Dear Delegates,
Purchasing fraud is on the rise. Companies today do not just face risks from internal fraud but also
from external criminals who are technologically savvy. The important role on combating fraud plays in
minimising financial losses is fast gaining ground. CFE-In-Practice experts is providing you
with practical advice on how to “look for red flags” and symptoms of fraud. Discover
why some numbers do not add up. Mitigate this fraud risk management by learning
the latest strategies that can be adapted to your company. This event will also cover
investigation and prevention, most importantly how to structure your business processes to minimise
the risks whilst maintaining operational efficiency.
Recognising the challenges that organisations are facing in combating Purchasing Fraud, CSI
In Practice is pleased to present this 2-days Workshop on Understanding Procurement Fraud -
Investigation & Resolution. This will serve as an excellent opportunity to learn how best to conduct
an internal investigation to protect your organization and step up on controls to deter fraud.
Sam Mpundu has over 8 years of experience in finance roles and currently serves as the Group Chief Financial Officer of Earthrow Finance Limited. He holds several professional qualifications including an MBA from Oxford Brookes University and certifications in accounting, fraud examination, and financial reporting. Additionally, he is pursuing a doctoral degree from the University of Pretoria.
This document summarizes a training event on preventing procurement fraud and establishing strategic governance. The training will discuss measures for preventing bribery in procurement, global anti-corruption legislation, and South Africa's anti-corruption requirements for companies. Attendees will learn techniques for fraud prevention, loss recovery, detecting deception in interviews, and defining procurement fraud. The event is aimed at procurement staff, auditors, investigators and other roles involved in fraud prevention and compliance. It will be led by two expert facilitators experienced in forensic accounting and anti-corruption law.
Deze publicatie gaat in op de risico's met betrekking tot het inkoopproces bij bedrijven actief in de Consumer Goods & Retail markt. Ook wordt ingegaan op hoe bedrijven deze inkoopfraude risico's zouden kunnen reduceren met behulp van technologie en het uitvoeren van supplier audits.
Procurement Fraud Presentation Bill KohnenBill Kohnen
This document discusses procurement fraud and provides definitions, frameworks, and strategies for organizations to prevent and detect fraud. It outlines that procurement fraud involves intentional deception to obtain an unlawful advantage. It then discusses how fraud occurs at the organizational, personal, and process levels and provides warning signs. Finally, it recommends professionalizing the procurement process through training, compensation, and establishing standard procedures while also conducting periodic reviews and using outside help to detect potential fraud.
The document discusses contract procurement fraud, including common schemes like collusion among contractors to manipulate bidding. It outlines the procurement process and provides red flags for fraud in areas like bid evaluation. Finally, it recommends elements of an effective fraud prevention program, such as educating employees, implementing controls, monitoring activities, and conducting vendor due diligence.
This document provides an overview of procurement anti-corruption and anti-fraud training. It discusses the increasing reports of corruption and fraud among South African businesses, with procurement fraud being one of the most commonly reported issues. The objectives of the training are to identify risks, red flags, and best practices to develop an effective anti-corruption strategy. Various typologies of procurement corruption and fraud are defined, including bribery, bid rigging, ghost companies, unjustified sole-sourcing, and overcharging. The phases of the procurement cycle that are most susceptible to these issues are also examined.
This document summarizes a presentation on embedding anti-corruption due diligence in procurement. Corruption distorts markets, increases costs, undermines rule of law, and hinders economic growth. Procurement anti-corruption due diligence ensures integrity in procurement processes and supplier relationships. It should be aligned with corporate strategy and risk management. Due diligence investigates suppliers through company registry checks, politically exposed persons databases, litigation records, site visits, and reputation testing. Red flags that require further review include suppliers on watchlists, involvement in legal issues like fraud, and negative media reports. Due diligence benefits include enhancing reputation, risk management, and cost efficiency.
Sam Mpundu has over 8 years of experience in finance roles and currently serves as the Group Chief Financial Officer of Earthrow Finance Limited. He holds several professional qualifications including an MBA from Oxford Brookes University and certifications in accounting, fraud examination, and financial reporting. Additionally, he is pursuing a doctoral degree from the University of Pretoria.
This document summarizes a training event on preventing procurement fraud and establishing strategic governance. The training will discuss measures for preventing bribery in procurement, global anti-corruption legislation, and South Africa's anti-corruption requirements for companies. Attendees will learn techniques for fraud prevention, loss recovery, detecting deception in interviews, and defining procurement fraud. The event is aimed at procurement staff, auditors, investigators and other roles involved in fraud prevention and compliance. It will be led by two expert facilitators experienced in forensic accounting and anti-corruption law.
Deze publicatie gaat in op de risico's met betrekking tot het inkoopproces bij bedrijven actief in de Consumer Goods & Retail markt. Ook wordt ingegaan op hoe bedrijven deze inkoopfraude risico's zouden kunnen reduceren met behulp van technologie en het uitvoeren van supplier audits.
Procurement Fraud Presentation Bill KohnenBill Kohnen
This document discusses procurement fraud and provides definitions, frameworks, and strategies for organizations to prevent and detect fraud. It outlines that procurement fraud involves intentional deception to obtain an unlawful advantage. It then discusses how fraud occurs at the organizational, personal, and process levels and provides warning signs. Finally, it recommends professionalizing the procurement process through training, compensation, and establishing standard procedures while also conducting periodic reviews and using outside help to detect potential fraud.
The document discusses contract procurement fraud, including common schemes like collusion among contractors to manipulate bidding. It outlines the procurement process and provides red flags for fraud in areas like bid evaluation. Finally, it recommends elements of an effective fraud prevention program, such as educating employees, implementing controls, monitoring activities, and conducting vendor due diligence.
This document provides an overview of procurement anti-corruption and anti-fraud training. It discusses the increasing reports of corruption and fraud among South African businesses, with procurement fraud being one of the most commonly reported issues. The objectives of the training are to identify risks, red flags, and best practices to develop an effective anti-corruption strategy. Various typologies of procurement corruption and fraud are defined, including bribery, bid rigging, ghost companies, unjustified sole-sourcing, and overcharging. The phases of the procurement cycle that are most susceptible to these issues are also examined.
This document summarizes a presentation on embedding anti-corruption due diligence in procurement. Corruption distorts markets, increases costs, undermines rule of law, and hinders economic growth. Procurement anti-corruption due diligence ensures integrity in procurement processes and supplier relationships. It should be aligned with corporate strategy and risk management. Due diligence investigates suppliers through company registry checks, politically exposed persons databases, litigation records, site visits, and reputation testing. Red flags that require further review include suppliers on watchlists, involvement in legal issues like fraud, and negative media reports. Due diligence benefits include enhancing reputation, risk management, and cost efficiency.
