On October 20th and 21st, the Midwest Fraud Investigators Network will once again host a virtual conference.
We have a great lineup of speakers. Once again, the conference will occur over two days. Each day will consist of a morning session from 8:30 to 12:30. Cost for attendance will be $75. Register online here.
Here are our presenters:
Erik Shiffman, ASAC FBI Chicago – Ransomware: History and Trends
A brief examination of how ransomware has evolved into its current state and where it’s going next. This examination will include ransomware origins, evolving trends and obstacles, as well as basic mitigation efforts. Additionally, I will also discuss how best to involve your local FBI Field Office for critical incident response purposes.
Holly Zielke and Claudia Kemple, IL Department of Aging – Adult Protective Services—Elder Abuse and Financial Exploitation
The Illinois Adult Protective Services (APS) Program is the state designated agency directed to investigate and respond to reports of abuse, neglect, self-neglect and financial exploitation of adults aged 18-59 year of age with a disability and adults aged 60 years of age and older. Financial exploitation is one of the most reported and substantiated types of abuse that Adult Protective Services addresses. In this presentation, we will review how APS are provided and how APS collaborates with other professions in the protection of vulnerable adults.
Ryan Duquette, ACFE RSM Canada—Through the Looking Glass
“Through the looking glass” is a metaphorical expression meaning: on the strange side, in the twilight zone, or in a strange, parallel world. While the internet can be considered a strange, parallel world, it can also be an informative, interesting, yet scary place when conducting different types of investigations. There are various technologies and methods that you can use to protect your identity and information while conducting internet-based investigations. This session will illustrate these technologies and methods to keep you safe when investigating online.
You will learn how to:
Identify the methods criminals use to find your data.
Compare various technologies and software tools to protect your identity while investigating online.
Examine various methods to employ to hide your own tracks.
Tony Paixão—Wicklander-Zulawski Associates – The Anatomy of the Investigative Interview
The investigative interview is more than a conversation—it’s a strategy. To maximize on the evidence uncovered from an extensive investigation, the investigator needs to curate the appropriate interview approach that leverages rapport, strategic questioning, and self-control. In this presentation, we will explore what components promote an “effective” investigative interview, we will discuss how to formulate a calculated line questioning that’s focused on eliciting the maximum amount of information and we will discuss the importance of keeping the most important variable in the exchange under control—yourself.