Podcast appearances and mentions of Brian A Benczkowski

  • 3PODCASTS
  • 3EPISODES
  • 27mAVG DURATION
  • ?INFREQUENT EPISODES
  • Dec 6, 2019LATEST

POPULARITY

20172018201920202021202220232024


Latest podcast episodes about Brian A Benczkowski

This Week in FCPA
Episode 182 – the Farewell to DC Fontana edition

This Week in FCPA

Play Episode Listen Later Dec 6, 2019 45:05


The lads mourn the passing of DC (Dorothy Catherine) Fontana this week. She was one of the earliest driving forces behind Star Trek and a great screenwriter. Jay mourns the Texans first in over his Patriots in the 21st Century and they then turn to some other of this week’s top compliance and ethics stories which caught their collective eyes.  1.     Bribery and Corruption on trial. Boustani admits paying bribes but found not guilty. How did that happen? Rick Messick explains. Conversely, 6 FCPA defendants have been found guilty this year. Dick Cassin reports.  2.     DOJ tweaks FCPA Corporate Enforcement Policy. Mike Volkov reviews. Davis Polk lawyers weigh in.  3.     Assistant Attorney General Brian A. Benczkowski Delivers Remarks at the ACI Conference on the FCPA.  4.     The most idiotic FCPA article ever.  5.     Jay reminices on the founding of AMI and the creation of the independent integrity monitor. 6.     What are ethical downsides to AI in FinTech and RegTech? Kristin Broughton explores. 7.     Don’t encourage employees to speak up if you are not ready to listen. Bob Conlin explains why.  8.     Fallout continues from massive money-laundering scheme ‘down under’. Jonathan Rausch.  9.     A framework to think about ESG, corporate purpose and governace. Frank Glassner.   10.  Ten things to do in preparation for CCPA. Lori Tripoli reports. 11.  On the Compliance Podcast Network, Tom interview AMI MD, Mikhail Gordon for a sponsored podcast series on Aspects of Monitorships. In Part 1, why independence is so critical; in Part 2,  the ABA on Monitors; in Part 3, How international teaching informs compliance; in Part 4 cultural differences in int’l and domestic monitorships and in Part 5, the evolution of monitorships.  12.  Reflections on DC Fontana.  Tom Fox is the Compliance Evangelist and can be reached at tfox@tfoxlaw.com. Jay Rosen is Mr. Monitor and can be reached at jrosen@affiliatedmonitors.com. For more information on how an independent monitor can help improve your company’s ethics and compliance program, visit our sponsor Affiliated Monitors at www.affiliatedmonitors.com.  Learn more about your ad choices. Visit megaphone.fm/adchoices

Daily Compliance News
December 5, 2019, the Trump Runs from London edition

Daily Compliance News

Play Episode Listen Later Dec 4, 2019 7:00


In today’s edition of Daily Compliance News: Peleton takes heat over TV ad. (Washington Post) Warren takes aim at bank mergers. (NYT) Assistant Attorney General Brian A. Benczkowski Delivers Remarks at the ACI Conference on the FCPA. (DOJPress Release) Risk and AI. (WSJ) Learn more about your ad choices. Visit megaphone.fm/adchoices

Ruin a Bad Guy's Day Radio - Fraud Prevention Podcast
How Fraudsters Exploit Malware and Phishing for Financial Gain

