Fraud Triangle Analytics Anti-Fraud Research and Methodologies

Size: px
Start display at page:

Download "Fraud Triangle Analytics Anti-Fraud Research and Methodologies"

Transcription

1 Fraud Triangle Analytics Anti-Fraud Research and Methodologies Risk Management Committee Meeting American Hotel & Lodging Association November 18, 2009

2 Topics for discussion Why incorporate fraud detection analytics The Fraud Triangle in the current business environment Forensic analytics maturity model Our research: forensic data analytics from a Fraud Triangle perspective Forensic analytics to find hidden money (combining structured and unstructured data) Page 2

3 Why incorporate fraud detection analytics? 7% of company revenues are lost due to fraud per ACFE* Obtain better understanding of company s risks & controls Sets a proper tone at the top Integrates well with internal audit functions and goes beyond controls testing Potential lower D&O premiums *2008 ACFE Report to the Nation on Occupational Fraud Page 3

4 Current environment The perfect storm for fraud Companies and organizations are downsizing which has an immediate effect on internal controls Opportunity Budgets are decreasing. Companies and organizations are doing more with less. Increase use of government funds Layoffs unemployment and unease continue Stock prices levels remain low Credit crisis and other external factors limit liquidity Pressure Internal and External Pressure Opportunity to Commit Fraud Internal Controls Rationalization Stressed and disaffected employees may have greater ability to rationalize improper actions Page 4

5 Where is fraud occurring? Source: ACFE 2008 Report to the Nation On Occupational Fraud Page 5

6 2008 Corruption Perceptions Index X Low High Page 6

7 How is it detected? 66% by tip or accident Source: ACFE 2008 Report to the Nation On Occupational Fraud Page 7

8 Forensic Analytics Maturity Model Become more proactive in detecting fraud Low Detection Rate High Structured Data Traditional Rules-Based Queries & Analytics Model-Based Analysis Visual Analytics Unstructured Data Traditional Keyword Searching Latent Semantic Analysis Natural Language Processing High False Positive Rate Low Page 8

9 Data Sources in Today s Organization Focus of most audits Text OPPORTUNITY for audit Graphics Unstructured Data Structured Data CRM Databases Accounting Systems Presentations & Spreadsheets Page 9 20% 80%

10 Summary of Our Research Incorporated lessons learned from past Change the way we view data 80% of data is unstructured Innovative and aggressive methods to uncover: Fraud Error Misuse Waste Need for a targeted, risk-based approach May/June and July/August issues of FRAUD Magazine Page 10

11 Risk-Based Approach Workflow 1. Perform risk assessment 2. Link risk to business process 3. Link business process to departments 4. Link departments to people 5. Collect data (in or transactional data) 6. Perform analysis Risks Processes Departments People Data Analysis Page 11

12 The Fraud Triangle¹ Applying theory to electronic communications 1. Donald R. Cressey's Fraud Triangle ; Incentive/Pressure, Opportunity and Rationalization are present when fraud exists. Page 12

13 EY / ACFE Library of Keywords (Over 3,000 terms in a half dozen languages so far ) Rationalization Incentive/ Pressure Opportunity I deserve it nobody will find out gray area they owe it to me everybody does it fix it later the company can afford it not hurting anyone won t miss it don t get paid enough make the number don t let the auditor find out don t leave a trail not comfortable why are we doing this pull out all the stops do not volunteer information want no part of this only a timing difference not ethical special fees client side storage off the books cash advance side commission backdate no inspection no receipt smooth earnings pull earnings forward Page 13

14 Predictive Fraud Analysis - output Joint EY and ACFE Research Project Page 14

15 Proactive Fraud Analysis Research Revenue Recognition Fraud Keyword hits as a percentage of total s Incentive/Pressure Terms Opportunity Terms Rationalization Terms Page 15

16 Proactive Fraud Analysis Research Revenue Recognition Fraud Selected Top Keyword Hits During Peak Period Incentive/Pressure Terms problem commit create concern not sure short clarify split spread revise sorry Opportunity Terms correct appropriate reserve miss condition depart discount difficult fail critical Rationalization Terms therefore find out it s OK get w/1 back challenge find it figure out catch complex does not w/1 make sense doesn t w/1 make sense Page 16

17 Proactive Fraud Analysis Research Bribery Case Keyword hits as a percentage of total s Incentive/Pressure Terms Opportunity Terms Rationalization Terms Investigation timeframe, September 2006 to March 2007 Page 17

18 Proactive Fraud Analysis Research Bribery Case Selected Top Keyword Hits During Peak Period Incentive/Pressure Terms Opportunity Terms manage risk short problem commit concern clear fake cover policy fund complain investigate process w/5 fee consult audit offshore renewal Rationalization Terms error therefore challenge complex entitled get w/1 back catch mistake justified find out Page 18

19 Visualizing the Fraud Triangle: Via Online Dashboard Page 19

20 Drill down by custodian, focus on key years Page 20

21 Drill down further into months Terms counts update for the custodian and specified months Page 21

22 If required, drill down to the source or instant message communication Page 22

23 Case Example: Global Consumer Products Company received more than 40 whistleblower hotline complaints from one of the regions in Mexico over a three month period In response, the company s internal audit team performed an investigation on the complaints Company wanted to review s for 28 custodians, in search of evidence that would further bolster the results of the investigations; however, time and budget was limited When EY became involved, we were provided little information pertaining to the various allegations EY processed the PST s using Fraud Triangle Analytics yielding 200,964 s. and attachments were searched using a combination of ACFE-EY Fraud Terms as well as terms provided by the Client ( Client Terms ) related to their various internal investigations. Page 23

24 Analysis of Client Terms Fraud Indicators for the top five custodians for high-risk terms Diesel vs Fraud Score 50 Results from the investigation line key words hits Trend Avg. Diesel_Per Trend Pressure key words hits Trend Avg. IP_Per Trend Avg. OP_Per 40 Opportunity key words hits Trend Trend Avg. RAT_Per Rationalization key words hits Trend Trend Jul 1 07 Sep 1 07 No v 1 07 Jan 1 08 Mar 1 08 May 1 08 Jul 1 08 Sep 1 08 Nov 1 08 Jan 1 09 Mar 1 09 May 1 09 Date Th e tren d of averag e o f Diesel_Per, averag e o f IP_Per, average of O P_Per an d averag e of RAT_Per with Date. Th e data is filtered on Date Year an d name. The Date Year filter has multip le members selected. Th e name filter keeps G ABRIEL ROSAS MORENO, JAVIER QUIROZ CHIAPA, JOSE LUIS HERNNDEZ GARCA (SALVATIERRA), RAFAEL ARREDONDO CARCIA (VALLE DE SANTIAGO) and VICTO R HUG O LO PEZ VALLADARES. Page 24

25 Advanced Analytics WHO WHAT WHEN WHY Social Networking Concept Clustering Communication Over Time Sentiment Analysis Who is talking to whom? about what? over which time period? how do they feel? People-to-people analysis Top words mentioned When communications occur Positive vs. Negative Sentiment Entity-to-entity analysis Map communication lines to organization chart Key concepts / topics Top or unusual dollar amounts Sensitive words / phrases Communication spikes around key business events Top 10 negative journal entries Top 10 angry s Top 10 most concerned s SSN Customer survey analysis CCN Employee survey analysis Page 25

26 Visual Analytics Entity Extraction Geographic view Why so many mentions of Colombia? We don t do business in Colombia! Page 26

27 Considering Structured Data Low Detection Rate High Structured Data Traditional Rules-Based Queries & Analytics Model-Based Analysis Visual Analytics Unstructured Data Traditional Keyword Searching Latent Semantic Analysis Natural Language Processing High False Positive Rate Low Page 27

28 Fraud Risk Areas to Consider Asset Misappropriation Corruption / FCPA Financial Statement Cash Disbursements Bid Rigging Accounts Payable General Ledger Conflicts of Interest Account Receivable Materials Management & Inventory Control Purchase Order Management Salaries & Payroll Travel & Expenses Contract Compliance Kickbacks Materials Management & Inventory Control Purchase Order Management Deposits General Ledger Materials Management & Inventory Control Purchase Order Management Vendor Management Payment Cards Sales Analysis Travel & Expenses Revenue Recognition / Procure to Pay Sales Analysis Note: Some categories may overlap depending on the objectives of the investigation. Page 28

29 Data Analytics Common Areas of Interest 1. Payment stream analysis Altered invoices, goods not received, duplicate invoices, inflated prices, excess quantities purchased 2. Vendor master/employee master comparisons Fictitious vendors, vendor risk ranking, conflicts of interest 3. Employee expenses Over limits, unusual expenses, miscellaneous/sundry expenses, consultant payments 4. P-card expenditures 5. Payroll Over limits, unusual expenses, miscellaneous/sundry expenses Ghost employees, unusual payments, no deductions/evaluations, direct deposit account analysis 6. Bribery & Corruption / FCPA Bid rigging, conflicts of interest, contract compliance, kickbacks, payments to outside consultants Page 29

30 Find Hidden Money Recover Erroneous, Negligent or Fraudulent Payments Different Vendor ID Same Date Exact Same Amount Different Invoice # Same Reference / Job Code Similar names Some with same address Page 30

31 Predictive Modeling Analyze 400,000 transactions for suspected bribery payments (400 man-days) 1. Ernst & Young team reviewed 2,000 transactions from ledger data (text comments, amounts, dates, etc.) Identified 400 suspicious and 1,600 non-suspicious entries 2. Created statistical model: Is Suspicious / Is Not Suspicious Incorporated both structured and unstructured data into the model 3. Applied model to remaining 398,000 additional transactions 4. Identified 14,000 new suspicious transactions With confidence over 95% similar to Is Suspicious Identified over $8 million of highly suspicious payments Page 31

32 Predictive Modeling (Step 2) Perform text analytics Volume contract facilitation Perform Text Analytics on free text fields Conduct term frequency analysis for most occurring or unusual transaction descriptions Capture concepts release expense Page 32

