top of page
Q&A Seminar

Prevention & Detection Training

Our company’s training is customized to the client’s procurement methods, thereby ensuring the content is delivered consistently within the procurement environment of which it operates. We also have a collection of customary training modules that have been developed and delivered for a broad range of professions, including auditors, investigators, fraud examiners, law enforcement officials, procurement professionals, and One of the most effective tools in the prevention, detection, and deterrence of procurement fraud and abuse are knowledgeable employees, protecting against, looking for, and reporting potential procurement violations. Our company training can be customized to our client’s procurement methods, thereby ensuring the training content can be delivered to the procurement environment of the client. We also have a collection of customary training that has been developed and delivered for a broad range of professions, including auditors, investigators, fraud examiners, law enforcement officials, procurement professionals, and others.

Customized - In order to customize the training, we review procurement documents and work-flow diagrams of the client days prior to the training event, thereby allowing us to incorporate the clients’ procurement methods into the training delivery to be more relevant.

Customary - We have a collection of customary procurement fraud and abuse prevention and detection training. These training events have been developed and delivered to both public and private sectors domestically and internationally.

Our training is designed as individual modules allowing them to be stand-alone training events or permitting them to be woven into a single or multi-day training event.

Working in partnership with our clients and utilizing a “Procurement Fraud Schemes Analysis” methodology designed by our company, we:


Identify our client's unique degree of risks to the traditional forty-four (44) misconduct schemes and abuse found in today's procurement and purchasing methods; Pinpoint which of the 44 schemes are more likely to occur within the client's processes; and Determine the potential impacts if the schemes are not prevented, detected and/or corrected.



Our assessment methodology is adaptable and can be structured to evaluate a single type of misconduct (i.e. time and attendance, conflict of interest, bribes, and gratuities) or multiple schemes of procurement fraud and/or abuse. Our methodology can further assess the procurement or purchasing process of a contract, particular division within an organization or across an enterprise as a whole. We summarize the results and make suggestions for areas of improvement to reduce the vulnerabilities and the probability of future occurrence, consistent with the client’s business structure and risk tolerance thresholds. With the knowledge of their high risk areas, our clients are better positioned to design sound integrity controls (internal policy, procedures, and/or processes designed to prevent and detect fraud and abuse) consistent with their overall business environment.

Working in partnership with our clients and utilizing a “Procurement Fraud Schemes Analysis” methodology designed by our company, we:


Identify our client's unique degree of risks to the traditional forty-four (44) misconduct schemes and abuse found in today's procurement and purchasing methods;

Pinpoint which of the 44 schemes are more likely to occur within the client's processes; and


Determine the potential impacts if the schemes are not prevented, detected and/or corrected.Our assessment methodology is adaptable and can be structured to evaluate a single type of misconduct (i.e. time and attendance, conflict of interest, bribes, and gratuities) or multiple schemes of procurement fraud and/or abuse. Our methodology can further assess the procurement or purchasing process of a contract, particular division within an organization or across an enterprise as a whole.



We summarize the results and make suggestions for areas of improvement to reduce the vulnerabilities and the probability of future occurrence, consistent with the client’s business structure and risk tolerance thresholds. With the knowledge of their high risk areas, our clients are better positioned to design sound integrity controls (internal policy, procedures, and/or processes designed to prevent and detect fraud and abuse) consistent with their overall business environment.

Prevention & Detection Training: Services
bottom of page