The proliferation of technology in the modern-day workplace presents a world of opportunity for fraudsters — and a complex challenge for fraud examiners. Anti-fraud professionals must know how to combat cyberfraud and how to use technology in fraud examinations. Learning the basics of digital forensics is crucial to uncovering fraud in the 21st century.
In this episode of Fraud Talk, ACFE Content Manager Rihonna Scoggins meets with Christian Focacci, CEO and Founder of Threat Digital, to discuss the future of risk management and compliance software. The discussion delves into the groundbreaking advancements in large language models, their role in processing unstructured text and the critical importance of explainability in AI-driven solutions. Focacci also addresses the issue of AI washing and offers practical advice for companies and fraud examiners on integrating AI to optimize processes.
On July 15, a South Korean treasure hunting company called the Shinil Group claimed it found the wreck of a Russian warship, the Dmitrii Donskoi. The ship sank east of the Korean Peninsula more than 100 years prior during a 1905 battle with the Japanese while carrying a cargo of 200 tons of gold bullion, according to Shinil’s claim.
As part of the Internet Archive, the Wayback Machine contains a historic log of an estimated 735 billion web pages, making it an incredibly powerful database supporting a range of businesses and industries.
Dr. Jessica Barker addressed hundreds of anti-fraud professionals today at the 2018 ACFE Fraud Conference Europe and told them that a new weak point in organizations’ cybersecurity might stem from an unlikely source — General Data Protection Regulation (GDPR) compliance.
In September 2021, the IRS published a request for proposal titled, “Development of Exploitation Techniques Against Cryptowallets.” According to supporting documentation, it appears that the digital forensics unit of their Criminal Investigations branch has repeatedly run into scenarios involving the seizure of crypto hardware wallets (also known as cold storage devices) that could not be accessed due to their security features.
Tod McDonald, CPA and Garth Leonard, CFE, from Valid8 Financial, join ACFE Community Manager Rihonna Scoggins in the most recent episode of Fraud Talk to explore the current resources at hand for fraud examiners.
The U.S. Department of Justice (DOJ) announced in early February 2022 that they had arrested two individuals, Ilya Lichtenstein and his wife Heather Morgan. When the couple was arrested in connection with the theft of cryptocurrency from the Bitfinex cryptocurrency exchange in 2016 and subsequent laundering of the proceeds, it led to one of the most valuable seizures of illicit proceeds in law enforcement history.
The 2024Anti-Fraud Technology Benchmarking Report, developed by the Association of Certified Fraud Examiners (ACFE) in partnership with SAS, highlights a significant trend in the fight against fraud.
There appeared to be an overwhelmingly substantial number of “high loss” fraud schemes being perpetrated in 2022 (as reported by the Federal Trade Commission). This was shocking as it appeared to show more high loss cases than low loss cases. This would signal a marked departure from decades of historical statistics. Statistics we, in program oversight, rely upon to strategize our anti-fraud endeavors.
Like any tool, AI can be wielded for malicious purposes. Fraudsters are increasingly leveraging AI to enhance the efficiency and sophistication of their scams.
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be used against us. "Future Crimes" provides...
Artificial intelligence (AI) is already well on its way to making "good jobs" obsolete. Many paralegals, journalists, office workers and even computer programmers are...
In "Spam Nation" by Brian Krebs, you will trace the rise, fall and alarming resurrection of the digital mafia behind two spam pharmacies, countless viruses, phishing and...
Cyber attacks perpetrated against businesses, governments, organizations and individuals have been occurring for decades. Many attacks are discovered only after the...
Fraud examiners are grappling with ever-mounting quantities of data, but in today's volatile banking environment, paying attention to that data is more important than...
Arguably one of the most important challenges of the 21st century, with millions lost each year, cyber crime has evolved from a minor nuisance to a major concern...
For all its amazing benefits, the worldwide social media phenomenon has provided manipulative people and organizations with the tools, and human targets, that allow...
Designed as an introduction and overview to the field, "Cyber Forensics: A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crimes...
People research everything online: shopping, school, jobs, travel and other people. Your online persona is your new front door. It is likely the first thing that new...
The recent acceleration of digital trends across payments and e-commerce has propelled the alternative payment systems industry to a pivotal moment and has changed the payments industry forever...
Feeling overwhelmed by the number of fraud cases piling up? You’re not alone. Fraudsters have countless opportunities to infiltrate organizations and fraud examiners...
Digital currency is now the mainstream for most individuals and financial institutions. This gives modern fraudsters more opportunities to commit scams and schemes...
Learn about the dark web and digital currencies, discover how those technologies relate to fraud and examine strategies for investigating fraud cases...
Ransomware gets a lot of press, but business email compromise (BEC) has been far more lucrative. According to the Verizon 2021 Data Breach Investigations Report, BECs net the attacker nearly three times the median payout of a ransomware attack...
Financial institutions encounter threats to consumers every day with each transaction. With the advent of instant payments adoption and the shift of liability...
The pandemic has led to growth in the adoption of various online/mobile banking products and services as well as faster payment options. One key emerging trend is...
Policing across the globe is at a digital crossroads. From one perspective, the technology tsunami that has overrun every commercial business sector has now reached the policing industry...
What if your organization had a crystal ball to identify fraud before it happened? The strategic purpose of a risk management plan is to define, identify, assess and respond to risks. Regardless of existing frameworks...
Discover the latest insights on anti-fraud technologies' effectiveness in managing fraud risk, and learn how organizations are leveraging data and technology in their anti-fraud programs.
No Results
arrested two individuals</a>, Ilya Lichtenstein and his wife Heather Morgan. When the couple was arrested in connection with the theft of cryptocurrency from the Bitfinex cryptocurrency exchange in 2016 and subsequent laundering of the proceeds, it led to one of the most valuable seizures of illicit proceeds in law enforcement history.</p>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/blog/seize-cryptocurrency.png","Category":"ArticlesResources","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"c4304190-b821-4636-86ab-85487513aac4","IsEthicsCpe":false,"ItemImageAlt":"hand-grabbing-bitcoin","ItemImageUrl":"/-/media/images/acfe/blog/seize-cryptocurrency.png","ItemLinkUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=are-you-ready-to-seize-some-cryptocurrency","SubCategory":"Article","Title":"Are You Ready to Seize Some Cryptocurrency?","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"c4304190-b821-4636-86ab-85487513aac4","ItemUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=are-you-ready-to-seize-some-cryptocurrency","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"<p>The <a rel=\"noopener noreferrer\" href=https://www.acfe.com/"https://www.acfe.com/fraud-resources/anti-fraud-technology-benchmarking-report/" target=\"_blank\">2024<em> </em><span style=\"text-decoration: underline;\"><em>Anti-Fraud Technology Benchmarking Report</em></span></a>, developed by the Association of Certified Fraud Examiners (ACFE) in partnership with SAS, highlights a significant trend in the fight against fraud.</p>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/blog/sas-benchmarking-report.png","Category":"ArticlesResources","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"b9397d8d-e161-4d67-a6d1-090d65f26f62","IsEthicsCpe":false,"ItemImageAlt":"2024-Anti-Fraud-Technology-Benchmarking-Report-Cover","ItemImageUrl":"/-/media/images/acfe/blog/sas-benchmarking-report.png","ItemLinkUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=insights-from-2024-anti-fraud-technology-benchmarking-report","SubCategory":"Article","Title":"Insights from the 2024 Anti-Fraud Technology Benchmarking Report","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"b9397d8d-e161-4d67-a6d1-090d65f26f62","ItemUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=insights-from-2024-anti-fraud-technology-benchmarking-report","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"There appeared to be an overwhelmingly substantial number of “high loss” fraud schemes being perpetrated in 2022 (as reported by the Federal Trade Commission). This was shocking as it appeared to show more high loss cases than low loss cases. This would signal a marked departure from decades of historical statistics. Statistics we, in program oversight, rely upon to strategize our anti-fraud endeavors.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/events/seminarimgs_governmentfraud_1920x1080.png","Category":"ArticlesResources","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"21043d22-78fa-467a-9646-31cabff981ca","IsEthicsCpe":false,"ItemImageAlt":"GovernmentFraud","ItemImageUrl":"/-/media/images/acfe/events/seminarimgs_governmentfraud_1920x1080.png","ItemLinkUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=modern-government-fraud-schemes-and-government-oversights-contrasting-approach","SubCategory":"Article","Title":"The Dichotomy of Modern Government Fraud Schemes and Government Oversight’s Contrasting Approach","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"21043d22-78fa-467a-9646-31cabff981ca","ItemUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=modern-government-fraud-schemes-and-government-oversights-contrasting-approach","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"<p>Like any tool, AI can be wielded for malicious purposes. Fraudsters are increasingly leveraging AI to enhance the efficiency and sophistication of their scams. </p>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/shared/acfe-insights/gettyimages-1210454438.jpg","Category":"ArticlesResources","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"7c296f70-733b-4274-9fbe-0886034d68e0","IsEthicsCpe":false,"ItemImageAlt":"AI Fraud Insights","ItemImageUrl":"/-/media/images/shared/acfe-insights/gettyimages-1210454438.jpg","ItemLinkUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=how-fraudsters-are-weaponizing-artificial-intelligence","SubCategory":"Article","Title":"AI's Double-Edged Sword: How Fraudsters are Weaponizing Intelligence","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"7c296f70-733b-4274-9fbe-0886034d68e0","ItemUrl":"/fraud-resources/fraud-examiner-archives/fraud-examiner-article?s=how-fraudsters-are-weaponizing-artificial-intelligence","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be used against us. \"Future Crimes\" provides...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/future-crimes.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"823749fd-88ed-48b5-843b-4064fe30d452","IsEthicsCpe":false,"ItemImageAlt":"future-crimes","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/future-crimes.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Future-Crimes-Everything-is-Connected-Everyone-is-Vulnerable-and-What-We-Can-Do-About-It","SubCategory":"Publication","Title":"Future Crimes: Everything is Connected, Everyone is Vulnerable and What We Can Do About It","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"823749fd-88ed-48b5-843b-4064fe30d452","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Future-Crimes-Everything-is-Connected-Everyone-is-Vulnerable-and-What-We-Can-Do-About-It","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Artificial intelligence (AI) is already well on its way to making \"good jobs\" obsolete. Many paralegals, journalists, office workers and even computer programmers are...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/riseoftherobots.jpeg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"a7ae1b1f-0964-4add-8bee-f9e196555669","IsEthicsCpe":false,"ItemImageAlt":"Book Cover for Rise of the Robots: Technology and the Threat of a Jobless Future","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/riseoftherobots.jpeg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Rise-of-the-Robots-Technology-and-the-Threat-of-a-Jobless-Future","SubCategory":"Publication","Title":"Rise of the Robots: Technology and the Threat of a Jobless Future","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"a7ae1b1f-0964-4add-8bee-f9e196555669","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Rise-of-the-Robots-Technology-and-the-Threat-of-a-Jobless-Future","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"In \"Spam Nation\" by Brian Krebs, you will trace the rise, fall and alarming resurrection of the digital mafia behind two spam pharmacies, countless viruses, phishing and...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/spamnationjpg.png","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"ffd1b8d8-4ce1-47d3-9a92-b787016daf58","IsEthicsCpe":false,"ItemImageAlt":"Book cover for Spam Nation","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/spamnationjpg.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Spam-Nation","SubCategory":"Publication","Title":"Spam Nation","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"ffd1b8d8-4ce1-47d3-9a92-b787016daf58","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Spam-Nation","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Cyber attacks perpetrated against businesses, governments, organizations and individuals have been occurring for decades. Many attacks are discovered only after the...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/cybercrime-investigators.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"619ed0c0-dabd-4bc5-8822-783d27478691","IsEthicsCpe":false,"ItemImageAlt":"Book cover for Cybercrime Investigators Handbook","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/cybercrime-investigators.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Cybercrime-Investigators-Handbook","SubCategory":"Publication","Title":"Cybercrime Investigators Handbook","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"619ed0c0-dabd-4bc5-8822-783d27478691","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Cybercrime-Investigators-Handbook","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Fraud examiners are grappling with ever-mounting quantities of data, but in today's volatile banking environment, paying attention to that data is more important than...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/bank-fraud.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"d7961aa9-3722-4ccb-b085-7937215ac29e","IsEthicsCpe":false,"ItemImageAlt":"Book cover for Bank Fraud: Using Technology to Combat Losses","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/bank-fraud.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Bank-Fraud-Using-Technology-to-Combat-Losses","SubCategory":"Publication","Title":"Bank Fraud: Using Technology to Combat Losses","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"d7961aa9-3722-4ccb-b085-7937215ac29e","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Bank-Fraud-Using-Technology-to-Combat-Losses","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Arguably one of the most important challenges of the 21st century, with millions lost each year, cyber crime has evolved from a minor nuisance to a major concern...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/cyber-fraud.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"ed021d7e-cdc4-4d76-8f06-068aa09266ca","IsEthicsCpe":false,"ItemImageAlt":"Cyber Fraud: Tactics, Techniques and Procedures","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/cyber-fraud.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Cyber-Fraud-Tactics-Techniques-and-Procedures","SubCategory":"Publication","Title":"Cyber Fraud: Tactics, Techniques and Procedures","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"ed021d7e-cdc4-4d76-8f06-068aa09266ca","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Cyber-Fraud-Tactics-Techniques-and-Procedures","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"For all its amazing benefits, the worldwide social media phenomenon has provided manipulative people and organizations with the tools, and human targets, that allow...