in Ireland.
With 1.2 billion monthly active users on Facebook alone, it’s not surprising that social media networks can be a rich source of information for investigators. And because Americans spend more time on social media than any other major Internet activity, including email, social media information and evidence is plentiful. You just need to know how to get it.
Finding, preserving and collecting social media evidence often requires some forensic skills, as well as an understanding of the laws that govern its collection and use. It’s important for investigators to be aware of both the possibilities and limitations of social media forensics.
Facebook Forensics Toolkit(FFT) is a very simple Forensic Tool to find out people's personal and behavioral information through extracting data from their Facebook profile .
Corporate Executive Protection in the 21st CenturyAS Solution
AS Solution is changing the conversation about executive protection. This presentation offers valuable takeaways that we have learned while helping our clients with their global expansion.
Besides its focus on the core areas of Fraud Prevention, Financial Crimes and Computer Forensics, ICFE also aims to share its expertise with working professionals / organisations who wish to stay abreast of the latest developments in corporate and anti-fraud measures. We do this by organising various in-house training programmes which are tailored to suit different companies in their specific industries.
At ICFE, we focus in 5 areas of professional development:
• Fraud Prevention
• Anti-Money Laundering
• Business Ethics & Corporate Governance
• Computer Forensics
• Corporate Skills & Leadership Development
The Graduate Diploma in Digital Forensics and Cyber Security aims to improve the technical capabilities of IT and Computer Science professionals across Asia. You will learn the latest investigative and forensic techniques available to trace and track digital evidence using high tech tools for investigation. You will also gain a better understanding of the legal and ethical framework using practical case studies and analysis.
Formed in 2011, The Infotention Network, LLC focuses on developing courses, tools, and the learning networks required to enable the fullest participation of an informed citizenry and the development of a sustainable capable and confident workforce.
We are a specialized company in immigration screening and providing our services to various governments in Asia, Middle East and Europe. We also providing background verifications to numerous corporations for their employment screening needs and originators of one of the world’s largest International Criminality, Fraud and Risk repositories which is being used by various HR and PES companies around the world.
DataFlow Pakistan established in 2007, providing comprehensive domestic coverage with on-the-ground presence in more than 8 cities across Pakistan.
DataFlow Pakistan is managed by the founders who have collectively more than 100 years of experience of working in the risk management, investigations and consulting space in the Asia Pacific region. Our board of directors based out of Singapore maintains supervision over the operations of DataFlow and provide the valuable guidance and direction to the company.
Area of Services
• Immigration Screening - Student Visa, Work Permits and Migration applications
• Enhanced Background Screening - Employee, Vendor and Business Partner Screening
• Document Verification - We counter Document Frauds by providing verification of many types of issued documents pertaining to academic qualification, employment history, and financial support claims such as bank statements, loan letters, sponsor letter, saving certificates etc.
• Pakistan Specific Fraud Data – Dual /Fake ID holders, Criminal/Civil/Banking Court data, Tax/Loan Defaulters data, Banned Companies data, Negative Public notices, Regulatory and Financial embezzlement data
• International Criminality Data - One of the World’s largest International Criminality, Risk and Fraud databases focused on Emerging Markets (200+ Million records , 209 countries covered, 300+ Sources, Daily updates)
A free webinar that offers advice on what information you can and cannot use from a social media background screening. Learn common pitfalls of social media background checks and how to avoid legal risks.
To view the entire webinar recording, visit: http://i-sight.com/social-media-background-screening/
We offer services such as Partner and Marital Investigation, Teenage Surveillance and Drug Detection,etc. Contact us if you are searching for a Private Investigation Services in Ireland.
With 1.2 billion monthly active users on Facebook alone, it’s not surprising that social media networks can be a rich source of information for investigators. And because Americans spend more time on social media than any other major Internet activity, including email, social media information and evidence is plentiful. You just need to know how to get it.
