• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

13 Fraud courses in Sheffield

Organisation Programme - How to identify and mitigate procurement fraud and corruption

By Global Risk Alliance Ltd

Our training programme will provide those involved at any stage of the process for procuring goods and/or services within their organisations with the knowledge and skillset to identify and mitigate the threat posed by the breadth and multi-layered complexity of procurement fraud and corruption.

Organisation Programme - How to identify and mitigate procurement fraud and corruption
Delivered In-Person in InternationallyFlexible Dates
£7,000 to £9,000

Fraud should not happen, but it does. It can happen at the highest to lowest levels in an organisation. Recent surveys show that incidents of fraud are not decreasing. Fraud costs companies money and, perhaps even more importantly, reputational damage. The losers are not just the shareholders, suppliers, customers, etc, but society as a whole. This programme shows why frauds happen, how organisations put themselves at risk and what they can do to prevent it. This programme will help directors and others understand: The motives for committing fraud Directors' responsibilities for identifying and reporting fraud What types of frauds there are How frauds are perpetrated How they can be prevented How regulators deal with fraud Above all, the principal objective of this programme is to help make your organisation as secure as possible from the threat of fraud. 1 Motives for committing fraud - drivers of fraud Session objective: to understand why people might commit fraud Drivers of fraudulent behaviourAmbitionGreedTheftConceit? And more! 2 Accounting mechanisms that allow fraud Session objective: to review the elements of the accounting, internal control and management processes that allow creative accounting Income or liability? Asset or expense? Coding errors and misclassification Netting off and grossing up Off-balance sheet items 3 Structures that allow fraud Session objective: to consider company and trading structures that allow frauds to be perpetrated Group structures Trading structures Tax havens Importing and exporting 4 Interpretations and other non-compliance that allow fraud Session objective: to look at how creative interpretations of law and accounting practice may permit fraud The place of accounting standards Accounting policies Trading methods The place of auditing standards 5 Money laundering Session objective: to review what constitutes money laundering Types of money laundering Identifying laundering Preventing laundering 6 Preventing fraud - proper management structures Session objective: to review the place of proper corporate governance Corporate governance Company management structure Audit committees The place of internal audit 7 Preventing fraud - proper accounting Session objective: to review best accounting and auditing practice Accounting standards Internal accounting policies Adequacy of internal controls Internal audit 8 Preventing fraud - regulation Session objective: to look at how regulators aim to prevent fraud The regulatory environment Financial services regulation 9 Conclusion Course review Open forum Close 10 Course summary - developing your own cost action plan Group and individual action plans will be prepared with a view to participants identifying their cost risks areas and the techniques which can be immediately applied to improve costing and reduce costs

Fraud (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Organisation Programme - Bribery and corruption risk assessment

By Global Risk Alliance Ltd

Our training programme will provide those involved at any stage of the process for procuring goods and/or services within their organisations with the knowledge and skillset to identify and mitigate the threat posed by the breadth and multi-layered complexity of procurement fraud, corruption and associated financial crime and money laundering.

Organisation Programme - Bribery and corruption risk assessment
Delivered In-Person in InternationallyFlexible Dates
£7,000 to £9,000

Forensic Accounting for Frauds

5.0(10)

By GBA Corporate

Overview Corporate frauds have the inherent power to bring large organizations to their knees, cause huge monetary loss, prompt lawsuits followed by significant legal expenses, lead to the imprisonment of employees and deteriorate confidence in the market, governments, and institutions. In response, corporations and governments across the globe have stepped up their effort to inspect, prevent and penalize fraudulent practices; resulting in a greater emphasis on the domains of forensic auditing and accounting in the current economy. This training course will empower you to recognize the root causes of fraud and white-collar crime in the current economy, understand the categories of fraud, equip you with methodologies of fraud detection and prevention, and heighten your ability to detect potential fraudulent situations. In addition to the fundamentals of fraud investigation and detection in a digital environment; profit-loss evaluation, analysis of accounting books, legal concepts, and quantification of financial damages are also examined in this course

Forensic Accounting for Frauds
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

FORENSIC ACCOUNTING AND AUDITING

5.0(10)

By GBA Corporate

Overview This training course will empower you to recognize the root causes of fraud and white-collar crime in the current economy, understand the categories of fraud, equip you with methodologies of fraud detection and prevention, and heighten your ability to detect potential fraudulent situations. In addition to the fundamentals of fraud investigation and detection in a digital environment; profit-loss evaluation, analysis of accounting books, legal concepts, and quantification of financial damages are also examined in this course

FORENSIC ACCOUNTING AND AUDITING
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,779

Corruption and Procurement Fraud Training Programmes

By Global Risk Alliance Ltd

Our In-Person training programmes provide students involved at any stage of operational processes, projects or procuring goods and/or services within their organisations with the knowledge and skillset to identify and mitigate the threat posed by the breadth and multi-layered complexity of procurement fraud and corruption. Course objectives Our courses aims to increase and enhance delegates’ understanding of the various procurement fraud and corruption threats which impact upon them and the organisations, sectors and regions in which they operate and provide them with the tools necessary to risk assess and mitigate those threats.