This document advertises a two-day workshop on practical techniques for combating corporate fraud. The workshop will provide hands-on training on conducting internal fraud investigations, detecting "red flags", applying forensic accounting skills, and structuring business processes to minimize fraud risk. It will be led by Tommy Seah, an experienced fraud examiner and author. The workshop outlines describe sessions on understanding why and how people commit fraud, approaches to fraud prevention, detection and investigation, and developing audit tests to uncover hard-to-spot fraud practices. The workshop aims to equip attendees with practical skills and knowledge for minimizing the risks and impacts of fraud.
How will this EFRM course benefit you?
After completion you will be able to:
• identify risks which could result in fraud
• provide recommendations to executive / senior management in managing fraud risk
• identify warning signs of fraud in operational audits
• develop Fraud ICQ to look at fraud issues
Dear Delegates,
Corporate fraud costs businesses hundreds of millions of dollars each year. It affects livelihoods and is a common
cause of corporate failure. It is the responsibility of the board of directors to prevent fraud by putting in places the
appropriate controls and review procedures. This program shows you why Accounting Information System (AIS)
Threats are ever increasing. Control risks have also increased in the last few years because there are computers
and servers everywhere, and information is available to an unprecedented number of workers. Distributed
computer networks make data available to many users, and these networks are harder to control than centralized
mainframe systems. With the introduction of 3 levels of COSO and value driven ERM, things should be under
control. Recent events at SATYAM proves that in reality things are getting out of control. So, what went wrong ?
Is it time to train the auditors ?
Recognising the challenges that organisations are facing in combating Fraud, CSI In Practice is pleased to present
this 2-days Workshop on Enterprise Fraud Risk Management. This will serve as an excellent opportunity to learn how
best to conduct an internal investigation to protect your organization and step up on controls to deter fraud.
It will happen when you least expect it. There will always be allegation of fraud and
employee misdemeanour. This is a perennial truth. The question that needs to be addressed
is how do we go about managing such allegations.
In recent years, a variety of laws and regulations have emerged in Singapore and Malaysia,
providing organizations with an array of criteria to incorporate into their antifraud
efforts. But for all practical purpose there is no law on managing fraud allegation.
In the wake of high-profile corporate scandals as well as new regulations worldwide,
many business leaders are increasingly aware of the need to create company-specific
antifraud measures to address internal corporate fraud and employee misconduct.
While acknowledging that no single approach to fraud risk management can fit every
organizations needs, this seminar focus on key practices that organizations have
generally found to be effective when tailoring a company-specific fraud allegation
investigation program and offers a strategic approach to aligning corporate values
with employees performance.
The Federal Bureau of Investigation, financial institutions and merchants are always on
the lookout for scam artists. One of the most common and unregulated industry where
fraud is most prevalent and perpetrated on a daily basis is in the area of Management
Consultancy. Almost every unemployed and unemployable individual calls themselves
Management CONsultants.
The technique to know whether you have been a victim is to examine the deliverables.
Look at the concepts closely. If they cannot even get the fundamentals right, you know
that it is REALLY a CONsultancy firm.
Financial Statement Fraud training by Tommy SEAHTommy Seah
This document advertises and provides details about a 2-day workshop on detecting and preventing financial statement fraud hosted by ProEdge Global.
The workshop aims to provide an overview of different types of financial fraud, with a focus on financial statement fraud. Attendees will learn practical techniques to combat financial statement fraud from an expert in the field.
The workshop is intended for corporate leaders, financial professionals, accountants, and auditors who want to improve their ability to detect, respond to, and prevent financial statement fraud.
This document provides information about a two-day conference on combating procurement fraud held from October 24-25, 2013 in Pretoria, South Africa. The conference will address why procurement fraud is a risk, how to detect and investigate it, and how to develop strategies to prevent and reduce the risk of it. Several high-profile speakers will present on topics such as applying anti-corruption legislation, emerging technologies for fraud detection, and case studies. Attendees will learn how to assess procurement fraud risks and implement best practices. The conference is aimed at executives, procurement staff, auditors, and others involved in procurement or fraud prevention.
This document provides information about a multi-day training workshop on credit risk management. The workshop will be held quarterly in 2009 at a hotel in Kuala Lumpur, Malaysia. It will be led by Tommy Seah, a certified fraud examiner and expert in financial management. The workshop aims to help participants better analyze financial statements and credit risks. It will cover topics like sound financial management, cash flow analysis, and loan monitoring techniques. The intended audience includes professionals in banking, auditing, credit, and finance. The document provides registration details, instructor background, and contact information to sign up.
Procurement fraud is a clear and present risk for organisations across all sectors. The move to outsourced services has created the opportunity for fraud to occur any stage of the contract process. Exploitation of an organisations purchasing, procurement and contract systems can cause untold damage in terms of revenue and reputation. However with appropriate controls, accountable tendering processes and strict prevention strategies the opportunities for fraud can be significantly reduced.
Expanding your horizons how traditional crime can turn hi tech adv j fickJacqueline Fick
This document outlines a fictional scenario presenting a new business venture called Moola for Mahala Enterprises that specializes in hi-tech fraud. The CEO, Jacky Sparrow, introduces the leadership team and discusses expanding into new areas like international revenue share fraud, Wangiri fraud, and establishing a wireless application service provider in another country to enable these fraudulent activities. Financial projections show large potential profits from return calls generated through unauthorized premium rate phone numbers. The presentation concludes by discussing challenges of preventing sophisticated cybercrime through legislation, knowledge sharing, and international cooperation.
This document provides information about the CSI World Headquarters 2009 Annual Investigation, Fraud, Systemic Risk Management Conference taking place on May 26-27, 2009 in Kuala Lumpur, Malaysia. The conference objectives are to provide tools and techniques to assist professionals in understanding systemic risk challenges and to feature four unique tracks catering to different experience levels. The detailed two-day agenda outlines sessions on topics such as managing reputational risk, fraud risk assessment, investigative profiling, forensic techniques, IT security, and digital forensics. Masterclasses on financial analysis and other subjects will also be offered after the conference.
CSI 2009 Conference Brochure after early bird discountTommy Seah
This document provides information about the CSI World Headquarters 2009 Annual Investigation, Fraud, Systemic Risk Management Conference taking place on May 26-27, 2009 in Kuala Lumpur, Malaysia. The conference objectives are to provide tools and techniques to assist professionals in understanding systemic risk challenges and to feature four unique tracks catering to different experience levels. The detailed two-day agenda outlines sessions on topics such as managing reputational risk, fraud risk assessment, investigative profiling, forensic techniques, IT security, and digital forensics. Masterclasses on financial analysis and other subjects will also be offered after the conference.
The document announces the 2009 Annual CSI Systemic Risk Conference to be held in Kuala Lumpur, Malaysia on May 26th. It provides information on the conference objectives, which are to provide tools and techniques to assist professionals in understanding systemic risk challenges in audit, IT and fraud examination. The conference will feature keynote speakers and a combination of plenary and case study sessions led by senior fraud practitioners and risk management specialists. It encourages professionals to register to stay ahead of the technology curve and learn from leading international and domestic practitioners.
