Fraud Resources

Technology

The proliferation of technology in the modern-day workplace presents a world of opportunity for fraudsters — and a complex challenge for fraud examiners. Anti-fraud professionals must know how to combat cyberfraud and how to use technology in fraud examinations. Learning the basics of digital forensics is crucial to uncovering fraud in the 21st century.

Explore Technology Resources

View all items related to this topic below. Visit Fraud Resource Library
View articles, reports and resources below. Fraud Examiner Article
Earn CPE through self-study courses designed with your busy schedule in mind. View All CPE Courses
Attend an event on this topic to earn CPE in a format that works with your schedule. View our Calendar of Events

Filter by:

  • Subtopic
  • Field of Study
  • Course Level

Results (45)

arrested two individuals</a>, Ilya Lichtenstein and his wife Heather Morgan. When the couple was arrested in connection with the theft of cryptocurrency from the Bitfinex cryptocurrency exchange in 2016 and subsequent laundering of the proceeds, it led to one of the most valuable seizures of illicit proceeds in law enforcement history.</p>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/blog/seize-cryptocurrency.png","Category":"ArticlesResources","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"c4304190-b821-4636-86ab-85487513aac4","IsEthicsCpe":false,"ItemImageAlt":"hand-grabbing-bitcoin","ItemImageUrl":"/-/media/images/acfe/blog/seize-cryptocurrency.png","ItemLinkUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=are-you-ready-to-seize-some-cryptocurrency","SubCategory":"Article","Title":"Are You Ready to Seize Some Cryptocurrency?","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"c4304190-b821-4636-86ab-85487513aac4","ItemUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=are-you-ready-to-seize-some-cryptocurrency","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"<p>The <a rel=\"noopener noreferrer\" href=https://www.acfe.com/"https://www.acfe.com/fraud-resources/anti-fraud-technology-benchmarking-report/" target=\"_blank\">2024<em> </em><span style=\"text-decoration: underline;\"><em>Anti-Fraud Technology Benchmarking Report</em></span></a>, developed by the Association of Certified Fraud Examiners (ACFE) in partnership with SAS, highlights a significant trend in the fight against fraud.</p>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/blog/sas-benchmarking-report.png","Category":"ArticlesResources","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"b9397d8d-e161-4d67-a6d1-090d65f26f62","IsEthicsCpe":false,"ItemImageAlt":"2024-Anti-Fraud-Technology-Benchmarking-Report-Cover","ItemImageUrl":"/-/media/images/acfe/blog/sas-benchmarking-report.png","ItemLinkUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=insights-from-2024-anti-fraud-technology-benchmarking-report","SubCategory":"Article","Title":"Insights from the 2024 Anti-Fraud Technology Benchmarking Report","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"b9397d8d-e161-4d67-a6d1-090d65f26f62","ItemUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=insights-from-2024-anti-fraud-technology-benchmarking-report","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"There appeared to be an overwhelmingly substantial number of &ldquo;high loss&rdquo; fraud schemes being perpetrated in 2022 (as reported by the Federal Trade Commission). This was shocking as it appeared to show more high loss cases than low loss cases. This would signal a marked departure from decades of historical statistics. Statistics we, in program oversight, rely upon to strategize our anti-fraud endeavors.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/events/seminarimgs_governmentfraud_1920x1080.png","Category":"ArticlesResources","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"21043d22-78fa-467a-9646-31cabff981ca","IsEthicsCpe":false,"ItemImageAlt":"GovernmentFraud","ItemImageUrl":"/-/media/images/acfe/events/seminarimgs_governmentfraud_1920x1080.png","ItemLinkUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=modern-government-fraud-schemes-and-government-oversights-contrasting-approach","SubCategory":"Article","Title":"The Dichotomy of Modern Government Fraud Schemes and Government Oversight’s Contrasting Approach","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"21043d22-78fa-467a-9646-31cabff981ca","ItemUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=modern-government-fraud-schemes-and-government-oversights-contrasting-approach","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"<p>Like any tool, AI can be wielded for malicious purposes. Fraudsters are increasingly leveraging AI to enhance the efficiency and sophistication of their scams.  &nbsp;</p>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/shared/acfe-insights/gettyimages-1210454438.jpg","Category":"ArticlesResources","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"7c296f70-733b-4274-9fbe-0886034d68e0","IsEthicsCpe":false,"ItemImageAlt":"AI Fraud Insights","ItemImageUrl":"/-/media/images/shared/acfe-insights/gettyimages-1210454438.jpg","ItemLinkUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=how-fraudsters-are-weaponizing-artificial-intelligence","SubCategory":"Article","Title":"AI's Double-Edged Sword: How Fraudsters are Weaponizing Intelligence","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"7c296f70-733b-4274-9fbe-0886034d68e0","ItemUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=how-fraudsters-are-weaponizing-artificial-intelligence","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be used against us. \"Future Crimes\" provides...