What you learn on ... the 'fraud and corruption risk in business' CIMA Mastercourse.

The course speaker, Stephen Hill, is the founder of anti-fraud specialist Snowdrop Consulting and director of data and intelligence at the Absolute Partnership. He was head of a large accountancy firm's fraud and forensic group, where he advised clients on crime prevention and detection, working closely with the police.

This one-day course will offer delegates a full understanding of the threats posed by various types of fraud (especially cyber-crime), how to recognise where these may exist and how best to respond to them.

It is designed with any accounting practitioner who could become a victim of fraud in mind. Although the material is aimed primarily at those with a broad understanding of fraud, more advanced topics will be covered towards the end. The key subjects include:

* The identification of fraud.

* More recent criminal developments, such as phishing.

* The release of data in Wi-Fi hot spots.

* Insider fraud.

* Practical risk-assessment techniques.

* The response to fraud.

I will start the day by looking at everyday activities that could be targeted by criminals. I'll consider the "fraud triangle"--an academic model, proposed by a US criminologist called Donald Cressey, that identifies the three key factors that need to be present for fraud to occur: opportunity, pressure and rationalisation. I'll also use case studies to examine issues such as corporate financial irregularities and insider dealing to illustrate how such situations were able to develop.

A substantial part of the course will concern cyber-crime. Its annual cost to UK business alone is thought to be at least 21bn [pounds sterling], according to a recent report by the London Chamber of Commerce and Industry. This section will look at risk arising from cloud computing--the ability to steal information from mobile phones in Wi-Fi hot spots has become a serious threat, for instance. It will also cover simple scams such as phishing and the rise in online attacks fuelled by the widespread use of social media.

Insider fraud is one threat that has grown significantly in recent years. It is often instigated through...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT