loader from loading.io

Forensic Accounting with Leah Wietholter

Easy Prey

Release Date: 06/01/2022

Cybersecurity for Everyday People with Greg Tomchick show art Cybersecurity for Everyday People with Greg Tomchick

Easy Prey

Learning how to keep your business safe and protect your online data can be advantageous for your home and personal life as well. Your children and family can create awareness at school and with friends. Today’s guest is Greg Tomchick. Greg is a former professional baseball player turned award-winning cybersecurity coach. He has worked with more than 250 world-renowned companies, including American Airlines, Caterpillar, and Trinity Rail. He is regularly featured live on ABC, Fox, and is an expert contributor to Inc. Magazine. He is now the CEO of Valor Cybersecurity and host of The...

info_outline
Misunderstanding Victims of Romance Fraud show art Misunderstanding Victims of Romance Fraud

Easy Prey

The media loves sensationalized romance scams, but we need to understand that anyone can be emotionally seduced and it's not just the lonely. No one is off limits to being targeted, no matter the age, status, or career. And the impact is far greater than just financial. Today’s guest is Becky Holmes. Becky is the creator and voice behind the popular Twitter account Death to Spinach. Becky’s book looks at all aspects of romance fraud, from the heartbreaking to the hilarious, the academic to the anecdotal, and discusses where we’ve gone wrong in dealing with those affected. Show Notes: ...

info_outline
Scams Exploiting Emotions with Alan Castel show art Scams Exploiting Emotions with Alan Castel

Easy Prey

We can easily stereotype those we believe are susceptible to a scam. But the scammers are keeping up with current events and are prepared to take advantage of our basic human emotions. The impact of these frauds is underreported due to the shame and embarrassment.  Today’s guest is Alan Castel. Alan is a Psychology professor at The University of California Los Angeles. He studies learning, memory, fraud, and aging. His work has been featured in The New York Times, Wall Street Journal, and Time Magazine. He recently published a book entitled . Show Notes: [1:08] - Alan shares his...

info_outline
3 Types of Insider Fraud with Claire Maillet show art 3 Types of Insider Fraud with Claire Maillet

Easy Prey

In this episode, we’re shining a light on a pervasive threat that often lurks in the shadows of corporate environments: insider fraud. We’ll explore the insidious nature of insider threats, the various forms they can take, and most importantly, how organizations can arm themselves with knowledge and strategies to mitigate these risks effectively. Today’s guest is Claire Mailet. Claire is an award-winning financial crime prevention expert and has worked in the field for over ten years. In her spare time, Claire assists universities in the UK to support staff and students who stammer and...

info_outline
5 Fraud Vulnerability Factors with Martina Dove show art 5 Fraud Vulnerability Factors with Martina Dove

Easy Prey

Understanding our cognitive biases can help us realize that we sometimes are too trusting of emails, texts, or calls from someone we perceive to be an authority. Today’s guest is Martina Dove. Martina is a researcher with a fervent passion for fraud prevention. Her expertise focuses on persuasion, scam techniques, and individual characteristics that make people susceptible to fraud. She is passionate about fighting fraud by teaching people how to spot scammer techniques and has recently published a book on fraud psychology. Show Notes: [0:50] - Martina shares her background in...

info_outline
Hacker Tactics with John Hammond show art Hacker Tactics with John Hammond

Easy Prey

The tech world is ever-changing and it can be difficult to keep up. As businesses and individuals, it's important to remember to keep your software up to date and apply patches as they are released. Today’s guest is John Hammond. John is a cybersecurity researcher, educator, and content creator. As part of the Adversary Tactics Teams at Huntress, John spends his days analyzing malware and making hackers earn their access. He is an online YouTube personality showcasing program tutorials, malware analysis, dark web threats, and other cybersecurity content. Show Notes: [1:01] - John shares...

info_outline
Top 5 Supply Chain Risks with Kevin Kumpf show art Top 5 Supply Chain Risks with Kevin Kumpf

Easy Prey

As businesses embrace digital transformation and rely on interconnected networks for their operations, the vulnerabilities within the digital supply chain become increasingly apparent. From data breaches to third party vulnerabilities, the threats are multi-faceted and ever-evolving. Today’s guest is Kevin Kumpf. Kevin has more than 20 years of IT Security and Compliance experience including over 10 years of cybersecurity, governance, and critical infrastructure experience working in the energy, medical manufacturing, transportation, and fedramp realms.  Show Notes: [0:54] - Kevin...

info_outline
The Risks and Rewards of Cryptocurrencies with Natalie Brunell show art The Risks and Rewards of Cryptocurrencies with Natalie Brunell