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/future-crimes.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"823749fd-88ed-48b5-843b-4064fe30d452","IsEthicsCpe":false,"ItemImageAlt":"future-crimes","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/future-crimes.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Future-Crimes-Everything-is-Connected-Everyone-is-Vulnerable-and-What-We-Can-Do-About-It","SubCategory":"Publication","Title":"Future Crimes: Everything is Connected, Everyone is Vulnerable and What We Can Do About It","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"823749fd-88ed-48b5-843b-4064fe30d452","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Future-Crimes-Everything-is-Connected-Everyone-is-Vulnerable-and-What-We-Can-Do-About-It","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Artificial intelligence (AI) is already well on its way to making \"good jobs\" obsolete. Many paralegals, journalists, office workers and even computer programmers are...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/riseoftherobots.jpeg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"a7ae1b1f-0964-4add-8bee-f9e196555669","IsEthicsCpe":false,"ItemImageAlt":"Book Cover for Rise of the Robots: Technology and the Threat of a Jobless Future","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/riseoftherobots.jpeg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Rise-of-the-Robots-Technology-and-the-Threat-of-a-Jobless-Future","SubCategory":"Publication","Title":"Rise of the Robots: Technology and the Threat of a Jobless Future","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"a7ae1b1f-0964-4add-8bee-f9e196555669","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Rise-of-the-Robots-Technology-and-the-Threat-of-a-Jobless-Future","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"In \"Spam Nation\" by Brian Krebs, you will trace the rise, fall and alarming resurrection of the digital mafia behind two spam pharmacies, countless viruses, phishing and...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/spamnationjpg.png","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"ffd1b8d8-4ce1-47d3-9a92-b787016daf58","IsEthicsCpe":false,"ItemImageAlt":"Book cover for Spam Nation","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/spamnationjpg.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Spam-Nation","SubCategory":"Publication","Title":"Spam Nation","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"ffd1b8d8-4ce1-47d3-9a92-b787016daf58","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Spam-Nation","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Cyber attacks perpetrated against businesses, governments, organizations and individuals have been occurring for decades. Many attacks are discovered only after the...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/cybercrime-investigators.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"619ed0c0-dabd-4bc5-8822-783d27478691","IsEthicsCpe":false,"ItemImageAlt":"Book cover for Cybercrime Investigators Handbook","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/cybercrime-investigators.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Cybercrime-Investigators-Handbook","SubCategory":"Publication","Title":"Cybercrime Investigators Handbook","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"619ed0c0-dabd-4bc5-8822-783d27478691","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Cybercrime-Investigators-Handbook","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Fraud examiners are grappling with ever-mounting quantities of data, but in today's volatile banking environment, paying attention to that data is more important than...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/bank-fraud.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"d7961aa9-3722-4ccb-b085-7937215ac29e","IsEthicsCpe":false,"ItemImageAlt":"Book cover for Bank Fraud: Using Technology to Combat Losses","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/bank-fraud.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Bank-Fraud-Using-Technology-to-Combat-Losses","SubCategory":"Publication","Title":"Bank Fraud: Using Technology to Combat Losses","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"d7961aa9-3722-4ccb-b085-7937215ac29e","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Bank-Fraud-Using-Technology-to-Combat-Losses","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Arguably one of the most important challenges of the 21st century, with millions lost each year, cyber crime has evolved from a minor nuisance to a major concern...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/cyber-fraud.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"ed021d7e-cdc4-4d76-8f06-068aa09266ca","IsEthicsCpe":false,"ItemImageAlt":"Cyber Fraud: Tactics, Techniques and Procedures","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/cyber-fraud.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Cyber-Fraud-Tactics-Techniques-and-Procedures","SubCategory":"Publication","Title":"Cyber Fraud: Tactics, Techniques and Procedures","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"ed021d7e-cdc4-4d76-8f06-068aa09266ca","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Cyber-Fraud-Tactics-Techniques-and-Procedures","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"For all its amazing benefits, the worldwide social media phenomenon has provided manipulative people and organizations with the tools, and human targets, that allow...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/web-of-deceit.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"63451d79-748a-46d9-a229-b7c214b8f260","IsEthicsCpe":false,"ItemImageAlt":"web-of-deceit","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/web-of-deceit.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Web-of-Deceit-Misinformation-and-Manipulation-in-the-Age-of-Social-Media","SubCategory":"Publication","Title":"Web of Deceit: Misinformation and Manipulation in the Age of Social Media","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"63451d79-748a-46d9-a229-b7c214b8f260","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Web-of-Deceit-Misinformation-and-Manipulation-in-the-Age-of-Social-Media","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Designed as an introduction and overview to the field, \"Cyber Forensics: A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crimes...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/cyber-forensics.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"73bdebdc-238b-4a31-85b8-1e67740b5e59","IsEthicsCpe":false,"ItemImageAlt":"Cyber Forensics A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crimes","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/cyber-forensics.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Cyber-Forensics-A-Field-Manual-for-Collecting-Examining-and-Preserving-Evidence-of-Computer-Crimes","SubCategory":"Publication","Title":"Cyber Forensics: A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crimes","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"73bdebdc-238b-4a31-85b8-1e67740b5e59","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Cyber-Forensics-A-Field-Manual-for-Collecting-Examining-and-Preserving-Evidence-of-Computer-Crimes","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"People research everything online: shopping, school, jobs, travel and other people. Your online persona is your new front door. It is likely the first thing that new...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/protecting_your_internet_identity-thumbnail.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"9f22360c-99b7-4fb6-83c8-1743c2f54c77","IsEthicsCpe":false,"ItemImageAlt":"Protecting Your Internet Identity","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/protecting_your_internet_identity-thumbnail.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Protecting-Your-Internet-Identity-Are-You-Naked-Online","SubCategory":"Publication","Title":"Protecting Your Internet Identity: Are You Naked Online?","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"9f22360c-99b7-4fb6-83c8-1743c2f54c77","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Protecting-Your-Internet-Identity-Are-You-Naked-Online","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"What responsibility, ethically, do we bear for what we post online and on social outlets? When social media can influence...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/the-ethics-of-our-digital-world-and-the-influence-we-exert.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":2.0,"FieldOfStudy":"Regulatory Ethics","Format":null,"Id":"95704589-f1b0-438c-9b10-d490237e9e5d","IsEthicsCpe":true,"ItemImageAlt":"The Ethics of Our Digital World and the Influence We Exert","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/the-ethics-of-our-digital-world-and-the-influence-we-exert.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=The-Ethics-of-Our-Digital-World-On-Demand-Webinar","SubCategory":"Publication","Title":"The Ethics of Our Digital World (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"95704589-f1b0-438c-9b10-d490237e9e5d","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=The-Ethics-of-Our-Digital-World-On-Demand-Webinar","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Regulatory Ethics","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"The recent acceleration of digital trends across payments and e-commerce has propelled the alternative payment systems industry to a pivotal moment and has changed the payments industry forever...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/how-well-do-you-understand-digital-wallets-on-doman.png","Category":"SelfStudyCpe","CourseLevel":"Advanced","CpeCredits":1.5,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"1503fb8b-fc2d-4a00-89d4-6e5f8b8164bc","IsEthicsCpe":false,"ItemImageAlt":"How well do you understand Digital Wallets","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/how-well-do-you-understand-digital-wallets-on-doman.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=How-Well-Do-You-Understand-Digital-Wallets-and-Alternative-Payment-Systems","SubCategory":"Publication","Title":"How Well Do You Understand Digital Wallets and Alternative Payment Systems?","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"1503fb8b-fc2d-4a00-89d4-6e5f8b8164bc","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=How-Well-Do-You-Understand-Digital-Wallets-and-Alternative-Payment-Systems","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Feeling overwhelmed by the number of fraud cases piling up? You&rsquo;re not alone. Fraudsters have countless opportunities to infiltrate organizations and fraud examiners...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/shared/ondemand_leveraging-technology-for-more-efficient-fraud-investigations_/1620x1080_ondemand-leveraging-technology-for-more-efficient-fruad-investigation.