33 Predictive Modeling (Step 3) Prepare the model Perform Variable Analysis These variables were less important when predicting suspicious transactions. Client should focus resources on monitoring efforts for the three leading drivers which accounts for 80% of the predictive value. These three variables were this highest drivers of suspicious transactions Page 33

34 Customized on-line compliance monitoring tools Uploads / integrates with transactional data sources Drill down capabilities by subsidiary or region Dynamic reporting Web-based Rules-based and model based analytics Page 34

35 Monitoring online reports Anomaly Detection Names have been partially redacted Page 35

36 Benford s Law (In naturally occurring numbers) Where d is the leading digit and p is the probability. Source: Wikipedia Page 36

37 Benford s Law Practical Examples Applications: Expense costs, Vendor invoices, Sales Figures, and Insurance Claims should follow Benford s Law 1 Spot dummy vendors in data manipulation schemes Majority of improper purchases begin with 7, 8, or 9 which is just the opposite of Benford s predicted patterns Consequently, fraudulent invoices are easier to detect using Benford s Law than by random sampling. Also identify amounts just below pre-defined cut-offs As shown, the threshold for second approval was $4,000 so invoices often began with 3 (as in $3,999) Analysis of 10,000 vendor invoices 1. Per Mark Nigrini, a Ph.D., and a chartered accountant: After several years of studying Benford s Law, he published his thesis in 1992 demonstrating that Benford s Law could be used to detect fraud and to detect rounded numbers. His studies revealed that sales figures, insurance claim costs, and expense claims should follow Benford s Law. Page 37

38 Final considerations for our clients Assess risk Part of planning, or just a repeat of last year Measure risk Is it just rules based? Consider unstructured (text-based) data Consider incorporating the fraud triangle concept Improve business performance Not just risk mitigation FCPA awareness Find hidden money Reduce costs Page 38

39 Thank you Daniel Torpey, CPA, CITP Partner, Assurance Services Fraud Investigation & Dispute Services Dallas, Texas (214) Vincent Walden, CFE, CPA, CITP Senior Manager, Assurance Services Fraud Investigation & Dispute Services Dallas, Texas (214) Page 39

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview

More information

Advanced Data Analytics, the Fraudsters Worst Enemy

Advanced Data Analytics, the Fraudsters Worst Enemy Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability

More information

Demystifying Big Data Analytics

Demystifying Big Data Analytics Demystifying Big Data Analytics Practical approaches to business intelligence and forensic analytics 9 May 2013 Discussion topics Big Data & Big Data Analytics Current fraud risks - industry research Components

More information

Emerging Trends in Fraud Analytics:

Emerging Trends in Fraud Analytics: Global Risk Advisory Services Emerging Trends in Fraud Analytics: Accounting for Words Text Analytics is a promising new forensic technique for the investigator 4 th Annual Text Analytics Summit Vincent

More information

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients

More information

by: Scott Baranowski, CIA

by: Scott Baranowski, CIA Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf

More information

Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses

Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception

More information

Taking Data Analytics to the Next Level

Taking Data Analytics to the Next Level Taking Data Analytics to the Next Level Implementing and Supporting Big Data Initiatives What Is Big Data and How Is It Applicable to Anti-Fraud Efforts? 2 of 20 Definition Gartner: Big data is high-volume,

More information

Leveraging Big Data to Mitigate Health Care Fraud Risk

Leveraging Big Data to Mitigate Health Care Fraud Risk Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud

More information

Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen

Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,

More information

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

AGA Kansas City Chapter Data Analytics & Continuous Monitoring AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help

More information

Using Data Analytics to Detect Fraud. Other Data Analysis Techniques

Using Data Analytics to Detect Fraud. Other Data Analysis Techniques Using Data Analytics to Detect Fraud Other Data Analysis Techniques Qualitative Data Analysis Most data analysis techniques require the use of data in the form of numbers. Qualitative data analysis is

More information

Procurement Fraud Identification & Role of Data Mining

Procurement Fraud Identification & Role of Data Mining The paper describes the known boundaries of Procurement Fraud and outlines the scope of data mining within the same. The paper also highlights some of the basic steps to be taken care of before the application

More information

Integrating Data Analytics into Internal Audit

Integrating Data Analytics into Internal Audit Integrating Data Analytics into Internal Audit IIA Beach Cities Meeting May 19, 2011 Agenda Introductions Background Industry Perspective Benefits of Challenges in Examples / Case Studies Tools Of The

More information

Fraud Prevention Training

Fraud Prevention Training Fraud Prevention Training Kim Turner, Chief Audit Executive Emily Knopp, Audit Director Fraud Prevention: WHAT YOU WILL LEARN & FRAUD FACTS What you will take away with you: Glossary of Fraud Terms Details

More information

Perp Poetry. Fraud & Embezzlement: Lessons From the Trenches. Presented by. acumen insight. ideas attention reach. expertise depth agility talent

