Annual ISCPA & ACFE Fraud Conference - VIRTUALLY Focus on Fraud

Register Now
  • Date/Time
    • Nov 2, 2020 - Nov 3, 2020
    • Sign In: 7:30am (MT)
    • Day 1: 8:00am - 12:00pm (MT)
    • Day 2: 8:00am - 12:00pm (MT)
    • Add to Calendar
  • Location
    • Your Computer
  • Credits
    • 14.00
  • Credit Type(s)
    • Accounting (Technical) (4.00)
    • Ethics (2.00)
    • Specialized Knowledge and Applications (8.00)
  • Vendor
    • *** ISCPA ***
  • Level
    • Update
  • Fields of Study
    • Fraud
  • Message
    • ATTENDING Virtually


ISCPA & ACFE Boise Chapter have once again partnered to bring you an outstanding 2020 Fraud Conference ...

This year is going to be a little different than past years - we are excited to bring you this unique conference in a virtual setting!

To keep you from staring at your computer screen for 9 consecutive hours 2 days in a row, we have broken this year's fraud conference into 3 sections (you can thank us later).


Section 1:   Join us via your computer on

Monday, November 2

  • 8 - 9:55 am - The Enemy Within: Detecting and Investigating Employee Fraud
  • 10:10 am - 12 pm - Psychopathy: Beyond Serial Killers and Into the Community

Tuesday, November 3

  • 8 - 9:55 am - Artificial Intelligence and Real World Investigations
  • 10:10 am - 12 pm - Cybersecurity Model Framework for Contingency Plans Associated with Remote Work

Section 2:  Attend 2 of these 3 ACPEN webcasts on the date that works best for your schedule:

  • Business Fraud Basics
    • Monday November 9 @ 10 am – 12 pm
    • Wednesday, December 9 @ 12 – 2 pm
  • Fraud Brainstorming & Interviewing Techniques for Auditors & Accountants
    • Monday, November 16 @ 12 – 2 pm
    • Saturday, November 28 @ 8 – 10 am
    • Wednesday, December 16 @ 12 – 2 pm
  • Bribery & Corruption: It CAN Happen in Your Organization
    • Wednesday, November 11 @ 10 am – 12 pm
    • Wednesday, November 25 @ 10 am – 12 pm
    • Tuesday, December 15 @ 10 am – 12 pm

Section 3: Complete the 2-hour, on-demand ethics self-study:

  • Rationalizing Unethical Choices - Everybody Does It
    • View between 11.3.20 and 11.30.20

Designed For

  • Attorneys, legal professionals and law enforcement personnel
  • Controllers and corporate managers
  • Detectives and private investigators
  • Forensic and management accountants
  • Internal and external auditors
  • Loss prevention and security professionals
  • Certified Fraud Examiners and other anti-fraud professionals
  • Highlights

    Section 1: (all 4 presentations included)

    • The Enemy Within: Detecting and Investigating Employee Fraud:
      • Speaker: Gene Ferraro
        • Whether one provides goods or services or simply consumes them, employee dishonesty and fraud has its cost. Successful employers recognize that employee fraud is one of the most expensive and harmful forms of crime they face. Eugene Ferraro, Board Certified in Security Management and Human Resources Management and a renowned Certified Fraud Examiner will provide a provocative look at this problem and means by which modern investigators confront it. He will reveal how forensic fraud examination, interviewing and covert surveillance are used to detect fraud and confront it when found. He will also discuss the legal aspects of investigating fraud and the privacy rights of those who commit it.
    • Psychopathy: Beyond Serial Killers and into the Community
      • Speaker: Jessica Wells (BSU)
        • Although society often thinks of psychopathy in regard to psychopathic murderers, psychopathy is much more complex. Psychopathy is, in fact, a constellation of personality traits that are found in nearly all people and exist on a continuum. Those that are high in these psychopathic traits are not just murderers but exist in all segments of society. This presentation will cover what psychopathy is, where it comes from, and the consequences of psychopathy in life and in the workplace.
          • Understand the dimensionality of psychopathy
          • Identify behavioral patterns consistent with psychopathic traits
          • Become familiar with approaches of how to respond to individuals with high levels of psychopathic traits
    • Artificial Intelligence and Real World Investigations
      • Speakers: Joe Sremack (BDO) and John Colthart (MindBridge)
        • Gain a foundational understanding of AI: the different types of AI techniques, Machine Learning and AI, and weak AI vs. strong AI and super AI
        • Learn how AI is being applied and which leading tools are being used
        • Follow a real-world investigation using non-AI techniques vs. incorporating AI
        • Understand how to measure AI ROI and how to select a tool
    • Cybersecurity Model / Framework for Contingency Plans Associated With Remote Work
      • Speakers:  Dr. Kimberlee Ann Brannock (HP) and Michael Howard (HP)
        • Organizations are currently going through the COVID-19 pandemic while preparing for any future event that is likely to disrupt the business. Because of these types of events, organizations have an obligation as responsible corporate citizens to ensure that everyone is safe. Organizational leaders have an obligation to enable their employees to work safely, comfortably, and remotely with the highest level of security possible. This includes ensuring the work that is conducted is being done in a manner to protect the individual, the organization, and the associated company data.
        • When this is not a key consideration, organizations introduce significant risks where it is foreseeable harm occurs at the individual and organizational level. Michael and Kimberlee are providing an overview of a cybersecurity model/framework comprised of cybersecurity best practices for your consideration for adopting into your remote contingency plan. Which should be part of your business continuity / disaster recovery / resiliency program. By implementing the cybersecurity model/framework organizations will reduce the impact of loss of life, protect brand and reputation, alleviate and deter cybersecurity risk and vulnerabilities, avoid legalities and fines, and improve your overall security posture.

