General Fraud
2017 Ransomware on the Dark Web How the Underground Economy Works
2017 Persuasive Storytelling for Litigation
2016 Advocating for Immigrant Victims ‐ Ashley Harrington, Abbie Johnson
2015 Calculating Individual Economic Damages With Damages Advocate
2015 Winning Your Case BEFORE Trial Using Persuasive Graphics
2015 We All Know What You Did Last Summer: Privacy and the Internet of Things
2015 Cybersecurity Industry Expert Presentation
2014 Things Every Mock Juror Ever Has Said
2014 Insider Threat and Privileged Access
2014 13th Annual ACAMS Conference Round‐Up
2014 Virtual Identity in the Digital Economy
2014 Storytelling as a Persuasion Tool (in litigation)
2012 Malware B to Z
2012 Healthcare Fraud in America
2010 The Plague of Spreadsheet Fraud
2010 Top Ten Business Drivers in Financial Crimes Management
2009 Keeping Up with Fraud Sophistication: Leveraging Advanced Analytics and Social Network Analysis
2009 Understanding Insider Threats
2009 Utilizing Analytics for Enterprise Case Management
2009 CFE Prep Course
2009 Forensic Accounting for Valuation, Auditing, Litigation and Fraud Practitioners
Investigations
2017 Strategic Use of Evidence in Investigation Interviews
2017 Investigation Interview Planning What to Do Before the Interview
2017 Women and Fraud: Special Considerations for Investigating the Pink Collar Criminal
2017 Documenting Your Workplace Investigation Protect Your Case and Your Organization
2017 Hunting and Disrupting Cyber‐Criminals
2017 Diving Deeper with WordPress Security Logs
2016 Stalkers & How They Use Technology, Vigil, Antuna
2016 Investigating Online: Conducting Pre‐Interview Research
2016 Elicitation Techniques: How to Get the Information You Need in Investigation Interviews
2015 The Winter Method A Business‐Focused Approach to Workplace Investigations
2015 Writing Effective Investigation Reports
2015 Creating an Effective Investigation Strategy
2015 Detecting and Investigating Vendor Fraud
2015 Social Media Forensics for Investigators
2014 Financial Institutions Can Shed Light on “Invisible” Victims of Human Trafficking and Smuggling
2014 Advanced Resources and Tools for Online Investigations
2014 Mastering Challenging Investigation Interview Subjects
2014 Financial Crime Investigations and the Role of the FIU
2014 Conducting Anonymous Online Investigations
2014 Closing Out the Investigation and Dealing with the Aftermath
2014 Conducting a Procedurally Fair Investigation
2014 Fighting Financial Crime Using Cross Institution Detection
2014 Preparing to Conduct Procedurally Fair Investigations
2014 Conducting Foreign Due Diligence Investigations
2014 Big Data Approach to Discovering Fraud
2014 Finding Fraud Through Data Analytics
2014 An Investigator’s Guide to Searching Court Records
2013 Expert Witness Background Checks
2013 Mastering Online Investigation Tools Part 2
2013 Interviewing Session 6: Investigation Interviews Putting It All Together
2013 Interviewing Session 5: Telephone Interviews
2013 Interviewing Session 4: Question Types and When to Use Them
2013 Law Social Media and Investigation
2013 Interviewing Session 3: Detecting Deception and Understanding Motives
2013 Investigating Report Writing Best Practices
2013 Interviewing Session 2: Establishing a Baseline and Building Rapport
2013 Interviewing Session 1: Investigation Interview Preparation
2012 How to Locate Hidden Assets
2012 Learn the Science of Lie Spotting
2012 Online Investigations Using Deep Web Searches
2012 Mining the Data Mountain
2012 Investigating Money Laundering
2012 Transaction Auditing and Monitoring
2011 How to Detect and Prevent Financial Statement Fraud
Ethics
2018 Human Subjects Research Course ‐ Ethical Principles (Refresher Certification)
2018 Ethics for Managers and Executives
2017 Professionalism and the Ethical Conduct of Research
2016 Emerging Risks: Is Your Code of Conduct Up to Standard?
2016 How to Write a Code of Conduct that Works for Your Organization
2015 Investigating Misconduct‐Reaching a Decision and Determining Root Causes
2015 Tone from the Top, Bottom, and Everywhere in Between
2015 Ethical Investigation Interviews The PEACE Model
2015 Handling Ethical Issues in Investigations
2015 NASBA Ethics Town Hall Meeting
2015 Human Subjects Research Course ‐ Ethical Principles (Refresher Certification)
2014 Writing a Values Statement that Encourages Ethical Behavior
2013 Human Subjects Research Course ‐ Ethical Principles
2013 Professional Ethics How to Recognize and Reduce Risk
2013 Healthcare Reform and New Opportunities for the Ethically Challenged
2012 Ethical Issues for Fraud Examiners
2010 Influencing Employee Ethics and Preventing Fraud
Elder Financial Abuse
2016 Elder Financial Abuse: An Advocate’s Guide to Proactive Intervention (Presentation)
2016 Animal Cruelty & Domestic Violence ‐ Hageman, Pohl, Greene
2016 Revealing Family Financial Stories Using Genograms
2016 GIA Making Elder Justice a Reality‐The Federal and Philanthropic Perspectives
2015 Elder financial exploitation via power of attorney abuse: What family members’ experiences reveal…