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":2.0,"FieldOfStudy":"Information Technology","Format":null,"Id":"b99acafb-2da4-4c95-8c02-d923ef194bc7","IsEthicsCpe":false,"ItemImageAlt":"Leveraging Technology for more Efficient Fraud Investigation","ItemImageUrl":"/-/media/images/shared/ondemand_leveraging-technology-for-more-efficient-fraud-investigations_/1620x1080_ondemand-leveraging-technology-for-more-efficient-fruad-investigation.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=leveraging-technology-for-more-efficient-fraud-investigations-on-demand-webinar","SubCategory":"Publication","Title":"Leveraging Technology for More Efficient Fraud Investigations (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"b99acafb-2da4-4c95-8c02-d923ef194bc7","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=leveraging-technology-for-more-efficient-fraud-investigations-on-demand-webinar","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Digital currency is now the mainstream for most individuals and financial institutions. This gives modern fraudsters more opportunities to commit scams and schemes...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinar_into-the-ether-and-back-again_tracing-cryptocurrency-in-money-laundering_1620x1080_2023.png","Category":"SelfStudyCpe","CourseLevel":"Intermediate","CpeCredits":2.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"54345898-0584-443b-a3a8-185406dacf25","IsEthicsCpe":false,"ItemImageAlt":"Tracing Cryptocurrency in Money Laundering","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinar_into-the-ether-and-back-again_tracing-cryptocurrency-in-money-laundering_1620x1080_2023.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Tracing-Cryptocurrency-in-Money-Laundering","SubCategory":"Publication","Title":"Tracing Cryptocurrency in Money Laundering","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"54345898-0584-443b-a3a8-185406dacf25","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Tracing-Cryptocurrency-in-Money-Laundering","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Money stolen via fraud is increasingly being converted into cryptocurrencies, with its movements then effectively hidden from investigators...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/shared/theresnosuchthingascryptocurrencycrime-thumbnail-final/1620x1080-new-image-theres-no-such-thing-as-cryptocurrency-crime-png/1620x1080-new-image-theres-no-such-thing-as-cryptocurrency-crime-png.png","Category":"SelfStudyCpe","CourseLevel":"Intermediate","CpeCredits":1.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"897bbfed-5c54-4fb5-9c18-a7923b351b88","IsEthicsCpe":false,"ItemImageAlt":"Theres No Such Thing as Cryptocurrency Crime","ItemImageUrl":"/-/media/images/shared/theresnosuchthingascryptocurrencycrime-thumbnail-final/1620x1080-new-image-theres-no-such-thing-as-cryptocurrency-crime-png/1620x1080-new-image-theres-no-such-thing-as-cryptocurrency-crime-png.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=theres-no-such-thing-as-cryptocurrency-crime-on-demand-webinar","SubCategory":"Publication","Title":"There's No Such Thing as Cryptocurrency Crime (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"897bbfed-5c54-4fb5-9c18-a7923b351b88","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=theres-no-such-thing-as-cryptocurrency-crime-on-demand-webinar","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-self-study-internetofthings.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":0.2,"FieldOfStudy":"Information Technology","Format":null,"Id":"d0a80d53-1f56-4200-abd8-8bb21605acce","IsEthicsCpe":false,"ItemImageAlt":"Image of Laptop Computer with illustration of smaller digital clouds connecting to a large digital on Screen","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-self-study-internetofthings.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Exploring-the-Internet-of-Things","SubCategory":"Publication","Title":"Exploring the Internet of Things","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"d0a80d53-1f56-4200-abd8-8bb21605acce","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Exploring-the-Internet-of-Things","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"<span>Learn how Business Email Compromise scams work and discover ways to prevent and respond to them.</span>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-business-email-compromise-scams/1620x1080_nano_business-email-compromise-scams.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":0.2,"FieldOfStudy":"Information Technology","Format":null,"Id":"fa060427-8e36-4213-912f-297e7d05813d","IsEthicsCpe":false,"ItemImageAlt":"What is Business Email Compromise?","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-business-email-compromise-scams/1620x1080_nano_business-email-compromise-scams.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=What-is-Business-Email-Compromise","SubCategory":"Publication","Title":"What is Business Email Compromise? (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"fa060427-8e36-4213-912f-297e7d05813d","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=What-is-Business-Email-Compromise","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Gain a basic understanding of what blockchain is and discover its potential business and anti-fraud applications.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/1620x1080-new-image-what-is-blockchain.