Demystifying Big Data Analytics

Size: px
Start display at page:

Download "Demystifying Big Data Analytics"

Transcription

1 Demystifying Big Data Analytics Practical approaches to business intelligence and forensic analytics 9 May 2013

2 Discussion topics Big Data & Big Data Analytics Current fraud risks - industry research Components of an effective anti-fraud analytics program Advanced analytics to detect rogue employee behavior Forensic analytics technology framework beyond rules-based tests Emerging technologies Page 2

3 Big Data and Big Data Analytics Page 3

4 The big question is What is Big Data? Big Data characteristics Big data represents data sets that can no longer be easily managed or analyzed with traditional or common management tools, methods, and infrastructure. High Volume Page 4

5 Big Data has arrived In this decade, the universe will grow 44x from 0.9 zettabytes to 35.2 zettabytes. Facebook Electronic Payments Video Rendering Social Media Mobile Sensors PayPal Video Surveillance Medical Imaging Smart grids Geophysical exploration Gene Sequencing Page 5

6 Enterprises are looking to leverage Big Data to Better understand their customer need and further their business growth. ebay needs insights into what the customer wants in order to improve customer experience and increase traffic on the site Yahoo adopted Big Data to connect what users are looking for with what advertisers are trying to sell to them. Optimize business decisions through data driven insights. The auto industry has been able to use GPS systems to gather information on customer driving habits to then improve their products. Make money by selling insights from Big Data. Polk, a household name in the auto industry, sells online subscriptions to data about vehicle sales and ownership to automakers, part suppliers, dealers, advertising firms, and insurance companies Page 6

7 What is Big Data analytics? Transform data to information, information to insight and insight to intelligence Analysis is based on a large population of transactions instead of sample Process of examining large amounts of data of a variety of types to uncover hidden patterns, unknown correlations and other useful information Act of transforming data with the aim of extracting useful information and facilitating the achievement of factual conclusions Extracting the nuggets of gold hidden under mountains of data Page 7

8 The Analytics Value Chain: Manage DATA Manage DATA relevant data Perform ANALYTICS insights rules/algorithms Drive DECISIONS Primary goal with managing data should be to cut through the Big Data hype to leverage the relevant data needed to drive better business decisions Big Data Not So Big Data Volume Terabytes/Pedabytes Megabytes/Gigabytes Variety Unstructured (text, voice, video) Structured / Relational Velocity Data in Motion (Streaming) Data at Rest Veracity Untrusted / Uncleansed Trusted / Cleansed Page 8

9 The Analytics Value Chain: Perform Analytics Manage DATA relevant data Perform ANALYTICS insights rules/algorithms Drive DECISIONS Clients must be adept across a continuum of analytical techniques Advanced Analytics Prescriptive Analytics To determine WHICH decision and/or action will produce the most effective result against a specific set of objectives and constraints Predictive Analytics Leverage past data to understand the underlying relationship between data inputs and outputs to understand WHY something happened or to predict WHAT will happen in the future across various scenarios Business Intelligence Descriptive Analytics Mine past data to report, visualize, and understand WHAT has already happened after the fact or in real-time Mathematical Complexity Page 9

10 The Analytics Value Chain: Drive Decisions Manage DATA relevant data Perform ANALYTICS insights rules/algorithms Drive DECISIONS Last year, IBM surveyed 4,500 clients who said that they use analytics to drive decisions in three primary areas: Customer - to grow revenue and provide personalized services / products Operations - to reduce costs and improve service reliability Finance - to optimize investments across revenue/cost tradeoffs and to identify fraud, waste, and abuse Page 10

11 Current fraud risks Page 11

12 Risks by category Page 12

13 How is fraud detected? 50.3% by tip or accident Source: ACFE 2010 Report to the Nations On Occupational Fraud Source: ACFE 2012Report to the Nations Page 13

14 Anti-Fraud Controls Page 14

15 2012 Ernst & Young Global Fraud Survey 39% of respondents say that bribery & corruption practices occur frequently in their countries 15% of CFOs surveyed said they would be willing to make cash payments to win business 20% of CFOs surveyed said that they are willing to make personal gifts to win business 372 global CFOs surveyed Page 15

16 Components of an effective anti-fraud & corruption compliance program Elements of a successful corporate anti-fraud, bribery and corruption program Code of Ethics Setting the Proper Tone Proactive Fraud and Controls Corruption Communication Risk Monitoring Prevention and Training Assessment and Analytics Policies Management Ownership and Involvement Reactive Incident Response Plan Anti-fraud, bribery and corruption key activities Corporate compliance assessment Corporate compliance design Gap analysis Future state design session Discovery response planning Records and information management Who owns fraud? Assign roles and responsibilities Fraud and risk committee formulation Customized training Corporate governance Design sessions Corporate anti-fraud road map FCPA / anti-bribery compliance assessments Fraud risk assessment Targeted anti-fraud analytics Anti-bribery and corruption analytics M&A Due Diligence 3 rd Party Due Diligence Vendor Risk profiling Vendor Vetting -Level I, II, III background checks Investigations Fraud response planning Forensic data analytics Discovery and document review Page 16

