49 集

Join us to hear about crime families, penny stock boiler rooms, international money launderers, narco-traffickers, oligarchs, dictators, warlords, and kleptocrats. The Fraud Eats Strategy series is the distillation of experiences, whether it's an accounting scandal, arrests, search warrants, loss of market cap, or all of those things at once – one thing is sure. Failure to consider fraud and corruption risk can upend your strategy and lead to disaster.  

Fraud Eats Strategy Scott Moritz

    • 犯罪紀實

Join us to hear about crime families, penny stock boiler rooms, international money launderers, narco-traffickers, oligarchs, dictators, warlords, and kleptocrats. The Fraud Eats Strategy series is the distillation of experiences, whether it's an accounting scandal, arrests, search warrants, loss of market cap, or all of those things at once – one thing is sure. Failure to consider fraud and corruption risk can upend your strategy and lead to disaster.  

    Human Trafficking is Everyone’s Problem: Steps that Organizations Can Take to Disrupt Human Trafficking

    Human Trafficking is Everyone’s Problem: Steps that Organizations Can Take to Disrupt Human Trafficking

    Human trafficking is the fastest-growing transnational crime with more than 25 million people held in forced labor and sexual exploitation. As if these numbers aren't horrifying enough, 10 million of those trafficked people are children, and yet rarely are US organizations focused on human trafficking's impact on their operations, much less society as a whole. In fact, most of us consider human trafficking to be a problem occurring in developing countries and that there are more pressing issues that should demand our attention and compliance resources. That false narrative is part of what makes human trafficking so difficult to counter.

    • 44 分鐘
    Investigation Challenges: The More Things Change, the More They Stay The Same

    Investigation Challenges: The More Things Change, the More They Stay The Same

    Host Scott Moritz was a guest speaker at the October NAVEX Next Virtual Conference joined by Gregory Coleman, a former FBI colleague, to discuss established investigation techniques and how some of these practices have changed in recent times.
    For more information visit: FraudEatsStrategy.com

    • 50 分鐘
    Navigating the Steps of an FCPA Investigation - Part 2

    Navigating the Steps of an FCPA Investigation - Part 2

    In Part 2 of this series we continue the conversation of how to bring order to the chaos of the early days of an FCPA investigation.
    For more information visit FraudEatsStrategy.com

    • 23 分鐘
    Bringing Order to the Chaos: Navigating the Steps of an FCPA Investigation

    Bringing Order to the Chaos: Navigating the Steps of an FCPA Investigation

    In part 1 of this Fraud Eats Strategy series, we discuss how to bring order to the chaos of the early days of an FCPA investigation and avoid mortgaging the company’s future in the process.
    For more information visit FraudEatsStrategy.com

    • 32 分鐘
    The Anatomy of a Ransomware Attack - Part 2

    The Anatomy of a Ransomware Attack - Part 2

    In part 2 of this series, we continue to discuss the tools that cybersecurity teams use to combat ransomware attacks.
    For more information visit FraudEatsStrategy.com

    • 28 分鐘
    The Anatomy of a Ransomware Attack - Part 1

    The Anatomy of a Ransomware Attack - Part 1

    Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer networks and encrypt the data stored on those networks and render it unusable. The criminal organization then holds the data hostage until a ransom payment is made. If the ransom is not paid, the victim organization’s data will either remain encrypted and unusable or it could be released to the public. 
    For more information visit FraudEatsStrategy.com

    • 27 分鐘

熱門犯罪紀實 Podcast

我在案發現場
ETtoday
出塊True Crime
Yolanda Chiu & Olive Lai
X調查
X調查
阿善師鑑識實錄
阿善師製作團隊
Crime Junkie
audiochuck
她說犯罪 She Tells True Crime
Lily W