Error loading player: No playable sources found

The Art of the Search - Effectively Using Internet Research/Data Sources in Forensic Accounting

Date
November 10, 2013

Open sources go far beyond what is available in Google, Facebook and other popular sites. This session will look beyond the obvious social networks and similar media to locate assets, discover leaks, protect reputations, track down anonymous users and expand the arsenal of resources available, but unknown to most accounting professionals. Participants will:
• Be exposed to fraudulent business enterprises, locate assets and find undercover intelligence
• Learn about database resources and online sources for conducting research online
• Leave with actual websites to use in their own investigations

Speaker

Speaker Image for Cynthia Hetherington
Cynthia Hetherington, MLS, MSM, CFE, CII
President, Hetherington Group

Related Products

Thumbnail for Protecting Your Online Image - Leverage Your Online Presence
Protecting Your Online Image - Leverage Your Online Presence
Business professionals know that you are only as good as your last engagement.  When everything goes wonderfully, rave reviews, 5 stars and appreciation is enjoyed all around.  Yet on occasion a false claim, or torrid review, comes up and you are caught off guard…
Thumbnail for Understanding the Dark Web
Understanding the Dark Web
This session will examine the Dark Web, the channels used to institute private sales and exchanges, and criminal behavior…
Thumbnail for FinOSINT - Financial Open Source Intelligence
FinOSINT - Financial Open Source Intelligence
Open source intelligence is a well-covered area of expertise that covers any and many areas of content. Building on these skills, the instructor will focus on financial intelligence research practices…
Thumbnail for Cybertools for Forensic Accountants
Cybertools for Forensic Accountants
Financial service professionals and investigators will learn how to conduct business intelligence investigations, due diligence, asset and enhanced background checks using the latest and most effective cybertools…

This site uses cookies to store information on your computer. Some are essential to make our site work, others help us improve, the user experience. By using the site, you consent to the placement of these cookies. Visit our Privacy Center to learn more.