Return-Path: <ryan@worldwidegf.com>
Delivered-To: kathy@transocean.com
Received: from vps.transocean.com
	by vps.transocean.com with LMTP id eKxJLZIC1lpyRAAAInt2oQ
	for <kathy@transocean.com>; Tue, 17 Apr 2018 07:20:02 -0700
Return-path: <ryan@worldwidegf.com>
Envelope-to: kathy@transocean.com
Delivery-date: Tue, 17 Apr 2018 07:20:02 -0700
Received: from worldwidegf.com ([103.200.6.182]:42523)
	by vps.transocean.com with esmtp (Exim 4.89_1)
	(envelope-from <ryan@worldwidegf.com>)
	id 1f8RSc-0004cX-MG
	for kathy@transocean.com; Tue, 17 Apr 2018 07:20:02 -0700
MIME-Version: 1.0
DMARC-Filter: OpenDMARC Filter v1.3.2 worldwidegf.com 41EE7208CF
Authentication-Results: worldwidegf.com; dmarc=none (p=none dis=none) header.from=worldwidegf.com
Authentication-Results: worldwidegf.com; spf=fail smtp.mailfrom=ryan@worldwidegf.com
DKIM-Filter: OpenDKIM Filter v2.11.0 worldwidegf.com 41EE7208CF
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=worldwidegf.com;
	s=default; t=1523973800;
	bh=Lj3uvCnsQXnDcV6Akmuy26dy+JquzeuUwLBotws776o=;
	h=From:Reply-To:To:Subject:Date:From;
	b=iuT9PvUk/q+SUuhCcUpRLR11YTgpevDO2i9RYK1j6V5m19Yf1FmWw670BA40kEYgf
	 VB4Vy5v7IrnfGUFcE05DLLJakrZmhS7uzULpY7LxVRHAwPnilvhToZR0VOTEvH1XQX
	 J7yYNjE81PXvTO1MYS7EvnVJuxZ+vT2cBrtZx+1Q=
From: "Countering Fraud" <ryan@worldwidegf.com>
Reply-To: ryan@worldwidegf.com
To: kathy@transocean.com
Subject: Fraud (Countering)
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_20B6_36E570DD.31173AF9"
X-Mailer: Smart_Send_2_0_132
Date: Tue, 17 Apr 2018 22:10:42 +0800
Message-ID: <1088424380184160862850@HYSTOU-PC>
X-Spam-Status: No, score=2.5
X-Spam-Score: 25
X-Spam-Bar: ++
X-Ham-Report: Spam detection software, running on the system "vps.transocean.com",
 has NOT identified this incoming email as spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 
 Content preview:  Countering Fraud A New Approach to Developing Strategy, Detection
    and Investigation It is time to think about making your organization fraud
    proof by equipping you with necessary knowledge to detect and investigate
    fraud for better strategy [...] 
 
 Content analysis details:   (2.5 points, 3.0 required)
 
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  0.0 URIBL_BLOCKED          ADMINISTRATOR NOTICE: The query to URIBL was blocked.
                             See
                             http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
                              for more information.
                             [URIs: worldwidegf.com]
 -0.0 SPF_PASS               SPF: sender matches SPF record
 -0.0 SPF_HELO_PASS          SPF: HELO matches SPF record
  0.0 HTML_MESSAGE           BODY: HTML included in message
  0.8 BAYES_50               BODY: Bayes spam probability is 40 to 60%
                             [score: 0.5000]
 -0.1 DKIM_VALID             Message has at least one valid DKIM or DK signature
  0.1 DKIM_SIGNED            Message has a DKIM or DK signature, not necessarily valid
  1.8 PYZOR_CHECK            Listed in Pyzor (http://pyzor.sf.net/)
 -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from author's
                             domain
X-Spam-Flag: NO


------=_NextPart_001_20B6_36E570DD.31173AF9
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: quoted-printable

Countering Fraud A New Approach to  Developing Strategy, Detection and Inve=
stigation

It is time to think about making your organization fraud proof by equipping=
 you with necessary knowledge to detect and investigate fraud for better st=
rategy


08th - 09th July 2018 in Dubai, UAE
&
11th - 12th July 2018 in Kuala Lumpur, Malaysia


Hi Colleague,

Many organisations have a Counter Fraud Strategy in place that is designed =
around known risk and detected fraud.=20

This two day course aims to look at how we can measure our undetected fraud=
, the fraud we don=92t know about, and then redesign our strategy to counte=
r the true cost of fraud being perpetrated.=20

Once we know the true level of fraud and its related cost, we can treat it =
like any other business cost and find ways to reduce it.

