{"id":12565,"date":"2025-03-18T20:57:33","date_gmt":"2025-03-18T20:57:33","guid":{"rendered":"https:\/\/aiia.al\/?p=12565"},"modified":"2025-04-09T07:51:21","modified_gmt":"2025-04-09T07:51:21","slug":"fraud-in-the-digital-era","status":"publish","type":"post","link":"https:\/\/aiia.al\/index.php\/2025\/03\/18\/fraud-in-the-digital-era\/","title":{"rendered":"FRAUD IN THE DIGITAL ERA"},"content":{"rendered":"\n<p><em>Detection, investigation and countermeasures<\/em><\/p>\n\n\n\n<p><strong>Date<\/strong>: 14 \u2013 15 April 2025<br><strong>Time<\/strong>: 09:00 \u2013 17:00<br><strong>Location<\/strong>: Xheko Imperial (Foyer meeting room)<br><strong>Course director<\/strong>: Komitas STEPANYAN<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"963\" height=\"676\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"http:\/\/aiia.al\/wp-content\/uploads\/2025\/03\/fraud.jpg\" alt=\"\" class=\"wp-image-12564 lazyload\" style=\"width:476px;height:auto\" data-sizes=\"auto\" data-srcset=\"https:\/\/aiia.al\/wp-content\/uploads\/2025\/03\/fraud.jpg 963w, https:\/\/aiia.al\/wp-content\/uploads\/2025\/03\/fraud-300x211.jpg 300w, https:\/\/aiia.al\/wp-content\/uploads\/2025\/03\/fraud-768x539.jpg 768w, https:\/\/aiia.al\/wp-content\/uploads\/2025\/03\/fraud-600x421.jpg 600w, https:\/\/aiia.al\/wp-content\/uploads\/2025\/03\/fraud-20x14.jpg 20w\" sizes=\"(max-width: 963px) 100vw, 963px\" \/><\/figure>\n\n\n\n<div id=\"wp-block-themeisle-blocks-button-group-5bef9c6b\" class=\"wp-block-themeisle-blocks-button-group wp-block-buttons\">\n<div id=\"wp-block-themeisle-blocks-button-15daf82d\" class=\"wp-block-themeisle-blocks-button wp-block-button\"><a href=\"https:\/\/aiia.al\/wp-content\/uploads\/2025\/03\/Fraud-in-the-Digital-Era_Agenda.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"wp-block-button__link\"><span>access here full agenda<\/span><\/a><\/div>\n<\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-accordion-41dc2da4\" class=\"wp-block-themeisle-blocks-accordion exclusive\">\n<details class=\"wp-block-themeisle-blocks-accordion-item\"><summary class=\"wp-block-themeisle-blocks-accordion-item__title\"><div>Introduction<\/div><\/summary><div class=\"wp-block-themeisle-blocks-accordion-item__content\">\n<p>\u201cFraud in Digital Era: Detection, Investigation and Countermeasures&#8221; training course is a cutting-edge program designed to arm participants with the essential skills to combat digital fraud in today&#8217;s fast-paced technological landscape. This course delves deep into the mechanisms of fraud, exploring why individuals commit fraudulent acts and identifying early warning signs. Participants will gain a thorough understanding of various types of digital fraud, recent trends, and industry-specific case studies that highlight real-world applications. The program emphasizes risk assessment, equipping learners to pinpoint vulnerabilities within their organizations and implement effective countermeasures. By mastering advanced fraud detection techniques such as real-time monitoring, data analysis, behavioral analytics, and AI-based algorithms, attendees will be well-prepared to safeguard their digital assets.<br><\/p>\n\n\n\n<p>Tailored for a diverse audience, this course is ideal for security professionals, compliance officers, risk managers, IT specialists, auditors, business leaders, and anyone keen on deepening their knowledge of digital fraud prevention and investigation. The curriculum offers practical guidance on conducting thorough fraud investigations, including gathering and preserving digital evidence, understanding legal considerations, and reporting findings. Participants will engage in hands-on exercises and case studies to apply learned concepts in realistic scenarios, ensuring they leave with actionable insights and skills. Whether you are responsible for safeguarding digital assets, ensuring regulatory compliance, or leading organizational fraud prevention efforts, this comprehensive training will enhance your ability to detect, investigate, and counteract digital fraud effectively.