2015 Presenter: Elder Financial Exploitation within the Family System
2015 Live NVivo Review with Elder Financial Exploitation Research Team
2014 Elder Abuse True Link Deep Dive
2013 Emerging Trends in Elder Financial Exploitation
2013 Presenter: Overcoming Impediments to Effective Protection of Elderly Victims’ Assets
2013 Elder Abuse & Mandatory Reporting
2013 Wrap‐Around Services for Low‐Income Senior Victims
2013 Elder Financial Exploitation: What Families Contribute & How They Are Impacted
2013 Elder Abuse Investigation: The Importance of Collaboration
2011 Presenter: Increasing Awareness of Financial Exploitation of At‐Risk Individuals
Planning
2016 How to Respond to an Active Shooter in the Workplace
2015 High Touch‐High Tech New Client And Referral Marketing System
2014 Planning and Organizing Your Project to Ensure Success
2014 Analysis and Challenges of the Implementation Mapping Process
2014 Implementation Mapping for Global Fund Programs
2014 Introduction to Implementation Mapping
2010 Workshop for Implementers of the Global Fund to Fight AIDS, Tuberculosis and Malaria
Fraud Prevention
2018 Fraud Analytics: Ensuring Data Quality
2018 Artificial Intelligence and Machine Learning to Fight Financial Crime
2018 New Ways to Prevent and Detect Fraud Risks Across Employee Spend Areas
2018 BrightTalk‐TokenEX‐Flashpoint‐Blockchain 101
2018 8 Current Challenges in Financial Crime and How to Manage Them
2018 Overcoming Major Hurdles to Achieve a Holistic AML Compliance Program
2018 Politically Exposed Persons (PEPs) ‐ Exposing the Facts
2017 Diminished Capacity and Senior Clients: Steps to Protect the Firm and the Client (Webinar panelist)
2017 Preventing & Addressing Family Elder Financial Exploitation
2017 De‐Risking Dilemma: How the Financial Industry Can Collaborate to Manage Risk
2017 AI, Machine Learning and the Future of Cybersecurity (Black Hat Conference)
2017 Your Small Business Will Be Hacked ‐ Because It Is Easy (Black Hat Conference)
2017 Managing Risk Through AI: What Financial Institutions Need to Know
2016 How to Protect Against the Ransomware Epidemic
2016 Understanding WordPress Security Vulnerabilities
2015 Corporate Security and Employee Privacy‐Getting the Balance Right
2015 The Need for Speed: Accelerating Payment Settlement and Fraud Detection
2015 Are You Prepared for the Next High‐Impact Vulnerability?
2015 Intrusion Detection with Tripwire Enterprise
2015 The State of Cybersecurity
2015 How to Get Ahead of Attackers with Threat Intelligence
2014 Model Risk Management Across Financial Crime Apps
2014 Proactive Threat Intelligence for Active Defense
2014 Hacking Point Of Sale How Mega Retailers Are Compromised
2014 How to Detect and Prevent Employee Theft
2014 How the 20 Controls Address Real Threats.pdf
2016 WordPress Disaster Week (four one‐hour sessions 2/16/16 to 2/19/16)
2012 Helping Businesses Succeed by Addressing Waste and Abuse
2010 Fraud Related Internal Controls
Research Methodology and Tools
2017 Explore and Visualize Your Data ‐ Using NVivo 11 for Windows to Tell the Story
2016 How to Make Better Decisions Faster with NVivo 11 for Windows and Qualtrics
2016 Top Coding Stripe Tips in NVivo 11 for Windows
2016 Explore and Visualize Your Data – Using NVivo 11 for Windows to Tell the Story
2015 Mixed Methods Research Analyzing Survey Data with NVivo 10 for Windows #2
2015 Librarians and Nvivo‐Supporting Your Campus Researchers and Engaging in Your Own Research, Too!
2015 Learning How to Explore and Visualize Your Data with NVivo 10 for Windows #2
2015 Mixed Methods Research Analyzing Survey Data with NVivo 10 for Windows #1
2015 Understanding Online Brand Communities ‐ The Role of NVivo and NCapture
2015 Improving Your Literature Review with NVivo 10 for Windows #2
2015 Making Qualitative Analysis More Transparent by Using NVivo 10 for Windows
2015 Discover New Social Media Research Capabilities with NVivo 10 for Windows
2015 Auto Coding by Example with NVivo 10 for Windows
2015 Improving Your Literature Review with NVivo 10 for Windows #1
2015 Learning How to Explore and Visualize Your Data with NVivo 10 for Windows #1
2015 Organizing Your Grant Writing Process Using NVivo 10 for Windows
2015 Enrich Your Audio Content with Transcription Using NVivo 10 for Windows
2014 Best Practices in Parent and Provider Interactions in Pediatrics
2014 Increase the Impact, Efficiency and Shelf‐life of Your User Research
2014 Nvivo training for EFE work
2014 Building Successful Research Collaborations
2014 Using NVivo for Grant Proposals
Practice Development
2017 Creating a Powerful Podcast That Reaches The Masses, Generates Revenue & Differentiates You
2016 Jeff Goins webinar on blogging webinarjam.net
2016 Client Services Webinar: How to be a Top‐Notch FlexJobs Subscriber
2016 How to Build the Perfect Professional Services Website
2015 How to Create and Deliver Your First Five Figure Webinar
2015 30 Minutes To Get Your Product on Front Page of Google
2015 9 Ways to Build Recurring Revenue With Your WordPress Site(four 1‐hour sessions 4/20 to 4/24/15)