Fraud Triangle Analytics Anti-Fraud Research and Methodologies
|
|
- Rosamond Hardy
- 8 years ago
- Views:
Transcription
1 Fraud Triangle Analytics Anti-Fraud Research and Methodologies Risk Management Committee Meeting American Hotel & Lodging Association November 18, 2009
2 Topics for discussion Why incorporate fraud detection analytics The Fraud Triangle in the current business environment Forensic analytics maturity model Our research: forensic data analytics from a Fraud Triangle perspective Forensic analytics to find hidden money (combining structured and unstructured data) Page 2
3 Why incorporate fraud detection analytics? 7% of company revenues are lost due to fraud per ACFE* Obtain better understanding of company s risks & controls Sets a proper tone at the top Integrates well with internal audit functions and goes beyond controls testing Potential lower D&O premiums *2008 ACFE Report to the Nation on Occupational Fraud Page 3
4 Current environment The perfect storm for fraud Companies and organizations are downsizing which has an immediate effect on internal controls Opportunity Budgets are decreasing. Companies and organizations are doing more with less. Increase use of government funds Layoffs unemployment and unease continue Stock prices levels remain low Credit crisis and other external factors limit liquidity Pressure Internal and External Pressure Opportunity to Commit Fraud Internal Controls Rationalization Stressed and disaffected employees may have greater ability to rationalize improper actions Page 4
5 Where is fraud occurring? Source: ACFE 2008 Report to the Nation On Occupational Fraud Page 5
6 2008 Corruption Perceptions Index X Low High Page 6
7 How is it detected? 66% by tip or accident Source: ACFE 2008 Report to the Nation On Occupational Fraud Page 7
8 Forensic Analytics Maturity Model Become more proactive in detecting fraud Low Detection Rate High Structured Data Traditional Rules-Based Queries & Analytics Model-Based Analysis Visual Analytics Unstructured Data Traditional Keyword Searching Latent Semantic Analysis Natural Language Processing High False Positive Rate Low Page 8
9 Data Sources in Today s Organization Focus of most audits Text OPPORTUNITY for audit Graphics Unstructured Data Structured Data CRM Databases Accounting Systems Presentations & Spreadsheets Page 9 20% 80%
10 Summary of Our Research Incorporated lessons learned from past Change the way we view data 80% of data is unstructured Innovative and aggressive methods to uncover: Fraud Error Misuse Waste Need for a targeted, risk-based approach May/June and July/August issues of FRAUD Magazine Page 10
11 Risk-Based Approach Workflow 1. Perform risk assessment 2. Link risk to business process 3. Link business process to departments 4. Link departments to people 5. Collect data (in or transactional data) 6. Perform analysis Risks Processes Departments People Data Analysis Page 11
12 The Fraud Triangle¹ Applying theory to electronic communications 1. Donald R. Cressey's Fraud Triangle ; Incentive/Pressure, Opportunity and Rationalization are present when fraud exists. Page 12
13 EY / ACFE Library of Keywords (Over 3,000 terms in a half dozen languages so far ) Rationalization Incentive/ Pressure Opportunity I deserve it nobody will find out gray area they owe it to me everybody does it fix it later the company can afford it not hurting anyone won t miss it don t get paid enough make the number don t let the auditor find out don t leave a trail not comfortable why are we doing this pull out all the stops do not volunteer information want no part of this only a timing difference not ethical special fees client side storage off the books cash advance side commission backdate no inspection no receipt smooth earnings pull earnings forward Page 13
14 Predictive Fraud Analysis - output Joint EY and ACFE Research Project Page 14
15 Proactive Fraud Analysis Research Revenue Recognition Fraud Keyword hits as a percentage of total s Incentive/Pressure Terms Opportunity Terms Rationalization Terms Page 15
16 Proactive Fraud Analysis Research Revenue Recognition Fraud Selected Top Keyword Hits During Peak Period Incentive/Pressure Terms problem commit create concern not sure short clarify split spread revise sorry Opportunity Terms correct appropriate reserve miss condition depart discount difficult fail critical Rationalization Terms therefore find out it s OK get w/1 back challenge find it figure out catch complex does not w/1 make sense doesn t w/1 make sense Page 16