Perp Poetry. Fraud & Embezzlement: Lessons From the Trenches. Presented by. acumen insight. ideas attention reach. expertise depth agility talent acumen insight Fraud & Embezzlement: Lessons From the Trenches ideas attention reach Presented by Angela Morelock, CPA, CFE, CFF, ABV, Certified Forensic Accountant www.bkdforensics.com expertise depth

More information

THE ABC S OF DATA ANALYTICS

THE ABC S OF DATA ANALYTICS THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable

More information

FRAUD RISK ASSESSMENT

FRAUD RISK ASSESSMENT FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by

More information

The auditors responsibility to consider fraud in an audit of financial statements

The auditors responsibility to consider fraud in an audit of financial statements The auditors responsibility to consider fraud in an audit of financial statements Audit in a nutshell Reality Picture (= financial statements) Balance sheet Assets Liabilities Equity Process Detection

More information

Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner

Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner Learning Objectives: Understand how fraud can occur Learn procedures you can implement to prevent fraud Learn how to detect fraud Common Situations

More information

Fraud Prevention: The Prevention and Detection of Fraud Begins with You

Fraud Prevention: The Prevention and Detection of Fraud Begins with You Fraud Prevention: The Prevention and Detection of Fraud Begins with You Takeaways What is fraud? Definition Facts Four factors Fraud risk assessment Four evaluation criteria Common fraud schemes Case studies

More information

Financial Services Group

Financial Services Group Fraud Detection and Prevention Presented by: Carrie Kennedy, CPA, Partner Anthony Porter, CPA, Manager 1 The material appearing in this presentation is for informational purposes only and should not be

More information

Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP

Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP Data Mining/Fraud Detection April 28, 2014 Jonathan Meyer, CPA KPMG, LLP 1 Agenda Overview of Data Analytics & Fraud Getting Started with Data Analytics Where to Look & Why? What is Possible? 2 D&A Business

More information

Investigative Techniques

Investigative Techniques Investigative Techniques Data Analysis and Reporting Tools 2016 Association of Certified Fraud Examiners, Inc. Data Mining v. Data Analysis Data mining is the science of searching large volumes of data

More information

FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE

FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE CPAs & ADVISORS experience reach // S. Todd Burchett, CPA, ABV, ASA, CFF, CFE Partner tburchett@bkd.com 210.268.1932 AGENDA

More information

FRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM

FRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM FRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM Presenter: Zamani Nxumalo SAS, National Treasury 30 March 2011 CONTENTS Key Terms & Definitions Process & Challenges Fraud

More information

Fraud: Real Stories, Real People, Real Impact

Fraud: Real Stories, Real People, Real Impact Fraud: Real Stories, Real People, Real Impact Chris Harper, CPA, MBA Senior Manager Types of Fraud Asset misappropriation Fraudulent financial reporting Identity theft Detection Skills The Fraud Triangle

More information

Centre for Corporate Governance. Sample listing of fraud schemes

Centre for Corporate Governance. Sample listing of fraud schemes Centre for Corporate Governance Sample listing of fraud schemes Sample listing of fraud schemes The following listing of possible fraud schemes can be utilized by management and auditors to assist in identifying

More information

GLOBAL PORTS INVESTMENTS PLC

GLOBAL PORTS INVESTMENTS PLC Adopted by the Directors of GLOBAL PORTS INVESTMENTS PLC Resolution of 14 July 2008 GLOBAL PORTS INVESTMENTS PLC (previously GLOBAL PORTS INVESTMENTS LTD) ANTI-FRAUD POLICY TABLE OF CONTENTS 1. INTRODUCTION.....

More information

Office of the Inspector General

Office of the Inspector General Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs April 2005 Dear Public Officials: April

More information

Sharon Kurek, CPA, CFE Director of Internal Audit

Sharon Kurek, CPA, CFE Director of Internal Audit Sharon Kurek, CPA, CFE Director of Internal Audit What You Will Take Aware With You Definition of Internal Auditing Scope of Audit Activities Risk and Control Process Common Audit Topics Fraud Awareness

More information

Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP eferrara@forrester.com. Copyright 2015 Edward S.

Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP eferrara@forrester.com. Copyright 2015 Edward S. MIS 520 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP eferrara@forrester.com Fraud Awareness & Internal Controls Awareness Internal

More information

U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S

U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S A C a s e W a r e I D E A R e s e a r c h R e p o r t CaseWare IDEA Inc.