Easy Prey

There are significant risks to be aware of when using crypto and over the past two years, many tokens have imploded. As you choose to invest digitally, do your research and understand the commodity that you use. Today’s guest is Natalie Burnell. Natalie is the host of the #1 woman-led show in the bitcoin space, Coin Stories. She is a bitcoin educator, a frequent media commentator, and an award-winning journalist.  Show Notes: [0:50] - Natalie shares her background and the mission behind the Coin Stories Podcast. [2:19] - Learning about bitcoin gave Natalie a little more hope as she...

info_outline
Tax Scams with Richard Gilbert show art Tax Scams with Richard Gilbert

Easy Prey

In this episode, we uncover the intricate web of tax-related scams that prey on unsuspecting individuals every year. From phishing emails promising tax refunds to elaborate identity theft schemes, join us as we expose tactics used by scammers to exploit fear and ignorance during tax season. Today’s guest is Richard Gilbert. Richard is the Director of the Examination Division with the North Carolina Department of Revenue. He has been with the department for over 25 years. He is a licensed CPA and has received his Bachelor’s of Business Administration from North Carolina Central University....

info_outline
Virtual Kidnapping with Titania Jordan show art Virtual Kidnapping with Titania Jordan

Easy Prey

In this episode, we shine a light on the sinister phenomenon of virtual kidnapping. From deceptive phone calls to the psychological manipulation tactics, join us as we delve into the dark world where fears are exploited for profit, leaving victims shaken and families torn apart.  Today’s guest is Titania Jordan. Titania is a nationally renowned tech, social media, and family expert who has appeared on programs such as the Today Show, Good Morning America, Fox News, CNN, and more. She is the author and founder of Parenting in a Tech World and serves as Chief Parent Officer of the online...

info_outline
 
More Episodes

Data entry may seem boring, but you never know the story behind the information being entered and the patterns that emerge. Some data has distinctive characteristics that point towards fraudulent activities. Today’s guest is Leah Wietholter. Leah is the CEO and founder of Workman Forensics as well as the host of the Investigation Game Podcast. After working for the FBI, she has served as the Senior Certified Fraud Examiner in Tulsa and she currently volunteers as a treasurer for the Tulsa Crime Stoppers. With over 15 years of experience and more than 100 cases worked, Leah has honed her industry expertise to create the Data Sleuth Process, a scalable data-first approach to forensic accounting engagement and fraud investigations. 

Show Notes:

  • [1:03] - Welcome to the show, Leah! Leah shares her background and current role as founder of Workman Forensics.
  • [2:08] - What sets Workman Forensics apart is their creative team and Investigation Games.
  • [4:26] - Forensics accounting started becoming more common, but Leah shares how she became a part of the FBI accounting team.
  • [6:13] - While in the FBI, she was heavily involved in data entry and also testified for grandy jury after Hurricane Katrina.
  • [7:58] - Many times, fraud is determined simply by entering data and seeing patterns.
  • [9:25] - Leah explains a tool developed by Workman Forensics to see anomalies within data that indicate fraud.
  • [11:41] - By building up from this information, categories for fraud risk can easily be seen.
  • [13:18] - Business owners need to know what money enters the business, what form of payment, who touches the money, and what money leaves the business.
  • [14:29] - Pay close attention to your payroll reports.
  • [16:04] - You need to also know what is normal for your business, then always look for things that look off.
  • [17:31] - Chris shares an unusual statement he received and why it looked odd.
  • [19:08] - People committing embezzlement typically pay themselves in even dollar amounts.
  • [20:57] - Indicators allow investigators a more defined set of data to look at more closely.
  • [22:46] - If the person in charge of your bookkeeping isn’t reconciling, you have a problem. Leah explains what reconciling is.
  • [24:57] - You don’t always know how much money you have if you aren’t reconciling.
  • [25:56] - Most scams have a lifespan of 18 months, but in these types of financial fraud cases, Leah says they last several years.
  • [26:58] - When it comes to financial fraud, Leah says it can’t always be prevented but it is important to detect it quickly.
  • [28:21] - When money comes into your business, a certain amount is already called for. The money stolen is the profit.
  • [30:11] - You can limit access to accounts through your bank.
  • [32:14] - Leah shares the story of the craziest case she worked on.
  • [36:12] - In this case, someone was using their own legitimate business to launder money through fake vendors.
  • [37:25] - Many people think that if a large sum is stolen that the money can be found somewhere, but in most cases, it has been spent.
  • [40:18] - In Tulsa, where Leah is located, there are a lot of casinos but the majority of the embezzlement cases she has worked on are by people with shopping addictions.
  • [42:31] - One of the suspicious behaviors for high risk is being loved by management but not by others.
  • [44:24] - The feeling of betrayal is the most emotionally charged in these events.
  • [45:13] - As the owner, make it a process to check things every month.
  • [46:50] - A red flag could be if bookkeepers or accountants are defensive when you want to check things.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 

Links and Resources: