Using Technology to Automate Fraud Detection Within Key Business Process Areas
|
|
- Moris Chase
- 8 years ago
- Views:
Transcription
1 Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd
2 2 Topics Fraud detection and integrated audit, risk management and compliance Role of data analysis technology in fraud detection Automation of fraud detection analytics and continuous monitoring Practical steps for implementation Examples of fraud tests for key business process areas
3 3 Integrated Audit, Risk Management, and Compliance Enterprise Risk Management gaining momentum Fraud a key focus area for risk management and control Increasing trend toward continuous risk and control assessment Technology is critical but underutilized Data driven risk management, control, and compliance
4 4 Technology and Fraud Detection Surveys by IIA, Big 4, and ACL Technology: a critical factor for successful performance in risk management, audit, and fraud detection Data analysis is the technology expected to have the greatest impact on effectiveness and productivity.
5 Fraud and Risk Management 5 ACL s 2013 Survey of 2,200 audit, risk management, and compliance professionals Internal fraud and abuse area of highest concern
6 6 Decide on Strategic Approach Integrate fraud-detection analytical testing into those of overall risk management and control? Automated fraud detection as a standalone function?
7 7 Fundamentals of technology for fraud detection Analyze 100% populations of transactional data (plus master data and application control settings) Identify indicators of fraudulent activities Overall statistical analysis to indicate anomalies ( don t know what you don t know ) Specific analysis to identify specific circumstances that indicate a high probability of fraud Compare data across different databases and systems Generate exceptions suspect items for review and investigation
8 8 Capabilities of data analysis technologies for fraud detection Pre-built analytic routines classification, stratification, duplicate testing, aging, join, match, compare, statistical analysis, digital analysis (Benford) Flexibility to support full automation and complex tests Automated logging Ability to access and manipulate a broad range of data Scheduled automatic processing Security Workflow and exception management Dashboard reporting
9 9 Continuous Monitoring Model Data Data Data Transactional Data Access transactional data from disparate sources Controls & Compliance Rules Test transactional data against established internal control rules and transactional profiles Significant Control Breaches Alerts Immediate notification of critical exposures Historical and statistical transactional profiling Financial & Business Unit Managers & Audit Suspect Transactions Findings Transactions detailed for further analysis Management & Audit Action Investigations, recoveries, and improved controls and procedures
10 Audit Contribution ACL Transforming Audit and Risk 10 Audit Analytic Capability Model ad hoc repetitive continuous Foresight Level 5 Monitoring Level 4 Automated Insight Level 3 Managed Level 2 Applied Hindsight Level 1 Basic Sophistication
11 Audit Contribution ACL Transforming Audit and Risk 11 Audit Analytic Capability Model Survey responses: Level of current audit analytics usage ad hoc repetitive continuous Foresight Continuous 11% Level 5 Monitoring Insight Hindsight Ad Hoc 67% Level 1 Basic Automated Repeatable 22% Level 2 Applied Level 3 Managed Sophistication Level 4 Automated
12 Audit Contribution ACL Transforming Audit and Risk 12 Audit Analytic Capability Model Survey responses: Level of highest desired analytics usage ad hoc repetitive continuous Foresight 30% 67% Level 5 Monitoring 3% Level 4 Automated Insight Level 3 Managed 0% 0% Level 2 Applied Hindsight Level 1 Basic Sophistication
13 13 Continuous Monitoring for Fraud Detection Timely repeated processing of tests against recent transactions Provides timely insight and reduces risk of fraud escalation Actual timing varies according to cycles of the underlying process Technically, progression from ad-hoc test processing to continuous monitoring is not usually complex Critical issues to address are people and process
14 14 Implementation steps for effective and sustainable fraud detection (1) Define overall objectives, including decision on fraud detection as part of an overall risk management and control testing vs. standalone function Assign roles and responsibilities Define fraud risks to be tested fraud risk universe For each fraud risk, establish data analysis fraud detection test in terms of: data requirements data access processes analysis logic
15 15 Implementation steps for effective and sustainable fraud detection (2) Coordinate with IT department Develop tests Validate tests Establish timing and responsibilities for automated test processing Establish workflow and responsibilities for exception management and resolution Implement reporting processes
16 16 Fraud tests for key business process areas Start with core set of basic tests for a business process area Progressively build and implement a broader library of tests for different business process areas In practice, organizations may establish large libraries of tests over a period of time Fraud specialist or auditor is often in best position to understand specific fraud risks in given business process Develop analytics to reflect 1. known risks 2. potential risks in circumstances that are not likely to be foreseen (DKWYDK)