    Section 2: (you may select up to 2 of these ACPEN webcasts)

    • Business Fraud Basics
      • Total Credits: 2 Accounting - Technical
      • Monday November 9 @ 10 am – 12 pm
      • Wednesday, December 9 @ 12 – 2 pm
        • Learn the basic concepts of fraud committed within organizations. These concepts include the definition of fraud, the types of fraud that are often committed, and how to uncover them. CPAs, finance teams, management are all responsible for bringing fraud risks and allegations of fraud to light. This course is a fundamentals course to get you started. 
          • Learning Objectives
            • Learn the definition of fraud and the three main business fraud types
            • Discuss theory behind why fraud is committed
            • Begin to learn the red flags of fraud
            • Review real-life case studies of fraud
          • Major Subjects
            • ACFE Fraud Classifications
            • ACFE Report to the Nations
            • Red Flags
            • Management Tools
    • Fraud Brainstorming & Interviewing Techniques for Auditors & Accountants
      • Total Credits: 2 (Governmental Accounting 1; Governmental Auditing) - Technical
      • Monday, November 16 @ 12 – 2 pm
      • Saturday, November 28 @ 8 – 10 am
      • Wednesday, December 16 @ 12 – 2 pm
        • Two of the most important requirements under current auditing standards are (1) engagement team brainstorming and (2) expanded inquiries of auditee personnel.  The skill with which these important requirements are carried out can mean the difference between discovering material fraud and … a lawsuit. These requirements definitely demand that auditors develop new skills and change the way they conduct audits.  This session will use case studies to provide insights into these important skill sets.
        • This session will address the following:
          • Why brainstorming is important
          • Rules for effective brainstorming
          • The brainstorming documentation dilemma
          • Successful interviewing: what to do and what not to do
          • How to spot signs of deceptive behavior
          • Integrating brainstorming results with interviewing; and vice versa
        • Learning Objectives
          • Understand that auditor responsibilities now include brainstorming and a new type of interview
          • Understand the purpose of and rules for effective fraud brainstorming
          • Understand how to conduct effective interviews designed to detect evidence of fraud
          • Understand the signs of deceptive behavior
          • Understand how to use brainstorming and fraud inquiries synergistically
        • Major Subjects
          • Fraud detection
          • Fraud brainstorming
          • Fraud interviews
          • Signs of deception and deceptive behavior
    • Bribery & Corruption: It CAN Happen in Your Organization
      • Total Credits: 2 (Governmental Accounting 1; Governmental Auditing) - Technical
      • Wednesday, November 11 @ 10 am – 12 pm
      • Wednesday, November 25 @ 10 am – 12 pm
      • Tuesday, December 15 @ 10 am – 12 pm
        • If your organization buys things, you are at risk of being victim to a wide variety of bribery and corruption schemes.  If your organization sells good or services, you might be engaged in such schemes and not realize it.  This session will explain what these fraud schemes are, examine three recent case studies, list the red flags associated with these schemes, and identify key safeguards to have in place to prevent or detect such schemes.
        • Learning Objectives
          • Understand the various types of correction and bribery schemes that can take place in any organization
          • Understand why most organizations are at risk of becoming a victim of bribery & corruption schemes
          • Study three recent, real-world cases of bribery and corruption
          • Understand the many red flags that might indicate that a bribery or corruption scheme is happening
          • Understand the several important safeguards that every organization should have in place to minimize the risks of bribery and corruption
        • Major Subjects
          • Bribery
          • Corruption
          • Public corruption
          • Kickbacks
          • Bid rigging
          • Economic extortion
          • Conflicts of interest
          • ACFE Fraud Classifications
          • Red flags
          • Safeguards

    Section 3: (complete this 2-hour, on-demand self-study program)

    • Rationalizing Unethical Choices - Everybody Does It
      • View the recording between 11.3.20 and 11.30.20
      • Pass the quiz by 11.30.20
        • This webinar will explore the ”Everybody does it” rationalization that people use to gradually move closer to the line they think they would never cross. Three simple words that seem harmless; yet can be a powerful force. If, in the business world, unethical behavior doesn’t always start out as unethical, what drives intelligent people to make poor choices and cross that line? Join Chuck Gallagher, former CPA and convicted felon, for a discussion about what motivates unethical behavior in the workplace and how to recognize it. Understanding how and why employees make bad decisions in the first place is key to creating a healthier work environment as well as protecting yourself from crossing the bridge of no return.

