2019

2019 IIA Fraud Conference - Ethical Thinking.pdf2019 IIA Fraud Conference - Ethical Thinking.pdf

2019 IIA Fraud Conference - Third Party Risk.pdf2019 IIA Fraud Conference - Third Party Risk.pdf

2019 IIA Fraud Conference - Compliance Programs Internal Investigations.pdf2019 IIA Fraud Conference - Compliance Programs Internal Investigations.pdf

2019 IIA Fraud Conference - FCPA and Global Compliance.pdf2019 IIA Fraud Conference - FCPA and Global Compliance.pdf

2019 IIA Fraud Conference - P2P Risk.pdf2019 IIA Fraud Conference - P2P Risk.pdf

2019 IIA Fraud Conference - Forensic Data Analytics.pdf2019 IIA Fraud Conference - Forensic Data Analytics.pdf

2019 IIA Fraud Conference - Investigative Reporting.pdf2019 IIA Fraud Conference - Investigative Reporting.pdf

IIA WaveSpace Seminar - graphic recording 2.27.19.pdfIIA WaveSpace Seminar - graphic recording 2.27.19.pdf

Seattle IIA Data Governance.pdfSeattle IIA Data Governance.pdf

2018

May 2018 Luncheon presentation.pptMay 2018 Luncheon presentation.ppt

J. Hall - Managing Fraud Risks in Procurement  Contracting - March 21.pptxJ. Hall - Managing Fraud Risks in Procurement Contracting - March 21.pptx

J. Hall - 4 Cases, 3 Lessons, 2 Critical Actions - March 21, 2018.pptxJ. Hall - 4 Cases, 3 Lessons, 2 Critical Actions - March 21, 2018.pptx

Cybersecurity Framework Luncheon Presentation 1-18-18.pptxCybersecurity Framework Luncheon Presentation 1-18-18.pptx

2017

IIA_10.19.2017 - Microsoft Presentation FINAL.PDFIIA_10.19.2017 - Microsoft Presentation FINAL.PDF​​

GDPR Briefing Deck for IIA meeting 9.21 v2.pptxGDPR Briefing Deck for IIA meeting 9.21 v2.pptx

Essential Wisdom - IA Speech.pdfEssential Wisdom - IA Speech.pdf

Session 1_Integrity-Self-Assessment - March 2017 Seattle IIA Conference.pdfSession 1_Integrity-Self-Assessment - March 2017 Seattle IIA Conference.pdf

Session 1_Seattle IIA Integrity Presentation Outline_ Protiviti_ Mar. 2017.pdfSession 1_Seattle IIA Integrity Presentation Outline_ Protiviti_ Mar. 2017.pdf

Session 2_How Cybersecurity Programs are Effecting Fraud.pdfSession 2_How Cybersecurity Programs are Effecting Fraud.pdf

Session 3_Kimbro Whistleblowin and IA post Dodd Frank March 2017.pdfSession 3_Kimbro Whistleblowin and IA post Dodd Frank March 2017.pdf

Session 5_Fraud Risk Management for Internal Auditors.pdfSession 5_Fraud Risk Management for Internal Auditors.pdf

IIA Seattle-Bellevue - Moss Adams Upleveling Internal Audit - 02-16-17.pdfIIA Seattle-Bellevue - Moss Adams Upleveling Internal Audit - 02-16-17.pdf

Audit Never Sleeps USA.pptxAudit Never Sleeps USA.pptx​​

Older

Past Presentations​

Puget Sound Chapter IIA NA_IPPF Slides with Dahle modifications 3 17 2015.pptxPuget Sound Chapter IIA NA_IPPF Slides with Dahle modifications 3 17 2015.pptx

Data Analytics - AM.pdfData Analytics - AM.pdf

Data Analytics - PM.pdfData Analytics - PM.pdf

Report to the nations-2014.pdfReport to the nations-2014.pdf

WSCPA-IAA Bellevue 2015-Oct-28.pdfWSCPA-IAA Bellevue 2015-Oct-28.pdf

Three Lines of Defense and Business Continuity Presentation.pptxThree Lines of Defense and Business Continuity Presentation.pptx

2016-Pulse-of-Internal-Audit-Puget Sound.pptx2016-Pulse-of-Internal-Audit-Puget Sound.pptx

Puget Sound 05 19 16 Luncheon.pptxPuget Sound 05 19 16 Luncheon.pptx

ISACA Tabletop Exercise FINAL.PDFISACA Tabletop Exercise FINAL.PDF​​​​