<\/p>\n<\/div><\/details>\n\n\n\n<details class=\"wp-block-themeisle-blocks-accordion-item\"><summary class=\"wp-block-themeisle-blocks-accordion-item__title\"><div>Course Objective<\/div><\/summary><div class=\"wp-block-themeisle-blocks-accordion-item__content\">\n<p>The primary objective of the &#8220;Fraud in Digital Era: Detection, Investigation and Countermeasures&#8221; course is to equip participants with the knowledge and skills necessary to effectively identify, prevent, and investigate digital fraud in today&#8217;s rapidly evolving technological landscape. The course aims to:<br>\u2713 Understand fraud fundamentals: Why do people commit fraud, what are some early red flags?<br>\u2713 Understand Digital Fraud: Provide a comprehensive understanding of the types of digital fraud, recent trends, and real-world case studies.<br>\u2713 Risk Assessment: Enable participants to assess potential fraud risks and vulnerabilities within their organization or industry.<br>\u2713 Implement Countermeasures: Teach practical strategies and tools for preventing digital fraud.<br>\u2713 Fraud Detection: Introduce advanced fraud detection techniques using real-time monitoring, data analysis, behavioral analytics, and AI-based algorithms.<br>\u2713 Investigative Techniques: Offer guidance on conducting thorough fraud investigations, including gathering and preserving digital evidence, legal considerations, and reporting findings.<br>\u2713 Hands-On Experience: Provide practical exercises and case studies to apply learned concepts in real-world scenarios, ensuring participants gain actionable insights and skills.<\/p>\n<\/div><\/details>\n\n\n\n<details class=\"wp-block-themeisle-blocks-accordion-item\"><summary class=\"wp-block-themeisle-blocks-accordion-item__title\"><div>Target Audience<\/div><\/summary><div class=\"wp-block-themeisle-blocks-accordion-item__content\">\n<p>This course is designed for a diverse audience, including:<\/p>\n\n\n\n<ul>\n<li><strong>Auditors<\/strong>: Internal and external auditors who need to understand digital fraud and its implications for financial reporting and compliance.<\/li>\n\n\n\n<li><strong>Information Security Professionals<\/strong>: Individuals responsible for safeguarding digital assets and preventing cyber threats within their organization.<\/li>\n\n\n\n<li><strong>Compliance Officers<\/strong>: Professionals tasked with ensuring adherence to regulatory requirements and mitigating fraud risks.<\/li>\n\n\n\n<li><strong>Risk Managers<\/strong>: Experts focused on identifying and managing risks within their organization, including financial and operational risks.<\/li>\n\n\n\n<li><strong>IT Specialists<\/strong>: Technology professionals involved in implementing and managing security solutions to protect against digital fraud.<\/li>\n\n\n\n<li><strong>Business Leaders<\/strong>: Executives and managers who want to enhance their organization&#8217;s fraud prevention and detection capabilities.<\/li>\n\n\n\n<li><strong>Anyone Interested<\/strong>: Individuals interested in gaining a deeper understanding of digital fraud, its impact, and how to protect against it.<\/li>\n<\/ul>\n<\/div><\/details>\n\n\n\n<details class=\"wp-block-themeisle-blocks-accordion-item\"><summary class=\"wp-block-themeisle-blocks-accordion-item__title\"><div>Course Program<\/div><\/summary><div class=\"wp-block-themeisle-blocks-accordion-item__content\">\n<h5 class=\"wp-block-heading\"><strong>Understand Fraud Fundamentals: Why People Commit Fraud and Early Red Flags<\/strong><\/h5>\n\n\n\n<ul>\n<li>Fraud triangle: Pressure | Opportunity | Rationalization<ul><li>Capabilities in Digital Era<\/li><\/ul>\n<ul>\n<li>Early Red Flags: Behavioral and Lifestyle Changes | Access and Control Issues | Unusual Transactions<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Digital Fraud Landscape: Trends &amp; Emerging Threats<\/strong><strong><\/strong><\/h5>\n\n\n\n<ul>\n<li>Traditional vs. digital fraud<ul><li>Cyber-enabled vs. cyber-dependent fraud<\/li><\/ul>\n<ul>\n<li>Industry-specific fraud trends | Phishing, business email compromise (BEC), loan fraud, Identity fraud, credit application fraud, API security threats, digital wallet fraud, AI-driven scams, SIM swap fraud, call-forwarding fraud, mobile payment fraud.