More information

Using Technology to Automate Fraud Detection Within Key Business Process Areas

Using Technology to Automate Fraud Detection Within Key Business Process Areas Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd

More information

T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud

T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud FEATURED FACULTY: Richard B. Lanza, CPA, CFE, CGMA, President of Cash Recovery Partners LLC 973-729-3944 rich@richlanza.com

More information

Fraud Awareness Training

Fraud Awareness Training UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for

More information

ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore

ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore With ever-increasing data volumes, more sophisticated fraud patterns, and a drive for strong corporate governance, how can organisations build a culture of integrity and compliance? Learn how data analytics

More information

Invoice Number Vendor Number Amount 129304 A543891 $1,035.71 129304 A543891 $1,035.71

Invoice Number Vendor Number Amount 129304 A543891 $1,035.71 129304 A543891 $1,035.71 Fraud Detection: Using Data Analysis Techniques A new approach being used for fraud prevention and detection involves the examination of patterns in the actual data. The rationale is that unexpected patterns

More information

Diploma in Forensic Accounting (Level 4) Course Structure & Contents

Diploma in Forensic Accounting (Level 4) Course Structure & Contents Brentwood Open Learning College Diploma in Forensic Accounting (Level 4) Course Structure & Contents Diploma in Forensic Accounting Course Structure & Contents Page 1 Unit 1 Introduction Forensic Accounting

More information

Accounts Payable Best Practices

Accounts Payable Best Practices Accounts Payable Best Practices Presented by: Eddy Castaneda, CPA, MBA Accounts Payable Best Practices Top Practices AP Top Practices Document your current AP procedures Can identify overlapping work Can

More information

Fraud Prevention and Detection in a Manufacturing Environment

Fraud Prevention and Detection in a Manufacturing Environment Fraud Prevention and Detection in a Manufacturing Environment Introduction The Association of Certified Fraud Examiners (ACFE) estimated in its 2008 Report to the Nation on Occupational Fraud and Abuse

More information

ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST

ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST 1 Our Objective To assist organizations in finding lost thousands of dollars in profits through duplicate payments, duplicate billings, overpayments,

More information

Cash Flow Management: The Life of Your Business

Cash Flow Management: The Life of Your Business Cash Flow Management: The Life of Your Business Brian S. Gottschalk CPA Partner GellerRagans Certified Public Accountants Advisors Cash Flow- defined Movement of money received and spent: the pattern of

More information

Use of Data Extraction & Analysis Software In a Financial Statement Audit

Use of Data Extraction & Analysis Software In a Financial Statement Audit Use of Data Extraction & Analysis Software In a Financial Statement Audit A Message from The Audit Wizard April 2008 Making Auditors Proficient, Inc. Phone: 352-750-9636 www.billallen.com E-mail: ballen@billallen.com

More information

An Auditor s Guide to Data Analytics

An Auditor s Guide to Data Analytics An Auditor s Guide to Data Analytics Natasha DeKroon, Duke University Health System Brian Karp Services Experis, Risk Advisory May 11, 2013 1 Today s Agenda Data Analytics the Basics Tools of the Trade

More information

Secrets, Conspiracies and Hidden Patterns: Fraud and Advanced Data Mining

Secrets, Conspiracies and Hidden Patterns: Fraud and Advanced Data Mining Secrets, Conspiracies and Hidden Patterns: Fraud and Advanced Data Mining Shauna Woody-Coussens Director, Forensic & Valuation Services Jeremy Clopton Manager, Forensic & Valuation Services Agenda Fraud

More information

Microsoft Confidential

Microsoft Confidential Brock Phillips, CPA, CFE, CCEP Forensic Accounting Sr. Manager Financial Integrity Unit Microsoft Audit Group Lou DeCola, CPA, CIA, CFE Forensic Accounting Sr. Manager Financial Integrity Unit Microsoft

More information

Office of the Inspector General

Office of the Inspector General Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs Second Edition American Recovery and Reinvestment

More information

PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM

PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM Auditors need to understand that while audit findings are common, they are not necessarily fraud and due care is needed in building evidence.

More information

Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education

Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Contents Introduction Internal Audit as Trusted Advisor & Business Partner Big Ticket Items: Fraud, Revenue Leakage

More information

LGMA Qld Governance and Corporate Planning Village Forum

LGMA Qld Governance and Corporate Planning Village Forum www.pwc.com.au Fraud Risk Management Fraud Risk Assessments LGMA Qld Governance and Corporate Planning Village Forum March 2015 Agenda Introductions Fraud Risk Management Fraud Statistics s Global Economic

More information

Fraud Awareness and Prevention Program Report

Fraud Awareness and Prevention Program Report Internal Audit Department Fraud Awareness and Prevention Program Report Project 2009-263 A Review of Fraud Awareness, Prevention, Detection and Risk Mitigation Practices in Landfill Operations, Central

More information

Internal Control Risks Associated with Information Technology. Kevin M. Bronner, Ph.D.

Internal Control Risks Associated with Information Technology. Kevin M. Bronner, Ph.D. Internal Control Risks Associated with Information Technology By Kevin M. Bronner, Ph.D. Introduction: The Risk of Information Technology Fraud The information technology (IT) function is important to

More information

RED FLAGS OF FRAUD MAY 13, 2014 IIA AUSTIN CHAPTER

RED FLAGS OF FRAUD MAY 13, 2014 IIA AUSTIN CHAPTER MAY 13, 2014 IIA AUSTIN CHAPTER 2014 by the Association of Certified Fraud Examiners, Inc. Revised: 3/26/14 No portion of this work may be reproduced or transmitted in any form or by any means electronic

More information

Managing FCPA (Foreign Corrupt Practices Act) Risks

Managing FCPA (Foreign Corrupt Practices Act) Risks Managing FCPA (Foreign Corrupt Practices Act) Risks Diana Shin - Partner Jacqueline Fan Associate Director Fraud Investigation and Dispute Services July 2010 Agenda 1. Compliance pressure points 2. Putting

More information

2/5/2013. Session Objectives. Higher Education Headlines. Getting Started with Data Analytics. Higher Education Headlines.

