Detecting Fraud
Using IDEA

CPE Sponsor
 Courtenay Thompson & Associates


Tuesday June 12, 2018           8:30 to 4:30
Wednesday June 13, 2018     8:30 to 4:30

Add to Calendar 


Hosted by


12222 Merit Drive
2nd Floor
Main Conference Room
Dallas, TX 75251

Driving Directions 

16 CPE

Field of Study:  Auditing 
Course Level: Basic 
No prerequisites.  Advance preparation required.

Get details from
Courtenay Thompson & Associates

About the Instructor Scott Langlinais, CPA

Scott Langlinais has dedicated over 20 years of his career to fraud detection and investigation. Business leaders across many industries have asked him to assess their environment and design strategies to help defend the organization's people, reputation and assets.

Mr. Langlinais employs IDEA data analysis software to sift through system transactions and seek indicators of fraud, waste and abuse.  Using such techniques, he has helped companies recover millions of dollars from vendor overpayments, corruption and unbilled revenues.

Prior to starting his own practice, Mr. Langlinais held accounting and internal audit leadership positions, most recently serving as Director of Internal Audit and Security for a NASDAQ 100 software company.  The International Risk Management Institute publishes his quarterly articles about fraud prevention.

Scott received a BBA degree from the University of Notre Dame. 

Event Contact

Lynn Runyon 
Courtenay Thompson & Associates 
214-473-4294 direct 

Courtenay Thompson & Associates is registered with the National Association of State Boards of Accountancy (NASBA), as a sponsor of continuing education on the National Registry of CPE Sponsors.  State boards of accountancy have final authority on the acceptance of individual courses for CPE credit.  Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website:

For information regarding CPE, complaint, or program cancellation, please contact our office at 214-361-8346


Detecting Fraud Using IDEA                          16 CPE
Instructor:  Scott Langlinais 

In this two-day hands-on seminar, attendees will apply data analysis techniques to real-life fraud scenarios using data files and case studies to identify and solve problems.  Our goal is to teach audit and accounting professionals to detect fraud, waste and abuse early and address them professionally.  

Who should attend:  Auditors, Investigators, Accounting Professionals.  
Whether you are a seasoned investigator or someone seeking a better understanding of what can go wrong in your organization, you will benefit from this program.  Novice auditors or those new to data analysis will learn and employ fundamental detection techniques to real cases, while advanced users and investigators will apply their knowledge in new and challenging ways to detect buried symptoms within complex schemes.

Attendees should bring a laptop computer with IDEA software installed and updated.  The Instructor will provide downloadable data for use in class.  Don't use IDEA?  A free demo version of IDEA software will be provided to you.

From the opening exercise, we will employ a team approach to solving cases, as in the field.  Within IDEA, you will apply to actual case data: Creative Extractions; Statistical Analyses; Join-matches & mismatches; Trend Analysis; Pivot Tables; Embedded Functions; Field Manipulation; Numeric & Date Stratification; Benford's Law; Data Duplications & Exclusions; and more!

Register Now!  Register online using the link above.  Register over the phone by calling 214-361-8346.

Program Fee = $895             Register by June 1 = $845

Team Discount: 2 or more from the same organization = $745 ea.

Program fee is payable with registration to Courtenay Thompson & Associates, P. O. Box 822343, Dallas, TX 75382 by check or pay by credit card online.  Contact our office if an invoice is required.  Fee includes instruction, all program materials, lunch and refreshment breaks.

Cancellation and Refund: Substitutes will be accepted until the program starts.  Cancellations will be accepted up to 7 calendar days prior to program start without incurring a $50 late cancellation fee.  Full fee is charged for failure to attend when enrollment has not been cancelled as specified.

Learning Objectives

Attendees will understand how to...

  • Apply a five-step approach to fraud detection, and avoid the dangers of mishandling cases.
  • Blend traditional detection methods with data analysis techniques.
  • Correct problems with the data import, identifying missing and hidden data.
  • Keep data organized and use editable fields to isolate problems.
  • Employ more creative extractions to increase the chance of detecting wrongdoing.
  • Use effective techniques for detecting circumvention of system controls.
  • Extract symptoms embedded within blocks of data.
  • Identify symptoms of theft and fraudulent reporting within common processes.
  • Use principles of effective thinking and presentation to compile strong evidence.

Course Contents

Preparing to Detect Fraud

  • Factors that discourage us from detecting fraud.
  • Building discipline to handle wrongdoing and avoid the dangers of mishandling cases.
  • Applying a five-step approach to fraud detection.
  • Understanding what can go wrong and recognizing symptoms of wrongdoing.
  • Correcting problems with the data import, identifying missing and hidden data.
  • Keeping your data organized.

Detecting Fraud with IDEA

  • Identifying patterns through statistical review, data sorting, and field summarizations.
  • Effective and creative extractions for disbursements, employee reimbursements, liquid assets,
    revenues, and general ledger transactions.
  • Employing editable fields to flag anomalies.
  • Applying duplicate key detection/exclusion, and combining with field manipulation to detect
    circumvention of system controls. 
  • Avoiding six common errors in data analysis.
  • Stratifying data to detect approval circumvention, earnings management, and money laundering.
  • Using special functions to carve out symptoms embedded within blocks of data.
  • Employing join-matches and mismatches to detect fictitious vendors, revenue leaks, and false shipments.
  • Extracting key-word symptoms of corruption and fraudulent financial reporting.
  • Application of pivot tables, Benford's law, and trend analysis.

Putting It All Together

  • Developing programs to detect theft and fraudulent reporting.
  • Applying techniques to solve cases from allegation to presentation of evidence.
  • Weaving techniques into a continuous monitoring program.
  • Using principles of effective thinking and presentation to compile effective evidence.