Fraud and Corruption Risk Management 2012Ola Odejayi
The document advertises a 2-day workshop on fraud and corruption risk management to be held from 13-14 March 2012 in Johannesburg, South Africa. The workshop will address key components of fraud and corruption risk management, including identification, assessment, mitigation and monitoring of risks. It will provide practical knowledge and tools to develop an effective fraud prevention strategy. The facilitator, Pat Cunningham, has extensive experience in fraud prevention, risk management and corporate governance.
The document advertises the 2009 CSI World Headquarters Annual Investigation, Fraud, and Systemic Risk Management Conference taking place from May 26-27 in Kuala Lumpur, Malaysia. The conference chair, Tommy Seah, invites attendees to learn about integrating CSI into auditing and understanding organizational risks. The conference will provide tools and techniques for understanding systemic risk challenges and feature speakers on topics like fraud, risk assessment, and cybercrime. Attendees can become a Certified Systems Investigator to gain critical knowledge in financial analysis, data security, and data analytics.
Fraud is a major problem affecting businesses around the world each year. While it may be impossible to totally eliminate fraud, much can be done to minimize
the risk of, and opportunity for fraudulent activity. To minimize risk, the root causes of fraud must be understood, including the possible pressure or crisis of
need on the part of the fraudster, the opportunity to commit fraud, and the willingness to rationalize the act. This 4-day program offers you the opportunity to
acquaint yourself with the understanding and skills as well as the tools you need to cooperate with management to fight and reduce significantly the risks and
ill effects of fraudulent acts at the workplace
This document provides information on in-house training programmes offered by ICFE Group of Companies. ICFE is a think tank group specializing in fraud prevention with headquarters in Singapore and offices in Malaysia and Hong Kong. It offers tailored in-house training programmes on topics such as anti-money laundering, white collar crimes, fraud investigation techniques, and digital forensics. ICFE trainers are experienced professionals who share real-life experiences investigating fraud. The training aims to help organizations prevent fraud and stay up to date on the latest developments. ICFE has provided training to clients from various public and private sectors in Singapore and Malaysia.
Employees And Fraud Risks - UiTM Masters in Accounting Special LectureKenny Ong
The document discusses fraud risks and risk management strategies at CNI Holdings Berhad, a Malaysian MLM company. It describes several fraud cases CNI experienced, including ticket overclaims, undercutting sales leaders, and cash embezzlement. It then outlines CNI's framework for risk mitigation, including defining risks, reducing likelihood and impact, monitoring risks, and conducting fraud investigations. New fraud risks from changes like e-commerce are also discussed. Throughout, lessons learned about preventing fraud through effective culture, policies, and oversight are emphasized.
This course will address the risks to a business from data breaches, various forms of cyberfraud and identity theft. We will discuss the legal issues with data breaches including issues for companies that are victims of data breaches.
Forensic Accounting & Litigation Support Forum 2015Kennedy Mwangi
This document announces a three-day forensic accounting and litigation support forum to take place from April 27-29, 2015 in Nairobi, Kenya. It will feature presentations from experts in forensic accounting, fraud detection and prevention, litigation support, and related fields. Attendees will gain practical insights and learn how to minimize risks while maintaining operational efficiency. The forum is endorsed by various professional organizations and will offer continuing professional development credits for attendees.
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudFraudBusters
Webinar series from FraudResourceNet LLC on Preventing and Detecting Fraud Using Data Analytics. Recordings of these Webinars are available for purchase from our Website fraudresourcenet.com
This Webinar focused on fraud detection using data analytic software (Excel, ACL, IDEA)
FraudResourceNet (FRN) is the only searchable portal of practical, expert fraud prevention, detection and audit information on the Web.
FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware.
The two entities designed FRN as the “go-to”, easy-to-use source of “how-to” fraud prevention, detection, audit and investigation templates, guidelines, policies, training programs (recorded no CPE and live with CPE) and articles from leading subject matter experts.
FRN is a continuously expanding and improving resource, offering auditors, fraud examiners, controllers, investigators and accountants a content-rich source of cutting-edge anti-fraud tools and techniques they will want to refer to again and again.
ProEdge Global Sdn. Bhd.
Suite: 33-01, 33rd Floor,
Menara Keck Seng,
203 Jalan Bukit Bintang,
55100 Kuala Lumpur, Malaysia.
Tel : +603-2116 5671
HP : +6016-338 9783
kenneth@proedgeglobal.com
Psychology of fraud 50 pages for comment by tommy seah number one fraud busterTommy Seah
This document provides an overview and summary of a book on the psychology of fraud, gender bias, and interview techniques. It discusses the definition of fraud and how to identify it, the factors that lead to fraud, limitations of internal controls, differences in male and female psychology and motivation for fraud. The bulk of the document focuses on effective interview techniques to determine the truth in a fair and ethical manner. It provides guidance on red flags for fraud, best practices for interviewing witnesses, detecting deception, verifying information and effective note taking.
More Related Content
Similar to Understanding Procurement Fraud by Tommy Seah
This document advertises a two-day workshop on practical techniques for combating corporate fraud. The workshop will provide hands-on training on conducting internal fraud investigations, detecting "red flags", applying forensic accounting skills, and structuring business processes to minimize fraud risk. It will be led by Tommy Seah, an experienced fraud examiner and author. The workshop outlines describe sessions on understanding why and how people commit fraud, approaches to fraud prevention, detection and investigation, and developing audit tests to uncover hard-to-spot fraud practices. The workshop aims to equip attendees with practical skills and knowledge for minimizing the risks and impacts of fraud.
How will this EFRM course benefit you?
After completion you will be able to:
• identify risks which could result in fraud
• provide recommendations to executive / senior management in managing fraud risk
• identify warning signs of fraud in operational audits
• develop Fraud ICQ to look at fraud issues
Dear Delegates,
Corporate fraud costs businesses hundreds of millions of dollars each year. It affects livelihoods and is a common
cause of corporate failure. It is the responsibility of the board of directors to prevent fraud by putting in places the
appropriate controls and review procedures. This program shows you why Accounting Information System (AIS)
Threats are ever increasing. Control risks have also increased in the last few years because there are computers
and servers everywhere, and information is available to an unprecedented number of workers. Distributed
computer networks make data available to many users, and these networks are harder to control than centralized
mainframe systems. With the introduction of 3 levels of COSO and value driven ERM, things should be under
control. Recent events at SATYAM proves that in reality things are getting out of control. So, what went wrong ?
Is it time to train the auditors ?
Recognising the challenges that organisations are facing in combating Fraud, CSI In Practice is pleased to present
this 2-days Workshop on Enterprise Fraud Risk Management. This will serve as an excellent opportunity to learn how
best to conduct an internal investigation to protect your organization and step up on controls to deter fraud.
It will happen when you least expect it. There will always be allegation of fraud and
employee misdemeanour. This is a perennial truth. The question that needs to be addressed
is how do we go about managing such allegations.
In recent years, a variety of laws and regulations have emerged in Singapore and Malaysia,
providing organizations with an array of criteria to incorporate into their antifraud
efforts. But for all practical purpose there is no law on managing fraud allegation.