Ruin a Bad Guy's Day Radio - Fraud Prevention Podcast

Play Episode Listen Later Apr 29, 2019 29:24


How Fraudsters Exploit Malware and Phishing for Financial Gain Subscribe: Apple Podcasts | YouTube | Spotify | Stitcher | TuneIn Welcome to Ruin a Bad Guy's Day Radio. We are growing by leaps and bounds because of listeners just like YOU! If you like the podcast, please go to Apple Podcasts to leave a comment and give us a 5 Star rating...Thank You! Apple Podcast https://podcasts.apple.com/us/podcast/ruin-a-bad-guys-day-radio-fraud-prevention-podcast/id1437720527?mt=2 In this episode we discuss how fraudsters exploit malware and phishing for financial gain. A recent conviction of international cybercriminals in federal court reveals how these fraudsters operate and target their victims. Learn how protect yourself from malware and phishing schemes. Source: Department of Justicehttps://www.justice.gov/opa/pr/two-romanian-cybercriminals-convicted-all-21-counts-relating-infecting-over-400000-victim Romanian Cybercriminals Convicted of All 21 Counts Relating to Infecting Over 400,000 Victim Computers with Malware and Stealing Millions of DollarsA federal jury convicted two Bucharest, Romania residents of 21 counts related to their scheme to infect victim computers with malware in order to steal credit card and other information to sell on dark market websites, mine cryptocurrency and engage in online auction fraud, announced Assistant Attorney General Brian A. Benczkowski of the Justice Department’s Criminal Division and U.S. Attorney Justin E. Herdman of the Northern District of Ohio Two Romanians were convicted after a 12-day trial of conspiracy to commit wire fraud, conspiracy to traffic in counterfeit service marks, aggravated identity theft, conspiracy to commit money laundering and 12 counts each of wire fraud. Sentencing has been set for Aug. 14, 2019 before Chief Judge Patricia A. Gaughan of the Northern District of Ohio. According to testimony at trial and court documents, the defendants who pleaded guilty collectively operated a criminal conspiracy from Bucharest, Romania. It began in 2007 with the development of proprietary malware, which they disseminated through malicious emails purporting to be legitimate from such entities as Western Union, Norton AntiVirus and the IRS. When recipients clicked on an attached file, the malware was surreptitiously installed onto their computer. This malware harvested email addresses from the infected computer, such as from contact lists or email accounts, and then sent malicious emails to these harvested email addresses. The defendants infected and controlled more than 400,000 individual computers, primarily in the United States. Listen to the podcast for more information! Malware:https://en.wikipedia.org/wiki/Malware Malware (malicious software) is any software intentionally designed to cause damage to a computer, server, client, or computer network. Malware does the damage after it is implanted or introduced in some way into a target's computer and can take the form of executable code, scripts, active content, and other software. The code is described as computer viruses, worms, Trojan horses, ransomware, spyware, adware, and scareware, among other terms. Malware has a malicious intent, acting against the interest of the computer user—and so does not include software that causes unintentional harm due to some deficiency, which is typically described as a software bug. Phishinghttps://en.wikipedia.org/wiki/Phishing Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication. Typically carried out by email spoofing or instant messaging, it often directs users to enter personal information at a fake website, the look and feel of which are identical to the legitimate site. Phishing is an example of social engineering techniques being used to deceive users. Users are often lured by communications purporting to be from trusted parties such as social web sites, auction sites, banks, online payment processors or IT administrators. Contact Ruin a Bad Guy's Day Radio:https://www.ruinabadguysday.com/contact Donate: Help Ruin a Bad Guy's Day Radio fight fraud!https://donorbox.org/support-ruin-a-bad-guy-s-day-radio Ruin a Bad Guy’s Day Radio Merchandise:-Coffee Mugs, T-Shirts, Hoodies Sale! Get 15% Off - Use Coupon Code: THANKYOUhttps://teespring.com/stores/ruin-a-bad-guys-day-radio Who Should Listen? Fraud Managers and Investigators, Cybersecurity, Fraud Analysts, Law Enforcement Professionals, Risk Managers, E-commerce Managers, M-commerce managers, Finance Professionals, Chargeback Specialists, Call Center Agents, and IT/Operations. Disclaimer: Ruin a Bad Guy’s Day, LLC. The information provided in Ruin a Bad Guy’s Day/Skip Myers podcasts/webinars and accompanying material is for informational purposes only. It should not be considered legal or financial advice. You should consult with legal counsel or other professionals to determine what may be best for your individual or organizational needs. Ruin a Bad Guy’s Day® is a registered trademark.Visit: https://www.ruinabadguysday.com More Podcasts:  https://ruinabadguysday.podbean.com/ Sponsor a Podcast: https://ruinabadguysday.podbean.com/p/sponsor-us/