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":0.2,"FieldOfStudy":"Information Technology","Format":null,"Id":"561737ed-d846-4aad-a3b8-fcddf5dd5050","IsEthicsCpe":false,"ItemImageAlt":"What is Blockchain Laptop Image","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/1620x1080-new-image-what-is-blockchain.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=What-is-Blockchain","SubCategory":"Publication","Title":"What is Blockchain? (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"561737ed-d846-4aad-a3b8-fcddf5dd5050","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=What-is-Blockchain","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-self-study-nano-dlt-versus-blockchain.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":0.2,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"63e6a285-9281-4cbe-a7f5-749637738d2e","IsEthicsCpe":false,"ItemImageAlt":"Image of Laptop Computer with Cell Phone on Crypto Exchange on Screen","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-self-study-nano-dlt-versus-blockchain.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=DLT-Versus-Blockchain","SubCategory":"Publication","Title":"DLT Versus Blockchain (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"63e6a285-9281-4cbe-a7f5-749637738d2e","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=DLT-Versus-Blockchain","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"<span>Learn what ransomware is, how a ransomware infection starts and the importance of cybersecurity training.</span>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-what-is-ransomware/1620x1080_nano-what-is-ransomware.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":0.2,"FieldOfStudy":"Information Technology","Format":null,"Id":"b660a12f-944f-4d3d-bfe3-b8ff9f166fe6","IsEthicsCpe":false,"ItemImageAlt":"What is Ransomware","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-what-is-ransomware/1620x1080_nano-what-is-ransomware.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=What-Is-Ransomware","SubCategory":"Publication","Title":"What Is Ransomware? (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"b660a12f-944f-4d3d-bfe3-b8ff9f166fe6","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=What-Is-Ransomware","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn cybersecurity methods that are important pillars upon which to build a robust cybersecurity program.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-cybersecurity-best-practices/1620x1080_nano_cybersecurity-best-practices.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":0.2,"FieldOfStudy":"Information Technology","Format":null,"Id":"6cb2eb78-c6ad-41e5-9657-a2edf974e2df","IsEthicsCpe":false,"ItemImageAlt":"Cybersecurity Best Practices","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-cybersecurity-best-practices/1620x1080_nano_cybersecurity-best-practices.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Cybersecurity-Best-Practices","SubCategory":"Publication","Title":"Cybersecurity Best Practices (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"6cb2eb78-c6ad-41e5-9657-a2edf974e2df","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Cybersecurity-Best-Practices","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Gain an increased awareness of alternative currencies, knowledge of their strengths and weaknesses, the ways in which they can be exploited and more.&nbsp;","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/alternative-currencies-and-fraud/1620x1080-new-image-alternative-currencies-and-fraud.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":2.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"e4991c75-0ef5-4539-a68d-cfb44d2dfc46","IsEthicsCpe":false,"ItemImageAlt":"Image of laptop displaying a digitized dollar sign","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/alternative-currencies-and-fraud/1620x1080-new-image-alternative-currencies-and-fraud.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Alternative-Currencies-and-Fraud","SubCategory":"Publication","Title":"Alternative Currencies and Fraud (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"e4991c75-0ef5-4539-a68d-cfb44d2dfc46","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Alternative-Currencies-and-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about prominent emerging technologies that can be applied to the prevention and/or detection of fraud.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/shared/1620x1080-resized-only-fighting-fraud-with-emerging-technologies/1620x1080-resized-only-fighting-fraud-with-emerging-technologies.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":2.0,"FieldOfStudy":"Information Technology","Format":null,"Id":"2e397c35-0197-468e-a526-527f715054ff","IsEthicsCpe":false,"ItemImageAlt":"Image of a finger on a touch screen device","ItemImageUrl":"/-/media/images/shared/1620x1080-resized-only-fighting-fraud-with-emerging-technologies/1620x1080-resized-only-fighting-fraud-with-emerging-technologies.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Fighting-Fraud-with-Emerging-Technologies","SubCategory":"Publication","Title":"Fighting Fraud with Emerging Technologies (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"2e397c35-0197-468e-a526-527f715054ff","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Fighting-Fraud-with-Emerging-Technologies","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"In this course, you will discover emerging technological trends and their potential impacts, both negative and positive, on the investigative process.