Corruption and Procurement Fraud Training Programmes
Delivered In-Person in InternationallyFlexible Dates
Price on Enquiry

Insurance Risk Management

5.0(10)

By GBA Corporate

Overview For internal employees who want to understand and expand their roles related to financial reporting, as well as those who simply need a refresher on financial accounting, this course is the ideal way to get up to speed. By exploring concepts that go beyond basic accounting, this course will enable participants to approach financial auditing with renewed confidence. The programme will walk participants through an analysis of an organization's financial statements using case study exercises, where participants will calculate key ratios and analyze trends over time. Engaging in discussions on both historic and current fraud cases, participants will learn how to recognize “red flags” in financial statement reporting.

Insurance Risk Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,779

Session Border Controllers for engineers

5.0(3)

By Systems & Network Training

Session Border Controllers course description A hands on course covering Session Border Controllers with a focus on the technical workings of features commonly found in Session Border Controllers. Hands on practicals follow each major theory session. What will you learn Explain how Session Border Controllers work. Explain the SIP call flow using a SBC. Deploy Session Border Controllers Describe the features found in Session Border Controllers. Session Border Controllers course details Who will benefit: Technical staff working with SIP. Prerequisites: Definitive SIP for engineers Duration 2 days Session Border Controllers course contents SIP review Signalling, media, RTP, SIP, peer to peer, SIP proxies, SIP call flows. Hands on: SIP packet analysis. Session Border Controllers What is a SBC? SBC features, peering scenario, access scenario, NNI SBC, UNI SBC, enterprise SBC. Hands on: SBC call flows SBC topology hiding Header privacy, B2BUA. Hands on: Header analysis. Session control Call admissions, QoS, statistics and billing, redundancy and scalability. Hands on: SBC session control SBC and NAT NAT traversal, STUN, ICE, NAT and SIP, NAT and RTP. Hands on: SBC and NAT traversal. SBC and security DoS, access control, encryption, authentication, toll fraud, regulatory issues, lawful intercept. Hands on: Security. Interoperability mediation Manipulating SIP headers, IMS, IETF, TISPAN, SIP-I. SBC interworking.

Session Border Controllers for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Management of Risk (M_o_R) Practitioner: In-House Training

By IIL Europe Ltd

Management of Risk (M_o_R®) Practitioner: In-House Training The M_o_R® Practitioner course has been designed to provide learners with the opportunity to practice the practical application of the M_o_R method and covers the twelve M_o_R principles: Approach, Process and the basic techniques essential to managing risks using the M_o_R guidance. The purpose of the M_o_R Practitioner qualification is to confirm that the learner has achieved sufficient understanding of how to apply and tailor M_o_R in a scenario situation. What you will Learn At the end of the M_o_R Practitioner course, learners will gain competencies in: M_o_R framework (principles, approach based on risk documentation, process steps, and embedding and reviewing M_o_R principles Outline of M_o_R approach documents (including policy, process guide, and risk communications plan) Risk identification, assessment, and control Embedding and reviewing M_o_R M_o_R organizational perspectives (strategic, program, project, operational) Benefits The M_o_R Practitioner course offers a wide-ranging set of guidelines that will help in the management of risk in a project or program environment. It will help prepare learners for the M_o_R Practitioner Exam. They will feel more confident in approaching risk management after attending the course and will be aware of the use of different techniques that can assist in this task, including: Improved basis for effective strategy formation Reduced time spent fire-fighting and fewer unwelcome surprises Increased likelihood of successful change initiative outcomes Closer internal focus on doing the right things properly Increase in efficient use of resources waste and fraud Better management of contingency resources M_o_R roles and responsibilities M_o_R health check M_o_R maturity model Risk specialisms (including business continuity management) Introduction Introduction to the course What is a risk? What is risk management? Why is risk management so important? Basic risk definitions The development of knowledge about risk management Corporate governance and internal control Where and when should risk management be applied? M_o_R Principles The purpose of M_o_R principles Aligns with objectives Fits the context Engages stakeholders Provides clear guidance Informs decision-making Facilitates continual improvement Creates a supportive culture Achieves measurable value Risk management maturity models M_o_R Approach Relationship between the documents Risk management policy Risk management process guide Risk management strategy Risk register Issue register Risk response plan Risk improvement plan Risk communications plan M_o_R Process Common process barriers Identify - contexts Identify - the risks Assess - estimate Assess - evaluate Plan Implement Communication throughout the process M_o_R Perspectives Strategic perspective Programme perspective Project perspective Operational perspective Risk Specialisms Business continuity management Incident and crisis management Health and Safety management Financial risk management Environmental risk management Reputational risk management Contract risk management

Management of Risk (M_o_R) Practitioner: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

FORENSIC ACCOUNTING FOR INSTITUTIONAL INVESTORS

By Behind The Balance Sheet

Our Forensic Accounting Course is designed to help investment analysts detect earnings manipulation. It focuses on creative accounting rather than conducting detailed forensic analysis but we explain the tools short sellers employ to detect fraud and some of the techniques we used at hedge funds to identify short opportunities.