17 Start with the Fraud Tree New tools and methodologies are required for monitoring corruption schemes Traditional focus of legal and compliance. Increased use of audit resources. Corruption Fraud tree Traditional focus of external audit. Fraudulent statements Conflicts of interest Bribery and corruption/ FCPA Illegal gratuities Bid-rigging/ procurement Revenue recognition GAAP Reserves Non financial Asset misappropriation Traditional focus of internal audit. Cash larceny Theft of other assets inventory/ AR/ fixed assets Fake vendor Payroll fraud T&E fraud Theft of data Page 17

18 Forensic analytics maturity model Beyond traditional rules-based queries consider all four quadrants Low Detection Rate High Structured Data Matching, Grouping, Ordering, Joining, Filtering Traditional rules-based Queries & Analytics Anomaly Detection, Clustering Risk Ranking Statistical-Based Analysis Unstructured Data Keyword Search Traditional Keyword Searching Data visualization, Drill-down into data, Text Mining Data Visualization & Text Mining High False Positive Rate Low Page 18

19 Fraud risk is in all datasets When considering enterprise risk, all sources of data should be addressed Gartner study shows that 80% of enterprise data is unstructured in nature Most internal audit procedures focus on the 20% structured data Structured Data CRM Databases Accounting Systems Text Graphics 80% Unstructured Data Presentations & Spreadsheets Unstructured Data 20% 80% Few organizations have the methodologies or technologies to efficiently address unstructured data Source: Gartner Research Page 19

20 Unstructured forensic analytics Page 20

21 Every second 05 Babies are born 1.4 Million spam s 48 Minutes of video are uploaded to YouTube 06 People long-on for the first time 05 New broadband subscribers 50 Mobile phones sold 34,000 Google searches 200,000 Text messages are sent 02 New blogs created 09 PCs sold >01 New domains registered 60 People visit an online dating site Page 21

22 Message Frequency Analyze communication over time to identify gaps in data set Understand message counts across the population (View and/or instant messaging frequency and consistency relative to the population.) Over which time period? When communications occur Communication spikes around key business events Page 22

23 Keyword Search Summary Analyze keyword hits by term, custodian, and date Analyze effectiveness of keywords. Understand the effect of keyword hits by custodian and timeframe to prioritize review and analyze keyword hits. Page 23

24 Link analysis Who is talking to who? The first 48 hours: Live server log files pulled in quickly for early case assessments Understanding a complex organization s true organization chart: Identification of relationships, versus activities, amongst actors Triage of custodians and communications for traditional review and additional analytics: Rapidly identify and point to communications of highest interest Sample analytics criterion: 1. Private communications, where 90% of all communications is outbound 2. Private Communications where content is FORWARDED Outbound more than 35% of time 3. Private Communications where attachments are sent outbound more that 35% of time Page 24

25 Fraud Triangle analytics Applying the theory to electronic communications Over 3,000 fraudulent terms/phrases in a dozen languages Page 25

26 Interactive dashboard for Page 26

27 Emotional Tone Analysis Identify Derogatory, Surprised, Secretive, Worried communications Page 27

28 Combine analytics to surface issues Unstructured, communications data. is organized and risk scored for analysis and remediation. & TXT Messages Transactions Voice Mail & Instant Messages Analysis Platform Document management Employee Hard Drives Page 28

29 Custodian Risk Ranking Scored by custodian and time period based on multiple criteria 1. Behavioral Keywords 2. Behavioral Keywords 3. Behavioral Keywords 4. User Activity 5. User Activity 6. Alias Clustering Percentage of EY-ACFE opportunity-focused behavioral term hits for that week in ESI sent or received by the custodian in focus Percentage of EY-ACFE rationalization-focused behavioral term hits for that week in ESI sent or received by the custodian in focus. Percentage of EY-ACFE incentive-pressure-focused behavioral term hits for that week in ESI sent or received by the custodian in focus. Percentage of instances within that week, where custodian sends or receives ESI involving those outside of peer group, as identified through hierarchies. Percentage of instances within that week, where custodian sends or receives ESI involving those outside of superiors, as identified through hierarchies. Percentage of instances within that week, where custodian sends or receives ESI involving at least one (1) of their identified communicative aliases. Scaling: 3 Scaling: 3 Scaling: 4 Scaling: 2 Scaling: 2 Scaling: 3 7. Emotive Percentage of instances within that week, where the custodian sends or receives ESI Tone with negative emotions identified through linguistic analyses. Scaling: 5 Custodian C1 C2 C3 C4 C5 C6 C7 Scaling C1 Scaling C2 Scaling C3 Scaling C4 Scaling C5 Scaling C6 Scaling C7 Score A, Week A, Week Page 29