Finding, preserving and collecting social media evidence often requires some forensic skills, as well as an understanding of the laws that govern its collection and use. It’s important for investigators to be aware of both the possibilities and limitations of social media forensics.
Facebook Forensics Toolkit(FFT) is a very simple Forensic Tool to find out people's personal and behavioral information through extracting data from their Facebook profile .
Corporate Executive Protection in the 21st CenturyAS Solution
AS Solution is changing the conversation about executive protection. This presentation offers valuable takeaways that we have learned while helping our clients with their global expansion.
Besides its focus on the core areas of Fraud Prevention, Financial Crimes and Computer Forensics, ICFE also aims to share its expertise with working professionals / organisations who wish to stay abreast of the latest developments in corporate and anti-fraud measures. We do this by organising various in-house training programmes which are tailored to suit different companies in their specific industries.
At ICFE, we focus in 5 areas of professional development:
• Fraud Prevention
• Anti-Money Laundering
• Business Ethics & Corporate Governance
• Computer Forensics
• Corporate Skills & Leadership Development
The Graduate Diploma in Digital Forensics and Cyber Security aims to improve the technical capabilities of IT and Computer Science professionals across Asia. You will learn the latest investigative and forensic techniques available to trace and track digital evidence using high tech tools for investigation. You will also gain a better understanding of the legal and ethical framework using practical case studies and analysis.
Formed in 2011, The Infotention Network, LLC focuses on developing courses, tools, and the learning networks required to enable the fullest participation of an informed citizenry and the development of a sustainable capable and confident workforce.
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...Falgun Rathod
Cyber Octet Private Limited is India's renowned Cyber Security Company of India and listed in Top 25 Companies. Cyber Octet Provides Ethical Hacking Training in Ahmedabad & Cyber Security Training and Certifications. More than 50000 Students has been trained by Cyber Octet Private Limited.
Introduction:
Welcome to LogikEye, where innovation meets security. In an era dominated by rapid technological advancements, LogikEye stands as a beacon of excellence in the realm of cyber security and digital forensics. Established with a passion for safeguarding digital landscapes, LogikEye is dedicated to providing cutting-edge solutions that empower businesses to navigate the evolving threat landscape with confidence.
About Us:
LogikEye was founded with a vision to redefine the paradigm of cyber security and digital forensics. As a customer-centric organization, we pride ourselves on delivering holistic solutions that not only protect against cyber threats but also enable businesses to harness the full potential of the digital era securely.
Mission:
Our mission at LogikEye is clear - to be the guardians of your digital assets. We strive to provide robust cyber security measures and advanced digital forensics services that empower our clients to thrive in a secure digital environment.
Vision:
At LogikEye, we envision a future where businesses operate seamlessly in a digitally connected world, free from the fear of cyber threats. Our vision is to be at the forefront of technological innovation, setting new standards in cyber security and digital forensics to create a safer digital space for all.
Core Values:
Innovation: We embrace innovation as the cornerstone of our solutions. By staying ahead of the technological curve, we empower our clients with the latest advancements in cyber security.
Integrity: We uphold the highest standards of integrity in all our interactions. Transparency and honesty are at the heart of our business practices.
Customer-Centric: Our clients are at the center of everything we do. We are committed to understanding their unique needs and delivering tailored solutions.
Collaboration: We believe in collaborative partnerships, both within our team and with our clients. Together, we create stronger, more resilient digital ecosystems.
Our Services:
1. Cyber Security Solutions:
Network Security: LogikEye ensures the integrity of your digital infrastructure by safeguarding against unauthorized access and cyber attacks.
Endpoint Security: We secure end-user devices, preventing malicious activities and ensuring the protection of critical data.
Incident Response: LogikEye provides swift and effective responses to cyber incidents, minimizing potential damage and mitigating future risks.
2. Digital Forensics:
Data Recovery: Our advanced forensics techniques enable the retrieval of lost or compromised data, ensuring business continuity.
Incident Investigation: LogikEye conducts thorough investigations to identify root causes and vulnerabilities in the event of a security incident.