In the wake of high-profile corporate scandals as well as new regulations worldwide,
many business leaders are increasingly aware of the need to create company-specific
antifraud measures to address internal corporate fraud and employee misconduct.
While acknowledging that no single approach to fraud risk management can fit every
organizations needs, this seminar focus on key practices that organizations have
generally found to be effective when tailoring a company-specific fraud allegation
investigation program and offers a strategic approach to aligning corporate values
with employees performance.
The Federal Bureau of Investigation, financial institutions and merchants are always on
the lookout for scam artists. One of the most common and unregulated industry where
fraud is most prevalent and perpetrated on a daily basis is in the area of Management
Consultancy. Almost every unemployed and unemployable individual calls themselves
Management CONsultants.
The technique to know whether you have been a victim is to examine the deliverables.
Look at the concepts closely. If they cannot even get the fundamentals right, you know
that it is REALLY a CONsultancy firm.
Financial Statement Fraud training by Tommy SEAHTommy Seah
This document advertises and provides details about a 2-day workshop on detecting and preventing financial statement fraud hosted by ProEdge Global.
The workshop aims to provide an overview of different types of financial fraud, with a focus on financial statement fraud. Attendees will learn practical techniques to combat financial statement fraud from an expert in the field.
The workshop is intended for corporate leaders, financial professionals, accountants, and auditors who want to improve their ability to detect, respond to, and prevent financial statement fraud.
This document provides information about a two-day conference on combating procurement fraud held from October 24-25, 2013 in Pretoria, South Africa. The conference will address why procurement fraud is a risk, how to detect and investigate it, and how to develop strategies to prevent and reduce the risk of it. Several high-profile speakers will present on topics such as applying anti-corruption legislation, emerging technologies for fraud detection, and case studies. Attendees will learn how to assess procurement fraud risks and implement best practices. The conference is aimed at executives, procurement staff, auditors, and others involved in procurement or fraud prevention.
This document provides information about a multi-day training workshop on credit risk management. The workshop will be held quarterly in 2009 at a hotel in Kuala Lumpur, Malaysia. It will be led by Tommy Seah, a certified fraud examiner and expert in financial management. The workshop aims to help participants better analyze financial statements and credit risks. It will cover topics like sound financial management, cash flow analysis, and loan monitoring techniques. The intended audience includes professionals in banking, auditing, credit, and finance. The document provides registration details, instructor background, and contact information to sign up.
Procurement fraud is a clear and present risk for organisations across all sectors. The move to outsourced services has created the opportunity for fraud to occur any stage of the contract process. Exploitation of an organisations purchasing, procurement and contract systems can cause untold damage in terms of revenue and reputation. However with appropriate controls, accountable tendering processes and strict prevention strategies the opportunities for fraud can be significantly reduced.
Expanding your horizons how traditional crime can turn hi tech adv j fickJacqueline Fick
This document outlines a fictional scenario presenting a new business venture called Moola for Mahala Enterprises that specializes in hi-tech fraud. The CEO, Jacky Sparrow, introduces the leadership team and discusses expanding into new areas like international revenue share fraud, Wangiri fraud, and establishing a wireless application service provider in another country to enable these fraudulent activities. Financial projections show large potential profits from return calls generated through unauthorized premium rate phone numbers. The presentation concludes by discussing challenges of preventing sophisticated cybercrime through legislation, knowledge sharing, and international cooperation.
This document provides information about the CSI World Headquarters 2009 Annual Investigation, Fraud, Systemic Risk Management Conference taking place on May 26-27, 2009 in Kuala Lumpur, Malaysia. The conference objectives are to provide tools and techniques to assist professionals in understanding systemic risk challenges and to feature four unique tracks catering to different experience levels. The detailed two-day agenda outlines sessions on topics such as managing reputational risk, fraud risk assessment, investigative profiling, forensic techniques, IT security, and digital forensics. Masterclasses on financial analysis and other subjects will also be offered after the conference.
CSI 2009 Conference Brochure after early bird discountTommy Seah
This document provides information about the CSI World Headquarters 2009 Annual Investigation, Fraud, Systemic Risk Management Conference taking place on May 26-27, 2009 in Kuala Lumpur, Malaysia. The conference objectives are to provide tools and techniques to assist professionals in understanding systemic risk challenges and to feature four unique tracks catering to different experience levels. The detailed two-day agenda outlines sessions on topics such as managing reputational risk, fraud risk assessment, investigative profiling, forensic techniques, IT security, and digital forensics. Masterclasses on financial analysis and other subjects will also be offered after the conference.
The document announces the 2009 Annual CSI Systemic Risk Conference to be held in Kuala Lumpur, Malaysia on May 26th. It provides information on the conference objectives, which are to provide tools and techniques to assist professionals in understanding systemic risk challenges in audit, IT and fraud examination. The conference will feature keynote speakers and a combination of plenary and case study sessions led by senior fraud practitioners and risk management specialists. It encourages professionals to register to stay ahead of the technology curve and learn from leading international and domestic practitioners.
Fraud and Corruption Risk Management 2012Ola Odejayi
The document advertises a 2-day workshop on fraud and corruption risk management to be held from 13-14 March 2012 in Johannesburg, South Africa. The workshop will address key components of fraud and corruption risk management, including identification, assessment, mitigation and monitoring of risks. It will provide practical knowledge and tools to develop an effective fraud prevention strategy. The facilitator, Pat Cunningham, has extensive experience in fraud prevention, risk management and corporate governance.
The document advertises the 2009 CSI World Headquarters Annual Investigation, Fraud, and Systemic Risk Management Conference taking place from May 26-27 in Kuala Lumpur, Malaysia. The conference chair, Tommy Seah, invites attendees to learn about integrating CSI into auditing and understanding organizational risks. The conference will provide tools and techniques for understanding systemic risk challenges and feature speakers on topics like fraud, risk assessment, and cybercrime. Attendees can become a Certified Systems Investigator to gain critical knowledge in financial analysis, data security, and data analytics.
Fraud is a major problem affecting businesses around the world each year. While it may be impossible to totally eliminate fraud, much can be done to minimize
the risk of, and opportunity for fraudulent activity. To minimize risk, the root causes of fraud must be understood, including the possible pressure or crisis of
need on the part of the fraudster, the opportunity to commit fraud, and the willingness to rationalize the act. This 4-day program offers you the opportunity to
acquaint yourself with the understanding and skills as well as the tools you need to cooperate with management to fight and reduce significantly the risks and
ill effects of fraudulent acts at the workplace
This document provides information on in-house training programmes offered by ICFE Group of Companies. ICFE is a think tank group specializing in fraud prevention with headquarters in Singapore and offices in Malaysia and Hong Kong. It offers tailored in-house training programmes on topics such as anti-money laundering, white collar crimes, fraud investigation techniques, and digital forensics. ICFE trainers are experienced professionals who share real-life experiences investigating fraud. The training aims to help organizations prevent fraud and stay up to date on the latest developments. ICFE has provided training to clients from various public and private sectors in Singapore and Malaysia.