17 Proactive Fraud Analysis Research Bribery Case Keyword hits as a percentage of total s Incentive/Pressure Terms Opportunity Terms Rationalization Terms Investigation timeframe, September 2006 to March 2007 Page 17
18 Proactive Fraud Analysis Research Bribery Case Selected Top Keyword Hits During Peak Period Incentive/Pressure Terms Opportunity Terms manage risk short problem commit concern clear fake cover policy fund complain investigate process w/5 fee consult audit offshore renewal Rationalization Terms error therefore challenge complex entitled get w/1 back catch mistake justified find out Page 18
19 Visualizing the Fraud Triangle: Via Online Dashboard Page 19
20 Drill down by custodian, focus on key years Page 20
21 Drill down further into months Terms counts update for the custodian and specified months Page 21
22 If required, drill down to the source or instant message communication Page 22
23 Case Example: Global Consumer Products Company received more than 40 whistleblower hotline complaints from one of the regions in Mexico over a three month period In response, the company s internal audit team performed an investigation on the complaints Company wanted to review s for 28 custodians, in search of evidence that would further bolster the results of the investigations; however, time and budget was limited When EY became involved, we were provided little information pertaining to the various allegations EY processed the PST s using Fraud Triangle Analytics yielding 200,964 s. and attachments were searched using a combination of ACFE-EY Fraud Terms as well as terms provided by the Client ( Client Terms ) related to their various internal investigations. Page 23
24 Analysis of Client Terms Fraud Indicators for the top five custodians for high-risk terms Diesel vs Fraud Score 50 Results from the investigation line key words hits Trend Avg. Diesel_Per Trend Pressure key words hits Trend Avg. IP_Per Trend Avg. OP_Per 40 Opportunity key words hits Trend Trend Avg. RAT_Per Rationalization key words hits Trend Trend Jul 1 07 Sep 1 07 No v 1 07 Jan 1 08 Mar 1 08 May 1 08 Jul 1 08 Sep 1 08 Nov 1 08 Jan 1 09 Mar 1 09 May 1 09 Date Th e tren d of averag e o f Diesel_Per, averag e o f IP_Per, average of O P_Per an d averag e of RAT_Per with Date. Th e data is filtered on Date Year an d name. The Date Year filter has multip le members selected. Th e name filter keeps G ABRIEL ROSAS MORENO, JAVIER QUIROZ CHIAPA, JOSE LUIS HERNNDEZ GARCA (SALVATIERRA), RAFAEL ARREDONDO CARCIA (VALLE DE SANTIAGO) and VICTO R HUG O LO PEZ VALLADARES. Page 24
25 Advanced Analytics WHO WHAT WHEN WHY Social Networking Concept Clustering Communication Over Time Sentiment Analysis Who is talking to whom? about what? over which time period? how do they feel? People-to-people analysis Top words mentioned When communications occur Positive vs. Negative Sentiment Entity-to-entity analysis Map communication lines to organization chart Key concepts / topics Top or unusual dollar amounts Sensitive words / phrases Communication spikes around key business events Top 10 negative journal entries Top 10 angry s Top 10 most concerned s SSN Customer survey analysis CCN Employee survey analysis Page 25
26 Visual Analytics Entity Extraction Geographic view Why so many mentions of Colombia? We don t do business in Colombia! Page 26
27 Considering Structured Data Low Detection Rate High Structured Data Traditional Rules-Based Queries & Analytics Model-Based Analysis Visual Analytics Unstructured Data Traditional Keyword Searching Latent Semantic Analysis Natural Language Processing High False Positive Rate Low Page 27
28 Fraud Risk Areas to Consider Asset Misappropriation Corruption / FCPA Financial Statement Cash Disbursements Bid Rigging Accounts Payable General Ledger Conflicts of Interest Account Receivable Materials Management & Inventory Control Purchase Order Management Salaries & Payroll Travel & Expenses Contract Compliance Kickbacks Materials Management & Inventory Control Purchase Order Management Deposits General Ledger Materials Management & Inventory Control Purchase Order Management Vendor Management Payment Cards Sales Analysis Travel & Expenses Revenue Recognition / Procure to Pay Sales Analysis Note: Some categories may overlap depending on the objectives of the investigation. Page 28
