A Bite of What You’ve Listened To

The Latest Bites

Destigmatizing the Practice of Whistleblowing

In the wake of the financial crisis of 2008, the Dodd-Frank Act (“Dodd-Frank”) was signed into federal law on July 21, 2010.  At the time, the recession was considered the worst financial crisis since the Great Depression. It seemed like a 100-year storm.  As it turns out, it was only a 12-year storm.  The passage…

Keep reading

The Achilles Heel of FCPA Compliance: Bribe-paying Intermediaries

According to Stanford University Law School’s Foreign Corrupt Practices Act Clearinghouse, between 2001 and 2019, there were 268 FCPA enforcement actions. 246 (or 91.7%) of the bribes were paid by third parties as opposed to officers or employees of the defendant company. Sales agents, distributors, JV partners, resellers, freight forwarders, customs brokers, lawyers and accountants…

Keep reading

Chasing Bernie’s Billions: Inside the Most Successful Asset Recovery Effort in History

On December 11th, 2008 Bernie Madoff was arrested by the FBI in his Manhattan home and criminally charged with a multi-million-dollar securities fraud scheme. So began the most comprehensive and successful financial investigation and asset search in history. The Securities Investor Protection Corporation (“SIPC”) Trustee and Baker Hostetler have continued their tireless search for assets…

Keep reading

Investigation Challenges: The More Things Change, the More They Stay The Same Fraud Eats Strategy

Host Scott Moritz was a guest speaker at the October NAVEX Next Virtual Conference joined by Gregory Coleman, a former FBI colleague, to discuss established investigation techniques and how some of these practices have changed in recent times. For more information visit: FraudEatsStrategy.com
  1. Investigation Challenges: The More Things Change, the More They Stay The Same
  2. Navigating the Steps of an FCPA Investigation – Part 2
  3. Bringing Order to the Chaos: Navigating the Steps of an FCPA Investigation
  4. The Anatomy of a Ransomware Attack – Part 2
  5. The Anatomy of a Ransomware Attack – Part 1

Never miss an episode

Subscribe wherever you enjoy podcasts:

Email us at: fraudeatsstrategy@fticonsulting.com

%d bloggers like this: