Browse Topics
Artificial Intelligence
Auditing Culture
Career & Leadership Development
Certification
COVID Resources
Cybersecurity
Data Analytics
Fraud & Ethics
Fundamentals
Governance
Risk Management
Talent Management
Trusted Advisor
Login
It looks like your browser does not have JavaScript enabled. Please turn on JavaScript and try again.
It looks like your browser does not have JavaScript enabled. Please turn on JavaScript and try again.
The Fraudit
The Fraudit
153817
F3ZGtzdzrT-ktZX2JAduDCmIDldMAwH7
8c7bf5d07e9e43178f045565d8d4e592
Pamela Verick, a director with Protiviti, discusses how to conduct a "fraudit" an audit to identify indicators of fraud risk. To learn more about fighting fraud, be sure to attend Ranjit Singh's "Developing and Implementing a Fraud Risk Assurance Map" session at The IIA's 2013 International Conference, http://www.iia2013ic.org/concurrent-sessions.html.
https://house-fastly.us-east-1.ooyala.com/F3ZGtzdzrT-ktZX2JAduDCmIDldMAwH7/QCdjB5HwFOTaWQ8X4xMDoxOjBrO-I4W8
https://www.theiia.org/sites/auditchannel/Lists/AuditChannelVideos/DispForm.aspx?ID=153817
The Fraudit
You May Also Be Interested In
Violating The IIA’s Code of Ethics: A Scenario to Consider, Part 4
Violating The IIA’s Code of Ethics: A Scenario to Consider, Part 2
Violating The IIA’s Code of Ethics: A Scenario to Consider, Part 3
Violating The IIA’s Code of Ethics: A Scenario to Consider, Part 1
What is in the EHS Auditor's Toolbox?
Third-party Risk: Part 1
Ethical Use of Data in the Future
Trusted Advisor: Thoughts About Ethical Resiliency Part 2
Establishing a Risk Management Program in the Public Sector
Ethics and Professional Responsibility
Trusted Advisor: Thoughts About Ethical Resiliency
Culture of Ethics Part 1
Culture of Ethics Part 2
Proactive Approaches to Governance and Risk in the Public Sector
Financial Services Audit Center Sound Bite on Root Cause
Professional Responsibility and Ethics Part 2
Professional Responsibility and Ethics Part 1
Audit Executive Center Preview on Cyber Resilience
Financial Services Audit Center Preview on Combined Assurance
Streamlining the Annual Risk Assessment Process, Pt 3
Streamlining the Annual Risk Assessment Process, Pt 2
Streamlining the Annual Risk Assessment Process, Pt 1
Managing and Overseeing Risk in a Merger Environment
Application Testing: Not Just for IT Auditors, Pt 2
Application Testing: Not Just for IT Auditors, Pt 1
New Security Controls to Fight Modern Threats, Pt 3
New Security Controls to Fight Modern Threats, Pt 2
New Security Controls to Fight Modern Threats, Pt 1
Proactively Managing the Cyber Threat Landscape, Pt 2
Proactively Managing the Cyber Threat Landscape, Pt 1
Is Your PCI Compliance Really Keeping You Safe?, Pt 3
Is Your PCI Compliance Really Keeping You Safe?, Pt 2
Is Your PCI Compliance Really Keeping You Safe?, Pt 1
Fraud in the Health Care System Pt 2
Fraud in the Health Care System Pt 1
Internal Audit and Environmental, Health and Safety
Risk Management: Everyone's Responsibility, Pt 2
Risk Management: Everyone's Responsibility, Pt 1
What Would You Do? An Ethical Dilemma
Auditing Third-party Risk, Part 3
Auditing Third-party Risk, Part 2
Auditing Third-party Risk, Part 1
Public Sector Audit Pros: Invest in Yourself
The Effects of Culture on Organizational Ethics
How to Jump-Start Continuous Monitoring, pt 3
How to Jump-Start Continuous Monitoring, pt 2
How to Jump-Start Continuous Monitoring, pt 1
CBOK 2015: Challenges for Public Sector Auditors
Internal Audit’s Impact on Cybersecurity, Part 2
Internal Audit’s Impact on Cybersecurity, Part 1
Internal Audit in Transition, Part 3
Internal Audit in Transition, Part 2
Internal Audit in Transition, Part 1
The MDM-GRC-ERM Puzzle
4 Phases of Auditing Construction Projects
Public vs. Private Sector Internal Auditing
Social Media: 3 Key Areas to Audit
7 Keys to Increasing CAE Value
Case Study: Ignored Red Flags Enable a Vendor Fraud
Introducing The IIA's CRMA Certification
Comments
Please enable JavaScript to view the
comments powered by Disqus.
comments powered by
Disqus