Employees And Fraud Risks - UiTM Masters in Accounting Special LectureKenny Ong
The document discusses fraud risks and risk management strategies at CNI Holdings Berhad, a Malaysian MLM company. It describes several fraud cases CNI experienced, including ticket overclaims, undercutting sales leaders, and cash embezzlement. It then outlines CNI's framework for risk mitigation, including defining risks, reducing likelihood and impact, monitoring risks, and conducting fraud investigations. New fraud risks from changes like e-commerce are also discussed. Throughout, lessons learned about preventing fraud through effective culture, policies, and oversight are emphasized.
This course will address the risks to a business from data breaches, various forms of cyberfraud and identity theft. We will discuss the legal issues with data breaches including issues for companies that are victims of data breaches.
Forensic Accounting & Litigation Support Forum 2015Kennedy Mwangi
This document announces a three-day forensic accounting and litigation support forum to take place from April 27-29, 2015 in Nairobi, Kenya. It will feature presentations from experts in forensic accounting, fraud detection and prevention, litigation support, and related fields. Attendees will gain practical insights and learn how to minimize risks while maintaining operational efficiency. The forum is endorsed by various professional organizations and will offer continuing professional development credits for attendees.
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudFraudBusters
Webinar series from FraudResourceNet LLC on Preventing and Detecting Fraud Using Data Analytics. Recordings of these Webinars are available for purchase from our Website fraudresourcenet.com
This Webinar focused on fraud detection using data analytic software (Excel, ACL, IDEA)
FraudResourceNet (FRN) is the only searchable portal of practical, expert fraud prevention, detection and audit information on the Web.
FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware.
The two entities designed FRN as the “go-to”, easy-to-use source of “how-to” fraud prevention, detection, audit and investigation templates, guidelines, policies, training programs (recorded no CPE and live with CPE) and articles from leading subject matter experts.
FRN is a continuously expanding and improving resource, offering auditors, fraud examiners, controllers, investigators and accountants a content-rich source of cutting-edge anti-fraud tools and techniques they will want to refer to again and again.
Similar to Understanding Procurement Fraud by Tommy Seah (20)
ProEdge Global Sdn. Bhd.
Suite: 33-01, 33rd Floor,
Menara Keck Seng,
203 Jalan Bukit Bintang,
55100 Kuala Lumpur, Malaysia.
Tel : +603-2116 5671
HP : +6016-338 9783
kenneth@proedgeglobal.com
Psychology of fraud 50 pages for comment by tommy seah number one fraud busterTommy Seah
This document provides an overview and summary of a book on the psychology of fraud, gender bias, and interview techniques. It discusses the definition of fraud and how to identify it, the factors that lead to fraud, limitations of internal controls, differences in male and female psychology and motivation for fraud. The bulk of the document focuses on effective interview techniques to determine the truth in a fair and ethical manner. It provides guidance on red flags for fraud, best practices for interviewing witnesses, detecting deception, verifying information and effective note taking.
The way to understand anything
in life is to first understand the
fundamental concept that is
involve. For a subject like
“Effective Cash Management”,
the first thing to understand is
the difference between liquidity
and stupidity. Cash flow is the
lifeblood of a company and is
fundamental to its very existence.
Finance professionals must
understand how their decisions on
investment, operations and
financing lead to specific cash flow
moverments within the business
system. Part of the manager’s job
is to maintain an appropriate
balance between inflows and
outflows of cash. Unfortunately, an
intricate understanding of how
cash flows within company eludes
most business personnel.
The Structural Approach to
Investigating Financial Statement
Fraud is the specialty practice
area of examiners that describes
engagements that result from
actual or anticipated disputes or
litigation. In litigation, 'Forensic'
means suitable for use in Court,
and it is to that standard and
potential outcome that fraud
examiners generally have to work.
Certified System Investigators
(CSI), Fraud Examiners (CFE) and
Forensic accountants (CPA) often
have to give expert evidence at the
eventual trial. All of the larger
accounting firms, as well as many
medium-sized and boutique firms,
have specialist forensic
accounting departments. Within
these groups, there may be further
sub-specializations: some forensic
accountants may, for example, just
specialize in insurance claims,
personal injury claims, fraud,
construction, or royalty audits.
This is where the distinction lies:
While Accounting firms do only
“Forensic Accounting” CSIs and
CFEs perform Investigations in
Financial Statement Fraud. This is
not the same thing — one is post
event, the other one is
pre-emptive.
Engagements relating to criminal
matters typically arise in the
aftermath of fraud. They frequently
involve the assessment of
accounting systems and accounts
presentation - in essence
assessing if the numbers reflect
reality. The CSI and CFE
determines whether there has
been any audit failure on the part
of the Accounting firm. This
seminar will train participants to
change from a justification mindset
to a pre-emptive mindset. It will
help them develop the capability to
render a service that can answer
the following questions, “What
have gone wrong? Could it have
been prevented in the first place?
Who is responsible for the mess?
The general idea is essentially to
prevent financial statement frauds
and when it does occur, how to
contain the damage and recognize
who is responsible for what in the
whole scheme of things.
Improving and Implementing Internal ControlsTommy Seah
Implementing and Improving Internal Controls
Articulating the increasing need for comprehensive in-house fraud control procedures
• Optimizing the accuracy and reliability of data acquired through internal inspections
• Detailing the process of applying controls inside the organization, and demonstrating the outcome
Fraud Risk Management - Road Show in KL, MalaysiaTommy Seah
The Reason why u need FRA
Passage of the Sarbanes-Oxley Act (SOX) caused more and more companies, public and private, to assess their vulnerability to fraud and abuse. Section 404(a) of the Act requires management of public companies to assess and report on its internal financial reporting controls, largely to ensure that financial statements are fairly presented in accordance with generally accepted accounting principles (GAAP). Fraudulent financial reporting that leads to a material misstatement in the financial statements is one key risk management should assess. This assessment focuses on accounts, processes, GAAP disclosures and the assertions in the financial statements and other required disclosures. Countries in Asia do not necessarily have their own version of SOX. But they have seen the benefits in SOX in the prevention of occupational fraud. Fraud Risk Assessment is now an integral part of good corporate governance.
Such assessments aren’t new. Organizations have assessed business and organizational risks for years. But fraud risk analysis has rarely been the primary focus. Times have changed, and now many companies and organizations are considering conducting specific fraud risk assessments.
Prevent, Deter and Detect Fraud
A fraud risk assessment is designed to examine the controls specifically created to prevent, deter and detect fraud. This assessment is fraud scheme and scenario-based. Fraud risk assessments also communicate a companywide policy of zero tolerance for fraud and abuse.
To conduct an effective fraud risk assessment, follow these steps:
1. Organize and define the assessment objectives with company management and your internal audit committee. Form a team of fraud and control experts, and get senior management and audit committee buy-in: Ask them to communicate their endorsement and sponsorship of both the process and a strong antifraud program to the entire organization.