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/protecting-against-emerging-cyber-risk/1620x1080-new-image-privacy-and-the-fraud-examiner-png/1620x1080-new-image-protecting-against-emerging-cyber-risks-png.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":2.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"dae64f25-c48a-4684-af1f-9967acabc4a8","IsEthicsCpe":false,"ItemImageAlt":"Protecting Against Emerging Cyber Risks","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/protecting-against-emerging-cyber-risk/1620x1080-new-image-privacy-and-the-fraud-examiner-png/1620x1080-new-image-protecting-against-emerging-cyber-risks-png.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Protecting-Against-Emerging-Cyber-Risks","SubCategory":"Publication","Title":"Protecting Against Emerging Cyber Risks (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"dae64f25-c48a-4684-af1f-9967acabc4a8","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Protecting-Against-Emerging-Cyber-Risks","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"<span>Learn about the dark web and digital currencies, discover how those technologies relate to fraud and examine strategies for investigating fraud cases...</span>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/the-dark-web-cryptocurrencies-and-fraud.png","Category":"SelfStudyCpe","CourseLevel":"Intermediate","CpeCredits":4.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"bc1b1daa-6e4b-44e1-adda-426c4efa33ac","IsEthicsCpe":false,"ItemImageAlt":"The Dark Web, Cryptocurrencies and Fraud","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/the-dark-web-cryptocurrencies-and-fraud.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=The-Dark-Web-Cryptocurrencies-and-Fraud","SubCategory":"Publication","Title":"The Dark Web, Cryptocurrencies and Fraud (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"bc1b1daa-6e4b-44e1-adda-426c4efa33ac","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=The-Dark-Web-Cryptocurrencies-and-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Investment in decentralized finance (DeFi) crowdfunding projects is becoming increasingly popular. Their complex blockchain foundations make them...<br />","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_ondemand_lega_webinar.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":2.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"cf4fff47-77df-425e-97ec-52d245946615","IsEthicsCpe":false,"ItemImageAlt":"Law Enforcement and Government Alliance On-Demand Webinar","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_ondemand_lega_webinar.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=investigative-elements-and-concepts-of-decentralized-finance","SubCategory":"Publication","Title":"Investigative Elements and Concepts of Decentralized Finance","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"cf4fff47-77df-425e-97ec-52d245946615","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=investigative-elements-and-concepts-of-decentralized-finance","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Ransomware gets a lot of press, but business email compromise (BEC) has been far more lucrative. According to the Verizon 2021 Data Breach Investigations Report, BECs net the attacker nearly three times the median payout of a ransomware attack...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinar_on_demand_the-costliest-business-email-compromise_1620x1080.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":2.0,"FieldOfStudy":"Information Technology","Format":null,"Id":"03120da7-451a-4fc9-abe2-656c07e40253","IsEthicsCpe":false,"ItemImageAlt":"Laptop displaying an image of a cell phone with an email notification","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinar_on_demand_the-costliest-business-email-compromise_1620x1080.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=The-Costliest-Cyber-Fraud-in-History-Business-Email-Compromise","SubCategory":"Publication","Title":"The Costliest Cyber Fraud in History: Business Email Compromise (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"03120da7-451a-4fc9-abe2-656c07e40253","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=The-Costliest-Cyber-Fraud-in-History-Business-Email-Compromise","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Generative AI has captivated the world&rsquo;s imagination, but what are the implications for the commercial and government sectors?&nbsp;","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinarandvirtual_fighting-digital-financial-crime-in-the-generative-ai-age--examining-the-global-scam-economy_1620x1080_2023.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":1.0,"FieldOfStudy":"Information Technology","Format":null,"Id":"043671f3-78ac-459a-85ce-728e6d809c75","IsEthicsCpe":false,"ItemImageAlt":"Fighting Digital Financial Crime in the Generative AI Age","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinarandvirtual_fighting-digital-financial-crime-in-the-generative-ai-age--examining-the-global-scam-economy_1620x1080_2023.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Fighting-Financial-Crime-in-the-Generative-AI-Age-On-Demand-Webinar","SubCategory":"Publication","Title":"Fighting Financial Crime in the Generative AI Age (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"043671f3-78ac-459a-85ce-728e6d809c75","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Fighting-Financial-Crime-in-the-Generative-AI-Age-On-Demand-Webinar","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Financial institutions encounter threats to consumers every day with each transaction. With the advent of instant payments adoption and the shift of liability...