29 Data Analytics Common Areas of Interest 1. Payment stream analysis Altered invoices, goods not received, duplicate invoices, inflated prices, excess quantities purchased 2. Vendor master/employee master comparisons Fictitious vendors, vendor risk ranking, conflicts of interest 3. Employee expenses Over limits, unusual expenses, miscellaneous/sundry expenses, consultant payments 4. P-card expenditures 5. Payroll Over limits, unusual expenses, miscellaneous/sundry expenses Ghost employees, unusual payments, no deductions/evaluations, direct deposit account analysis 6. Bribery & Corruption / FCPA Bid rigging, conflicts of interest, contract compliance, kickbacks, payments to outside consultants Page 29
30 Find Hidden Money Recover Erroneous, Negligent or Fraudulent Payments Different Vendor ID Same Date Exact Same Amount Different Invoice # Same Reference / Job Code Similar names Some with same address Page 30
31 Predictive Modeling Analyze 400,000 transactions for suspected bribery payments (400 man-days) 1. Ernst & Young team reviewed 2,000 transactions from ledger data (text comments, amounts, dates, etc.) Identified 400 suspicious and 1,600 non-suspicious entries 2. Created statistical model: Is Suspicious / Is Not Suspicious Incorporated both structured and unstructured data into the model 3. Applied model to remaining 398,000 additional transactions 4. Identified 14,000 new suspicious transactions With confidence over 95% similar to Is Suspicious Identified over $8 million of highly suspicious payments Page 31
32 Predictive Modeling (Step 2) Perform text analytics Volume contract facilitation Perform Text Analytics on free text fields Conduct term frequency analysis for most occurring or unusual transaction descriptions Capture concepts release expense Page 32
33 Predictive Modeling (Step 3) Prepare the model Perform Variable Analysis These variables were less important when predicting suspicious transactions. Client should focus resources on monitoring efforts for the three leading drivers which accounts for 80% of the predictive value. These three variables were this highest drivers of suspicious transactions Page 33
34 Customized on-line compliance monitoring tools Uploads / integrates with transactional data sources Drill down capabilities by subsidiary or region Dynamic reporting Web-based Rules-based and model based analytics Page 34
35 Monitoring online reports Anomaly Detection Names have been partially redacted Page 35
36 Benford s Law (In naturally occurring numbers) Where d is the leading digit and p is the probability. Source: Wikipedia Page 36
37 Benford s Law Practical Examples Applications: Expense costs, Vendor invoices, Sales Figures, and Insurance Claims should follow Benford s Law 1 Spot dummy vendors in data manipulation schemes Majority of improper purchases begin with 7, 8, or 9 which is just the opposite of Benford s predicted patterns Consequently, fraudulent invoices are easier to detect using Benford s Law than by random sampling. Also identify amounts just below pre-defined cut-offs As shown, the threshold for second approval was $4,000 so invoices often began with 3 (as in $3,999) Analysis of 10,000 vendor invoices 1. Per Mark Nigrini, a Ph.D., and a chartered accountant: After several years of studying Benford s Law, he published his thesis in 1992 demonstrating that Benford s Law could be used to detect fraud and to detect rounded numbers. His studies revealed that sales figures, insurance claim costs, and expense claims should follow Benford s Law. Page 37
38 Final considerations for our clients Assess risk Part of planning, or just a repeat of last year Measure risk Is it just rules based? Consider unstructured (text-based) data Consider incorporating the fraud triangle concept Improve business performance Not just risk mitigation FCPA awareness Find hidden money Reduce costs Page 38
39 Thank you Daniel Torpey, CPA, CITP Partner, Assurance Services Fraud Investigation & Dispute Services Dallas, Texas (214) Vincent Walden, CFE, CPA, CITP Senior Manager, Assurance Services Fraud Investigation & Dispute Services Dallas, Texas (214) Page 39