Expert Witness Services: We offer expert testimony and support in legal proceedings related to digital evidence.
Our Team:
Behind LogikEye is a team of highly skilled professionals, each an expert in their respective fields. Our dive
IT Governance & Leadership 17 - 20 November 2014 Dubai, UAE360 BSI
Information and related technology have become increasingly crucial in the sustainability, growth and management of value and risk in most enterprises. As a result, IT has moved from a support role to a central position within enterprises.
The enhanced role of IT for enterprise value creation and risk management has been accompanied by an increased emphasis on the Governance and Management of Enterprise IT (GEIT).
Enterprise stakeholders and the governing board wish to ensure that IT fulfills the goals of the enterprise. GEIT is an integral part of overall corporate governance.
GEIT addresses the definition and implementation of processes, structures and relational mechanisms within the enterprise that enable business and IT staff to
execute their responsibilities in support of creating or sustaining business value.
In this course you will learn and understand how to assess and evaluate an organization’s GEIT and make sure that IT is properly aligned with the business objectives.
COBIT 5 can help enterprises create optimal value from IT by maintaining a balance between realizing benefits, optimizing risk management and leveraging resources. The COBIT 5.0 addresses both business and IT functional areas and provides a governance, management and operational framework for enterprises of all sizes, whether commercial, not-for-profit or public sector.
Contact Kris at kris@360bsi.com to register.
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE360 BSI
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Information security is critical for modern business models today.
Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats.
Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
- Master the tools & techniques for effective information & network security.
- Discover how to create a complete & sustainable IT security architecture.
- Gain knowledge on how to develop sound security policy together with your security architecture.
- Learn how to perform an IT governance assessment using CoBIT 4.0
- Learn how to perform smart security risk assessment within your organization.
- Gain valuable insights on implementing a proactive & robust security management system.
- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Contact Kris at kris@360bsi.com for further information.
Yes of course, you can easily start mining pi network coin today and sell to legit pi vendors in the United States.
Here the telegram contact of my personal vendor.
@Pi_vendor_247
#pi network #pi coins #legit #passive income
#US
BONKMILLON Unleashes Its Bonkers Potential on Solana.pdfcoingabbar
Introducing BONKMILLON - The Most Bonkers Meme Coin Yet
Let's be real for a second – the world of meme coins can feel like a bit of a circus at times. Every other day, there's a new token promising to take you "to the moon" or offering some groundbreaking utility that'll change the game forever. But how many of them actually deliver on that hype?
how to sell pi coins effectively (from 50 - 100k pi)DOT TECH
Anywhere in the world, including Africa, America, and Europe, you can sell Pi Network Coins online and receive cash through online payment options.
Pi has not yet been launched on any exchange because we are currently using the confined Mainnet. The planned launch date for Pi is June 28, 2026.
Reselling to investors who want to hold until the mainnet launch in 2026 is currently the sole way to sell.
Consequently, right now. All you need to do is select the right pi network provider.
Who is a pi merchant?
An individual who buys coins from miners on the pi network and resells them to investors hoping to hang onto them until the mainnet is launched is known as a pi merchant.
debuts.
I'll provide you the Telegram username
@Pi_vendor_247
Abhay Bhutada Leads Poonawalla Fincorp To Record Low NPA And Unprecedented Gr...Vighnesh Shashtri
Under the leadership of Abhay Bhutada, Poonawalla Fincorp has achieved record-low Non-Performing Assets (NPA) and witnessed unprecedented growth. Bhutada's strategic vision and effective management have significantly enhanced the company's financial health, showcasing a robust performance in the financial sector. This achievement underscores the company's resilience and ability to thrive in a competitive market, setting a new benchmark for operational excellence in the industry.