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinarandvirtual_futureoffraud2024expertpredictions_1620x1080_2023.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":1.0,"FieldOfStudy":"Information Technology","Format":null,"Id":"180a8521-95fd-4550-b09f-2eb0841e0381","IsEthicsCpe":false,"ItemImageAlt":"Future Of Fraud 2024 Expert Predictions","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinarandvirtual_futureoffraud2024expertpredictions_1620x1080_2023.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Future-of-Fraud-2024-Expert-Predictions-On-Demand-Webinar","SubCategory":"Publication","Title":"Future of Fraud | 2024 Expert Predictions (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"180a8521-95fd-4550-b09f-2eb0841e0381","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Future-of-Fraud-2024-Expert-Predictions-On-Demand-Webinar","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"The pandemic has led to growth in the adoption of various online/mobile banking products and services as well as faster payment options. One key emerging trend is...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/2023-top-trends-in-aml-and-fraud-proof.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":1.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"4de58b4b-11c2-4b4f-90dd-e583d737a837","IsEthicsCpe":false,"ItemImageAlt":"2023 Top Trends in AML and Fraud Sanctions Screening Crypto Synthetic ID","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/2023-top-trends-in-aml-and-fraud-proof.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=2023-Top-Trends-in-AML-and-Fraud","SubCategory":"Publication","Title":"2023 Top Trends in AML and Fraud: Sanctions Screening, Crypto, Synthetic ID, Payments and More (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"4de58b4b-11c2-4b4f-90dd-e583d737a837","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=2023-Top-Trends-in-AML-and-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"<span style=\"background-color: #ffffff; color: #1e1f21;\">Policing across the globe is at a digital crossroads. From one perspective, the technology tsunami that has overrun every commercial business sector has now reached the policing industry...</span>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_ondemand_lawenforcement20.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":1.0,"FieldOfStudy":"Information Technology","Format":null,"Id":"c837594c-36d3-4f1e-979a-85a0d66d6a4b","IsEthicsCpe":false,"ItemImageAlt":"Law Enforcement 2.0 Navigating the Digital Divide","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_ondemand_lawenforcement20.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Law-Enforcement-2-0-Navigating-the-Digital-Divide","SubCategory":"Publication","Title":"Law Enforcement 2.0: Navigating the Digital Divide","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"c837594c-36d3-4f1e-979a-85a0d66d6a4b","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Law-Enforcement-2-0-Navigating-the-Digital-Divide","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"What if your organization had a crystal ball to identify fraud before it happened? The strategic purpose of a risk management plan is to define, identify, assess and respond to risks. Regardless of existing frameworks...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_fraudprecognitioncrystalballs_1620x1080_2023.png","Category":"SelfStudyCpe","CourseLevel":"Intermediate","CpeCredits":2.0,"FieldOfStudy":"Management Services","Format":null,"Id":"9ff2d414-78a3-47ea-8ecf-c5ad7b59d59c","IsEthicsCpe":false,"ItemImageAlt":"Fraud Precognition Crystal Balls, Tarot Cards and Other Risk Management Tools","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_fraudprecognitioncrystalballs_1620x1080_2023.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=fraud-precognition-crystal-balls-tarot-cards-and-other-risk-management-tools-on-demand-webinar","SubCategory":"Publication","Title":"Fraud Precognition: Crystal Balls, Tarot Cards and Other Risk Management Tools (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"9ff2d414-78a3-47ea-8ecf-c5ad7b59d59c","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=fraud-precognition-crystal-balls-tarot-cards-and-other-risk-management-tools-on-demand-webinar","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Management Services","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Discover the latest insights on anti-fraud technologies' effectiveness in managing fraud risk, and learn how organizations are leveraging data and technology in their anti-fraud programs.","HasResourceSource":false,"ItemImageUrlOrDefault":"/Assets/Images/article_transparent.jpg","Category":"ArticlesResources","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"f6b31e40-9ad3-4b40-b67e-70e5646527a4","IsEthicsCpe":false,"ItemImageAlt":"","ItemImageUrl":"","ItemLinkUrl":"https://www.acfe.com/fraud-resources/anti-fraud-technology-benchmarking-report","SubCategory":"","Title":"Anti-Fraud Technology Benchmarking Report","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"f6b31e40-9ad3-4b40-b67e-70e5646527a4","ItemUrl":"https://www.acfe.com/fraud-resources/anti-fraud-technology-benchmarking-report","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":false,"HasLink":true}]" />

Explore Resources by Topic

Learn two skills every interviewer needs