2/5/2013. Session Objectives. Higher Education Headlines. Getting Started with Data Analytics. Higher Education Headlines. + Getting Started with Data Analytics Prepared for the UCOP Auditor s Symposium January 30, 2013 and February 14, 2013 Session Objectives 2 Higher Education Headlines New IIA Guidance Visual Risk IQ s

More information

FORENSIC ACCOUNTING What s in it for me? Albany, NY June 14, 2011

FORENSIC ACCOUNTING What s in it for me? Albany, NY June 14, 2011 FORENSIC ACCOUNTING What s in it for me? Albany, NY June 14, 2011 Presented by Gary J. Cassiello, CPA, ABV, CFF garyc@jgspc.com 845-692-9500 Today s Outline Why is Forensic Accounting important? Executive

More information

Expert Systems in Fraud Detection: Expert Knowledge Elicitations in a Procurement Card Context

Expert Systems in Fraud Detection: Expert Knowledge Elicitations in a Procurement Card Context Expert Systems in Fraud Detection: Expert Knowledge Elicitations in a Procurement Card Context 12 th Fraud Seminar December 1, 2015 Presented by: Deniz Appelbaum Abdullah Al-Awadhi Knowledge Based Expert

More information

Forensic Auditing: The Audit of the Future, Today. Instructor: Ron Durkin, CFE, CPA/CFF, CIRA

Forensic Auditing: The Audit of the Future, Today. Instructor: Ron Durkin, CFE, CPA/CFF, CIRA Forensic Auditing: The Audit of the Future, Today Instructor: Ron Durkin, CFE, CPA/CFF, CIRA 1 1 Agenda Current events and developments in forensic accounting Define the term forensic auditing What is

More information

Internal Controls Best Practices

Internal Controls Best Practices Internal Controls Best Practices This list includes the most common internal controls applied by small to medium sized businesses to their operations. It includes controls that apply to the processes most

More information

Fighting Fraud with Data Mining & Analysis

Fighting Fraud with Data Mining & Analysis Fighting Fraud with Data Mining & Analysis Leonard W. Vona December 2008 Fraud Auditing, Inc. Phone: 518-784-2250 www.fraudauditing.net E-mail: leonard@leonardvona.com Copyright 2008 Leonard Vona and Fraud

More information

How To Understand And Understand Forensic Accounting

How To Understand And Understand Forensic Accounting Forensic Accounting and Investigations University of Texas at Arlington 14 August 2013 Overview What is Forensic Accounting? Definition and Services The Forensic Accountant History Roles Within Organizations

More information

ACCOUNTING RECORDS: HOW THEY ARE USED TO CONCEAL FRAUD. ROSANNE TERHART, CFE, CA Senior Manager BDO Canada LLP Vancouver, British Columbia Canada

ACCOUNTING RECORDS: HOW THEY ARE USED TO CONCEAL FRAUD. ROSANNE TERHART, CFE, CA Senior Manager BDO Canada LLP Vancouver, British Columbia Canada Once an employee commits fraud, he has limited time to conceal the financial transaction in the accounting records. Learn how employees hide these fraudulent transactions and what to look for when reviewing

More information

How To Prevent Fraud On A Credit Card

How To Prevent Fraud On A Credit Card Fraud Detection and Prevention Financial Management Advisory Council August 28, 2014 Sarah Mahugh, CPA, MBA Financial Audit Audit Manager Overview Fraud trends Fraud Risks and internal controls Case Studies

More information

Neil Meikle, Associate Director, Forensic Technology, PwC

Neil Meikle, Associate Director, Forensic Technology, PwC Case Study: Big Data Forensics Neil Meikle, Associate Director, Forensic Technology, PwC 6 November 2012 About me Transferred to Kuala Lumpur from PwC s Forensic Technology practice in London, England

More information

September 28, 2011. Audit s Role in Governance, Risk Management and Internal Control

September 28, 2011. Audit s Role in Governance, Risk Management and Internal Control September 28, 2011 Internal Audit Overview Audit s Role in Governance, Risk Management and Internal Control Mission Provide independent, objective assurance and advisory services designed to add value

More information

Contents. xiii xv. Case Studies Preface

Contents. xiii xv. Case Studies Preface Case Studies Preface xiii xv CHAPTER 1 What Is Fraud? 1 Fraud: A Definition 3 Why Fraud Happens 4 Who Is Responsible for Fraud Detection? 7 What Is a Fraud Awareness Program? 11 Screening Job Applicants

More information

Steven Boyer Vice-President, Gallagher Bassett Services Inc.