17 17 Examples of fraud tests for Purchase to Pay (1) P.O. with blank / zero amount Split P.O.s (multiple under approval threshold) Duplicate invoices (same #, same amount same date, same vendor same amount) Invoice amount paid > goods received Invoices with no matching receiving report Multiple invoices for same P.O. and date Pattern of sequential invoices from a vendor
18 18 Examples of fraud tests for Purchase to Pay (2) Unapproved vendors Suspect purchases of consumer items Employee and vendor with same: Name Address Phone number Bank account number Vendor address is a mail drop Payment without invoice Vendor master changes for brief periods
19 19 Examples of fraud tests for Procurement Cards Purchases of consumer items Suspect vendors Prohibited merchant codes Transactions made on weekends or holidays Split transactions (multiple items under threshold) Duplicate purchases (same item multiple employees)
20 20 Examples of fraud tests for Order to Cash Unusually high sales discounts Unusually high credit terms or limits Frequent credit memos to the same customer Shipments where employee address matches the ship address
21 21 Examples of fraud tests for Payroll /HR Terminated employees still on payroll Multiple employees with same address Unusually high O/T amounts and rates Invalid SSNs Unusually high commissions
22 22 Examples of fraud tests More information on fraud tests by business process and industry is available on Other resources include: TBD
23 23 Best Practices for Integrated Fraud Detection An integrated approach for technology in Audit, Risk, and Control Technology and data analysis as an integral part of risk and control strategy, including fraud detection Risk and controls management systems in place CA and CM in operation Risk and controls management systems integrate with fraud detection objectives and audit risk assessment and planning Data Driven Risk Management Data Driven Fraud Detection
24 Some Real World Case Studies 24 Los Angeles Unified School District Belmont Learning Center Data analysis use resulted in the identification of fraud and abuse in excess of $70 million Fictitious vendors Duplicate payments Overbilling No competitive bidding Policy violations Exceeding purchasing limits Improper coding
25 Some Real World Case Studies 25 U.S. government agency $6.5 billion in annual procurement card purchases Situation Millions of transactions occur each year Management oversight limited due to large number of direct reports Organization encouraged to spend more using P-cards due to rebate program Bad publicity resulted in more oversight from Congress
26 Some Real World Case Studies 26 U.S. government agency $6.5 billion in annual procurement card purchases Approach Used data analysis to monitor 12 million transactions 38 indicators of inappropriate transactions established and compared to actual data Data from disparate sources integrated including employee listings, authorizations, merchant restrictions, credit limits
27 Some Real World Case Studies 27 U.S. government agency $6.5 billion in annual procurement card purchases Result Identified $38 Million in suspect transactions (13,500 transactions or 0.001%) 2,000 cardholders flagged for further investigation Created timely and cost-effective reporting system to follow-up with vendors and banks in subsequent recovery process
28 28 For more information John Verver Vice President, Strategy ACL Services Tel. (604)
ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances
ACL WHITEPAPER Automating Fraud Detection: The Essential Guide John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances Contents EXECUTIVE SUMMARY..................................................................3
More informationby: Scott Baranowski, CIA
Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf
More informationACL EBOOK. Detecting and Preventing Fraud with Data Analytics
ACL EBOOK Detecting and Preventing Fraud with Data Analytics Contents Why use data analysis for fraud?... 4 Internal control systems, while good, are not good enough... 5 Purpose-built data analytics is
More informationAGA Kansas City Chapter Data Analytics & Continuous Monitoring
AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help
More informationCombatting: Purchasing Card: and T&E Expense Fraud: Getting Started Guide:
ACL EBOOK $ Combatting: Purchasing Card: and T&E Expense Fraud: Getting Started Guide: By John Verver, CA, CMC, CISA, Vice President, Product Strategy & Alliance, ACL Combatting Purchasing Card and T&E
More informationData Analytics For the Restaurant Industry
Data Analytics For the Restaurant Industry 2014 Sunera Snapshot SAP ACL Copyright 2013 Sunera LLC. 2 About Our Speaker Matt Osbeck, CPA, CIA, ACDA Matt is a Senior Manager in the Los Angeles office of
More informationProcurement Fraud Identification & Role of Data Mining
The paper describes the known boundaries of Procurement Fraud and outlines the scope of data mining within the same. The paper also highlights some of the basic steps to be taken care of before the application
More informationData Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP
Data Mining/Fraud Detection April 28, 2014 Jonathan Meyer, CPA KPMG, LLP 1 Agenda Overview of Data Analytics & Fraud Getting Started with Data Analytics Where to Look & Why? What is Possible? 2 D&A Business
More informationAn Auditor s Guide to Data Analytics
An Auditor s Guide to Data Analytics Natasha DeKroon, Duke University Health System Brian Karp Services Experis, Risk Advisory May 11, 2013 1 Today s Agenda Data Analytics the Basics Tools of the Trade
More informationIntroductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP eferrara@forrester.com. Copyright 2015 Edward S.