The European Unemployment Puzzle: implications from population agingGRAPE
We study the link between the evolving age structure of the working population and unemployment. We build a large new Keynesian OLG model with a realistic age structure, labor market frictions, sticky prices, and aggregate shocks. Once calibrated to the European economy, we quantify the extent to which demographic changes over the last three decades have contributed to the decline of the unemployment rate. Our findings yield important implications for the future evolution of unemployment given the anticipated further aging of the working population in Europe. We also quantify the implications for optimal monetary policy: lowering inflation volatility becomes less costly in terms of GDP and unemployment volatility, which hints that optimal monetary policy may be more hawkish in an aging society. Finally, our results also propose a partial reversal of the European-US unemployment puzzle due to the fact that the share of young workers is expected to remain robust in the US.
how to swap pi coins to foreign currency withdrawable.DOT TECH
As of my last update, Pi is still in the testing phase and is not tradable on any exchanges.
However, Pi Network has announced plans to launch its Testnet and Mainnet in the future, which may include listing Pi on exchanges.
The current method for selling pi coins involves exchanging them with a pi vendor who purchases pi coins for investment reasons.
If you want to sell your pi coins, reach out to a pi vendor and sell them to anyone looking to sell pi coins from any country around the globe.
Below is the contact information for my personal pi vendor.
Telegram: @Pi_vendor_247
How to get verified on Coinbase Account?_.docxBuy bitget
t's important to note that buying verified Coinbase accounts is not recommended and may violate Coinbase's terms of service. Instead of searching to "buy verified Coinbase accounts," follow the proper steps to verify your own account to ensure compliance and security.
What website can I sell pi coins securely.DOT TECH
Currently there are no website or exchange that allow buying or selling of pi coins..
But you can still easily sell pi coins, by reselling it to exchanges/crypto whales interested in holding thousands of pi coins before the mainnet launch.
Who is a pi merchant?
A pi merchant is someone who buys pi coins from miners and resell to these crypto whales and holders of pi..
This is because pi network is not doing any pre-sale. The only way exchanges can get pi is by buying from miners and pi merchants stands in between the miners and the exchanges.
How can I sell my pi coins?
Selling pi coins is really easy, but first you need to migrate to mainnet wallet before you can do that. I will leave the telegram contact of my personal pi merchant to trade with.
Tele-gram.
@Pi_vendor_247
Lecture slide titled Fraud Risk Mitigation, Webinar Lecture Delivered at the Society for West African Internal Audit Practitioners (SWAIAP) on Wednesday, November 8, 2023.
2. Elemental Economics - Mineral demand.pdfNeal Brewster
After this second you should be able to: Explain the main determinants of demand for any mineral product, and their relative importance; recognise and explain how demand for any product is likely to change with economic activity; recognise and explain the roles of technology and relative prices in influencing demand; be able to explain the differences between the rates of growth of demand for different products.
The secret way to sell pi coins effortlessly.DOT TECH
Well as we all know pi isn't launched yet. But you can still sell your pi coins effortlessly because some whales in China are interested in holding massive pi coins. And they are willing to pay good money for it. If you are interested in selling I will leave a contact for you. Just telegram this number below. I sold about 3000 pi coins to him and he paid me immediately.
Telegram: @Pi_vendor_247
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Social Media Investigation
1. SOCIAL MEDIA
INVESTIGATION
28 - 29 October 2014 Best Western Premier Dua Sentral, Kuala Lumpur
LEARNING OBJECTIVES
Learn to use Google effectively
Learn how to conduct your online investigations discreetly and
undercover
Expose social networks and personal vulnerabilities
Hunt down online social network profiles for criminals and elusive types
We will expose fraudulent people and enterprises, locate assets and
undercover intelligence
Learn how to use eBay and other online auction sites for
investigations
Learn free resources found on the Internet for conducting due diligence
and background investigations
Prevent exposing yourselves and your families online
29 September 2014 for
EARLY BIRD
FINANCIAL STATEMENT FRAUD
ICFE Group of Companies
International Cybercrime & Forensics Examiners
SINGAPORE | MALAYSIA | HONG KONG
ARNING earn earn ndercover
xpose unt e ndercover earn vestigations
earn nd event Register by
f
DISCOUNT!