30 Rogue employee analytics Risk Scoring Model peer stratification dashboard review Peer Stratification Dots represent clusters of high risk communications that can be reviewed by clicking. Detail-Level View Page 30

31 Structured forensic analytics Page 31

32 Integrated sampling approach Identifying a sample set of 50 payments for review, from 1.4 million in scope. Raw ERP system tables Data model design EY Payment Sample Selection Tool X riskiest payments, for detailed manual review 0.5X randomly selected payments, for contextual review Structured Attribute Analysis Payments related to sensitive field changes, by riskiest users Payments related to sensitive field changes, by riskiest fields Duplicative invoices Invoice completeness Round payment amounts Requirements Clustering Payments to high amount, low frequency vendors Payments to low amount, high frequency vendors Benford s Law deviants Payments to statistically anomalous vendors Fuzzy matching between employees and vendors Text Mining and Analysis Identification and extraction of entities: Geographies Proper nouns Addresses Telephone numbers Top concept extraction Identification of hits against EY- ACFE bribery and corruption keywords Minimal BAU disruption Transparency Sustainability EY received raw SAP tablesand rapidly re-constructed change activity and payments. Adjust weightings on-the-fly to reduce false-positives Architecture to support feeding in additional data, as needed. Page 32

33 Transaction Risk Scoring Analyzing multiple tests for each transaction Review breaches on targeted analytics Filter by selected analytics Page 33

34 Beyond rules-based tests Integrate statistical, visual and text mining techniques to identify patterns of high risk or rogue employee activities. Page 34

35 Focus on the payment text descriptions What if you saw these terms used as justification for payments to third parties? <blank description> Friend fee Donation Nobody calls it bribe expense Government fee Special commission One time payment Special payment Commission to the customer Incentive payment Pay on behalf of Goodwill payment Consulting fee Team building expense Volume contract incentive Processing fee Page 35

36 Text analytics in transactional data Page 36

37 Interactive dashboard: Expense review interface (who, what, where, why, how and how much?) Page 37

38 Emerging technologies Page 38

39 Search-around functionality Rapidly build out networks of interest and tie in multiple data sources Easily find entities, documents, events, etc which are directly related to your selection Page 39

40 A more human way to look at data Data points are represented as objects, with logical relationships Graphical representation of relationships between seemingly discrete entities Epicenters of activity become immediately discernable View supporting documents as dynamic objects Page 40

41 EY resources Page 41

42 Ernst & Young resources The guide to investigating business fraud Corruption or compliance weighing the costs, the Ernst & Young 10th global fraud survey Best practices for a global FCPA program, Compliance Week Keep it clean: the role of policies and training in compliance with anti-corruption laws, Supply Chain Quarterly Exposing the iceberg: detecting fraud through , FRAUD Magazine Fraud triangle analytics: applying the theory, FRAUD Magazine Page 42

43 Ernst & Young resources Staying ahead of corruption liabilities, ACG Mergers & Acquisitions Detecting financial statement fraud Ernst & Young white paper Demonstrating the effectiveness of your compliance program, Compliance Week Acquisitions in emerging markets: know the risks and how to address them, Financier Worldwide Accounting for Words, Internal Auditor Breaking the Status Quo in Review, FRAUD Magazine Page 43

44 Components of an effective corruption compliance program Page 44

45 Contacts James Walton Senior Manager Advisory Services Enterprise Intelligence Dallas, TX (214) Dave Rogers Senior Manager Fraud Investigation & Dispute Services Dallas, TX (214) Page 45

46 Ernst & Young Assurance Tax Transactions Advisory About Ernst & Young Ernst & Young is a global leader in assurance, tax, transaction and advisory services. Worldwide, our 152,000 people are united by our shared values and an unwavering commitment to quality. We make a difference by helping our people, our clients and our wider communities achieve their potential. Ernst & Young refers to the global organization of member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients. For more information about our organization, please visit Ernst & Young LLP is a client-serving member firm of Ernst & Young Global Limited operating in the US Ernst & Young LLP. All Rights Reserved This publication contains information in summary form and is therefore intended for general guidance only. It is not intended to be a substitute for detailed research or the exercise of professional judgment. Neither Ernst & Young LLP nor any other member of the global Ernst & Young organization can accept any responsibility for loss occasioned to any person acting or refraining from action as a result of any material in this publication. On any specific matter, reference should be made to the appropriate advisor. Page 46

Taking Data Analytics to the Next Level

Taking Data Analytics to the Next Level Taking Data Analytics to the Next Level Implementing and Supporting Big Data Initiatives What Is Big Data and How Is It Applicable to Anti-Fraud Efforts? 2 of 20 Definition Gartner: Big data is high-volume,

