XCPD-565 Fraud in the Governmental Environment
Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with School of Continuing Studies.Full disclaimer.
Fraudulent financial reporting, misappropriation of assets, bribery, abuse of power, and corruption--forensic examiners need to learn the particularities of these abuses in the governmental environment.
General course topics include:
- Government procurement
- Common fraud schemes
At the completion of the course, a successful student will be able to
- Describe the four attributes that make the government environment prone to fraud, waste, and abuse.
- Define corruption, bribery, extortion, and illegal gratuities.
- Describe the six most common fraud methods in government procurement cycle.
- Explain the government procurement cycle, basic appropriation law and "parking money" risk.
- Describe the basic principles of the Anti-Deficiency Act and Bona Fide Needs Statue.
- Define Best Value: Tradeoff process vs. Lowest price technically acceptable.
- Describe the types of abuses that are committed at each stage of the government procurement cycle, including during the competitive bidding process.
- Define elements and indicators of defective pricing, product substitution, cost mischarging, progress payment fraud, and price fixing.
Auditing for Fraud in the Government Environment
The American Institute of CPAs (AICPA) and the Government Accountability Office's (GAO) Yellow Book places responsibility on auditors to design their audit to detect fraud. But what does fraud look like? What techniques can you use to find it? And how does it rear its ugly head in the government environment?
In this course, the taxonomy of fraud will be discussed as well as how to do your best to uncover it and document your work in compliance with auditing standards.
At the conclusion of this course, participants will be able to:
- Apply Yellow Book and GAAS requirements regarding fraud to your organization;
- Distinguish between fraud, abuse, and non-compliance;
- Explain what to look for– using the CFE’s fraud tree and fraud triangle;
- Apply fraud risk assessment techniques; and,
- Design resulting audit methodologies.
Who should attend
This program is targeted towards auditors and other financial professionals charged with oversight and management of financial records.