Conducting investigations online goes a great deal farther than
conducting Google searches. With the constant changes on the WWW and
in Web 2.0 applications, fraud investigators needs to constantly learn and
adapt the newest methodologies for conducting their online
investigations.
This course is intended to teach participants how to effectively and
discreetly use internet resources, create proper search strategies and run
advanced social network investigations for fraud examinations, asset
location and due diligence investigations.
WHO SHOULD ATTEND?
Investigators
Journalists
Law Enforcement Officers
Risk Management
Finance Manager/Director
HR Manager/Director
Compliance Officers
Internal or External Auditors
Fraud Investigators
CFOs/ CEOs
Local Government Lawyers
Officers and Managers
COURSE INTRODUCTION
Website: www.icfe-cg.com
Email: enquiry@icfe-cg.com Follow us: ICFE Group of Companies
Tel: (603) 2282 5406 Fax: (603) 2282 5407
Follow us:
ICFE Malaysia Sdn Bhd • Co. Reg No: 871789 - X
2. SOCIAL MEDIA INVESTIGATION
28 - 29 October 2014 Best Western Premier Dua Sentral, Kuala Lumpur
COURSE SCHEDULE (2-DAY)
DAY ONE
Expert Web Searching Techniques
Live demonstrating
training designed to update investigators using the Internet. This is an advanced search class
search features underutilized in popular search engines and overlooked by most users. A foray
into Web 2.0 social networks and open sources will open up the class understanding to the volume of
information people share about themselves.
We will then get beyond Google and share the information not easily located, but found in blogs, RSS feeds, and
all the other invisible content that search engines do not capture.
Highlights:
• Expose fraudulent business enterprises, locate assets, and find undercover intelligence.
• Learn about database resources and online sources for conducting research online.
• Attendees will leave with actual Web sites to utilize in their own investigations.
Advanced Social Network Investigations
Using social networks allows you to vet hires, conduct due diligence pre-acquisition, prevent competitive
intelligence, and identify problem employees before workplace violence or intellectual property theft occurs.
This session reviews social and photo-network Web sites, mapping tools, and other Internet features that can be
used for intelligence-gathering and security assessments.
Highlights:
• Understand the difference between Web 2.0 and traditional Web sites
• Learn how to deconstruct a profile for your investigations.
• Expose social networks and personal vulnerabilities.
• Hunt down online social network profiles.
• Learn about cutting edge services that are coming up daily.
DAY TWO
Asset Forfeiture Online
Using the Internet to locate assets, assess value on property and understand the financial footprint of the
subject under examination. The instructor will take you on-line to some of the most productive sites that are
available. You will also learn how to deconstruct a Web site for intelligence, understand caching and how that
can be your best lead and backdoors that are useful for your investigations.
An evaluation of blog and social network sites, as well as a using the tools and resources for immediate
searching and alerting services will be shared.
Highlights:
• Hunt down online social network profiles and locate assets
• Set up alerts for asset or any type of investigation
• Deconstruct a Web site for intelligence gathering.
Due Diligence Online
Public or private, foreign or domestic, this class focuses on the expectations for a complete due diligence report.
Public records, legal filings, media, and other sources will be examined to understand their functionality and
limitations. A review of the popular fee-based and free databases will show off the latest services available to
investigators with an emphasis on budget and timeliness.
Highlights:
• Learn the Top 20 Items you should never miss in your research!
• Focused report writing in order to emphasize and highlight findings.
• Find out the mandatory databases for conducting business background investigations and due diligence.