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Fraud Detection Techniques<\/strong><\/h5>\n\n\n\n<ul>\n<li>Real-time monitoring and data analysis<ul><li>Behavioral analytics and adaptive algorithms<\/li><\/ul><ul><li>AI\/ML for fraud detection<\/li><\/ul>\n<ul>\n<li>Identifying suspicious patterns and anomalies<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">Digital Fraud Investigation: Tools &amp; Techniques<\/h5>\n\n\n\n<ul>\n<li>Digital forensics: Tracing fraudulent transactions<ul><li>Steps in conducting a fraud investigation<\/li><\/ul><ul><li>Gathering and preserving digital evidence<\/li><\/ul><ul><li>Open-source intelligence <em>(OSINT)<\/em> for fraud investigations<\/li><\/ul>\n<ul>\n<li>Legal and ethical considerations<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Workshop 2: Fraud Investigation Simulation<\/strong><\/h5>\n\n\n\n<p><em>Case: A cybercriminal bypassed authentication in a fintech mobile app, transferring funds to offshore accounts. Participants analyze logs, identify red flags, and propose countermeasures.<\/em><\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Fraud Prevention &amp; Risk Management Strategies<\/h5>\n\n\n\n<ul>\n<li>Best practices for banks, fintech, and telecom providers\n<ul>\n<li>Cybersecurity &amp; fraud risk governance<\/li>\n\n\n\n<li>Identifying potential fraud risks in digital environments<\/li>\n\n\n\n<li><span style=\"color: var(--jl-single-color); font-family: var(--jl-body-font); font-size: var(--jl-content-font-size); font-weight: var(--jl-body-font-weight);\">Assessing vulnerabilities and threatsDeveloping a risk assessment framework<\/span><\/li>\n\n\n\n<li>Role of fraud awareness training for employees and customers<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">Industry-Specific Case Study Discussion<\/h5>\n\n\n\n<ul>\n<li>Banking: Money laundering via digital accounts <em>(AML perspective)<\/em><ul><li>Microfinance: Ghost borrowers and fraudulent credit applications<\/li><\/ul><ul><li>Fintech: Fraud in decentralized finance <em>(DeFi)<\/em> and crypto scams<\/li><\/ul>\n<ul>\n<li>Telecom: SIM swap attack targeting mobile banking<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">Reporting and Mitigating Fraud<\/h5>\n\n\n\n<ul>\n<li>Documenting findings and reporting fraud<ul><li>Implementing corrective actions and controls<\/li><\/ul>\n<ul>\n<li>Continuous improvement and monitoring<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>Q&amp;A, Summary and key takeaways<\/strong><\/p>\n<\/div><\/details>\n\n\n\n<details class=\"wp-block-themeisle-blocks-accordion-item\"><summary class=\"wp-block-themeisle-blocks-accordion-item__title\"><div>Instructor Bio<\/div><\/summary><div class=\"wp-block-themeisle-blocks-accordion-item__content\">\n<p>This training course will be delivered by Komitas Stepanyan, an internationally certified professional and esteemed expert. Mr. Stepanyan is recognized by the International Monetary Fund (IMF) for his exceptional work in financial regulation and supervision, as well as IT and cybersecurity risk management, and IT fraud examination. Additionally, he is a distinguished expert for The World Bank Group, specializing in digital transformation and GovTech activities.<\/p>\n\n\n\n<p>Komitas is the Director of Technology and Cybersecurity Directorate at the Central Bank of ARMENIA. He has <strong>20+ years of experience<\/strong> working as an <strong>information security professional, Internal Audit consultant, cybersecurity consultant<\/strong>. More than 10 years he has the <strong>head of IT auditing division <\/strong>at the Central Bank of Armenia, providing audit and consulting services including information and cybersecurity audits.