2. Determine the business and accounting process(es) to be assessed and investigated. Usually, the initial processes selected are those where fraud or abuse has previously occurred or that management has identified as critical business processes that may be susceptible to fraud or abuse.
3. Identify potential schemes and scenarios specific to the process(es) to be examined against current controls. Fraud schemes and scenarios should be selected based on the specific business process, the industry, physical location of the process operation and any known frauds or abuses concerning the process.
4. Determine the likelihood of a fraud occurring within each scheme and scenario. The Public Company Accounting Oversight Board has defined risk levels as remote, more than remote or reasonably possible, and probable. If assessing a public company, assess the risk levels in relation to SOX compliance efforts.
5. After the fraud risks for individual processes have been identified, documented, and rated as to risk level, match the controls within each process to the identified fraud risks. Determine the effectiveness of each control in preventing or providing a means of early detection for the fraud risk. Group the risks as to their probability of occurring within the process.
6. Estimate the probable loss in dollars should the fraud or abuse occur. Try to place a value on loss of reputation if that is a possible outcome.
7. Prepare recommendations for strengthening controls and present to management.
Fraud Risk Assessment Benefits
Some benefits of a fraud risk assessment are obvious — compliance with Sarbanes-Oxley, protection of company assets, and a possible increase in profitability due to a reduction in fraud losses, waste and abuse. But another important benefit doesn’t appear in financial statements or government filings: the enhanced reputation of a highly ethical company that supports a strong internal and external antifraud policy and program.
Encouraging a whistle-blowing culture
as a way of upholding the highest
ethical behaviour
n set up the framework for protective
channels of reporting
n Overcoming hindering cultural issues of
whistle-blowing
sTAnLEy CHIA, manaGinG Director
CFe INTeRNaTIONaL CONSULTaNCY GROUP
(MEMBER Of THE CfE-In-PRACTICE GROuP Of COMPAnIEs)
Ethics and Integrity by Tommy Seah- A Value Added Audit on EnvironmentTommy Seah
A Value-Added Audit
On ETHICS and AUDITORS DUTIES
(Assessing Organizational and Individual Ethics)
By
Tommy Seah
World Class trainer for practicing auditors
BACKGROUND
13th Aug 2009, Hotel Rendezvous, Singapore
BACKGROUND
The continuing influence and impact which personal and professional ethics exerts upon
individuals, organizations and society, and the factors which influence organizational ethics,
has been thrust into the headlines of the populous. The ethical issues faced daily by
organizations and their employees are neither always straightforward nor easy to resolve.
Results of unethical behavior by accounting/audit professionals, and the impact of ethics upon
organizations, is a topic of growing concern in corporate board rooms around the world. This
one day seminar will examine the timely and important topic of ethics and its relevance and
importance to overall corporate wellbeing. In particular, what factors influence the likelihood
that an individual will act ethically or less than ethical, and what this means to management,
the organization, and internal controls in general. It also examines the question, if the
auditors are doing all that they are suppose to do, in the manner that they are suppose to do
it, why does fraud still occurs?
OBJECTIVES
OBJECTIVES
After completing this seminar, participants will be able to:
Understand SEATA and understand the interrelated nature of organizational functions and
components as they relate to establishing an ethically compliant organization
CFE Strategic
Alliances
Jointly Organized by Endorsed by
Certified System Investigator
CSI World Headquarters, Singapore
(CSI CPE Credits: 8)
CFE International
Consultancy Group
Private Limited
Identify the role of organizational values in driving strategic goals and objectives
Discover the role that personal values play in driving individual employee choices and
decisions
Develop an ethics assessment tool designed to evaluate an organization's compliance to
stated ethics policies
Pinpoint the underlying causes of patterns of unethical and/or undesired employee behavior
Reduce the incidence of employee conflict between the intended change and their personal
ethical standards and expectations
Increase employee commitment to organizational goals and objectives
The document discusses developing a fraud risk management program for an organization. It states that fraud risk management can be handled internally or outsourced, and is affected by factors like company size and culture. Any fraud prevention model should aim to prevent, deter, disrupt, identify and prosecute fraud. The document then lists steps to develop an effective fraud risk management program, such as having fraud prevention as part of the overall risk strategy, establishing policies and controls, training employees, and having whistleblower and reporting systems.
Traditionally, the practice of risk management comprises acceptance, transfer...Tommy Seah
Traditionally, the practice of risk management comprises acceptance, transference, elimination, control, sharing, insurance and avoidance of a diverse array of risks. Risk management and internal control business models have subsequently been devised which cater for all eventualities - categorised by terms such as business, operational and reputational risk.
FOREIGN EXCHANGE MANAGEMENT AUDIT - FOREX AUDIT by TOMMY SEAHTommy Seah
This course is aimed at those who wish to gain an understanding of the management techniques, concepts and practices in Foreign Exchange Management and control. This course is for you who are auditing the bank or somehow have an interest in the management and control of forex activities. It will also appeal to Backroom staff whose nature of work necessitates a good grasp of FOREX and Money Market activities. This is not a general course. It is specially tailored to suit the needs of the Bank Internal Auditors. It provides the Auditor with the necessary concepts, practice and program to conduct an FX Audit. The immediate benefit in attending this coaching session is that you get a complete Audit Programme on FOREX.
Understanding the strategies for improving and managing the risk/return profile and performance of forex position is crucial for successful Treasury Management. This coaching session includes a conceptual overview of Treasury Management concepts, such as line distribution, dealer correlation and valuation of position. Key forex inputs and outputs are defined using hands-on exercises with the CFE-In-Practice™ Case Studies. This informative program covers a wide range from product knowledge, elements of risk, return and optimization, control and forex risk management. In other words, learn everything you need to know about managing a Forex department so that profit can be optimized and loss can be recognized. Too many organisation make too much profit to be lost in Forex too quickly too. That is why you need to manage your Forex department actively.
OBJECTIVES AND BENEFITS IN ATTENDING
On completion of the Coaching Session participants will be able to:
• Understand and assess the risk and return of a Forex portfolio
• Determine the most attractive exposures from a risk/return perspective
• Determine the range and likelihood of future forex portfolio values; given this range and likelihood, determine how much equity or capital is required
• Identify the major sources of concentration and diversification in a Forex portfolio
• Assess strategies for improving performance of treasury portfolios
Day One - (PRODUCT KNOWLEDGE)
Is there a fundamental difference between Money Market & Foreign Exchange Market? What is a POSITION? Who controls the position in the bank? What is the best practice in the management of TREASURY LINES? How does Interest Rate Swaps and Currency Swaps work? Should your banks be involved in any of these? Case Studies and discussions.
Day Two (Forex AUDIT)
What is the correct audit approach? Why use the Systems based approach for forex audit? Where lies the auditor’s safety in a forex audit? What must be the FOREX audit focus?