MIS 520 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP eferrara@forrester.com Fraud Awareness & Internal Controls Awareness Internal
More informationFraud Detection & Data Analytics
September 2008 Fraud Detection & Data Analytics How to Utilize CAATs to detect fraud AN INDEPENDENT MEMBER OF BAKER TILLY INTERNATIONAL 505 AFFILIATE OFFICES WORLDWIDE Course Topics Overview of Data Analytics
More informationReduce Audit Time Using Automation, By Example. Jay Gohil Senior Manager
Reduce Audit Time Using Automation, By Example Jay Gohil Senior Manager Today s Session Speaker Bio: Jay Gohil, Protiviti Jay is a Senior Manager in the ERP Services practice in Atlanta. In the past seven
More informationFraud Workshop Finding the truth in the transactions
Your Trusted Partner for Audit Analytics Fraud Workshop Finding the truth in the transactions Copyright 2011 ACL Services Ltd. Robin Clough, ACDA ACL Certified Trainer Copyright 2011 ACL Services Ltd.
More informationA Performance Audit of the State s Purchasing Card Program
REPORT TO THE UTAH LEGISLATURE Number 2006-09 A Performance Audit of the State s Purchasing Card Program September 2006 Audit Performed By: Audit Manager Audit Supervisor Audit Staff Rick Coleman Susan
More informationLeveraging Big Data to Mitigate Health Care Fraud Risk
Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud
More informationData Analytics: Applying Data Analytics to a Continuous Controls Auditing / Monitoring Solution
Data Analytics: Applying Data Analytics to a Continuous Controls Auditing / Monitoring Solution December 10, 2014 Parm Lalli, CISA, ACDA Sunera Snapshot Professional consultancy with core competency in:
More information2/5/2013. Session Objectives. Higher Education Headlines. Getting Started with Data Analytics. Higher Education Headlines.
+ Getting Started with Data Analytics Prepared for the UCOP Auditor s Symposium January 30, 2013 and February 14, 2013 Session Objectives 2 Higher Education Headlines New IIA Guidance Visual Risk IQ s
More informationVendor Audit and Cost Recovery: Improving Bottom Line Results WHITE PAPER
Vendor Audit and Cost Recovery: Improving Bottom Line Results WHITE PAPER 2002 ACL Services Ltd. All rights reserved. AMWE109003 ACL and the ACL logo are registered trademarks of ACL Services Ltd. All
More informationStrong Corporate Governance & Internal Controls: Internal Auditing in Higher Education
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Contents Introduction Internal Audit as Trusted Advisor & Business Partner Big Ticket Items: Fraud, Revenue Leakage
More informationUsing data analytics and continuous auditing for effective risk management
Using data analytics and continuous auditing for effective risk management April 2014 Irakis Kanavaris Agenda Current trends Common terminology of Data Analytics and CA/CM KPMG approach & observations
More informationCFO. Improving the Bottom Line with Advanced Controls CONTENTS
CFO Improving the Bottom Line with Advanced Controls CONTENTS EXECUTIVE SUMMARY 1 THE PROBLEM ILLUSTRATED 2 SOLUTIONS 4 PROCESS RISKS AND CONTROLS 6 CASE STUDY 9 SELF ASSESSMENT 12 WHAT DOES THE FUTURE
More informationForensic Audit and Automated Oversight Federal Audit Executive Council September 24, 2009
Forensic Audit and Automated Oversight Federal Audit Executive Council September 24, 2009 Dr. Brett Baker, CPA, CISA Assistant Inspector General for Audit U.S. Department of Commerce OIG Overview Forensic
More informationP-Card Fraud Controls. Introduction
Introduction According to 2013 Association of Financial Professionals (AFP) Payments Fraud and Survey, the second most targeted payment type for fraud was corporate/commercial purchasing cards. 29% of
More informationLeverage T echnology: Move Your Business Forward
Give me a lever long enough and a fulcrum on which to place it, and I shall move the world - Archimedes Copyright. Fulcrum Information Technology, Inc. Is Oracle ERP in Scope for 2014 Audit Plan? Learn,
More informationThe ACL Audit Analytic Capability Model
ACL WHITEPAPER The ACL Audit Analytic Capability Model Navigating the journey from basic data analysis to continuous monitoring Table of Contents INTRODUCTION... 3 ACL S AUDIT ANALYTIC CAPABILITY MODEL...
More informationContinuous Monitoring and Case Management For SAP: Prevent Errors and Fraud in your most important Business Processes
REMEDYNE Continuous Monitoring Document Version: Rel. 1.6 2015-09- 07 Continuous Monitoring and Case Management For SAP: Prevent Errors and Fraud in your most important Business Processes TABLE OF CONTENTS
More informationIntegrating Data Analytics into Internal Audit
Integrating Data Analytics into Internal Audit IIA Beach Cities Meeting May 19, 2011 Agenda Introductions Background Industry Perspective Benefits of Challenges in Examples / Case Studies Tools Of The
More informationwww.pwc.com PwC The Path Forward for Data Analysis and Continuous Auditing May 2011
www.pwc.com The Path Forward for Data Analysis and Continuous Auditing May 2011 Agenda What are we hearing in the market? The CA Maturity Path Where to start? What is the difference between CA & CCM? Best
More informationContinuous Audit and Case Management For SAP: Prevent Errors and Fraud in your most important Business Processes
REMEDYNE Fraud Prevention Document Version: Rel. 1.4 2015-03-05 Continuous Audit and Case Management For SAP: Prevent Errors and Fraud in your most important Business Processes TABLE OF CONTENTS 1. SOLUTION
More informationAuditing for Value in the Procure to Pay Cycle Dallas IIA Chapter. October 1, 2009
Auditing for Value in the Procure to Pay Cycle Dallas IIA Chapter October 1, 2009 Supply Chain Risk Overview * Today s Focus * Includes Working Capital benefits 1 2009 Protiviti Inc. An Equal Opportunity
More informationAudit of Management of the Government Purchase Card Program, Number A-13-04
Audit of Management of the Government Purchase Card Program, Number A-13-04 Smithsonian Needs to Improve Preventative Controls for the Purchase Card Program Office of the Inspector General Report Number
More informationTAKE COST CONTROL AND COMPLIANCE TO A NEW LEVEL. with ACL Travel & Entertainment Expense Fraud and Cost Control Solution
TAKE COST CONTROL AND COMPLIANCE TO A NEW LEVEL with ACL Travel & Entertainment Expense Fraud and Cost Control Solution TAKE COST CONTROL AND COMPLIANCE TO A NEW LEVEL with ACL Travel & Entertainment Expense
More informationPurchasing Card (P-Card)Training
Purchasing Card (P-Card)Training D E P A R T M E N T O F G E N E R A L S E R V I C E S B U R E A U O F P R O C U R E M E N T J U L Y 2 0 1 5 Course Navigation This course is presented on a series of slides.
More informationContinuous Monitoring and Auditing: What is the difference? By John Verver, ACL Services Ltd.
Continuous Monitoring and Auditing: What is the difference? By John Verver, ACL Services Ltd. Call them the twin peaks of continuity continuous auditing and continuous monitoring. There are certainly similarities
More informationInformation overload: How to make data analytics work for the internal audit function
Information overload: How to make data analytics work for the internal audit function Danny Miller, Scott Higgins and Michael Rose Contents 1 A value proposition for internal audit 2 Leveraging data analytics
More informationMicrosoft Confidential
Brock Phillips, CPA, CFE, CCEP Forensic Accounting Sr. Manager Financial Integrity Unit Microsoft Audit Group Lou DeCola, CPA, CIA, CFE Forensic Accounting Sr. Manager Financial Integrity Unit Microsoft
More informationPREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM
IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM Auditors need to understand that while audit findings are common, they are not necessarily fraud and due care is needed in building evidence.
More informationCity of Berkeley. Prepared by:
City of Berkeley Berkeley Public Library Purchasing and Accounts Payable Audit Prepared by: Ann-Marie Hogan, City Auditor, CIA, CGAP Teresa Berkeley-Simmons, Audit Manager, CIA, CGAP Frank Marietti, Senior
More informationGOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments
GOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments Audit Report OIG-A-2013-018 September 20, 2013 NATIONAL RAILROAD PASSENGER CORPORATION Office of Inspector General REPORT HIGHLIGHTS Why
More informationData Analytics: Applying Data Analytics to a Continuous Controls Auditing / Monitoring Solution
Data Analytics: Applying Data Analytics to a Continuous Controls Auditing / Monitoring Solution January 22, 2015 Michael Kano, ACDA Sunera Snapshot Professional consultancy with core competency in: Internal
More informationGreat Expectations : How to Detect and Prevent Fraud using Data Analysis
Technology for Business Assurance Great Expectations : How to Detect and Prevent Fraud using Data Analysis Copyright 2009 ACL Services Ltd. Peter Millar Director, Technology Application ACL Services Ltd
More informationACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST
ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST 1 Our Objective To assist organizations in finding lost thousands of dollars in profits through duplicate payments, duplicate billings, overpayments,
More informationAccounts Payable Fraud Services
Accounts Payable Fraud Services According to research conducted by the Association of Certified Fraud Examiners (ACFE), U.S. organizations lose an estimated 7 percent of annual revenues to fraud. 1 In
More informationGRANITE SCHOOL DISTRICT PURCHASING CARD PROGRAM POLICIES AND PROCEDURES MANUAL
GRANITE SCHOOL DISTRICT PURCHASING CARD PROGRAM POLICIES AND PROCEDURES MANUAL Revised 11/11/2014 Overview The purpose of the Purchasing Card is to establish a more efficient, cost-effective method of
More informationPredictive Analysis Risk Analysis
Predictive Analysis Risk Analysis MARYLAND ASSOCIATION OF CPAS GOVERNMENT AND NOT-FOR-PROFIT CONFERENCE April 25, 2014 Overview Forensic Audit and Automated Oversight Data Analytics for Grant Oversight
More informationInternal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen
Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,
More informationData Analytics Leveraging Data Visualization and Automation in Audit Real World Examples
Data Analytics Leveraging Data Visualization and Automation in Audit Real World Examples June 3, 2015 Cliff Stephens, CISA Agenda Introductions Technological Advances in Analytics Capitalizing on Analytics
More informationTHE EVERGREEN STATE COLLEGE
The Evergreen State College Procurement Card Guide JP Morgan Chase VISA THE EVERGREEN STATE COLLEGE PROCUREMENT CARD HANDBOOK For Cardholders & Authorized Users Card Custodians Approving Officials Rev
More informationPURCHASING CARD POLICY AND PROCEDURES
PURCHASING CARD POLICY AND PROCEDURES 1. PURPOSE To establish policies and procedures for procuring goods and/or services using a Purchasing Card. Purchasing Cards are referred to throughout this policy
More informationData Mining: Unlocking the Intelligence in Your Data. Marlon B. Williams, CPA, ACDA Partner, IT Advisory Services Weaver
Data Mining: Unlocking the Intelligence in Your Data Marlon B. Williams, CPA, ACDA Partner, IT Advisory Services Weaver 0 Today s Agenda Big Data What is it? Data Mining at a Glance Why the Accounting
More informationTHE ABC S OF DATA ANALYTICS
THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable
More informationMiami University Purchasing Card Policy & Procedure
Miami University Purchasing Card Policy & Procedure MAY 22, 2015 1 Table of Contents Program Purpose... 3 Overview... 3 Advantages... 4 Getting Started- Card Application & Activation... 4 Capabilities,
More informationAuditing Capital Projects and Project Controls. March 2013
Auditing Capital Projects and Project Controls March 2013 Internal Audit Perspective Oversight Insight Foresight Is the process operating as planned? Are controls, resources, and performance measures adequate
More informationWhy is Internal Audit so Hard?
