8
Gain essential skills in financial operations and control to optimize your organization's performance and decision-making.
Detecting Fake Invoices: Common Scenarios, Templates, and Digital Fraud Techniques
Part 2
Part 3
Part 4
Malicious Code and Macros in PDFs, Excel, and Other Documents
Part 2
Part 3
Part 4
Invoice Attachments via Email and Phishing-Based Traps
Part 2
Part 3
Part 4
Timing Manipulations in Revenue Recognition (Cut-Off Fraud)
Part 2
Part 3
Part 4
Risks of Data Manipulation via Scripts, Bots, and Macros in Invoice Automation Systems
Part 2
Part 3
Part 4
Part 5
Part 6
Cyberfraud Impacting Financial Statements Through Misposting
Part 2
Part 3
Part 4
Real Case: Revenue Inflation via Fake Invoices and SEC Investigation
Part 2
Part 3
Part 4
How to Ensure Secure Controls in Monitoring, Approval, and Segmentation Layers
Part 2
Part 3
Part 4
Part 5
Module Quiz 1
Prevalence and Risks of Script and Macro Usage in Financial Operations
Part 2
Part 3
Unauthorized Intervention and Data Manipulation in Automated Workflows
Part 2
Part 3
Macro- and Script-Based Fraudulent Transactions: Hard-to-Detect Threats
Part 2
Part 3
Misuse of Internal Automations: Examples of Segregation of Duties Violations
Part 2
Part 3
Monitoring Automation Logs in Routine Transactions and Detecting Anomalies
Part 2
Part 3
Part 4
Real Case: Fraud Through Invoice Splitting Below Approval Thresholds Using Scripts
Part 2
Part 3
Part 4
Security Policy in Financial Automations: Who Writes the Code, Who Reviews It?
Part 2
Part 3
Part 4
Prevention and Control Measures: Best Practices Against Script/Macro-Based Insider Threats
Part 2
Part 3
Part 4
Module Quiz 2
Breakdowns in the Authorization Chain: Overlooked Roles and Cyber Risks
Part 2
Part 3
Identity Verification Weaknesses in E-Signature and Digital Approval Systems
Part 2
Part 3
Manipulation of Transfer Instructions: Fake Emails, Forms, and Interfaces
Part 2
Part 3
Time Pressure in Payment Approvals and the Use of Social Engineering
Part 2
Part 3
Bypassing Approval Chains Through API-Based Integration Systems
Part 2
Part 3
Part 4
Real Case: Fraudulent Transfer of $1.4 Million with a CFO-Spoofed Instruction
Part 2
Part 3
Designing Secure Approval Processes: Segregation of Duties, MFA, and Monitoring Systems
Part 2
Part 3
Practical Preventive Protocols for Finance Professionals
Part 2
Part 3
Module Quiz 3