DETAIL COACHING OUTLINE
• Data requirements and sources for active Forex management
• Default quantification for each obligor and utilization and recovery in the event of default; and an overview of the different sources for this data
• Understanding the distinction between MDDR line and FX line
• Components of Forex risk
• Methods of obtaining default probabilities
• Requirements for internal monitoring systems
• Determining quantum of loss given default in a Forex portfolio
• Criteria for which Forex position will be held in a portfolio or, alternatively, sold to other investors i.e. closing out
• An organization's required rate of return and its risk appetite
• Policy setting and implementation; investing guidelines, monitoring performance investment tactics, position control and management
• Quantification of Forex concentrations (Note: This program will describe and use the widely discussed CFE-In-Practice™ FOREX Case Studies)
METHODOLOGY
This coaching by a Certified Fraud Examiner consists of a lively series of short participative lectures conveyed using plain uncomplicated explanations. Learning will be facilitated through discussion and case studies. Ample coaching materials will be gi
The document outlines an agenda for a training on audit documentation, tools, and techniques for internal auditors. It includes introductory lectures, product and case study presentations, exercises, and breaks. It also discusses the internal auditor's role, the audit process, internal controls, documenting controls, risks, and system documentation methods like flowcharts and questionnaires.
This document outlines a risk-based audit coaching program led by Tommy Seah. The coaching will help participants understand risk identification, evaluation of internal controls, and audit techniques. It will cover the roles of internal auditors and compliance officers, the audit process, and components of internal control. The coaching uses interactive lectures, discussions, and case studies to facilitate learning. Tommy Seah is an experienced auditor and author who provides in-demand technical training to banks in Asia and Europe on topics like anti-money laundering, operational risk management, and Basel II.
TOMMY SEAH speaks on his perspective of FRAUD in CHINATommy Seah
1) The article discusses fraud that is occurring increasingly in China, especially as foreign companies establish supply chains and operations there. It provides three case studies of fraud that was uncovered.
2) The first case involved a country manager for a European machinery company who was embezzling money through shell companies and taking kickbacks from dealers. It took a detailed private investigation to uncover the full extent of his schemes.
3) The other two cases also involved employees who were diverting business for personal gain to companies they had ownership stakes in, as well as cronyism and embezzlement within a joint venture.
The document discusses organizing a 1-day course on understanding and developing a fraud risk management program for organizations. The course aims to help participants understand the business case for managing fraud risk, develop a COSO-consistent fraud risk management program, and evaluate existing fraud risk management programs. The course will cover topics like defining fraud risk, roles and responsibilities in fraud risk management, coordinating governance, risk management and compliance to prevent fraud, assessing fraud risk, and monitoring fraud risk management. It will be jointly organized and feature two trainers with experience in fraud examination, digital forensics certification, and financial crime consulting.
Tommy Seah speaks on CORRUPTION and FRAUD PREVENTION in MalaysiaTommy Seah
The document discusses managing internal investigations and corruption. It covers the differences between internal audit and forensic audit approaches, as well as the skill set requirements for internal investigations. It also discusses how to build competencies for internal investigations, the costs of fraud to organizations, and how to apply investigative methodologies while avoiding legal issues.
The document provides information about CFE-In-Practice, a company that offers fraud examination and consulting services. It discusses CFE-In-Practice's mission and philosophy, which is to provide efficient and insightful financial training, consulting, and fraud prevention services using experienced professionals. The document also provides an overview of the services offered, including corporate fraud investigation, management consulting, training and professional coaching. It includes a profile of Tommy Seah, a Certified Fraud Examiner and leader at CFE-In-Practice.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
1. Understanding Procurement Fraud
-Investigation & Resolution
17th & 18th June 2009 | Parkroyal Hotel| Kuala Lumpur|Malaysia
Some quotes from past participants
“The content of the presentation is useful in real world”
“New knowledge with regards to Procurement Fraud”
“Practical approach with simple & understandable illustrations”
“Presentation is lively, interesting and humourous”
“ The trainer were so energetic, resourceful & knowledgeable”
Special privileges for the first ten (10) paid and registered participants
a) Special rate of RM2,500 per pax
b) Further discount off 10% of normal fee for your next event
Another Event Proudly Organised By
CSI recognised
for CPD (10 hours)
Tel : +603 9056 2370 | Fax : +603 90562380 | www.csi-in-practice.com
2. Understanding Procurement Fraud - Investigation & Resolution
Message from the Workshop Leader
Dear Delegates,
Purchasing fraud is on the rise. Companies today do not just face risks from internal fraud but also
from external criminals who are technologically savvy. The important role on combating fraud plays in
minimising financial losses is fast gaining ground. CFE-In-Practice experts is providing you
with practical advice on how to “look for red flags” and symptoms of fraud. Discover
why some numbers do not add up. Mitigate this fraud risk management by learning
the latest strategies that can be adapted to your company. This event will also cover
investigation and prevention, most importantly how to structure your business processes to minimise
the risks whilst maintaining operational efficiency.
Recognising the challenges that organisations are facing in combating Purchasing Fraud, CSI
In Practice is pleased to present this 2-days Workshop on Understanding Procurement Fraud -
Investigation & Resolution. This will serve as an excellent opportunity to learn how best to conduct
an internal investigation to protect your organization and step up on controls to deter fraud.
Profile of the Workshop Leader
Mr. Tommy Seah, CFE, FAIA, Forensic CPA, Chartered Banker, Accountant,
Auditor, Investigator, Fraud Examiner, Regent Emeritus, ACFE (Texas, USA)
World Headquarters, Chairperson, CSI World Headquarters
Tommy is the Independent Third Party Central Bank Compliance Reviewer for a
$25 billion asset management company. He is a Risk Management Specialist and
a member of the Global Association of Risk Professionals (GARP). He is a Certified
Fraud Examiner and a member of The Association of Certified Fraud Examiners
Board of Regents based in Texas, USA. CFE is a post graduate professional
qualification recognised by the USA Central Intelligence Agency in it’s recruitment
of auditors for combating fraud.
Tommy Seah is the author of seven banking books including the F.I.G. Program. The
F.I.G. is the authoritative and definitive text on Financial Instruments designed to be
used in the world wide banking industry. This publication has received excellent
review and first class recommendation from some of the most authoritative
professional certification bodies and top-rated banks in the world. The other six
authoritative texts are The Audit Foreign Exchange in Banks, The Control of Money
Market Activities in Banks, Understanding and Auditing Operational Risk Management, Financial Management for Banks,
MCA for Banks and SWAPS in Investment Banking. His latest publication is BASEL II Trading Book Issues in Risk
Management.
For the past twenty eight years, Tommy has trained numerous bank auditors and consulted by numerous lawyers in
the region. Financial Instruments, Foreign Exchange, Money Market Options, Derivatives and Swaps are his special
interests. He devotes a substantial portion of his time in research work and is presently available on retainer to
selected established banks for loss prevention consultancy. Today, he is still very much a hands-on accountant,
auditor, investigator and SOX 404 Compliance examiner.