    Advanced Prep

  • Test your computer/device for compatibility with virtual meeting space
  • Download your materials

    Special thanks to our partner, ACPEN for their generosity and ability to provide access to the additional webcasts.

  • Register Now


    Please select one of the following options

    Please select one of the following options


    Eugene Ferraro

    Gene Ferraro

    Eugene F. Ferraro, CPP, CFE, PCI, SPHR, SHRM-SCP

    Gene has specialized in the investigation of allegations of behavioral and criminal misconduct for over 30 years. He is the founder and currently the Chief Executive of ForensicPathways, Inc. and frequently lectures and speaks on the topic of complex investigations involving allegations of harassment and discrimination. He is a graduate of the U.S. Naval Justice School and a former Marine Corps Naval Aviator and combat flight instructor. He is board certified in both Human Resources Management (SPHR and SHRM-SCP designations) and Security Management (CPP designation). He is also a Certified Fraud Examiner (CFE) and a Professional Certified Investigator (PCI).

    He is a member of The Society of Human Resource Management and ASIS International. He served on the ASIS Standards and Guidelines Commission for 10 years and co-chaired the working and technical committees which developed the 2015 national ANSI/ASIS Investigations Standard and the 2011 ASIS/SHRM Workplace Violence Prevention and Intervention ANSI Standard. Gene is the founder and former Chief Executive and Ethics Officer of Convercent, Inc., a Denver based global whistleblower hotline and compliance service provider currently serving clients in over 135 countries. He is also an inventor and was issued three U.S. patents for his inventions which architecturally underlie and support Convercent’s technology offerings.

    He is a licensed professional investigator and is the author of numerous books on various aspects of complex internal investigations and investigative interviewing in the private sector. He has competently testified as either a fact or expert witness in over 200 matters in the United States.

    John Colthart

    John Colthart

    John (JC) Colthart leads the growth team at MindBridge and is responsible for the whole customer lifecycle journey from lead generation to customer advocacy. He also plays a crucial role in technology evangelism helping organizations understand the mechanics and application of AI technology in practical terms towards their growth and success. He strives to lead clients to effectively use analytics to change the course of their business and provide greatest value to their customers. Working closely with major, strategic accounts, John is frequently engaged to deliver keynote sessions sharing his experience from the front lines of innovation.

    John is an innovation driven executive with a track record of exceeding growth and adoption targets by leading with a client-first mindset and strength in design and technology. Known for his ability to thrive in a fast-paced, early entry to market environment, John’s most recent role was at IBM Canada, where he served as a Business Unit Executive in Product Experience and Design. A key member of the design and offering management organizations within IBM Business Analytics reporting to the General Manager, John was responsible for designing a client experience for the Office of Finance and Accounting product offerings. With over 20 years in Finance, Accounting and Analytics roles spanning from practitioner to advisor to executive in sales and operations John brings diversity to every conversation. John has advised and implemented solutions globally. Prior to IBM John spent 10 years growing a fledgling software start-up in the Corporate Performance Management space to a team of over 425 employees and was a key transition executive after its acquisition by IBM.

    John is passionate about mentoring upcoming leaders and was recently recognized as 'Canada's Top Social Influencers in Finance, Innovation and Risk' by Thomson Reuters in 2018.

    Jessica Wells

    Jessica Wells

    Jessica Wells is an assistant professor of criminal justice at Boise State University. She received her Ph. D. in Criminal Justice and Criminology from Sam Houston State University in 2017. Her research is in the area of psychological and biosocial perspectives on criminal offending. Her publications focus on the consequences of stress and trauma exposure as well as psychopathy and aggression.

    Kimberlee Brannock

    Kimberlee Brannock

    As a Senior Security Advisor, Dr. Kimberlee Ann Brannock brings extensive knowledge and experience in compliance, risk, governance, IT, Information Security and privacy to help drive and shape HP’s worldwide security practice.

    As well as working with the HP security business unit, HP R&D, HP Labs, HP Business Units, HP Product Teams, and HP Global Functions to ensure HP’s leadership role in security, Dr. Brannock also educates clients on the importance of security including such items as security governance (exempli gratia (e.g.): security policies, security procedures, processes, standards and specifications) risk, compliance and information security for imaging and printing (includes devices, data, documents).