More information

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview

More information

Using Data Analytics to Detect Fraud. Other Data Analysis Techniques

Using Data Analytics to Detect Fraud. Other Data Analysis Techniques Using Data Analytics to Detect Fraud Other Data Analysis Techniques Qualitative Data Analysis Most data analysis techniques require the use of data in the form of numbers. Qualitative data analysis is

More information

Fraud Triangle Analytics Anti-Fraud Research and Methodologies

Fraud Triangle Analytics Anti-Fraud Research and Methodologies Fraud Triangle Analytics Anti-Fraud Research and Methodologies Risk Management Committee Meeting American Hotel & Lodging Association November 18, 2009 Topics for discussion Why incorporate fraud detection

More information

Emerging Trends in Fraud Analytics:

Emerging Trends in Fraud Analytics: Global Risk Advisory Services Emerging Trends in Fraud Analytics: Accounting for Words Text Analytics is a promising new forensic technique for the investigator 4 th Annual Text Analytics Summit Vincent

More information

Advanced Data Analytics, the Fraudsters Worst Enemy

Advanced Data Analytics, the Fraudsters Worst Enemy Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability

More information

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients

More information

Global EY FIDS Forensic Data Analytics Survey 2014

Global EY FIDS Forensic Data Analytics Survey 2014 Global EY FIDS Forensic Data Analytics Survey 2014 Big risks require big data thinking The Eighth International Pharmaceutical Compliance Congress Dubai, United Arab Emirates Vincent Walden Partner, EY

More information

www.pwc.com Being protected Using data analytics to detect fraud

www.pwc.com Being protected Using data analytics to detect fraud www.pwc.com Being protected Using data analytics to detect fraud Are you currently exposed to fraudulent activities? It will surprise few to learn that occupational fraud, IP infringement, corruption,

More information

ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore

ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore With ever-increasing data volumes, more sophisticated fraud patterns, and a drive for strong corporate governance, how can organisations build a culture of integrity and compliance? Learn how data analytics

More information

Neil Meikle, Associate Director, Forensic Technology, PwC

Neil Meikle, Associate Director, Forensic Technology, PwC Case Study: Big Data Forensics Neil Meikle, Associate Director, Forensic Technology, PwC 6 November 2012 About me Transferred to Kuala Lumpur from PwC s Forensic Technology practice in London, England

More information

Leveraging Big Data to Mitigate Health Care Fraud Risk

Leveraging Big Data to Mitigate Health Care Fraud Risk Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud

More information

Managing FCPA (Foreign Corrupt Practices Act) Risks

Managing FCPA (Foreign Corrupt Practices Act) Risks Managing FCPA (Foreign Corrupt Practices Act) Risks Diana Shin - Partner Jacqueline Fan Associate Director Fraud Investigation and Dispute Services July 2010 Agenda 1. Compliance pressure points 2. Putting

More information

IBM SECURITY QRADAR INCIDENT FORENSICS

IBM SECURITY QRADAR INCIDENT FORENSICS IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise

More information

Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A

Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A Brochure More information from http://www.researchandmarkets.com/reports/2866056/ Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A Description: Detect fraud faster no

More information

Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP

Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP Data Mining/Fraud Detection April 28, 2014 Jonathan Meyer, CPA KPMG, LLP 1 Agenda Overview of Data Analytics & Fraud Getting Started with Data Analytics Where to Look & Why? What is Possible? 2 D&A Business

More information

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances ACL WHITEPAPER Automating Fraud Detection: The Essential Guide John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances Contents EXECUTIVE SUMMARY..................................................................3

More information

How To Understand And Understand Forensic Accounting

How To Understand And Understand Forensic Accounting Forensic Accounting and Investigations University of Texas at Arlington 14 August 2013 Overview What is Forensic Accounting? Definition and Services The Forensic Accountant History Roles Within Organizations

More information

Integrating Data Analytics into Internal Audit

Integrating Data Analytics into Internal Audit Integrating Data Analytics into Internal Audit IIA Beach Cities Meeting May 19, 2011 Agenda Introductions Background Industry Perspective Benefits of Challenges in Examples / Case Studies Tools Of The

More information

Demystifying Big Data Government Agencies & The Big Data Phenomenon

Demystifying Big Data Government Agencies & The Big Data Phenomenon Demystifying Big Data Government Agencies & The Big Data Phenomenon Today s Discussion If you only remember four things 1 Intensifying business challenges coupled with an explosion in data have pushed

More information

Leading the way with Information-Led Transformation. Mark Register, Vice President Information Management Software, IBM AP