WHO SHOULD ATTEND :
• Purchasing Managers, Procurement Managers, Buyers, Merchandisers, Fraud Investigators,
Legal & Compliance Managers, CFOs & VPs Finance, Financial Controllers & Accountants, CEOs
& MDs, Company Directors, Risk Management & Regulatory Managers, Internal Auditors &
Audit Managers, , Internal Control Officers, HR & Training Managers, IT & Contract Managers
& all who involved in Corporate Transparency & Governance
3. Understanding Procurement Fraud - Investigation & Resolution
Workshop Outline : Day One (17th June, 2009)
Time Topic
Introduction to Purchasing Fraud
9.00am
• What is Procurement fraud?
• Internal Controls limitation
• Fraud-related dangers to be avoided
Understanding and Shaping Your Environment
• Understanding your policies, codes and practices
• The Trinity of Controls
• The Paradigm Shift
• The need for Fraud Risk Management
(AM Coffee/Tea Break)
10.30am
Anatomy of a Kickback Case
10.45am
• Collusion between employees and third parties represents a growing
number of all corporate frauds.
The Fraud Compass :
• In what order would you perform the suggested investigative tasks?
• What would each of you recommend to be done to investigate the
rumours of the COO receiving kickbacks from vendors?
(Lunch & Networking Session)
12.30pm
Recap Morning Session
2.00pm
Anatomy of a Kickback Case - Contd….
• Where do I find the help in investigating Procurement Fraud?
• What can be done to put more puzzle pieces on the board?
• What are the appropriate financial records to examine?
(PM Tea Break)
3.30pm
3.45pm
Creative Accounting and Purchasing Fraud
• The Systemic Approach to fraud detection
• Purchasing fraud exposures
• Symptoms and “red flags” of purchasing fraud
General Discussion & Question Session
Day 1 Ends
5.00pm
4. Practical Know How On Combating Corporate Fraud
Workshop Outline : Day Two (18th June, 2009)
Topic
Time
Recap on Day 1
9.00am
Corruption and Cultural Considerations
• Gifts and entertainment practices
• Understanding the global environment
• Pressures toward transparency
• Special situations in select industries
• Areas Meriting Additional Consideration
• Bidding
• Blanket purchases
• Minority and disadvantaged business programs
• Trade customs or practices
(AM Coffee/Tea Break)
10.30am
Suggestions for assessing and improving your environment
10.45am
• Ethics and Integrity
• Can ethics be taught ?
• Ethical Decision Making Model
• The Triangle of Temptations
(Lunch & Networking Session)
12.30pm
Recap Morning Session
2.00pm
Investigating - Responding to Suspected Wrongdoing
• Introduction to Investigations
• What a complete investigation should include
• Proving wrongdoing in purchasing
• An investigative checklist
(PM Tea Break)
3.30pm
Contracting & the Prevention of Purchasing Fraud
3.45pm
• Contracting tasks and controls
• A step-by-step approach to prevention
• Working with management to deter purchasing fraud
• Suggestions for the future
A Discussion on Procurement Fraud Cases
Case Studies, Q & A Session
Day 2 Ends
5.00pm
5. REGISTRATION FORM 5 EASY WAYS TO REGISTER
Understanding Procurement Fraud Telephone: (603) 9056 2370
- Investigation & Resolution
Fax: complete and send this registration form
17-18 June 2009
to: (603) 9056 2380
Parkroyal Hotel, Kuala Lumpur, Malaysia
Yes! Please register the following delegate(s) for this Workshop
Mail: this completed form together with payment to:
(Please photocopy for more delegates)
CSI IN PRACTICE
I am unable to attend but please put me on your mailing list
20-2, Jalan 1/76D, Desa Pandan,
55100 Kuala Lumpur, Malaysia
I am interested in your Upcoming Events
Name:(Dr/Mr/Mrs/Ms):____________________________________ Email: alvin@csi-in-practice.com
Job Title:________________________________________________
WEB: http://www.csi-in-practice.com
Email:___________________________________________________
Name:(Dr/Mr/Mrs/Ms):____________________________________ Your investment for attending this Workshop is:
Job Title:________________________________________________
Early Bird Fee
Regular Fee
Email:___________________________________________________ (If Payment & Registration are
(Payment
received by 31 June 2009)
after 31 Jun 2009)
Name:(Dr/Mr/Mrs/Ms):____________________________________
RM3,388 RM2,888
Workshop
Job Title:________________________________________________
The fee inclusive of lunch, refreshments and workshop documentation.
Email:___________________________________________________
Approving Manager:_____________________________________ Note: For payment by Local Order, early bird fee will only apply if
the local order is executed and payment fully released to us on or
Job Title:________________________________________________
before the early bird deadline.
Email:__________________________________________________
Company:_______________________________________________
Address:________________________________________________
________________________________________________________
Tel:________________________Fax:__________________________
CSI In Practice
Signature:_______________________________________________
20-2, Jalan 1/76D, Desa Pandan,
Email: __________________________________________________
55100 Kuala Lumpur, Malaysia
Company Chop :________________________________________
WORKSHOP VENUE AND ACCOMMODATION INFORMATION
3-1407335-12
Parkroyal Hotel, Kuala Lumpur, Malaysia
Jalan Sultan Ismail, 50250 Kuala Lumpur, Malaysia
Tel: (603) 2147 0088 Fax : (603) 2147 0099
:
Important Notice: Payment is required with registration and must be received prior
Website: www.parkroyalhotels.com
to the workshop to guarantee your place. Walk-in delegates with payment will only
Attn: Room Reservation Department be admitted on the basis of space availability at the workshop and with immediate
full payment.
For reservations, please make your bookings directly with the hotel.
To enjoy the special room rates, please quote CSI IN PRACTICE
CANCELLATIONS AND TRANSFERS
Workshop on “Understanding Procurement Fraud
- Investigation & Resolution”
If you are unable to attend, a substitute delegate is welcomed at no
Hotel bills are to be settled by delegates directly with the hotel. Hotel
extra charge. Please provide the name and the title of the substitute
reservations and travel plans are the responsibilities of the delegates.
delegate at least 2 working days prior to the Workshop. A refund less
Please note that rooms are available on a first-come-first-served basis.
RM300 administration charge will be made for cancellation received
INCORRECT MAILING INFORMATION in writing on or before 3rd June 2009. Regrettably, no refund can
be made for cancellation received after this date. A complete set of
It is possible that you may receive multiple mailings of this event or
documentation will however be sent to you.
incorrect company details on the labels, for which we apologise. If
this happens, please let us know so that we can update our database CSI IN PRACTICE reserves the right to make any amendments and/or
immediately. If you do not wish to be on our mailing list, please changes to the programme, venue, speaker replacements and/or
let us know and we will remove it from our listing. topics if warranted by circumstances beyond its control.
Disclaimer
FOR OFFICIAL USE
Due to the interactive nature of the learning session, the sequence and contents of the
program maybe vary according to the needs of the participants. The speaker reserves the
inalienable right and the privilege to conduct the program in the manner which he thinks FEE RECEIVED
to be in the best interest of the majority of the participants. Please ensure that you
understand this completely so as to prevent any form of unrealistic expectation and or
disappointment in a public enrolment program that was not tailored to your specific need.
Copyright @ Mar 2009