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview
More informationAdvanced Data Analytics, the Fraudsters Worst Enemy
Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability
More informationDemystifying Big Data Analytics
Demystifying Big Data Analytics Practical approaches to business intelligence and forensic analytics 9 May 2013 Discussion topics Big Data & Big Data Analytics Current fraud risks - industry research Components
More informationEmerging Trends in Fraud Analytics:
Global Risk Advisory Services Emerging Trends in Fraud Analytics: Accounting for Words Text Analytics is a promising new forensic technique for the investigator 4 th Annual Text Analytics Summit Vincent
More informationTypes of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down
Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients
More informationby: Scott Baranowski, CIA
Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf
More informationPresented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception
More informationTaking Data Analytics to the Next Level
Taking Data Analytics to the Next Level Implementing and Supporting Big Data Initiatives What Is Big Data and How Is It Applicable to Anti-Fraud Efforts? 2 of 20 Definition Gartner: Big data is high-volume,
More informationLeveraging Big Data to Mitigate Health Care Fraud Risk
Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud
More informationInternal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen
Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,
More informationAGA Kansas City Chapter Data Analytics & Continuous Monitoring
AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help
More informationUsing Data Analytics to Detect Fraud. Other Data Analysis Techniques
Using Data Analytics to Detect Fraud Other Data Analysis Techniques Qualitative Data Analysis Most data analysis techniques require the use of data in the form of numbers. Qualitative data analysis is
More informationProcurement Fraud Identification & Role of Data Mining
The paper describes the known boundaries of Procurement Fraud and outlines the scope of data mining within the same. The paper also highlights some of the basic steps to be taken care of before the application
More informationIntegrating Data Analytics into Internal Audit
Integrating Data Analytics into Internal Audit IIA Beach Cities Meeting May 19, 2011 Agenda Introductions Background Industry Perspective Benefits of Challenges in Examples / Case Studies Tools Of The
More informationFraud Prevention Training
Fraud Prevention Training Kim Turner, Chief Audit Executive Emily Knopp, Audit Director Fraud Prevention: WHAT YOU WILL LEARN & FRAUD FACTS What you will take away with you: Glossary of Fraud Terms Details
More informationPerp Poetry. Fraud & Embezzlement: Lessons From the Trenches. Presented by. acumen insight. ideas attention reach. expertise depth agility talent
acumen insight Fraud & Embezzlement: Lessons From the Trenches ideas attention reach Presented by Angela Morelock, CPA, CFE, CFF, ABV, Certified Forensic Accountant www.bkdforensics.com expertise depth
More informationTHE ABC S OF DATA ANALYTICS
THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable
More informationFRAUD RISK ASSESSMENT
FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by
More informationThe auditors responsibility to consider fraud in an audit of financial statements
The auditors responsibility to consider fraud in an audit of financial statements Audit in a nutshell Reality Picture (= financial statements) Balance sheet Assets Liabilities Equity Process Detection
More informationIs There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner
Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner Learning Objectives: Understand how fraud can occur Learn procedures you can implement to prevent fraud Learn how to detect fraud Common Situations
More informationFraud Prevention: The Prevention and Detection of Fraud Begins with You
Fraud Prevention: The Prevention and Detection of Fraud Begins with You Takeaways What is fraud? Definition Facts Four factors Fraud risk assessment Four evaluation criteria Common fraud schemes Case studies
More informationFinancial Services Group