Leading the way with Information-Led Transformation. Mark Register, Vice President Information Management Software, IBM AP Leading the way with Information-Led Transformation Mark Register, Vice President Information Management Software, IBM AP 1 Today s Topics Our Smarter Planet and the Information Challenge Accelerating

More information

Procurement Fraud Identification & Role of Data Mining

Procurement Fraud Identification & Role of Data Mining The paper describes the known boundaries of Procurement Fraud and outlines the scope of data mining within the same. The paper also highlights some of the basic steps to be taken care of before the application

More information

A New Era Of Analytic

A New Era Of Analytic Penang egovernment Seminar 2014 A New Era Of Analytic Megat Anuar Idris Head, Project Delivery, Business Analytics & Big Data Agenda Overview of Big Data Case Studies on Big Data Big Data Technology Readiness

More information

Why is Internal Audit so Hard?

Why is Internal Audit so Hard? Why is Internal Audit so Hard? 2 2014 Why is Internal Audit so Hard? 3 2014 Why is Internal Audit so Hard? Waste Abuse Fraud 4 2014 Waves of Change 1 st Wave Personal Computers Electronic Spreadsheets

More information

Forensic Audit Building a World Class Program

Forensic Audit Building a World Class Program Forensic Audit Building a World Class Program PAUL E. ZIKMUND DIRECTOR GLOBAL INTEGRITY AND FORENSIC AUDIT 1 2012 ACFE ANNUAL FRAUD CONFERENCE ORLANDO, FL Why the Need for Forensic Audit Program In response

More information

Office of the Inspector General

Office of the Inspector General Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs April 2005 Dear Public Officials: April

More information

Using Data Analytics to Detect Fraud

Using Data Analytics to Detect Fraud Using Data Analytics to Detect Fraud Gerard M. Zack, CFE, CPA, CIA, CCEP Introduction to Data Analytics CPE Instructions Course Objectives How data analytics can be used to detect fraud Different tools

More information

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

AGA Kansas City Chapter Data Analytics & Continuous Monitoring AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help

More information

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing

More information

Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption

Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption Toby Bishop, Director, Deloitte Forensic Center Deloitte Financial Advisory Services LLP Contents Why corporate resiliency? What

More information

Big Data / FDAAWARE. Rafi Maslaton President, cresults the maker of Smart-QC/QA/QD & FDAAWARE 30-SEP-2015

Big Data / FDAAWARE. Rafi Maslaton President, cresults the maker of Smart-QC/QA/QD & FDAAWARE 30-SEP-2015 Big Data / FDAAWARE Rafi Maslaton President, cresults the maker of Smart-QC/QA/QD & FDAAWARE 30-SEP-2015 1 Agenda BIG DATA What is Big Data? Characteristics of Big Data Where it is being used? FDAAWARE

More information

Better Business Analytics with Powerful Business Intelligence Tools

Better Business Analytics with Powerful Business Intelligence Tools Better Business Analytics with Powerful Business Intelligence Tools Business Intelligence Defined There are many interpretations of what BI (Business Intelligence) really is and the benefits that it can

More information

Microsoft Confidential

Microsoft Confidential Brock Phillips, CPA, CFE, CCEP Forensic Accounting Sr. Manager Financial Integrity Unit Microsoft Audit Group Lou DeCola, CPA, CIA, CFE Forensic Accounting Sr. Manager Financial Integrity Unit Microsoft

More information

Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP [email protected]. Copyright 2015 Edward S.

Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP eferrara@forrester.com. Copyright 2015 Edward S. MIS 520 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP [email protected] Fraud Awareness & Internal Controls Awareness Internal

More information

Diploma in Forensic Accounting (Level 4) Course Structure & Contents

Diploma in Forensic Accounting (Level 4) Course Structure & Contents Brentwood Open Learning College Diploma in Forensic Accounting (Level 4) Course Structure & Contents Diploma in Forensic Accounting Course Structure & Contents Page 1 Unit 1 Introduction Forensic Accounting

More information

Recognize the many faces of fraud

Recognize the many faces of fraud Recognize the many faces of fraud Detect and prevent fraud by finding subtle patterns and associations in your data Contents: 1 Introduction 2 The many faces of fraud 3 Detect healthcare fraud easily and

More information

Big Data & Analytics: Your concise guide (note the irony) Wednesday 27th November 2013

Big Data & Analytics: Your concise guide (note the irony) Wednesday 27th November 2013 Big Data & Analytics: Your concise guide (note the irony) Wednesday 27th November 2013 Housekeeping 1. Any questions coming out of today s presentation can be discussed in the bar this evening 2. OCF is

More information

Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management

Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators

More information

BIG DATA Impact on DMOs. TTRA June 21, 2013

BIG DATA Impact on DMOs. TTRA June 21, 2013 BIG DATA Impact on DMOs TTRA June 21, 2013 What is BIG DATA? 1. Big data is a collection of data sets so large and complex that it becomes difficult to process using on-hand database management tools or

More information

Data: To BI or not to BI?