The course is very interactive being practical skills and knowledge based.

Certification included.


By end of this course, delegates would be able to gain:

 PROFILE the fraudster
 EMBED anti-fraud culture
 DEVELOP counter fraud strategy and tactics
 APPLY the key stages of Fraud Loss Measurement
 UNDERSTAND techniques of proactive investigation
 MANAGE fraud problem; both internal and external
 CONSIDER how an anti-fraud department can be proactive
 IDENTIFY and MEASURE fraud loss and the true cost of fraud
 CONDUCT and RECORD an investigation utilising the PEACE model
 PRACTICE scoping, preparing, communicating, reviewing, analysing and repor=
ting fraud


For a detailed agenda and registation, simply reply and change the subject =
title to the following;
 =93Brochure-CfraudKL=94 for Malaysia session
or
 =93Brochure-CfraudDXB=94 for Dubai session


if you do not receive any reply;
Val DID : + 65 6825 9674
Whatsapp only +65 9128 5221

To unsubscribe, reply with subject =93Unsubs kathy@transocean.com


------=_NextPart_001_20B6_36E570DD.31173AF9
Content-Type: text/html; charset="windows-1252"
Content-Transfer-Encoding: quoted-printable

<HEAD>
<META content=3D"text/html; charset=3Dwindows-1252" http-equiv=3DContent-Ty=
pe>
<META name=3DGENERATOR content=3D"MSHTML 11.00.10570.1001"></HEAD>
<BODY>
<P><FONT size=3D2 face=3DArial><STRONG><FONT color=3D#000080><FONT size=3D3=
>Countering Fraud</FONT> A New Approach to&nbsp; Developing Strategy, Detec=
tion and Investigation</FONT></STRONG></FONT></P>
<P><FONT color=3D#800000 size=3D2 face=3DArial><STRONG><EM>It is time to th=
ink about making your organization fraud proof by equipping you with necess=
ary knowledge to detect and investigate fraud for better strategy</EM></STR=
ONG></FONT></P><FONT size=3D2 face=3DArial>
<P><BR><STRONG>08th - 09th July 2018 in Dubai, UAE<BR>&amp;<BR>11th - 12th =
July 2018 in Kuala Lumpur, Malaysia</STRONG></P>
<P><BR>Hi Colleague,</P>
<P>Many organisations have a Counter Fraud Strategy in place that is design=
ed around known risk and detected fraud.&nbsp; </P>
<P>This two day course aims to look at how we can measure our undetected fr=
aud, the fraud we don=92t know about, and then redesign our strategy to cou=
nter the true cost of fraud being perpetrated.&nbsp; </P>
<P>Once we know the true level of fraud and its related cost, we can treat =
it like any other business cost and find ways to reduce it. </P>
<P>The course is very interactive being practical skills and knowledge base=
d. </P>
<P>Certification included.</P>
<P><BR>By end of this course, delegates would be able to gain:</P>
<UL>
<LI>&nbsp;PROFILE the fraudster=20
<LI>&nbsp;EMBED anti-fraud culture=20
<LI>&nbsp;DEVELOP counter fraud strategy and tactics=20
<LI>&nbsp;APPLY the key stages of Fraud Loss Measurement=20
<LI>&nbsp;UNDERSTAND techniques of proactive investigation=20
<LI>&nbsp;MANAGE fraud problem; both internal and external=20
<LI>&nbsp;CONSIDER how an anti-fraud department can be proactive=20
<LI>&nbsp;IDENTIFY and MEASURE fraud loss and the true cost of fraud=20
<LI>&nbsp;CONDUCT and RECORD an investigation utilising the PEACE model=20
<LI>&nbsp;PRACTICE scoping, preparing, communicating, reviewing, analysing =
and reporting fraud</LI></UL>
<P><BR>For a detailed agenda and registation, simply reply and change the s=
ubject title to the following;<BR><STRONG><FONT style=3D"BACKGROUND-COLOR: =
#ffff80">&nbsp;=93Brochure-CfraudKL=94 for Malaysia session<BR>or<BR>&nbsp;=
=93Brochure-CfraudDXB=94 for Dubai session</FONT></STRONG></P>
<P><BR>if you do not receive any reply;<BR>Val DID : + 65 6825 9674<BR>What=
sapp only +65 9128 5221</P>
<P>To unsubscribe, reply with subject =93Unsubs kathy@transocean.com</FONT>=
</P></BODY>
------=_NextPart_001_20B6_36E570DD.31173AF9--