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/web-of-deceit.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"63451d79-748a-46d9-a229-b7c214b8f260","IsEthicsCpe":false,"ItemImageAlt":"web-of-deceit","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/web-of-deceit.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Web-of-Deceit-Misinformation-and-Manipulation-in-the-Age-of-Social-Media","SubCategory":"Publication","Title":"Web of Deceit: Misinformation and Manipulation in the Age of Social Media","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"63451d79-748a-46d9-a229-b7c214b8f260","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Web-of-Deceit-Misinformation-and-Manipulation-in-the-Age-of-Social-Media","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Designed as an introduction and overview to the field, \"Cyber Forensics: A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crimes...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/cyber-forensics.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"73bdebdc-238b-4a31-85b8-1e67740b5e59","IsEthicsCpe":false,"ItemImageAlt":"Cyber Forensics A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crimes","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/cyber-forensics.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Cyber-Forensics-A-Field-Manual-for-Collecting-Examining-and-Preserving-Evidence-of-Computer-Crimes","SubCategory":"Publication","Title":"Cyber Forensics: A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crimes","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"73bdebdc-238b-4a31-85b8-1e67740b5e59","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Cyber-Forensics-A-Field-Manual-for-Collecting-Examining-and-Preserving-Evidence-of-Computer-Crimes","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"People research everything online: shopping, school, jobs, travel and other people. Your online persona is your new front door. It is likely the first thing that new...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/books/3rd-party-books/protecting_your_internet_identity-thumbnail.jpg","Category":"BooksManuals","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"9f22360c-99b7-4fb6-83c8-1743c2f54c77","IsEthicsCpe":false,"ItemImageAlt":"Protecting Your Internet Identity","ItemImageUrl":"/-/media/images/acfe/products/publication/books/3rd-party-books/protecting_your_internet_identity-thumbnail.jpg","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Protecting-Your-Internet-Identity-Are-You-Naked-Online","SubCategory":"Publication","Title":"Protecting Your Internet Identity: Are You Naked Online?","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"9f22360c-99b7-4fb6-83c8-1743c2f54c77","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Protecting-Your-Internet-Identity-Are-You-Naked-Online","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"What responsibility, ethically, do we bear for what we post online and on social outlets? When social media can influence...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/the-ethics-of-our-digital-world-and-the-influence-we-exert.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":2.0,"FieldOfStudy":"Regulatory Ethics","Format":null,"Id":"95704589-f1b0-438c-9b10-d490237e9e5d","IsEthicsCpe":true,"ItemImageAlt":"The Ethics of Our Digital World and the Influence We Exert","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/the-ethics-of-our-digital-world-and-the-influence-we-exert.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=The-Ethics-of-Our-Digital-World-On-Demand-Webinar","SubCategory":"Publication","Title":"The Ethics of Our Digital World (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"95704589-f1b0-438c-9b10-d490237e9e5d","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=The-Ethics-of-Our-Digital-World-On-Demand-Webinar","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Regulatory Ethics","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"The recent acceleration of digital trends across payments and e-commerce has propelled the alternative payment systems industry to a pivotal moment and has changed the payments industry forever...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/how-well-do-you-understand-digital-wallets-on-doman.png","Category":"SelfStudyCpe","CourseLevel":"Advanced","CpeCredits":1.5,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"1503fb8b-fc2d-4a00-89d4-6e5f8b8164bc","IsEthicsCpe":false,"ItemImageAlt":"How well do you understand Digital Wallets","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/how-well-do-you-understand-digital-wallets-on-doman.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=How-Well-Do-You-Understand-Digital-Wallets-and-Alternative-Payment-Systems","SubCategory":"Publication","Title":"How Well Do You Understand Digital Wallets and Alternative Payment Systems?","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"1503fb8b-fc2d-4a00-89d4-6e5f8b8164bc","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=How-Well-Do-You-Understand-Digital-Wallets-and-Alternative-Payment-Systems","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Feeling overwhelmed by the number of fraud cases piling up? You’re not alone. Fraudsters have countless opportunities to infiltrate organizations and fraud examiners...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/shared/ondemand_leveraging-technology-for-more-efficient-fraud-investigations_/1620x1080_ondemand-leveraging-technology-for-more-efficient-fruad-investigation.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":2.0,"FieldOfStudy":"Information Technology","Format":null,"Id":"b99acafb-2da4-4c95-8c02-d923ef194bc7","IsEthicsCpe":false,"ItemImageAlt":"Leveraging Technology for more Efficient Fraud Investigation","ItemImageUrl":"/-/media/images/shared/ondemand_leveraging-technology-for-more-efficient-fraud-investigations_/1620x1080_ondemand-leveraging-technology-for-more-efficient-fruad-investigation.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=leveraging-technology-for-more-efficient-fraud-investigations-on-demand-webinar","SubCategory":"Publication","Title":"Leveraging Technology for More Efficient Fraud Investigations (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"b99acafb-2da4-4c95-8c02-d923ef194bc7","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=leveraging-technology-for-more-efficient-fraud-investigations-on-demand-webinar","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Digital currency is now the mainstream for most individuals and financial institutions. This gives modern fraudsters more opportunities to commit scams and schemes...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinar_into-the-ether-and-back-again_tracing-cryptocurrency-in-money-laundering_1620x1080_2023.png","Category":"SelfStudyCpe","CourseLevel":"Intermediate","CpeCredits":2.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"54345898-0584-443b-a3a8-185406dacf25","IsEthicsCpe":false,"ItemImageAlt":"Tracing Cryptocurrency in Money Laundering","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinar_into-the-ether-and-back-again_tracing-cryptocurrency-in-money-laundering_1620x1080_2023.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Tracing-Cryptocurrency-in-Money-Laundering","SubCategory":"Publication","Title":"Tracing Cryptocurrency in Money Laundering","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"54345898-0584-443b-a3a8-185406dacf25","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Tracing-Cryptocurrency-in-Money-Laundering","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Money stolen via fraud is increasingly being converted into cryptocurrencies, with its movements then effectively hidden from investigators...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/shared/theresnosuchthingascryptocurrencycrime-thumbnail-final/1620x1080-new-image-theres-no-such-thing-as-cryptocurrency-crime-png/1620x1080-new-image-theres-no-such-thing-as-cryptocurrency-crime-png.png","Category":"SelfStudyCpe","CourseLevel":"Intermediate","CpeCredits":1.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"897bbfed-5c54-4fb5-9c18-a7923b351b88","IsEthicsCpe":false,"ItemImageAlt":"Theres No Such Thing as Cryptocurrency Crime","ItemImageUrl":"/-/media/images/shared/theresnosuchthingascryptocurrencycrime-thumbnail-final/1620x1080-new-image-theres-no-such-thing-as-cryptocurrency-crime-png/1620x1080-new-image-theres-no-such-thing-as-cryptocurrency-crime-png.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=theres-no-such-thing-as-cryptocurrency-crime-on-demand-webinar","SubCategory":"Publication","Title":"There's No Such Thing as Cryptocurrency Crime (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"897bbfed-5c54-4fb5-9c18-a7923b351b88","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=theres-no-such-thing-as-cryptocurrency-crime-on-demand-webinar","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-self-study-internetofthings.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":0.2,"FieldOfStudy":"Information Technology","Format":null,"Id":"d0a80d53-1f56-4200-abd8-8bb21605acce","IsEthicsCpe":false,"ItemImageAlt":"Image of Laptop Computer with illustration of smaller digital clouds connecting to a large digital on Screen","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-self-study-internetofthings.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Exploring-the-Internet-of-Things","SubCategory":"Publication","Title":"Exploring the Internet of Things","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"d0a80d53-1f56-4200-abd8-8bb21605acce","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Exploring-the-Internet-of-Things","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"<span>Learn how Business Email Compromise scams work and discover ways to prevent and respond to them.</span>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-business-email-compromise-scams/1620x1080_nano_business-email-compromise-scams.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":0.2,"FieldOfStudy":"Information Technology","Format":null,"Id":"fa060427-8e36-4213-912f-297e7d05813d","IsEthicsCpe":false,"ItemImageAlt":"What is Business Email Compromise?","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-business-email-compromise-scams/1620x1080_nano_business-email-compromise-scams.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=What-is-Business-Email-Compromise","SubCategory":"Publication","Title":"What is Business Email Compromise? (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"fa060427-8e36-4213-912f-297e7d05813d","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=What-is-Business-Email-Compromise","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Gain a basic understanding of what blockchain is and discover its potential business and anti-fraud applications.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/1620x1080-new-image-what-is-blockchain.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":0.2,"FieldOfStudy":"Information Technology","Format":null,"Id":"561737ed-d846-4aad-a3b8-fcddf5dd5050","IsEthicsCpe":false,"ItemImageAlt":"What is Blockchain Laptop Image","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/1620x1080-new-image-what-is-blockchain.