Fraud Detection and Prevention Presented by: Carrie Kennedy, CPA, Partner Anthony Porter, CPA, Manager 1 The material appearing in this presentation is for informational purposes only and should not be
More informationData Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP
Data Mining/Fraud Detection April 28, 2014 Jonathan Meyer, CPA KPMG, LLP 1 Agenda Overview of Data Analytics & Fraud Getting Started with Data Analytics Where to Look & Why? What is Possible? 2 D&A Business
More informationInvestigative Techniques
Investigative Techniques Data Analysis and Reporting Tools 2016 Association of Certified Fraud Examiners, Inc. Data Mining v. Data Analysis Data mining is the science of searching large volumes of data
More informationFRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE
FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE CPAs & ADVISORS experience reach // S. Todd Burchett, CPA, ABV, ASA, CFF, CFE Partner tburchett@bkd.com 210.268.1932 AGENDA
More informationFRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM
FRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM Presenter: Zamani Nxumalo SAS, National Treasury 30 March 2011 CONTENTS Key Terms & Definitions Process & Challenges Fraud
More informationFraud: Real Stories, Real People, Real Impact
Fraud: Real Stories, Real People, Real Impact Chris Harper, CPA, MBA Senior Manager Types of Fraud Asset misappropriation Fraudulent financial reporting Identity theft Detection Skills The Fraud Triangle
More informationCentre for Corporate Governance. Sample listing of fraud schemes
Centre for Corporate Governance Sample listing of fraud schemes Sample listing of fraud schemes The following listing of possible fraud schemes can be utilized by management and auditors to assist in identifying
More informationGLOBAL PORTS INVESTMENTS PLC
Adopted by the Directors of GLOBAL PORTS INVESTMENTS PLC Resolution of 14 July 2008 GLOBAL PORTS INVESTMENTS PLC (previously GLOBAL PORTS INVESTMENTS LTD) ANTI-FRAUD POLICY TABLE OF CONTENTS 1. INTRODUCTION.....
More informationOffice of the Inspector General
Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs April 2005 Dear Public Officials: April
More informationSharon Kurek, CPA, CFE Director of Internal Audit
Sharon Kurek, CPA, CFE Director of Internal Audit What You Will Take Aware With You Definition of Internal Auditing Scope of Audit Activities Risk and Control Process Common Audit Topics Fraud Awareness
More informationIntroductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP eferrara@forrester.com. Copyright 2015 Edward S.
MIS 520 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP eferrara@forrester.com Fraud Awareness & Internal Controls Awareness Internal
More informationU S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S A C a s e W a r e I D E A R e s e a r c h R e p o r t CaseWare IDEA Inc.
More informationUsing Technology to Automate Fraud Detection Within Key Business Process Areas
Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd
More informationT&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud
T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud FEATURED FACULTY: Richard B. Lanza, CPA, CFE, CGMA, President of Cash Recovery Partners LLC 973-729-3944 rich@richlanza.com
More informationFraud Awareness Training
UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for
More informationISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore
With ever-increasing data volumes, more sophisticated fraud patterns, and a drive for strong corporate governance, how can organisations build a culture of integrity and compliance? Learn how data analytics
More informationInvoice Number Vendor Number Amount 129304 A543891 $1,035.71 129304 A543891 $1,035.71
Fraud Detection: Using Data Analysis Techniques A new approach being used for fraud prevention and detection involves the examination of patterns in the actual data. The rationale is that unexpected patterns
More informationDiploma in Forensic Accounting (Level 4) Course Structure & Contents
Brentwood Open Learning College Diploma in Forensic Accounting (Level 4) Course Structure & Contents Diploma in Forensic Accounting Course Structure & Contents Page 1 Unit 1 Introduction Forensic Accounting
More informationAccounts Payable Best Practices