<\/p>\n\n\n\n<p>Working as a short-term expert for cyber risk management, regulation and supervision and IT fraud examination for <strong>International Monetary Fund<\/strong>, he conducted and led many Technical Assistance and capacity-building missions covering a diverse range of countries and topics in Africa, Asia and Pacific.<\/p>\n\n\n\n<p>Since 2018, he has worked as a short-term consultant for <strong>The World Bank<\/strong>, supporting various jurisdictions in digital transformation projects, including cybersecurity.<\/p>\n\n\n\n<p>Komitas holds several international certificates: <strong>Certified in Risk and Information Systems Control<\/strong> <em>(CRISC- issued by ISACA)<\/em> and <strong>Certification in Risk Management Assurance<\/strong> <em>(CRMA- issued by IIA), <\/em><strong>Cobit Foundation Certificate<\/strong><em> (CobitF &#8211; issued by ISACA)<\/em> and Social Engineering and Phishing Mastery Certificate.<\/p>\n\n\n\n<p>In 2007, he earned his PhD in applied physics. In 2012, he graduated from the \u201cPublic Policy and Public Administration\u201d Certificate Program at Tufts University (USA). In 2016, he completed the online course &#8220;Digital Money&#8221; and in 2017 \u201cOperationalizing Mobile Money\u201d from the Digital Frontiers Institute in partnership with The Fletcher School, Tufts University<\/p>\n<\/div><\/details>\n\n\n\n<details class=\"wp-block-themeisle-blocks-accordion-item\"><summary class=\"wp-block-themeisle-blocks-accordion-item__title\"><div>Financial Information<\/div><\/summary><div class=\"wp-block-themeisle-blocks-accordion-item__content\">\n<p>Cost per participant: <strong>AIIA Members 260 \u20ac <\/strong><em>(<\/em><em>total amount, the subject is VAT excluded<\/em><em>)<\/em><\/p>\n\n\n\n<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;   Non-members 300 \u20ac <\/strong><em>(<\/em><em>total amount, the subject is VAT excluded<\/em><em>)<\/em><\/p>\n\n\n\n<p>Price includes course attendance and educational material.<\/p>\n\n\n\n<p>Payment* can be made by bank transfer or direct deposit by using the following account info: Account Holder<strong>: Albanian Institute of Internal Auditors <\/strong>Acc.no<strong>: 0010039700<\/strong><\/p>\n\n\n\n<p>Swift: <strong>SGSBALTX&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/strong>IBAN: <strong>AL43 2021 1123 0000 0000 1003 9700<\/strong><\/p>\n\n\n\n<p><strong>Raiffeisen Bank Albania<\/strong><\/p>\n\n\n\n<p><em>* Important: The transferred amount <strong>must include <\/strong>the entire amount as stated above. No shortfalls due to exchange fee\/or other administration charges may arise. Albanian Institute of Internal Auditors has to receive the amount that is stated in your invoice.<\/em><\/p>\n<\/div><\/details>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Detection, investigation and countermeasures Date: 14 \u2013 15 April 2025Time: 09:00 \u2013 17:00Location: Xheko Imperial (Foyer meeting room)Course director: Komitas STEPANYAN<\/p>\n","protected":false},"author":2,"featured_media":12564,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pmpro_default_level":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[66],"tags":[],"_links":{"self":[{"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/posts\/12565"}],"collection":[{"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/comments?post=12565"}],"version-history":[{"count":2,"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/posts\/12565\/revisions"}],"predecessor-version":[{"id":12567,"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/posts\/12565\/revisions\/12567"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/media\/12564"}],"wp:attachment":[{"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/media?parent=12565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/categories?post=12565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aiia.al\/index.php\/wp-json\/wp\/v2\/tags?post=12565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}