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=What-is-Blockchain","SubCategory":"Publication","Title":"What is Blockchain? (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"561737ed-d846-4aad-a3b8-fcddf5dd5050","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=What-is-Blockchain","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-self-study-nano-dlt-versus-blockchain.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":0.2,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"63e6a285-9281-4cbe-a7f5-749637738d2e","IsEthicsCpe":false,"ItemImageAlt":"Image of Laptop Computer with Cell Phone on Crypto Exchange on Screen","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-self-study-nano-dlt-versus-blockchain.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=DLT-Versus-Blockchain","SubCategory":"Publication","Title":"DLT Versus Blockchain (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"63e6a285-9281-4cbe-a7f5-749637738d2e","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=DLT-Versus-Blockchain","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"<span>Learn what ransomware is, how a ransomware infection starts and the importance of cybersecurity training.</span>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-what-is-ransomware/1620x1080_nano-what-is-ransomware.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":0.2,"FieldOfStudy":"Information Technology","Format":null,"Id":"b660a12f-944f-4d3d-bfe3-b8ff9f166fe6","IsEthicsCpe":false,"ItemImageAlt":"What is Ransomware","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-what-is-ransomware/1620x1080_nano-what-is-ransomware.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=What-Is-Ransomware","SubCategory":"Publication","Title":"What Is Ransomware? (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"b660a12f-944f-4d3d-bfe3-b8ff9f166fe6","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=What-Is-Ransomware","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn cybersecurity methods that are important pillars upon which to build a robust cybersecurity program.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-cybersecurity-best-practices/1620x1080_nano_cybersecurity-best-practices.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":0.2,"FieldOfStudy":"Information Technology","Format":null,"Id":"6cb2eb78-c6ad-41e5-9657-a2edf974e2df","IsEthicsCpe":false,"ItemImageAlt":"Cybersecurity Best Practices","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/nano/nano-cybersecurity-best-practices/1620x1080_nano_cybersecurity-best-practices.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Cybersecurity-Best-Practices","SubCategory":"Publication","Title":"Cybersecurity Best Practices (Nano Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"6cb2eb78-c6ad-41e5-9657-a2edf974e2df","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Cybersecurity-Best-Practices","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Gain an increased awareness of alternative currencies, knowledge of their strengths and weaknesses, the ways in which they can be exploited and more. ","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/alternative-currencies-and-fraud/1620x1080-new-image-alternative-currencies-and-fraud.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":2.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"e4991c75-0ef5-4539-a68d-cfb44d2dfc46","IsEthicsCpe":false,"ItemImageAlt":"Image of laptop displaying a digitized dollar sign","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/alternative-currencies-and-fraud/1620x1080-new-image-alternative-currencies-and-fraud.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Alternative-Currencies-and-Fraud","SubCategory":"Publication","Title":"Alternative Currencies and Fraud (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"e4991c75-0ef5-4539-a68d-cfb44d2dfc46","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Alternative-Currencies-and-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Learn about prominent emerging technologies that can be applied to the prevention and/or detection of fraud.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/shared/1620x1080-resized-only-fighting-fraud-with-emerging-technologies/1620x1080-resized-only-fighting-fraud-with-emerging-technologies.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":2.0,"FieldOfStudy":"Information Technology","Format":null,"Id":"2e397c35-0197-468e-a526-527f715054ff","IsEthicsCpe":false,"ItemImageAlt":"Image of a finger on a touch screen device","ItemImageUrl":"/-/media/images/shared/1620x1080-resized-only-fighting-fraud-with-emerging-technologies/1620x1080-resized-only-fighting-fraud-with-emerging-technologies.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Fighting-Fraud-with-Emerging-Technologies","SubCategory":"Publication","Title":"Fighting Fraud with Emerging Technologies (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"2e397c35-0197-468e-a526-527f715054ff","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Fighting-Fraud-with-Emerging-Technologies","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"In this course, you will discover emerging technological trends and their potential impacts, both negative and positive, on the investigative process.","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/protecting-against-emerging-cyber-risk/1620x1080-new-image-privacy-and-the-fraud-examiner-png/1620x1080-new-image-protecting-against-emerging-cyber-risks-png.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":2.