Data: To BI or not to BI? NATIONAL CONFERENCE ON BMS, 30 MAY 2013, HILTON HOTEL Challenges in building a BI and Big data analytics system Data: To BI or not to BI? Iva Valerieva, 1 Marketing & Business Development Manager Who Are

More information

Loss Prevention Data Mining Using big data, predictive and prescriptive analytics to enpower loss prevention

Loss Prevention Data Mining Using big data, predictive and prescriptive analytics to enpower loss prevention White paper Loss Prevention Data Mining Using big data, predictive and prescriptive analytics to enpower loss prevention Abstract In the current economy where growth is stumpy and margins reduced, retailers

More information

For Private circulation only www.deloitte.com/in. Creative. Clear. Focused. Forensic Services

For Private circulation only www.deloitte.com/in. Creative. Clear. Focused. Forensic Services For Private circulation only www.deloitte.com/in Creative. Clear. Focused. Forensic Services Do you conduct background checks on employees and vendors? Do you educate employees about the importance of

More information

Big Data Analytics: 14 November 2013

Big Data Analytics: 14 November 2013 www.pwc.com CSM-ACE 2013 Big Data Analytics: Take it to the next level in building innovation, differentiation and growth 14 About me Data analytics in the UK Forensic technology and data analytics in

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information

How To Make Data Streaming A Real Time Intelligence

How To Make Data Streaming A Real Time Intelligence REAL-TIME OPERATIONAL INTELLIGENCE Competitive advantage from unstructured, high-velocity log and machine Big Data 2 SQLstream: Our s-streaming products unlock the value of high-velocity unstructured log

More information

Introducing SAP Fraud Management. Jérôme Pugnet

Introducing SAP Fraud Management. Jérôme Pugnet Introducing SAP Fraud Management Jérôme Pugnet LEARNING POINTS Impacts and Challenges of Fraud How Big is the Problem? Fraud is Typically Found Without Technology: an Undetected Potential! What are the

More information

The Next Wave of Data Management. Is Big Data The New Normal?

The Next Wave of Data Management. Is Big Data The New Normal? The Next Wave of Data Management Is Big Data The New Normal? Table of Contents Introduction 3 Separating Reality and Hype 3 Why Are Firms Making IT Investments In Big Data? 4 Trends In Data Management

More information

Fraud Prevention and Detection in a Manufacturing Environment

Fraud Prevention and Detection in a Manufacturing Environment Fraud Prevention and Detection in a Manufacturing Environment Introduction The Association of Certified Fraud Examiners (ACFE) estimated in its 2008 Report to the Nation on Occupational Fraud and Abuse

More information

LGMA Qld Governance and Corporate Planning Village Forum

LGMA Qld Governance and Corporate Planning Village Forum www.pwc.com.au Fraud Risk Management Fraud Risk Assessments LGMA Qld Governance and Corporate Planning Village Forum March 2015 Agenda Introductions Fraud Risk Management Fraud Statistics s Global Economic

More information

Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative Analysis of the Main Providers

Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative Analysis of the Main Providers 60 Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative Analysis of the Main Providers Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative

More information

Using data analytics and continuous auditing for effective risk management

Using data analytics and continuous auditing for effective risk management Using data analytics and continuous auditing for effective risk management April 2014 Irakis Kanavaris Agenda Current trends Common terminology of Data Analytics and CA/CM KPMG approach & observations

More information

www.pwc.com/oracle Next presentation starting soon Business Analytics using Big Data to gain competitive advantage

www.pwc.com/oracle Next presentation starting soon Business Analytics using Big Data to gain competitive advantage www.pwc.com/oracle Next presentation starting soon Business Analytics using Big Data to gain competitive advantage If every image made and every word written from the earliest stirring of civilization

More information

The webinar will begin shortly

The webinar will begin shortly The webinar will begin shortly An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security Agenda The Security Landscape An Introduction to Security

More information

Kroll Ontrack Data Analytics. Forensic analysis and visualization of complex data sets to provide intelligence around investigations

Kroll Ontrack Data Analytics. Forensic analysis and visualization of complex data sets to provide intelligence around investigations Trade Date: 2013-08-14 11:57:00 Sum of Total Value: 287,663,728 Trade Date: 2013-08-14 11:51:00 Trader Name: Susan Wright Sum of Total Value: 443,382,018 Kroll Ontrack Data Analytics Trade Date: 2013-08-14

More information

Keith Barger MFS, MCSE, CCE

Keith Barger MFS, MCSE, CCE Keith Barger MFS, MCSE, CCE Principal/Practice Leader Advisory Services Keith Barger is a Principal in the Advisory Services practice with Grant Thornton and the Practice Leader for Forensic Accounting

More information

Oracle Financials Cloud Modernize Finance

Oracle Financials Cloud Modernize Finance FINANCIALS CLOUD Oracle Financials Cloud Modernize Finance Copyright 2014 Oracle Corporation. All Rights Reserved. Introduction Introduction Cloud computing is a vision that is increasingly turning into

More information

Italy. EY s Global Information Security Survey 2013

Italy. EY s Global Information Security Survey 2013 Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information

More information

IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE. Copyright 2012, SAS Institute Inc. All rights reserved.

IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE. Copyright 2012, SAS Institute Inc. All rights reserved. IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE ABOUT THE PRESENTER Marc has been with SAS for 10 years and leads the information management practice for canada. Marc s area of specialty

More information

NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation

NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation Market Offering: Package(s): Oracle Authors: Rick Olson, Luke Tay Date: January 13, 2012 Contents Executive summary

More information

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their

More information

San Francisco Chapter. Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young

San Francisco Chapter. Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young Learning Objectives Understand how data analysis can impact/improve business Understand typical data analysis challenges Understand the various

More information

Data collection architecture for Big Data

Data collection architecture for Big Data Data collection architecture for Big Data a framework for a research agenda (Research in progress - ERP Sense Making of Big Data) Wout Hofman, May 2015, BDEI workshop 2 Big Data succes stories bias our

More information

SIGNIFICANCE OF BUSINESS INTELLIGENCE APPLICATIONS FOR BETTER DECISION MAKING & BUSINESS PERFORMANCE

SIGNIFICANCE OF BUSINESS INTELLIGENCE APPLICATIONS FOR BETTER DECISION MAKING & BUSINESS PERFORMANCE SIGNIFICANCE OF BUSINESS INTELLIGENCE APPLICATIONS FOR BETTER DECISION MAKING & BUSINESS PERFORMANCE Dr. Nitin P. Mankar Professor (Director), Jayawantrao Sawant Institute of Management & Research (JSIMR).

More information

Viewpoint ediscovery Services

Viewpoint ediscovery Services Xerox Legal Services Viewpoint ediscovery Platform Technical Brief Viewpoint ediscovery Services Viewpoint by Xerox delivers a flexible approach to ediscovery designed to help you manage your litigation,

More information

Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you

Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you 3/27/2012 Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you Executive Summary The time to test fraud controls is before you have a fraud

More information

IBM QRadar Security Intelligence April 2013

IBM QRadar Security Intelligence April 2013 IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence

More information

III JORNADAS DE DATA MINING

III JORNADAS DE DATA MINING III JORNADAS DE DATA MINING EN EL MARCO DE LA MAESTRÍA EN DATA MINING DE LA UNIVERSIDAD AUSTRAL PRESENTACIÓN TECNOLÓGICA IBM Alan Schcolnik, Cognos Technical Sales Team Leader, IBM Software Group. IAE

More information

THOMSON REUTERS ACCELUS

THOMSON REUTERS ACCELUS THOMSON REUTERS ACCELUS ACCELUS Screening Resolution Service Executive Summary Thomson Reuters Accelus offers Screening Resolution Service (SRS): an outsourced screening service for Corporates and Financial

More information

IBM Security Intelligence Strategy

IBM Security Intelligence Strategy IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational

More information

Worldwide Anti-Corruption Policy

Worldwide Anti-Corruption Policy Worldwide Anti-Corruption Policy I. PURPOSE The laws of most countries make the payment or offer of payment or even receipt of a bribe, kickback or other corrupt payment a crime, subjecting both Eaton

More information

Driving business performance Using data analytics

Driving business performance Using data analytics Driving business performance Using data analytics January 2016 kpmg.com About data analytics Many companies are overlooking a significant opportunity to enhance decision making and improve performance

More information

THE ABC S OF DATA ANALYTICS

THE ABC S OF DATA ANALYTICS THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

FORENSIC ACCOUNTING: A COMPREHENSIVE GUIDE TO CONDUCTING FINANCIAL FRAUD INVESTIGATIONS FOAC/14/01

FORENSIC ACCOUNTING: A COMPREHENSIVE GUIDE TO CONDUCTING FINANCIAL FRAUD INVESTIGATIONS FOAC/14/01 FORENSIC ACCOUNTING: A COMPREHENSIVE GUIDE TO CONDUCTING FINANCIAL FRAUD INVESTIGATIONS FOAC/14/01 Table of Contents Fundamentals of Forensic Accounting... 1 Public Records and Other Information Sources...