Steven Boyer Vice-President, Gallagher Bassett Services Inc. Employee Dishonesty and Fraud Motive, Rationale & Opportunity Steven Boyer Vice-President, Gallagher Bassett Services Inc. Randall Wilson, CPA/CFF, CFE, Cr.FA Partner, National Practice Director Fraud

More information

Fraud Control Theory

Fraud Control Theory 13 Fraud Control Theory Using a variation of a saying from the 1960s, fraud happens. Like all costs of doing business, fraud must be managed. Management must recognize that people commit fraudulent acts

More information

Benford s Law and Digital Frequency Analysis

Benford s Law and Digital Frequency Analysis Get M.A.D. with the Numbers! Moving Benford s Law from Art to Science BY DAVID G. BANKS, CFE, CIA September/October 2000 Until recently, using Benford s Law was as much of an art as a science. Fraud examiners

More information

Board Matters Quarterly Critical insights for today s audit committee

Board Matters Quarterly Critical insights for today s audit committee EY Center for Board Matters Board Matters Quarterly Critical insights for today s audit committee In this issue Dealing with big data 02 The board s role in addressing data and analytics Directors need

More information

Fraud Prevention and Deterrence

Fraud Prevention and Deterrence Fraud Prevention and Deterrence Fraud Risk Assessment 2016 Association of Certified Fraud Examiners, Inc. What Is Fraud Risk? The vulnerability that an organization faces from individuals capable of combining

More information

SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY

SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY NOTE: This appendix is a sample from another entity. As such, no adjustment has been made to this material. The information may or may not agree with all the

More information

Six Financial Oversight Strategies for Nonprofits

Six Financial Oversight Strategies for Nonprofits Six Financial Oversight Strategies for Nonprofits You Inspire Us! 1) Greet your new friends! 2) Surf the binder and resources 3) Enjoy The Hope Center 4) Watch for MORE resources in 7 days: ECFA.org/Content/Six-Financial-Oversight-Strategiesfor-Nonprofits

More information

Developing and Implementing a Fraud Risk Assessment. Josh Shilts CPA/CFF, CFE

Developing and Implementing a Fraud Risk Assessment. Josh Shilts CPA/CFF, CFE Developing and Implementing a Fraud Risk Assessment Josh Shilts CPA/CFF, CFE MY GOAL HAVE YOU WALK AWAY WITH THE KNOWLEDGE AND TOOLS TO COMPLETE A FORMAL & USEFUL FRAUD RISK ASSESSMENT!!! Before We Begin,

More information

5 Important Controls to Mitigate Employee Fraud

5 Important Controls to Mitigate Employee Fraud 5 Important Controls to Mitigate Employee Fraud LMCIT WEBINAR : FEBRUARY 10, 2015 IN PARTNERSHIP WITH EIDE BAILLY Presenter: Jason Olson, MBA, CPA/CFF, CFE, CFI Presentation Disclaimer These seminar materials

More information

A Guide to Forensic Accounting Investigation. 2nd Edition

A Guide to Forensic Accounting Investigation. 2nd Edition Brochure More information from http://www.researchandmarkets.com/reports/2211320/ A Guide to Forensic Accounting Investigation. 2nd Edition Description: Recent catastrophic business failures have caused

More information

Chapter 15: Accounts Payable and Purchases

Chapter 15: Accounts Payable and Purchases Accounting Research Manager - Audit Private Accounting Research Manager Miller Interpretations and Other Resources Knowledge-Based Audit Procedures Chapter 15: Accounts Payable and Purchases Chapter 15:

More information

Expenditures Internal Audit Report

Expenditures Internal Audit Report Expenditures Internal Audit Report Report #2014-1 June 9, 2014 Table of Contents Table of Contents... 2 Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives... 4 Scope...

More information

Can Financial Statement Auditors Detect More Fraud? How Can PCAOB Make that Happen?

Can Financial Statement Auditors Detect More Fraud? How Can PCAOB Make that Happen? Can Financial Statement Auditors Detect More Fraud? How Can PCAOB Make that Happen? David L. Cotton, CPA, CFE, CGFM Cotton & Company, LLP November 20, 2014 The views expressed in these slides are solely

More information

Fraud and Role of Information Technology. September 2008

Fraud and Role of Information Technology. September 2008 Fraud and Role of Information Technology September 2008 Agenda IT Value Proposition Slide 2 Prior Interpretations of Internal Control Structure Have Addressed Three Separate Parts Which Were Audited Somewhat

More information

Chapter 15 Auditing the Expenditure Cycle

Chapter 15 Auditing the Expenditure Cycle Chapter 15 Auditing the Expenditure Cycle Expenditure cycle consists of activities related to the acquisition of and payment for plant assets and goods and services. Two major transaction classes: 1 purchases

More information

Auditing for Value in the Procure to Pay Cycle Dallas IIA Chapter. October 1, 2009

Auditing for Value in the Procure to Pay Cycle Dallas IIA Chapter. October 1, 2009 Auditing for Value in the Procure to Pay Cycle Dallas IIA Chapter October 1, 2009 Supply Chain Risk Overview * Today s Focus * Includes Working Capital benefits 1 2009 Protiviti Inc. An Equal Opportunity

