Sequor Law Summer Series: Deconstructing Fraud: Entering the Mind through Financial Investigation

28 Jul , 2021

To register for the upcoming live webinar, please Click Here

Every fraud case presents unique challenges, whether it is determining the intent of the fraudster, unwinding the fraudulent scheme, or recovering value. This presentation will help you build an arsenal of tools to leverage financial investigations and pierce through the fog to crack your case. Through the use of relevant case studies, we will discuss strategy and techniques that may be deployed to obtain and evaluate relevant evidence to identify indicia of fraud and pattern of conduct to understand the human element behind the fraud and, ultimately, successfully prosecute your case.

To register for the upcoming live webinar, please Click Here

More Webcasts

Claims and Requests ...

During this presentation, you will learn about the regulations and caselaw controlling claims and re...

Practitioners Take N...

The Federal Tort Claims Act is the way that the federal government is sued for negligence. There are...

The Bulk Sensitive D...

The “Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countrie...

Ethical Billing in t...

Protect your practice from the ethical vulnerabilities of AI by mastering Model Rules 1.1 and 1.5. T...

AI Governance in the...

AI, an innovative technology that was once a supporting act for digital transformation, business str...

Reinventing Project ...

The landscape of global finance is undergoing a seismic shift as traditional assets migrate to the b...

Navigating Governmen...

Contracting with the Federal Government is not like a business deal between two companies or a contr...

Generative AI for Li...

Explore the transformative potential of generative AI in modern litigation. “Generative AI for...

Introduction to Gove...

Contracting with the Federal Government is not like a business deal between two companies or a contr...

Cybersecurity Compli...

This course analyzes federal contractor cyber security obligations under the Federal Acquisition Reg...