Limited Period Offer - Get Unlimited Access to 10k+ hours of content with myCPE Prime at $199Subscribe Now

Identifying vulnerable touchpoints/engagement sets in a CX Journey

  • Accountant
  • CPA (CA)
  • CRMA
  • CFE
  • CGFM
  • CIA
  • CPA (US)
  • CVA
  • CA - ICAEW
  • IAP
  • QIAL
  • ACCA
  • MAFF
  • CTP
  • CA - Ireland
  • CA - Scotland
  • CPA - Ireland
  • Course Description
  • Course Qualification
  • Presenter
  • FAQ

Course Description

Course Description

Setting out to learn about fraud prevention can be a daunting task.

The most familiar method is "Payment Fraud" - stolen payment information used for transactions. This method reliably introduces billions of dollars of losses into the marketplace each year. Debit/credit card transactions and check fraud fall under this category. Each with countless ways to obtain, manipulate and employ the compromised sets of data.

A slightly less known method is "Account Takeovers" - the process wherein a fraudster gains access to an established account. Following the data breaches reported over the last several years, this method has grown in popularity among cyber-criminals. Tactics geared toward obtaining information can be launched against any company that stores valuable information. Targeted industries include Healthcare, Telephone Service Providers, Mortgage Companies, Financial Institutions, and Ride Share Providers just to name a few. The information is used in several different ways to target established accounts, drain funds, sell access, use frequent flyer miles, etc.

More methods include Identity theft, the establishment of credit lines/financing, counterfeit materials, mortgages, lease agreements, peer-to-peer marketplaces, digital goods exploits, physical goods exploits, chargeback abuse, refund abuse, promotion abuse.... and yes, the list goes on.

Finally, considering that successful repeatable attacks are then automated by cybercriminals via the use of bots and quickly, this daunting task seems almost impossible to overcome.

With many items on the list for raising awareness, filtering through mass-marketed media to understand how these fraud methods might apply to you and your operation presents another dimension of work in itself.

As intimidating as it might be, there is a way forward.

Join this CPE Fraud webinar to understand fraud methods employed by fraudsters and strategies that your company can deploy over time to seal gaps in processing relative to fraud.

You can also look into our CPE courses on Cybersecurity.

Learning Objectives

  • To discuss the examples of method development processes employed by fraudsters.
  • To review the throughline that exists between the majority of fraud prevention methods.
  • To analyze strategy items that your company can deploy over time to seal gaps in processing relative to fraud.
  • To evaluate the actionable items that you can employ.

Recommended For

  • This online CPE webinar is recommended for CPA (US), CIA, IAP, QIAL, CFE, CFF, CVA, CBA/MCBA, CGFM, MAFF, CTP, CRMA, and other professionals who want to learn everything about fraud methods and fraud prevention in the organization.
  • This CPD course is also helpful for Canadian CPAs, CA-ICAEW, CA-Ireland, CPA-Ireland, CA-Scotland, and ACCA who want to learn strategies items that your company can deploy over time to seal gaps in processing relative to fraud.

Who Should Attend?

  • ACCA
  • Auditors
  • CA - Ireland
  • CA - Scotland
  • Certified Fraud Examiner
  • Certified Public Accountant (CPA)
  • Certified Valuation Analysts
  • CPA (Industry)
  • CPA - Ireland
  • CPA - Large Firm
  • CPA - Mid Size Firm
  • CPA - Small Firm
  • Young CPA