Fraud Eats Strategy

Join us to hear about crime families, penny stock boiler rooms, international money launderers, narco-traffickers, oligarchs, dictators, warlords, and kleptocrats. The Fraud Eats Strategy series is the distillation of experiences, whether it's an accounting scandal, arrests, search warrants, loss of market cap, or all of those things at once – one thing is sure. Failure to consider fraud and corruption risk can upend your strategy and lead to disaster.  

True Crime
Business
Government
1
Exporting Compliance – Conducting Compliance In...
30 min
2
The Last of the Watchdogs
38 min
3
Pig Butchering: The Intersection of Romance Fr...
23 min
4
The Existential Threat of China
35 min
5
After the Fraud: Recovering Losses in an Insura...
26 min
6
Avoiding Trial by Fire: A Primer on Crisis Comm...
28 min
7
Interview Techniques & Detecting Deception on Zoom
Scott Moritz speaks to former FBI Agent, Michael Bret Hood about how to detect deception in an interview
28 min
8
Open Source Intelligence: The Tip of the Compli...
42 min
9
Bullet Proof FCPA Due Diligence
CPA acquisition due diligence, merger integration and the government’s recent revisions to the FCPA Resource Guide and Evaluation of Corporate Compliance Programs guidance
38 min
10
Less Perilous Harbor: What DOJ's M&A Safe Harbo...
23 min
11
Deconstructing the Minds of White-Collar Criminals
White-Collar Crime and Why They Do It
32 min
12
Curbing Crypto Crime: The Role of Crypto Exchan...
27 min
13
Evil on the Open Road: Inside the FBI's Highway...
41 min
14
Human Trafficking is Everyone’s Problem: Steps ...
Bringing Awareness to Human Trafficking
44 min
15
Investigation Challenges: The More Things Chang...
Investigation Challenges
50 min
16
Navigating the Steps of an FCPA Investigation -...
Navigating the Steps of an FCPA Investigation - Part 2
23 min
17
Bringing Order to the Chaos: Navigating the Ste...
Navigating the Steps of an FCPA Investigation
32 min
18
The Anatomy of a Ransomware Attack - Part 2
The Anatomy of a Ransomware Attack - Part 2
28 min
19
The Anatomy of a Ransomware Attack - Part 1
The Anatomy of a Ransomware Attack - Part 1
27 min
20
The 3 Regulatory Mandates Banks Fear the Most: ...
Monitorships, Lookbacks and KYC Remediations
43 min
21
Operationalizing Compliance
Operationalizing Compliance
41 min
22
Investigations for Non-Investigators: Holding D...
Investigations for Non-Investigators
38 min
23
Pawns, Goofs, Collaborators and Lone Wolves: A...
An Examination of Insider Threats
43 min
24
Keeping Criminality Out of the Casino
Keeping Criminality Out of the Casino
50 min
25
Destigmatizing Whistle-Blowers: The SEC's Offic...
Destigmatizing Whistle-Blowers
35 min