Why is Internal Audit so Hard? 2 2014 Why is Internal Audit so Hard? 3 2014 Why is Internal Audit so Hard? Waste Abuse Fraud 4 2014 Waves of Change 1 st Wave Personal Computers Electronic Spreadsheets
More informationPurchasing Card Policies and Procedure Manual
Purchasing Card Policies and Procedure Manual Revised February 10, 2015 Table of Contents 1.0 PURCHASING CARD OVERVIEW... 1 2.0 CARD FINANCIAL POLICY... 1 2.1 Terms:... 1 2.2 Limits:... 1 2.3 Allowable
More informationUNCOVER WHAT S HIDDEN IN YOUR SAP ERP DATA TO HELP CUT COSTS AND RAISE COMPLIANCE
UNCOVER WHAT S HIDDEN IN YOUR SAP ERP DATA TO HELP CUT COSTS AND RAISE COMPLIANCE UNCOVER WHAT S HIDDEN IN YOUR SAP ERP DATA TO HELP CUT COSTS AND RAISE COMPLIANCE Leverage the pre-packaged expertise in
More informationStrengthening Controls in 2013: The Order-to-Cash Cycle
Strengthening Controls in 2013: The Order-to-Cash Cycle Peter Millar Director, Technology Application Chris Stewart-Smith Senior Technical Consultant 2 Why are we talking about O2C? Economy is turning
More informationPerformance Audit City s Payment Process
Performance Audit City s Payment Process January 2013 City Auditor s Office City of Kansas City, Missouri 18-2011 Office of the City Auditor 21 st Floor, City Hall 414 East 12 th Street (816) 513-3300
More informationPROPOSAL RESPONSE FORM Use Additional Sheets as Required
Erie 1 BOCES Financial Card Services (RFP # R-081513PC) PROPOSAL RESPONSE FORM Use Additional Sheets as Required 1. Please check the card services that your proposal includes: P-Card only A/P Card only
More informationWHITE PAPER. Best Practices for the Use of Data Analysis in Audit. John Verver, CA, CISA, CMC
WHITE PAPER Best Practices for the Use of Data Analysis in Audit John Verver, CA, CISA, CMC CONTENTS Executive Summary...1 The Evolving Role of Audit Analytics...3 Applications of Audit Analytics...3 Approaches
More informationContract and Procurement Fraud. Vendor Management
Contract and Procurement Fraud Vendor Management Introduction Organizations must take steps to reduce vendor fraud, including: Conducting vendor due diligence Managing vendor risks via contracts Ensuring
More informationState Corporate Purchasing Card Program
Performance Audit Report State Corporate Purchasing Card Program Oversight Responsibilities Were Not Formally Established User Agencies Were Not Closely Monitoring Card Purchases September 2003 This report
More informationPurchasing Card Program
Purchasing Card Program User Guidelines University of North Alabama Procurement Department Created: March 2008 / Updated 7/16/2015 University of North Alabama Purchasing Card Program 1 Table of Contents
More informationOffice of the Auditor General. Audit of Accounts Payable. Tabled at Audit Committee November 26, 2015
Office of the Auditor General Audit of Accounts Payable Tabled at Audit Committee November 26, 2015 This page has been intentionally left blank Contents Executive Summary... 2 Introduction... 2 Background...