    During her 20-year tenure at HP, Dr. Brannock has led the HP initiative toward stronger cybersecurity, stronger privacy, better and stronger cybersecurity governance, risk, compliance, and information security, including better and stronger cybersecurity services, processes and procedures. Dr. Brannock served on the HP Compliance Community Forum, the HP Federal Compliance Council, the HP Regulatory Compliance Review Board, the HP Policy Review Team, and the HP PCI Council (pre-split), and the PCI Security Standards Council Board of Advisors representing HP.

    Pre HP Company split (approximately $122 Billion USD per annum company), Dr. Brannock was an HP Cybersecurity Manager, leading several global Cybersecurity Initiatives including the WW PCI Program, and worked on Separation Management Office activities prior to the Hewlett Packard split, focusing on cybersecurity with the aim of successfully supporting both companies leading to the split as it related to all things cybersecurity. This led to determining the Cybersecurity function in existence would move over to Hewlett Packard Enterprise, leading to a huge opportunity to build out the Cybersecurity global function from scratch, which Dr. Brannock seized.

    Dr. Brannock moved into the role of Senior Security Advisor in 2017 after serving as HP’s Cybersecurity Manager for Governance, Risk, Compliance and Information Security. Here, she built HP’s Cybersecurity operation from the ground up, as a result of Hewlett-Packard Company splitting from a $122 Billion USD company into two companies worth $50+ billion USD each.

    Before HP, Dr. Brannock began her career by building a family dot-com retail business, which her family liquidated and sold in mid-2000. In tandem, Dr. Brannock continued to work in technology security, advising with several companies, including HP (prior to joining HP), to help them understand issues such as IT consumption, governance, risk, compliance, security, IT and Cybersecurity budgeting, IT and Cybersecurity strategy, innovation, IT implementation, IT operations and security operations.

    Dr. Brannock holds degrees in accounting, corporate accounting, business, business administration, management information systems, and a professional doctorate specializing in technology and law (jurisprudence) for which she received a distinguished scholar award. In addition, Dr. Brannock is a PhD Candidate in Information Technology, Information Assurance and Cybersecurity.

    She also holds several credentials, including the CGRCM-IT, CISA, CSOXM, and PMP.

    Dr. Brannock participates in several organizations including ISACA, IAPP, ISSA, PMI, PCI SSC and in June 2017 finished serving more than two years on the PCI Security Standards Council Board of Advisors, which is a standards (including data security standards) setting body for the payment card industry.

    Michael Howard

    Michael Howard

    In his role as a head of security analytics practice at HP, Michael heads a worldwide team of security professionals that supports HP’s growth around enterprise print security and business solutions.

    In this role his team educates, evaluates risk through security audits and supports customers in creating comprehensive security policies to protect their printing environment while increasing the effectiveness of business solutions in a secure way. Michael also provides leadership working with the HP security business units and labs providing guidance around future development to ensure HP’s leadership role in security is maintained.

    Prior to his security position at HP, Michael was a worldwide senior consultant with HP helping companies on development of secure output management and workflow solutions to increase the effectiveness of business solutions in their environments.

    Michael began his career in the security and high technology field in 1981 with the U.S. Navy as a cryptologist. Over a 16-year period, he held numerous positions in Naval Intelligence in both operational and development roles working on projects to improve overall secure communications. Michael then worked directly with the Department of Defense in the security field for five years before joining private industry where his focus has been on enterprise security and business solutions for major corporations.

    Michael serves as a member on the HP Security Advisory Board providing advice and leadership on current and future development at HP. Michael is a certified GIAC, CSCS and CHP professional as well as a certified cryptologist.

    Joe Sremack

    Joe Scremack

    Joe Sremack is a director in BDO’s Data Analytics & Software Robotics practice. His primary focus is developing and implementing solutions to assist corporate and legal clients in matters involving complex technology issues and investigations. Joe’s experience is in structured data collection and analysis, IT assessments, electronic discovery, and software analysis. A computer scientist by training, Joe has conducted numerous investigations and assessments—including the three largest Ponzi schemes in history—involving systems investigations, data analysis, source code analysis, data compliance assessments, and the evaluation of technology solutions. He has assisted clients across the U.S. and internationally in such matters as financial crime investigations, regulatory compliance assessments, intellectual property theft, and antitrust disputes.

    Author of “Big Data Forensics,” a technical guide on performing investigations of large-scale, clustered data systems, Joe frequently presents and writes on topics involving transactional data systems.

    Prior to joining BDO, Joe held leadership positions at several expert service and advisory consulting firms.

    PROFESSIONAL AFFILIATIONS American Bar Association Association of Certified Fraud Examiners High Technology Crime Investigators Association

    EDUCATION M.S., North Carolina State University B.A., The College of Wooster

    ← Back to List