Accounts Payable Best Practices Presented by: Eddy Castaneda, CPA, MBA Accounts Payable Best Practices Top Practices AP Top Practices Document your current AP procedures Can identify overlapping work Can
More informationFraud Prevention and Detection in a Manufacturing Environment
Fraud Prevention and Detection in a Manufacturing Environment Introduction The Association of Certified Fraud Examiners (ACFE) estimated in its 2008 Report to the Nation on Occupational Fraud and Abuse
More informationACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST
ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST 1 Our Objective To assist organizations in finding lost thousands of dollars in profits through duplicate payments, duplicate billings, overpayments,
More informationCash Flow Management: The Life of Your Business
Cash Flow Management: The Life of Your Business Brian S. Gottschalk CPA Partner GellerRagans Certified Public Accountants Advisors Cash Flow- defined Movement of money received and spent: the pattern of
More informationUse of Data Extraction & Analysis Software In a Financial Statement Audit
Use of Data Extraction & Analysis Software In a Financial Statement Audit A Message from The Audit Wizard April 2008 Making Auditors Proficient, Inc. Phone: 352-750-9636 www.billallen.com E-mail: ballen@billallen.com
More informationAn Auditor s Guide to Data Analytics
An Auditor s Guide to Data Analytics Natasha DeKroon, Duke University Health System Brian Karp Services Experis, Risk Advisory May 11, 2013 1 Today s Agenda Data Analytics the Basics Tools of the Trade
More informationSecrets, Conspiracies and Hidden Patterns: Fraud and Advanced Data Mining
Secrets, Conspiracies and Hidden Patterns: Fraud and Advanced Data Mining Shauna Woody-Coussens Director, Forensic & Valuation Services Jeremy Clopton Manager, Forensic & Valuation Services Agenda Fraud
More informationMicrosoft Confidential
Brock Phillips, CPA, CFE, CCEP Forensic Accounting Sr. Manager Financial Integrity Unit Microsoft Audit Group Lou DeCola, CPA, CIA, CFE Forensic Accounting Sr. Manager Financial Integrity Unit Microsoft
More informationOffice of the Inspector General
Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs Second Edition American Recovery and Reinvestment
More informationPREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM
IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM Auditors need to understand that while audit findings are common, they are not necessarily fraud and due care is needed in building evidence.
More informationStrong Corporate Governance & Internal Controls: Internal Auditing in Higher Education
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Contents Introduction Internal Audit as Trusted Advisor & Business Partner Big Ticket Items: Fraud, Revenue Leakage
More informationLGMA Qld Governance and Corporate Planning Village Forum
www.pwc.com.au Fraud Risk Management Fraud Risk Assessments LGMA Qld Governance and Corporate Planning Village Forum March 2015 Agenda Introductions Fraud Risk Management Fraud Statistics s Global Economic
More informationFraud Awareness and Prevention Program Report
Internal Audit Department Fraud Awareness and Prevention Program Report Project 2009-263 A Review of Fraud Awareness, Prevention, Detection and Risk Mitigation Practices in Landfill Operations, Central
More informationInternal Control Risks Associated with Information Technology. Kevin M. Bronner, Ph.D.
Internal Control Risks Associated with Information Technology By Kevin M. Bronner, Ph.D. Introduction: The Risk of Information Technology Fraud The information technology (IT) function is important to
More informationRED FLAGS OF FRAUD MAY 13, 2014 IIA AUSTIN CHAPTER
MAY 13, 2014 IIA AUSTIN CHAPTER 2014 by the Association of Certified Fraud Examiners, Inc. Revised: 3/26/14 No portion of this work may be reproduced or transmitted in any form or by any means electronic
More informationManaging FCPA (Foreign Corrupt Practices Act) Risks
Managing FCPA (Foreign Corrupt Practices Act) Risks Diana Shin - Partner Jacqueline Fan Associate Director Fraud Investigation and Dispute Services July 2010 Agenda 1. Compliance pressure points 2. Putting
More information2/5/2013. Session Objectives. Higher Education Headlines. Getting Started with Data Analytics. Higher Education Headlines.