More informationLeveraging data analytics and continuous auditing processes for improved audit planning, effectiveness, and efficiency. kpmg.com
Leveraging data analytics and continuous auditing processes for improved audit planning, effectiveness, and efficiency kpmg.com Leveraging data analytics and continuous auditing processes 1 Executive
More informationInformation Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review RA-ITCentral@pa.gov
More informationData Analytics in the Corporate Payment Industry. Bret Hansen Vice President of Technology Services, U.S. Bancorp
Data Analytics in the Corporate Payment Industry Bret Hansen Vice President of Technology Services, U.S. Bancorp Agenda The Daily News Classifications of Complex Event Processing Maximizing Control, Compliance,
More informationContinuous Monitoring: Match Your Business Needs with the Right Technique
Continuous Monitoring: Match Your Business Needs with the Right Technique Jamie Levitt, Ron Risinger, September 11, 2012 Agenda 1. Introduction 2. Challenge 3. Continuous Monitoring 4. SAP s Continuous
More informationThe Power of Risk, Compliance & Security Management in SAP S/4HANA
The Power of Risk, Compliance & Security Management in SAP S/4HANA OUR AGENDA Key Learnings Observations on Risk & Compliance Management Current State Current Challenges The SAP GRC and Security Solution
More informationFraud Prevention and Detection in a Manufacturing Environment
Fraud Prevention and Detection in a Manufacturing Environment Introduction The Association of Certified Fraud Examiners (ACFE) estimated in its 2008 Report to the Nation on Occupational Fraud and Abuse
More informationGOVERNANCE: Opportunities Exist to Improve the Travel Card Program and Reduce Risks
GOVERNANCE: Opportunities Exist to Improve the Travel Card Program and Reduce Risks Audit Report No. OIG-A-2014-005 April 18, 2014 This page intentionally left blank. NATIONAL RAILROAD PASSENGER CORPORATION
More informationIntegrating CA and CM into Audit, Risk and Compliance processes
Integrating CA and CM into Audit, Risk and Compliance processes 26 th WCARS Rutgers University January, 2013 John Verver VP, Product Strategy & Alliances ACL CA and CM Integration with A, R & C 2 Enterprise
More informationRecommendations for Improving Purchasing Card Procedures
Recommendations for Improving Purchasing Card Procedures I. Cardholder Issues: 1. Receipts are not provided for all card charges. A. Current Policy Statement: The Cardholder must: Obtain all sales slips,
More informationTECHNOLOGY CONSULTING SERVICES DIRECTOR AH Consulting
TECHNOLOGY CONSULTING SERVICES DIRECTOR AH Consulting Present day organisations are under pressure to increase accountability and transparency as an assurance tool through: Real time reports Instant identification
More informationWVU FOUNDATION & UNIVERSITY PURCHASING CARD PROGRAM POLICIES & PROCEDURES. Updated October 2012
WVU FOUNDATION & UNIVERSITY PURCHASING CARD PROGRAM POLICIES & PROCEDURES Updated October 2012 Introduction This document contains the guidelines applicable to the WVU Foundation, Inc. Purchasing Card
More informationProactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you
3/27/2012 Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you Executive Summary The time to test fraud controls is before you have a fraud
More informationHOWARD UNIVERSITY POLICY
HOWARD UNIVERSITY POLICY Policy Number: 300-001 Policy Title: ACCOUNTS PAYABLE: PAYMENTS TO VENDORS Responsible Officer: Chief Financial Officer Responsible Office: Office of the Chief Financial Officer
More informationWhite Paper. 10 Ways to Prevent Business Expense Fraud and Abuse
White Paper 10 Ways to Prevent Business Expense Fraud and Abuse The real impact of expense fraud Business expense fraud is a considerable issue across the world. According to a survey that Chrome River
More informationREPORT NO. 2014-022 OCTOBER 2013 SEMINOLE STATE COLLEGE OF FLORIDA. Operational Audit
REPORT NO. 2014-022 OCTOBER 2013 SEMINOLE STATE COLLEGE OF FLORIDA Operational Audit BOARD OF TRUSTEES AND PRESIDENT Members of the Board of Trustees and President who served during the 2012-13 fiscal
More informationInternal Control Risks Associated with Information Technology. Kevin M. Bronner, Ph.D.
Internal Control Risks Associated with Information Technology By Kevin M. Bronner, Ph.D. Introduction: The Risk of Information Technology Fraud The information technology (IT) function is important to
More informationIntegrating Procurement Cards with Oracle Internet Expenses: Lessons Learned. Session ID: 08141
Integrating Procurement Cards with Oracle Internet Expenses: Lessons Learned October 06, 2011 Presented By Ashish Nagarkar (AST Corporation) anagarka@astcorporation.com Sari Fessenden (City of Modesto)
More informationWhite Paper - Travel & Entertainment Spend Analytics Best Practices
White Paper - Travel & Entertainment Spend Analytics Best Practices T&E is probably your company s second largest discretionary expense, representing on average as much as 6% of all corporate expenses.