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"dae64f25-c48a-4684-af1f-9967acabc4a8","IsEthicsCpe":false,"ItemImageAlt":"Protecting Against Emerging Cyber Risks","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/protecting-against-emerging-cyber-risk/1620x1080-new-image-privacy-and-the-fraud-examiner-png/1620x1080-new-image-protecting-against-emerging-cyber-risks-png.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Protecting-Against-Emerging-Cyber-Risks","SubCategory":"Publication","Title":"Protecting Against Emerging Cyber Risks (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"dae64f25-c48a-4684-af1f-9967acabc4a8","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Protecting-Against-Emerging-Cyber-Risks","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"<span>Learn about the dark web and digital currencies, discover how those technologies relate to fraud and examine strategies for investigating fraud cases...</span>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/self-study-cpe/online/the-dark-web-cryptocurrencies-and-fraud.png","Category":"SelfStudyCpe","CourseLevel":"Intermediate","CpeCredits":4.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"bc1b1daa-6e4b-44e1-adda-426c4efa33ac","IsEthicsCpe":false,"ItemImageAlt":"The Dark Web, Cryptocurrencies and Fraud","ItemImageUrl":"/-/media/images/acfe/products/publication/self-study-cpe/online/the-dark-web-cryptocurrencies-and-fraud.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=The-Dark-Web-Cryptocurrencies-and-Fraud","SubCategory":"Publication","Title":"The Dark Web, Cryptocurrencies and Fraud (Online Self-Study)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"bc1b1daa-6e4b-44e1-adda-426c4efa33ac","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=The-Dark-Web-Cryptocurrencies-and-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Investment in decentralized finance (DeFi) crowdfunding projects is becoming increasingly popular. Their complex blockchain foundations make them...<br />","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_ondemand_lega_webinar.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":2.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"cf4fff47-77df-425e-97ec-52d245946615","IsEthicsCpe":false,"ItemImageAlt":"Law Enforcement and Government Alliance On-Demand Webinar","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_ondemand_lega_webinar.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=investigative-elements-and-concepts-of-decentralized-finance","SubCategory":"Publication","Title":"Investigative Elements and Concepts of Decentralized Finance","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"cf4fff47-77df-425e-97ec-52d245946615","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=investigative-elements-and-concepts-of-decentralized-finance","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Ransomware gets a lot of press, but business email compromise (BEC) has been far more lucrative. According to the Verizon 2021 Data Breach Investigations Report, BECs net the attacker nearly three times the median payout of a ransomware attack...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinar_on_demand_the-costliest-business-email-compromise_1620x1080.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":2.0,"FieldOfStudy":"Information Technology","Format":null,"Id":"03120da7-451a-4fc9-abe2-656c07e40253","IsEthicsCpe":false,"ItemImageAlt":"Laptop displaying an image of a cell phone with an email notification","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinar_on_demand_the-costliest-business-email-compromise_1620x1080.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=The-Costliest-Cyber-Fraud-in-History-Business-Email-Compromise","SubCategory":"Publication","Title":"The Costliest Cyber Fraud in History: Business Email Compromise (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"03120da7-451a-4fc9-abe2-656c07e40253","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=The-Costliest-Cyber-Fraud-in-History-Business-Email-Compromise","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Generative AI has captivated the world’s imagination, but what are the implications for the commercial and government sectors? ","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinarandvirtual_fighting-digital-financial-crime-in-the-generative-ai-age--examining-the-global-scam-economy_1620x1080_2023.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":1.0,"FieldOfStudy":"Information Technology","Format":null,"Id":"043671f3-78ac-459a-85ce-728e6d809c75","IsEthicsCpe":false,"ItemImageAlt":"Fighting Digital Financial Crime in the Generative AI Age","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinarandvirtual_fighting-digital-financial-crime-in-the-generative-ai-age--examining-the-global-scam-economy_1620x1080_2023.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Fighting-Financial-Crime-in-the-Generative-AI-Age-On-Demand-Webinar","SubCategory":"Publication","Title":"Fighting Financial Crime in the Generative AI Age (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"043671f3-78ac-459a-85ce-728e6d809c75","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Fighting-Financial-Crime-in-the-Generative-AI-Age-On-Demand-Webinar","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Financial institutions encounter threats to consumers every day with each transaction. With the advent of instant payments adoption and the shift of liability...