+ Getting Started with Data Analytics Prepared for the UCOP Auditor s Symposium January 30, 2013 and February 14, 2013 Session Objectives 2 Higher Education Headlines New IIA Guidance Visual Risk IQ s
More informationFORENSIC ACCOUNTING What s in it for me? Albany, NY June 14, 2011
FORENSIC ACCOUNTING What s in it for me? Albany, NY June 14, 2011 Presented by Gary J. Cassiello, CPA, ABV, CFF garyc@jgspc.com 845-692-9500 Today s Outline Why is Forensic Accounting important? Executive
More informationExpert Systems in Fraud Detection: Expert Knowledge Elicitations in a Procurement Card Context
Expert Systems in Fraud Detection: Expert Knowledge Elicitations in a Procurement Card Context 12 th Fraud Seminar December 1, 2015 Presented by: Deniz Appelbaum Abdullah Al-Awadhi Knowledge Based Expert
More informationForensic Auditing: The Audit of the Future, Today. Instructor: Ron Durkin, CFE, CPA/CFF, CIRA
Forensic Auditing: The Audit of the Future, Today Instructor: Ron Durkin, CFE, CPA/CFF, CIRA 1 1 Agenda Current events and developments in forensic accounting Define the term forensic auditing What is
More informationInternal Controls Best Practices
Internal Controls Best Practices This list includes the most common internal controls applied by small to medium sized businesses to their operations. It includes controls that apply to the processes most
More informationFighting Fraud with Data Mining & Analysis
Fighting Fraud with Data Mining & Analysis Leonard W. Vona December 2008 Fraud Auditing, Inc. Phone: 518-784-2250 www.fraudauditing.net E-mail: leonard@leonardvona.com Copyright 2008 Leonard Vona and Fraud
More informationHow To Understand And Understand Forensic Accounting
Forensic Accounting and Investigations University of Texas at Arlington 14 August 2013 Overview What is Forensic Accounting? Definition and Services The Forensic Accountant History Roles Within Organizations
More informationACCOUNTING RECORDS: HOW THEY ARE USED TO CONCEAL FRAUD. ROSANNE TERHART, CFE, CA Senior Manager BDO Canada LLP Vancouver, British Columbia Canada
Once an employee commits fraud, he has limited time to conceal the financial transaction in the accounting records. Learn how employees hide these fraudulent transactions and what to look for when reviewing
More informationHow To Prevent Fraud On A Credit Card
Fraud Detection and Prevention Financial Management Advisory Council August 28, 2014 Sarah Mahugh, CPA, MBA Financial Audit Audit Manager Overview Fraud trends Fraud Risks and internal controls Case Studies
More informationNeil Meikle, Associate Director, Forensic Technology, PwC
Case Study: Big Data Forensics Neil Meikle, Associate Director, Forensic Technology, PwC 6 November 2012 About me Transferred to Kuala Lumpur from PwC s Forensic Technology practice in London, England
More informationSeptember 28, 2011. Audit s Role in Governance, Risk Management and Internal Control
September 28, 2011 Internal Audit Overview Audit s Role in Governance, Risk Management and Internal Control Mission Provide independent, objective assurance and advisory services designed to add value
More informationContents. xiii xv. Case Studies Preface
Case Studies Preface xiii xv CHAPTER 1 What Is Fraud? 1 Fraud: A Definition 3 Why Fraud Happens 4 Who Is Responsible for Fraud Detection? 7 What Is a Fraud Awareness Program? 11 Screening Job Applicants
More informationSteven Boyer Vice-President, Gallagher Bassett Services Inc.
Employee Dishonesty and Fraud Motive, Rationale & Opportunity Steven Boyer Vice-President, Gallagher Bassett Services Inc. Randall Wilson, CPA/CFF, CFE, Cr.FA Partner, National Practice Director Fraud
More informationFraud Control Theory
13 Fraud Control Theory Using a variation of a saying from the 1960s, fraud happens. Like all costs of doing business, fraud must be managed. Management must recognize that people commit fraudulent acts
More informationBenford s Law and Digital Frequency Analysis
Get M.A.D. with the Numbers! Moving Benford s Law from Art to Science BY DAVID G. BANKS, CFE, CIA September/October 2000 Until recently, using Benford s Law was as much of an art as a science. Fraud examiners
More informationBoard Matters Quarterly Critical insights for today s audit committee
EY Center for Board Matters Board Matters Quarterly Critical insights for today s audit committee In this issue Dealing with big data 02 The board s role in addressing data and analytics Directors need