More informationFebruary 2, 2012 ACCOUNTS PAYABLE BEST PRACTICES
February 2, 2012 ACCOUNTS PAYABLE BEST PRACTICES IMPORTANCE OF A/P BEST PRACTICES After payroll, the largest disbursement of a firm s funds typically comes from Accounts Payable (A/P) Accounts Payable
More informationCiti. Integrated Freight Processing for the U.S. Government. A powerful e-solution for managing and paying transportation-related expenses
Citi Integrated Freight Processing for the U.S. Government A powerful e-solution for managing and paying transportation-related expenses Finally a better way to receive, audit and pay freight invoices
More informationNeil Meikle, Associate Director, Forensic Technology, PwC
Case Study: Big Data Forensics Neil Meikle, Associate Director, Forensic Technology, PwC 6 November 2012 About me Transferred to Kuala Lumpur from PwC s Forensic Technology practice in London, England
More informationThe Basics of Internal Controls
The Basics of Internal Controls Presented to: The Institute of Internal Auditors (IIA) Topeka Chapter April 7, 2009 Today s Objectives Provide Insight into Internal Controls! Risk and Fraud the basis for
More informationContinuous Controls Monitoring. Virginia ISACA January Meeting 19 January 2010
Continuous Controls Monitoring Virginia ISACA January Meeting 19 January 2010 Today s Agenda What We Are Hearing About Risk Internal Controls Continuous Control Monitoring What is CCM? Framework EY Point
More informationBuilding for the Future
Building for the Future Alvia Brown Director, Global Operations Sean Pinto Manager, Global Operations Our Global Analytics- Enabled Audit Strategy 4 Company Overview World s largest non-alcoholic beverage
More informationWellsOne Commercial Card Summary-Commercial Card Expense Reporting (CCER)
WellsOne Commercial Card Summary-Commercial Card Expense Reporting (CCER) Quick Reference of Resources for Your Purchasing Card: Business Purchasing Service Center 24-hour Customer Service Number 1 (800)
More informationFighting Fraud with Data Mining & Analysis
Fighting Fraud with Data Mining & Analysis Leonard W. Vona December 2008 Fraud Auditing, Inc. Phone: 518-784-2250 www.fraudauditing.net E-mail: leonard@leonardvona.com Copyright 2008 Leonard Vona and Fraud
More informationTransforming Accounts Payable from Cost Center to Profit Center in Higher Education
Transforming Accounts Payable from Cost Center to Profit Center in Higher Education Ian Paul Da Costa Manager, Accounts Payable University of California, Los Angeles (UCLA) Agenda Objectives How a Purchase
More informationInternal Control Deliverables. For. System Development Projects
DIVISION OF AUDIT SERVICES Internal Control Deliverables For System Development Projects Table of Contents Introduction... 3 Process Flow... 3 Controls Objectives... 4 Environmental and General IT Controls...
More informationFraud Triangle Analytics Anti-Fraud Research and Methodologies
Fraud Triangle Analytics Anti-Fraud Research and Methodologies Risk Management Committee Meeting American Hotel & Lodging Association November 18, 2009 Topics for discussion Why incorporate fraud detection
More informationTARLETON STATE UNIVERSITY PROCUREMENT CARD
TARLETON STATE UNIVERSITY PROCUREMENT CARD USERS GUIDE February 2008 INTRODUCTION How the Program benefits Cardholders as well as Tarleton State University: Allows cardholders to obtain goods and services
More informationPurchasing Cards: Yesterday, Today & Tomorrow How far they ve come and where they are going.
Purchasing Cards: Yesterday, Today & Tomorrow How far they ve come and where they are going. Susan Ouchterloney, Bank of America Merrill Lynch Ryan Cappannari, Citizens Bank Payment Solutions Date: September
More informationTypes of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down
Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients
More informationPurchasing Card (P-Card) Policy and Procedure Frequently Asked Questions
Purchasing Card (P-Card) Policy and Procedure Frequently Asked Questions 1. Q: What is a Purchasing Card and why would I want a card? A: A Purchasing Card is basically a credit card that can be used to
More informationHow To Prevent Fraud On A Credit Card
Fraud Detection and Prevention Financial Management Advisory Council August 28, 2014 Sarah Mahugh, CPA, MBA Financial Audit Audit Manager Overview Fraud trends Fraud Risks and internal controls Case Studies
More information