Website: www.icfe-cg.com
Email: enquiry@icfe-cg.com
Follow us: ICFE Group of Companies
Tel: (603) 2282 5406 Fax: (603) 2282 5407
Follow us:
ICFE Malaysia Sdn Bhd • Co. Reg No: 871789 - X
3. SOCIAL MEDIA INVESTIGATION
28 - 29 October 2014 Best Western Premier Dua Sentral, Kuala Lumpur
8 - 9 October 2014 The Gardens Hotel, Kuala Lumpur
TRAINER’S PROFILE
Ali Fazeli has been involved in the information technology filed since his younger days. He
later pursued his higher studies in the field of Internet Security and Management from
Curtin University, Australia. He is a highly interactive and innovative trainer, whose work in
mainly based on research and applied knowledge from extensive experiences in Computer
Security and Data Recovery. He has extensive experience in Digital Forensic Investigation,
Anti-Forensic and Cyber War.
During his 10 years career, Ali has assisted and trained numerous information technology
security professional in Asia. He is accredited as a specialist in the successful investigation
and prosecution of fraudsters and other scum from the dark and under world of internet. He
has successfully accomplished professional certifications and has managed to use them
advantageously for the enhancement of his professional practice.
Ali is one of the most versatile IT security professional and expert, with skills ranging
from advisory expert to guidance consultant. One of the few of his expertise lay in lecture
deliveries. With a vast knowledge of various IT security sectors with core expertise in
Computer Forensics Investigation and Anti forensics techniques in Penetration testing;
Investigating IT Misuse; Wireless Network Hacking; Enterprise Network Security; Social
Network Forensics.
Today, Ali spends a substantial amount of his time consulting, advising and training IT
security professionals. Ali has contributed extensively in helping numerous governments
and private organizations face their information technology risks and provide security.
Ali Fazeli
ICFE Group of Companies
The ICFE Group of Companies is a think-tank group of firms dedicated to Fraud Risk Management, Investigation
and Prevention. Headquartered in Singapore with regional offices in Malaysia and Hong Kong, ICFE Group
of Companies was formed with the intention of combating fraudulent activity and maintaining good corporate
governance, and consequently providing professional training and value-adding consultancy services at
affordable rates. Our principal consultants are trained by the Association of Certified Fraud Risk Examiners (ACFE).
ICFE aims to share its expertise with working professionals or organisations who wish to stay abreast of the latest
developments in corporate skills and anti-fraud measures. We do this by organising various public training
programmes, seminars, and customised in-house training programmes which are tailored to suit companies in
their respective industries.
At ICFE, we focus on five areas of professional development:
1. Fraud Prevention
2. Anti-Money Laundering
3. Corporate Governance & Business Ethics
4. Digital Forensics
5. Corporate Skills & Leadership Development
Every member of ICFE is dedicated to bringing about a wholesome experience to all clients via Inspirational
training, Innovative consultative work and programmes that build Intelligent minds.
Website: www.icfe-cg.com
Email: enquiry@icfe-cg.com
Tel: (603) 2282 5406 Fax: (603) 2282 5407
Follow us:
www.icfe-cg.com
Follow us: ICFE Group of Companies
ICFE Malaysia Sdn Bhd • Co. Reg No: 871789 - X
4. SOCIAL MEDIA INVESTIGATION
28 - 29 October 2014 Best Western Premier Dua Sentral, Kuala Lumpur
8 - 9 October 2014 The Gardens Hotel, Kuala Lumpur
Bring This Seminar to Your Organisation!
Interested to have this seminar as an in-house programme to your company? We have well-qualified
specialist experts with practical experience to share their real-life involvement in investigating fraud
wrong-doing in the industry.
All our trainers are highly experienced professionals in their respective areas of expertise and their
insights will definitely enhance and enrich the already-attained knowledge our participants have.
Every member of ICFE is dedicated to bringing about a wholesome experience to all clients via
Inspirational training, Innovative consultative work and programmes that build Intelligent minds.
ICFE In-House Fraud Specialist for Consultation
Whether you suspect a fraud within your organisation, or simply wish to strengthen your company's
defense against the risk of economic crime, ICFE Group of Companies stands ready to support your
business goals. An anti-fraud consultancy firm first and foremost, we are dedicated to fraud risk
management, investigation & prevention in all its forms.