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinarandvirtual_futureoffraud2024expertpredictions_1620x1080_2023.png","Category":"SelfStudyCpe","CourseLevel":"Basic","CpeCredits":1.0,"FieldOfStudy":"Information Technology","Format":null,"Id":"180a8521-95fd-4550-b09f-2eb0841e0381","IsEthicsCpe":false,"ItemImageAlt":"Future Of Fraud 2024 Expert Predictions","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_webinarandvirtual_futureoffraud2024expertpredictions_1620x1080_2023.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Future-of-Fraud-2024-Expert-Predictions-On-Demand-Webinar","SubCategory":"Publication","Title":"Future of Fraud | 2024 Expert Predictions (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"180a8521-95fd-4550-b09f-2eb0841e0381","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Future-of-Fraud-2024-Expert-Predictions-On-Demand-Webinar","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"The pandemic has led to growth in the adoption of various online/mobile banking products and services as well as faster payment options. One key emerging trend is...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/2023-top-trends-in-aml-and-fraud-proof.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":1.0,"FieldOfStudy":"Specialized Knowledge","Format":null,"Id":"4de58b4b-11c2-4b4f-90dd-e583d737a837","IsEthicsCpe":false,"ItemImageAlt":"2023 Top Trends in AML and Fraud Sanctions Screening Crypto Synthetic ID","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/2023-top-trends-in-aml-and-fraud-proof.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=2023-Top-Trends-in-AML-and-Fraud","SubCategory":"Publication","Title":"2023 Top Trends in AML and Fraud: Sanctions Screening, Crypto, Synthetic ID, Payments and More (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"4de58b4b-11c2-4b4f-90dd-e583d737a837","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=2023-Top-Trends-in-AML-and-Fraud","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Specialized Knowledge","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"<span style=\"background-color: #ffffff; color: #1e1f21;\">Policing across the globe is at a digital crossroads. From one perspective, the technology tsunami that has overrun every commercial business sector has now reached the policing industry...</span>","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_ondemand_lawenforcement20.png","Category":"SelfStudyCpe","CourseLevel":"Overview","CpeCredits":1.0,"FieldOfStudy":"Information Technology","Format":null,"Id":"c837594c-36d3-4f1e-979a-85a0d66d6a4b","IsEthicsCpe":false,"ItemImageAlt":"Law Enforcement 2.0 Navigating the Digital Divide","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_ondemand_lawenforcement20.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=Law-Enforcement-2-0-Navigating-the-Digital-Divide","SubCategory":"Publication","Title":"Law Enforcement 2.0: Navigating the Digital Divide","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"c837594c-36d3-4f1e-979a-85a0d66d6a4b","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=Law-Enforcement-2-0-Navigating-the-Digital-Divide","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Information Technology","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"What if your organization had a crystal ball to identify fraud before it happened? The strategic purpose of a risk management plan is to define, identify, assess and respond to risks. Regardless of existing frameworks...","HasResourceSource":false,"ItemImageUrlOrDefault":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_fraudprecognitioncrystalballs_1620x1080_2023.png","Category":"SelfStudyCpe","CourseLevel":"Intermediate","CpeCredits":2.0,"FieldOfStudy":"Management Services","Format":null,"Id":"9ff2d414-78a3-47ea-8ecf-c5ad7b59d59c","IsEthicsCpe":false,"ItemImageAlt":"Fraud Precognition Crystal Balls, Tarot Cards and Other Risk Management Tools","ItemImageUrl":"/-/media/images/acfe/products/publication/webinar/webinar-image/acfe_fraudprecognitioncrystalballs_1620x1080_2023.png","ItemLinkUrl":"/training-events-and-products/all-products/product-detail-page?s=fraud-precognition-crystal-balls-tarot-cards-and-other-risk-management-tools-on-demand-webinar","SubCategory":"Publication","Title":"Fraud Precognition: Crystal Balls, Tarot Cards and Other Risk Management Tools (On-Demand Webinar)","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"9ff2d414-78a3-47ea-8ecf-c5ad7b59d59c","ItemUrl":"/training-events-and-products/all-products/product-detail-page?s=fraud-precognition-crystal-balls-tarot-cards-and-other-risk-management-tools-on-demand-webinar","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"| Management Services","HasImage":true,"HasLink":true},{"IsMembersOnly":false,"ResourceSource":"","Subtopics":[],"Summary":"Discover the latest insights on anti-fraud technologies' effectiveness in managing fraud risk, and learn how organizations are leveraging data and technology in their anti-fraud programs.","HasResourceSource":false,"ItemImageUrlOrDefault":"/Assets/Images/article_transparent.jpg","Category":"ArticlesResources","CourseLevel":"","CpeCredits":0.0,"FieldOfStudy":"","Format":null,"Id":"f6b31e40-9ad3-4b40-b67e-70e5646527a4","IsEthicsCpe":false,"ItemImageAlt":"","ItemImageUrl":"","ItemLinkUrl":"https://www.acfe.com/fraud-resources/anti-fraud-technology-benchmarking-report","SubCategory":"","Title":"Anti-Fraud Technology Benchmarking Report","Topics":null,"WebsiteFavorite":{"IsFavorited":false,"IsLoggedIn":false,"ItemId":"f6b31e40-9ad3-4b40-b67e-70e5646527a4","ItemUrl":"https://www.acfe.com/fraud-resources/anti-fraud-technology-benchmarking-report","LearningAndResourcesUrl":"/account-dashboard/my-learning-and-resources/","LogInUrl":"/Login"},"IsExperienceEditor":false,"FieldOfStudyString":"","HasImage":false,"HasLink":true}]" />