FORENSIC ACCOUNTING FOR INSTITUTIONAL INVESTORS
Delivered In-Person in InternationallyFlexible Dates
Price on Enquiry

Educators matching "Fraud"

Show all 5
St Wilfrid's Catholic Primary School

st wilfrid's catholic primary school

Sheffield

We process personal data to provide public services. Personal data is information about living identifiable individuals. It can be a name, address, contact details, photograph, sound recording; it can be details of someone’s behaviour, lifestyle, physical or mental health needs; it can be a unique number, such as a vehicle registration plate, National Insurance number, etc. We decide what personal data we need and how to use it, so we are a Data Controller and registered as such on the Information Commissioner’s Register of Data Controllers. When we collect personal data, we are required to make sure you are clear what data we need and why, what we intend to do with it, what your individual rights are, and who you can contact for enquiries or concerns about the use of your personal data. This is called a privacy notice and we can do this verbally or in writing. This page is our general privacy notice and we have included specific privacy notices below for the services that process large amounts of personal data, for example council tax, planning, parking, elections, licensing, housing, etc. Why we collect and use personal data We collect and use personal information to: provide, plan and manage our services carry out our regulatory, licensing and enforcement roles carry out any other tasks which we have to do by law make and take payments and grants and spot fraud listen to your ideas about our services tell you about our services evaluate and improve services We might collect your personal data directly from yourself, from someone acting on your behalf, or from another third party. We might collect this data in person, over the telephone, in writing, or captured as an image, audio or film recording. We can only use your personal data if we have a lawful basis for doing so. The lawful basis will be recorded on the Council’s Record of Processing Activity and, where appropriate, on relevant service area privacy notices. If we rely on consent to process your data, you have the right to withdraw that consent at any time. To withdraw consent, either contact the Service that you provided the consent to or contact the information management team. Sharing your information We share personal data internally within the council and also with external third parties so we can carry out our work. Internal sharing might include checking your eligibility for a service (eg free school meals) or keeping accurate records, whereas external sharing might be to ensure you receive the right service (eg social care support). Who we share information with depends on the service we are providing and your circumstances, but may include: healthcare, social and welfare organisations and professionals providers of goods and services financial organisations, including debt collection, tracing and credit referencing agencies elected members local and central government ombudsman and regulatory authorities professional advisors and consultants police forces, other law enforcement and prosecuting authorities voluntary and charitable organisations Disclosure and Barring Service Courts and Tribunals utilities providers When personal data is shared, only the minimum amount is shared and relevant contracts and / or agreements will be in place. Fraud prevention and detection We are required by law to protect the use of public funds and for this reason we share information with internal services and other bodies responsible for auditing or administering of public funds to detect and prevent fraud. This sharing includes, but is not exclusive to the Council’s external auditor, Department for Work and Pensions, other local authorities, HM Revenue and Customs, the Police, credit reference agencies. We also share personal data with the Cabinet Office for the National Fraud Initiative. This is a national data matching exercise, which takes electronic data from the private and public sectors to identify potential fraudulent claims and payments. The Cabinet Office stipulates the data that they need and subsequently provides us with details of the cases where the matching indicates an inconsistency or potential for fraud, so that we can investigate further. This data matching is carried out under the Local Audit and Accountability Act (part 6, Schedule 9) and does not rely on your consent. How long we keep information for This varies depending on the type of information, as well as the legal requirements and reason we are keeping the information. In some instances the law sets the length of time information has to be kept. We also have retention and disposal schedules which give details about how long we need to keep different types of information. Your data rights You have the following rights in regard to your personal information, to: access copies of any records we hold about you have any information we hold about you corrected have any information we hold about you deleted or destroyed restrict how information we hold about you can be used or shared object to information about you being held have any information we hold about you transferred to a third party challenge decisions relating to you made using automated decision making and profiling (currently we have no services that use automated decision making or profiling for decision making) Please note there may be times that we cannot fulfil these rights fully because of legal reasons, for example we cannot delete your data if we still need it. If you want to exercise any of the above rights, please make a subject access request. Make a subject access request Who to contact about the way your personal data is handled If you have any queries, concerns or complaints about the way we process your personal data, including the way we handle information requests, you can contact our Customer Services or the Data Protection Officer. If you are not satisfied with our response or believe we are not processing your personal data in accordance with the law you have the right to contact the Information Commissioner’s Office.