More information

COMPLIANCE POLICY MANUAL

COMPLIANCE POLICY MANUAL COMPLIANCE POLICY MANUAL FOREIGN CORRUPT PRACTICES ACT 07/24/2012 Policy Number 16-100 SUBJECT: FOREIGN CORRUPT PRACTICES ACT Application: Worldwide Strategic Business Units and Subsidiaries. It is the

More information

Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you

Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you 3/27/2012 Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you Executive Summary The time to test fraud controls is before you have a fraud

More information

A DOZEN IDEAS FOR SMALL BUSINESS FRAUD PREVENTION

A DOZEN IDEAS FOR SMALL BUSINESS FRAUD PREVENTION A DOZEN IDEAS FOR SMALL BUSINESS FRAUD PREVENTION Any discussion of fraud can be a difficult one because most individuals value being a trusted member of any organization and, in most cases, key employees

More information

A STUDY ON FORENSIC ACCOUNTING AND ITS USABILITY By Jyotsana S. Agarwala

A STUDY ON FORENSIC ACCOUNTING AND ITS USABILITY By Jyotsana S. Agarwala A STUDY ON FORENSIC ACCOUNTING AND ITS USABILITY By Jyotsana S. Agarwala Abstract: Forensic accounting is not a new field, but in recent years, banks, insurance companies and even police agencies have

More information

Using Data Analytics to Detect Fraud

Using Data Analytics to Detect Fraud Using Data Analytics to Detect Fraud Fundamental Data Analysis Techniques 2016 Association of Certified Fraud Examiners, Inc. Discussion Question For each data analysis technique discussed in this section,

More information

Purchasing Card Program

Purchasing Card Program Purchasing Card Program User Guidelines University of North Alabama Procurement Department Created: March 2008 / Updated 7/16/2015 University of North Alabama Purchasing Card Program 1 Table of Contents

More information

Good Corporate Governance: Essential to Prevent Conflicts of Interest and Fraud Pakistan s s Experience

Good Corporate Governance: Essential to Prevent Conflicts of Interest and Fraud Pakistan s s Experience Good Corporate Governance: Essential to Prevent Conflicts of Interest and Fraud Pakistan s s Experience By: Asad Ali Shah Partner, Deloitte Pakistan Council Member, Institute of Chartered Accountants of

More information

Investigation. Investigations

Investigation. Investigations Investigation The Forensic Services team of PricewaterhouseCoopers has the knowledge and experience necessary to conduct comprehensive fraud investigations. Our team in Poland has jointly performed in

More information

Why is Internal Audit so Hard?

Why is Internal Audit so Hard? Why is Internal Audit so Hard? 2 2014 Why is Internal Audit so Hard? 3 2014 Why is Internal Audit so Hard? Waste Abuse Fraud 4 2014 Waves of Change 1 st Wave Personal Computers Electronic Spreadsheets

More information

Abila. MIP Fund Accounting. Solutions overview. Accounts payable. Accounts receivable reporting, billing, and sales order entry

Abila. MIP Fund Accounting. Solutions overview. Accounts payable. Accounts receivable reporting, billing, and sales order entry Abila MIP Fund Accounting To help you deliver on your mission, MIP Fund Accounting is a configurable fund accounting solution that allows you to report and track information most important to you, your

More information

Employee Embezzlement and Fraud. Defending Against Insider Threats

Employee Embezzlement and Fraud. Defending Against Insider Threats Employee Embezzlement and Fraud Defending Against Insider Threats Today s Approach An open dialogue and sharing of information regarding a common threat of internal losses. There is no guarantee that any

More information

KEYS TO AN EFFECTIVE DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA

KEYS TO AN EFFECTIVE DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA KEYS TO AN EFFECTIVE ANTI-FRAUD PROGRAM WAYNE PURVES DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA AHIA 32 nd Annual Conference August 25-28, 2013 Chicago, Illinois

More information

Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained

Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained Performing Audit Procedures in Response to Assessed Risks 1781 AU Section 318 Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained (Supersedes SAS No. 55.)

More information

GOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments

GOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments GOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments Audit Report OIG-A-2013-018 September 20, 2013 NATIONAL RAILROAD PASSENGER CORPORATION Office of Inspector General REPORT HIGHLIGHTS Why

More information

Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A

Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A Brochure More information from http://www.researchandmarkets.com/reports/2866056/ Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A Description: Detect fraud faster no

More information

Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study

Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study Mieke Jans, Nadine Lybaert, and Koen Vanhoof Hasselt University, Agoralaan Building D, 3590 Diepenbeek, Belgium http://www.uhasselt.be/

More information

Audit Guide for Audit Committees of Small Nonprofit Organizations

Audit Guide for Audit Committees of Small Nonprofit Organizations Audit Guide for Audit Committees of Small Nonprofit Organizations A free resource provided by the Virginia Society of Certified Public Accountants Audit Guide for Small Nonprofit Organizations A free resource

More information