More information

SAS Fraud Framework for Banking

SAS Fraud Framework for Banking SAS Fraud Framework for Banking Including Social Network Analysis John C. Brocklebank, Ph.D. Vice President, SAS Solutions OnDemand Advanced Analytics Lab SAS Fraud Framework for Banking Agenda Introduction

More information

Fraud Prevention Policy

Fraud Prevention Policy FRAUD PREVENTION POLICY 1. Purpose 1.1. This policy sets out the general principles and minimum requirements for managing fraud risks across the Amcor Group and all its member and affiliated companies

More information

ANALYTICS STRATEGY: creating a roadmap for success

ANALYTICS STRATEGY: creating a roadmap for success ANALYTICS STRATEGY: creating a roadmap for success Companies in the capital and commodity markets are looking at analytics for opportunities to improve revenue and cost savings. Yet, many firms are struggling

More information

Risk Considerations for Internal Audit

Risk Considerations for Internal Audit Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013

More information

BIG DATA FUNDAMENTALS

BIG DATA FUNDAMENTALS BIG DATA FUNDAMENTALS Timeframe Minimum of 30 hours Use the concepts of volume, velocity, variety, veracity and value to define big data Learning outcomes Critically evaluate the need for big data management

More information

Deloitte Forensic. Deloitte Forensic. Capability Statement

Deloitte Forensic. Deloitte Forensic. Capability Statement Deloitte Forensic Deloitte Forensic Capability Statement Deloitte named a Kennedy Vanguard Leader in Forensic Investigation Consulting, based on capabilities. Source: Kennedy Consulting Research & Advisory;

More information

Data analytics and workforce strategies New insights for performance improvement and tax efficiency

Data analytics and workforce strategies New insights for performance improvement and tax efficiency Data analytics and workforce strategies New insights for performance improvement and tax efficiency Leading organizations today are shaping effective workforce strategies through the use of data analytics.

More information

Zero-in on business decisions through innovation solutions for smart big data management. How to turn volume, variety and velocity into value

Zero-in on business decisions through innovation solutions for smart big data management. How to turn volume, variety and velocity into value Zero-in on business decisions through innovation solutions for smart big data management How to turn volume, variety and velocity into value ON THE LOOKOUT FOR NEW SOURCES OF VALUE CREATION WHAT WILL DRIVE

More information

An Auditor s Guide to Data Analytics

An Auditor s Guide to Data Analytics An Auditor s Guide to Data Analytics Natasha DeKroon, Duke University Health System Brian Karp Services Experis, Risk Advisory May 11, 2013 1 Today s Agenda Data Analytics the Basics Tools of the Trade

More information

CRGroup Whitepaper: Digging through the Data. www.crgroup.com. Reporting Options in Microsoft Dynamics GP

CRGroup Whitepaper: Digging through the Data. www.crgroup.com. Reporting Options in Microsoft Dynamics GP CRGroup Whitepaper: Digging through the Data Reporting Options in Microsoft Dynamics GP The objective of this paper is to provide greater insight on each of the reporting options available to you within

More information

BEYOND BI: Big Data Analytic Use Cases

BEYOND BI: Big Data Analytic Use Cases BEYOND BI: Big Data Analytic Use Cases Big Data Analytics Use Cases This white paper discusses the types and characteristics of big data analytics use cases, how they differ from traditional business intelligence

More information

Fraud Risk Management providing insight into fraud prevention, detection and response

Fraud Risk Management providing insight into fraud prevention, detection and response Fraud Risk Management providing insight into fraud prevention, detection and response For private circulation only www.deloitte.com/in Fraud follows opportunity and attacks weakness. Know where you are

More information

Investigative Techniques

Investigative Techniques Investigative Techniques Data Analysis and Reporting Tools 2016 Association of Certified Fraud Examiners, Inc. Data Mining v. Data Analysis Data mining is the science of searching large volumes of data

More information

Using Analytics to detect and prevent Healthcare fraud. Copyright 2010 SAS Institute Inc. All rights reserved.

Using Analytics to detect and prevent Healthcare fraud. Copyright 2010 SAS Institute Inc. All rights reserved. Using Analytics to detect and prevent Healthcare fraud Copyright 2010 SAS Institute Inc. All rights reserved. Agenda Introductions International Fraud Trends Overview of the use of Analytics in Healthcare

More information

Digging for Gold: Business Usage for Data Mining Kim Foster, CoreTech Consulting Group, Inc., King of Prussia, PA

Digging for Gold: Business Usage for Data Mining Kim Foster, CoreTech Consulting Group, Inc., King of Prussia, PA Digging for Gold: Business Usage for Data Mining Kim Foster, CoreTech Consulting Group, Inc., King of Prussia, PA ABSTRACT Current trends in data mining allow the business community to take advantage of

More information

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287

More information

10426: Large Scale Project Accounting Data Migration in E-Business Suite

10426: Large Scale Project Accounting Data Migration in E-Business Suite 10426: Large Scale Project Accounting Data Migration in E-Business Suite Objective of this Paper Large engineering, procurement and construction firms leveraging Oracle Project Accounting cannot withstand

More information