Fraud Eats Strategy podcast

Fraud Eats Strategy

Scott Moritz

Join us to hear about crime families, penny stock boiler rooms, international money launderers, narco-traffickers, oligarchs, dictators, warlords, and kleptocrats. The Fraud Eats Strategy series is the distillation of Scott Moritz's experience forged over thirty-plus years, whether it's an accounting scandal, arrests, search warrants, loss of market cap, or all of those things at once – one thing is sure. Failure to consider fraud and corruption risk can upend your strategy and lead to disaster.

48 épisodes

  • Fraud Eats Strategy podcast

    Investigation Challenges: The More Things Change, the More They Stay The Same


    Host Scott Moritz was a guest speaker at the October NAVEX Next Virtual Conference joined by Gregory Coleman, a former FBI colleague, to discuss established investigation techniques and how some of these practices have changed in recent times. For more information visit:
  • Fraud Eats Strategy podcast

    Navigating the Steps of an FCPA Investigation - Part 2


    In Part 2 of this series we continue the conversation of how to bring order to the chaos of the early days of an FCPA investigation. For more information visit
  • Fraud Eats Strategy podcast

    Ne ratez aucun épisode de Fraud Eats Strategy et abonnez-vous gratuitement à ce podcast dans l'application GetPodcast.

    iOS buttonAndroid button
  • Fraud Eats Strategy podcast

    Bringing Order to the Chaos: Navigating the Steps of an FCPA Investigation


    In part 1 of this Fraud Eats Strategy series, we discuss how to bring order to the chaos of the early days of an FCPA investigation and avoid mortgaging the company’s future in the process. For more information visit
  • Fraud Eats Strategy podcast

    The Anatomy of a Ransomware Attack - Part 2


    In part 2 of this series, we continue to discuss the tools that cybersecurity teams use to combat ransomware attacks. For more information visit
  • Fraud Eats Strategy podcast

    The Anatomy of a Ransomware Attack - Part 1


    Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer networks and encrypt the data stored on those networks and render it unusable. The criminal organization then holds the data hostage until a ransom payment is made. If the ransom is not paid, the victim organization’s data will either remain encrypted and unusable or it could be released to the public.  For more information visit
  • Fraud Eats Strategy podcast

    The 3 Regulatory Mandates Banks Fear the Most: Monitorships, Lookbacks and KYC Remediations


    Monitorships, transaction lookbacks and KYC remediations are the equivalents of a regulatory vote of no confidence. They can be incredibly disruptive, painful and can cost millions of dollars to implement. They are extreme measures that are taken when regulators have seen no improvement in succeeding regulatory exams or sometimes happen without warning when a criminal investigation reveals how an institution was at the center of a large scale money laundering or dollar clearing criminal enterprise and their anti-money laundering or sanctions compliance program and the controls underlying them failed in spectacular fashion. These epic anti-money laundering failures lead regulators to conclude that the existing program was so ineffective it is highly likely that suspicious activity, possibly a great deal of suspicious activity, has been going on undetected and unreported for a period of years.  For more information, visit
  • Fraud Eats Strategy podcast

    Operationalizing Compliance


    This episode features special guest Tom Fox, founder of the Compliance Podcast Network and Author of The Compliance Handbook: A Guide to Operationalizing Your Compliance Program.. Click the link for 20% off of your purchase. The discussion focuses on the guidance compliance officers can use as roadmaps when architecting their Ethics & Compliance programs and anti-bribery and corruption compliance programs specifically the document Evaluation of Ethics and Compliance Programs authored by then DOJ Compliance Consultant Hui Chen published in 2017.
  • Fraud Eats Strategy podcast

    Investigations for Non-Investigators: Holding Down the Fort


    Internal investigations often are conducted by company personnel who may not have investigative backgrounds. While that is a common scenario and perfectly appropriate, there are certain dos and don’ts that non-investigators should know about to avoid missteps that could undermine the investigation and limit its effectiveness.  For more information visit:
  • Fraud Eats Strategy podcast

    Pawns, Goofs, Collaborators and Lone Wolves: An Examination of Insider Threats


    In this episode, we’re going to discuss insider threats. The term means different things to different people. Broadly, the term refers to any person or entity who has trusted insider access behind an organization’s firewall or inside their secure perimeter. “Insiders” include employees, officers, contractors, temporary workers, and certain categories of vendors and suppliers that either have unescorted access to an organization’s physical premises or who perform some type of important software or network function and have been granted administrator access to the organization’s network. All insiders pose a potential threat. It is a matter of degree and whether they have an inclination to abuse their position of trust.  For more information visit:
  • Fraud Eats Strategy podcast

    Keeping Criminality Out of the Casino


    Las Vegas has come to symbolize the commercialization of gambling. Casino gaming has become an extension of the global hospitality and tourism business  While the mob may not be the factor it once was, criminals are still attracted to casinos and as a result, illicit money still finds its way into casinos banks despite their devotion of considerable compliance and anti-money laundering resources designed at keeping it out. Financial crisis aside, casinos are the most profitable and desirable centerpieces of global hotel and casino gaming empires.   For more information visit:

Découvrez le meilleur des podcasts sur l'application GetPodcast.

Abonnez-vous à tous vos podcasts préférés, écoutez les épisodes sans connexion internet et recevez des recommandations de podcasts passionnants.

iOS buttonAndroid button