Date Venue Fee
15 Jul - 19 Jul 2024 Dubai – UAE $ 4,950 Register Now
21 Oct - 25 Oct 2024 Dubai – UAE $ 4,950 Register Now
About the Course

Fraud, Theft, and Corruption in the workplace are arguably the most underestimated problems and, therefore, the most unmanaged risk in business. As individuals and organisations, we are cashing in on the 'digital dividend' with ever-increasing enthusiasm. However, there is a price to be paid for these new-found freedoms, and we aren't paying it.

With every digital freedom, we create exposures and vulnerabilities. Sometimes, the technology needs more time to be ready for the task at hand because the human user still needs to adjust to the different types of risks they face online. As a result, online fraud, targeting any transaction that can generate cash, is being perpetrated by clever but unscrupulous criminals who see the digital world as a huge opportunity to make money. 

This 5-day interactive Managing Fraud in a Digitalised World training course is designed to discuss how Regulatory Technology (RegTech) and work processes play a part in managing digital fraud. It highlights every organisation's and individual's challenges in the exponentially growing digital world. Looking at all areas that can be affected by technology, the programme will highlight the cyber risks now faced by the world and innovative methods to protect us against them.

Core Objectives

The delegates will achieve the following objectives:

  • Appreciate the role of Regtech
  • Identify & understand Fraud, who commits it and why
  • Analyse smart devices and use them safely and effectively
  • Ensure that IT and Computer Systems are effectively monitored
  • Understand the digital underground
  • Know how organised crime hacks the systems
  • Acquire about emerging digital protection techniques
Training Approach

Delegates in this training course will receive thorough training utilising various proven adult learning teaching and facilitation techniques with highly interactive and participative training methodology, including case studies, exercises, and role-plays to simulate audit scenarios and situations that auditing, compliance, and quality assurance professionals will encounter.

The Attendees

Digital transactions and processes continue to grow; therefore, it is vital to mitigate digital fraud proactively. This training course is helpful for anyone dealing with digital operations and systems.

Likewise, it will be valuable to the professionals but not limited to the following:

  • Fraud Investigators and Specialists
  • Security Officers
  • Professionals working in Auditing, Compliance, and Quality Assurance
  • Managers need a broader understanding of how to investigate digital types of fraud
  • Professionals who are using technology for business
  • Members of the Fraud Team who need to learn more about targeting digital types of fraud
  • Professionals in Support Functions, such as HR, Finance, and Legal
  • Professionals needing a broader understanding of how organised crime will attack their business
Daily Discussion

DAY ONE: THE NATURE OF FRAUD

  • What is Fraud?
  • Who Commits Fraud?
  • The Fraud Components Triangle
  • Fraud in the Digital World
  • What can we do?
  • Regulatory Technology

DAY TWO: CONNECTED TECHNOLOGIES 

  • Smartphones
  • Emails and the Cloud
  • Computers and Laptops
  • Internal Systems
  • Fraud and Dangers in the Home

DAY THREE: THE DIGITAL UNDERGROUND

  • Organised-Crime
  • The Malware-Industrial Complex
  • The Onion Router (TOR)
  • Bitcoin – Legal or Just Money Laundering?
  • What is to be found there?

DAY FOUR: INCREASED CONNECTIVITY & HACKING 

  • All Things are Hackable
  • Hacking Biometrics
  • Everything Connected – Insecurely
  • Loss of Privacy
  • Hacking Your Home and Business

DAY FIVE: STRATEGY AND KEY ELEMENTS

  • Review standards, ISO 9001, ISO 27001, and ISO 15489
  • Creating Information and Documentation Audit
  • Create File Plans, Metadata Plans, Retention Schedules, and other Information Controls
  • The Way Forward – Users
  • Encryption