Seminar Participants can enjoy free & non-obligatory discussion with ICFE’s Fraud Specialist!
Email to enquiry@icfe-cg.com or call us at (603) 2282 5406.
Address: Unit A-25-05, Blk A, Menara UOA,
No. 5, Jalan Bangsar Utama 1,
59000 Bangsar Kuala Lumpur,
Wilayah Persekutuan Kuala Lumpur
Stanley CHIA
ICFE In-House Fraud Specialist
CerƟfied Fraud Examiner (CFE) with the AssociaƟon of CerƟfied Fraud Examiners (ACFE)
Member, ACFE Advisory Council since 2014
CerƟfied Member (CAMS) with AssociaƟon of CerƟfied AnƟ-Money Laundering
Specialists (ACAMS)
CerƟfied Financial Crimes InvesƟgator (CFCI) with InternaƟonal AssociaƟon of
Financial Crimes InvesƟgator (IAFCI)
CerƟfied AnƟ-CorrupƟon Manager (CACM) with American AnƟ-CorrupƟon InsƟtute (AACI)
Member, AssociaƟon of CerƟfied Financial Crime Specialists (ACFCS)
InternaƟonal Crime PrevenƟon Specialist (ICPS) with InternaƟonal Crime PrevenƟon
PracƟƟoner, Inc (ICPP)
Member of GRC InsƟtute
Associate Member, Singapore InsƟtute of Directors
Associate Member, Singapore InsƟtute of Management
PSMB CerƟfied Trainer (Malaysia Human Resource Development Fund)
CFE, CAMS, CFCI, ICPS,
BEcon, MCom (Business Law)
Group Managing Director &
Chief Fraud Examiner,
ICFE Group of Companies
In the complexity of the fraud examination profession, Stanley is notably recognised as a highly successful man by any measure. A man
of boundless curiosity, endowed with valuable insights and a lively sense of humour - Stanley, like all successful entrepreneurs, without
really realising the momentum of movement he has started, founded the ICFE Group of Companies for no other reason than his
personal satisfaction. In a three short years, he transformed the ICFE Group of Companies into a think-tank group that has offices
in Singapore and Malaysia. Today, the ICFE Group provides multi-consultancy solutions to companies world-wide.
As the Group Managing Director & Chief Fraud Examiner, Stanley's spirit of inquiry and devotion to fraud examination has laid
the foundations for the ICFE Group. Well versed in financial products and compliance methodologies, Stanley specialises in investigative
interviewing & profiling techniques and has handled numerous cases for both local and foreign financial institutions.
His professional experience, helmed through his time in large institutions like AIA Insurance, Singapore Exchange and United Overseas
Bank, extends across anti-money laundering, compliance, enforcement and fraud investigation work, solving cases which involved millions of
USD.
Stanley holds a Master of Commerce, specialising in Business Law and also a Bachelor of Economics, majoring in Money & Banking and
Accounting.
Website: www.icfe-cg.com
Email: enquiry@icfe-cg.com
Follow us: ICFE Group of Companies
Tel: (603) 2282 5406 Fax: (603) 2282 5407
Follow us:
ICFE Group of Companies
ICFE Malaysia Sdn Bhd • Co. Reg No: 871789 - X
5. 28 - 29 October 2014 Best Western Premier Dua Sentral, Kuala Lumpur
^
^
Delegate Particular
Delegate
Name
SOC IAL MEDIA INVESTIGATION
Mr / Ms / Mrs / Dr
Organisation
Designation
Phone
Email
Delegate
Name
Mr / Ms / Mrs / Dr
Organisation
Designation
Phone
Contact Person
Dept
Fax
Name
Mr / Ms / Mrs / Dr
Postal
Address
Designation
Phone
Email
Dept
Dept
Fax
I have read and understood the booking terms & conditions.
Personal Data Protection Notice (Compulsary to fill)
Please be informed that in accordance with the Malaysian Personal Data
Protection Act 2010 (“PDPA”), by providing your personal data to ICFE Group of
Companies (hereafter referred to as ‘ICFE’), you have hereby given consent to
ICFE to process your personal data for the purpose as stated below.
Purpose:
ICFE may use your personal information for direct marketing, as well as to
update you, on ICFE training events and conferences.
Data Disclosure:
ICFE may provide your personal information to third parties and to our
collaborative partners in relation to the purpose above.
Data Retention Details:
1. ICFE shall retain your personal data for seven (7) years from the date of
collection;
and
2. ICFE shall remove your personal data with you write to ICFE to withdraw your
consent. You may email to enquiry@icfe-cg.com by stating so.
Data Access:
You also have the rights to request access to your personal data at all times and
be entitled to correct it if necessary.
Please read and understand ICFE’s Personal Data Protection Notice before you
agree to submit your personal data.
Issued by:
ICFE Group of Companies
ACKNOWLEDGEMENT STATEMENT(Please tick where applicable)
I hereby acknowledge that I have read, understood and agree the purpose
of providing my personal data as mentioned in ICFE PDPA notice for the
training event.
I disagree to provide my personal data as mentioned in ICFE’s PDPA notice.
Participant:
Signature
Name:
Date
Contact Person:
Signature
Name:
Date
Signature
Name:
Date
Preferred Mode of Payment
By Cheque (Please cross cheque made payable to ICFE Malaysia
Sdn Bhd and mail your payment together with this registration form
to the Company address stated in the “How to Register” box above.)
Telegraphic Transfer Public Bank Berhad
Branch: Jalan Raja Chulan
Account No.: 3-1575918-33
Account Name: ICFE Malaysia Sdn Bhd
Swift Code: PBBEMYKL
Important Notice
IMPORTANT NOTICE: Payments are required with registration and must be received prior to the Coaching Session to guarantee your place. Walk-in
delegates will only be admitted on the basis of space availability at the Coaching Session and with immediate full payment.
CANCELLATIONS & TRANSFERS: If you are unable to attend, a substitute delegate is welcome at no extra charge. Please provide name and designation
of the substitute delegate at least 2 days prior to the program. A refund less 10% administrative charge will be made for cancellation received in writing 10
working before the program date. A complete set of documentation and a 50% refund will be given for cancellation made 3 working days before the program
date. Regrettably, no refund can be made for cancellation made on and/or after the program. A complete set of documentation will however be posted to
you. The organiser reserves the right to make any amendments and/or changes to the program, venue, speaker replacements and/or topics if warranted by
circumstances beyond its control.
DISCLAIMER: Due to the interactive nature of the learning session, the sequence and contents of the program may vary according to the needs of the
participants. The speaker reserves the right and the privilege to conduct the program in the manner which he thinks to be in the best interest of the majority
of the participants. Please ensure that you understand this completely so as to prevent any form of unrealistic expectation and or disappointment in a public
enrolment program that was not tailored to your specific need. Please inform the organiser in advance if you are not agreeable or do not completely
understand the term and we will cancel your enrolment accordingly.
Fax
Email
COURSE FEE (2-Day)
Regular Rates RM 5470.00
*Early Bird RM 4970.00
Buddy Rates (2 Pax) RM 8800.00
Register in pairs to enjoy buddy rates!
Not valid with other discounts.
How to RegisterHow to Register
Address: ICFE Malaysia Sdn Bhd
Unit A-25-05, Blk A, Menara UOA,
No. 5, Jalan Bangsar Utama 1,
59000 Bangsar Kuala Lumpur,
Wilayah Persekutuan Kuala Lumpur
*Register by
29 September 2014 for
EARLY BIRD
DISCOUNT!
ICFE Malaysia Sdn Bhd • Co. Reg No: 871789 - X
Ms Nonya Laila May Bok
Phone: +603 2282 4691
Fax: +603 2282 5407
Email: nonya.lailabok@icfe-cg.com