The Anatomy of a Ransomware Attack – Part 2

In part 2 of this series, we continue to discuss the tools that cybersecurity teams use to combat ransomware attacks. > Join us each week as we take a deep dive into the various forms of fraud across the world and discuss crime families, penny stock boiler rooms,...

The Anatomy of a Ransomware Attack – Part 1

Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer networks and encrypt the data stored on those networks and render it unusable. The criminal organization then holds the data hostage until a ransom payment is made. If...

Operationalizing Compliance

Today’s episode features special guest Tom Fox, founder of the Compliance Podcast Network and Author of The Compliance Handbook: A Guide to Operationalizing Your Compliance Program. Our discussion focuses on the guidance compliance officers can use as a roadmap...

Investigations for Non-Investigators

Internal investigations often are conducted by company personnel who may not have investigative backgrounds. While that is a common scenario and perfectly appropriate, there are certain dos and don’ts that non-investigators should know about to avoid missteps that...

Keeping Criminality Out of the Casino

Las Vegas has come to symbolize the commercialization of gambling. Casino gaming has become an extension of the global hospitality and tourism business While the mob may not be the factor it once was, criminals are still attracted to casinos and as a result, illicit...