More informationFraud Prevention and Deterrence
Fraud Prevention and Deterrence Fraud Risk Assessment 2016 Association of Certified Fraud Examiners, Inc. What Is Fraud Risk? The vulnerability that an organization faces from individuals capable of combining
More informationSAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY
SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY NOTE: This appendix is a sample from another entity. As such, no adjustment has been made to this material. The information may or may not agree with all the
More informationSix Financial Oversight Strategies for Nonprofits
Six Financial Oversight Strategies for Nonprofits You Inspire Us! 1) Greet your new friends! 2) Surf the binder and resources 3) Enjoy The Hope Center 4) Watch for MORE resources in 7 days: ECFA.org/Content/Six-Financial-Oversight-Strategiesfor-Nonprofits
More informationDeveloping and Implementing a Fraud Risk Assessment. Josh Shilts CPA/CFF, CFE
Developing and Implementing a Fraud Risk Assessment Josh Shilts CPA/CFF, CFE MY GOAL HAVE YOU WALK AWAY WITH THE KNOWLEDGE AND TOOLS TO COMPLETE A FORMAL & USEFUL FRAUD RISK ASSESSMENT!!! Before We Begin,
More information5 Important Controls to Mitigate Employee Fraud
5 Important Controls to Mitigate Employee Fraud LMCIT WEBINAR : FEBRUARY 10, 2015 IN PARTNERSHIP WITH EIDE BAILLY Presenter: Jason Olson, MBA, CPA/CFF, CFE, CFI Presentation Disclaimer These seminar materials
More informationA Guide to Forensic Accounting Investigation. 2nd Edition
Brochure More information from http://www.researchandmarkets.com/reports/2211320/ A Guide to Forensic Accounting Investigation. 2nd Edition Description: Recent catastrophic business failures have caused
More informationChapter 15: Accounts Payable and Purchases
Accounting Research Manager - Audit Private Accounting Research Manager Miller Interpretations and Other Resources Knowledge-Based Audit Procedures Chapter 15: Accounts Payable and Purchases Chapter 15:
More informationExpenditures Internal Audit Report
Expenditures Internal Audit Report Report #2014-1 June 9, 2014 Table of Contents Table of Contents... 2 Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives... 4 Scope...
More informationCan Financial Statement Auditors Detect More Fraud? How Can PCAOB Make that Happen?
Can Financial Statement Auditors Detect More Fraud? How Can PCAOB Make that Happen? David L. Cotton, CPA, CFE, CGFM Cotton & Company, LLP November 20, 2014 The views expressed in these slides are solely
More informationFraud and Role of Information Technology. September 2008
Fraud and Role of Information Technology September 2008 Agenda IT Value Proposition Slide 2 Prior Interpretations of Internal Control Structure Have Addressed Three Separate Parts Which Were Audited Somewhat
More informationChapter 15 Auditing the Expenditure Cycle
Chapter 15 Auditing the Expenditure Cycle Expenditure cycle consists of activities related to the acquisition of and payment for plant assets and goods and services. Two major transaction classes: 1 purchases
More informationAuditing for Value in the Procure to Pay Cycle Dallas IIA Chapter. October 1, 2009
Auditing for Value in the Procure to Pay Cycle Dallas IIA Chapter October 1, 2009 Supply Chain Risk Overview * Today s Focus * Includes Working Capital benefits 1 2009 Protiviti Inc. An Equal Opportunity
More informationCOMPLIANCE POLICY MANUAL
COMPLIANCE POLICY MANUAL FOREIGN CORRUPT PRACTICES ACT 07/24/2012 Policy Number 16-100 SUBJECT: FOREIGN CORRUPT PRACTICES ACT Application: Worldwide Strategic Business Units and Subsidiaries. It is the
More informationProactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you
3/27/2012 Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you Executive Summary The time to test fraud controls is before you have a fraud
More informationA DOZEN IDEAS FOR SMALL BUSINESS FRAUD PREVENTION
A DOZEN IDEAS FOR SMALL BUSINESS FRAUD PREVENTION Any discussion of fraud can be a difficult one because most individuals value being a trusted member of any organization and, in most cases, key employees
More informationA STUDY ON FORENSIC ACCOUNTING AND ITS USABILITY By Jyotsana S. Agarwala
A STUDY ON FORENSIC ACCOUNTING AND ITS USABILITY By Jyotsana S. Agarwala Abstract: Forensic accounting is not a new field, but in recent years, banks, insurance companies and even police agencies have
More informationUsing Data Analytics to Detect Fraud
Using Data Analytics to Detect Fraud Fundamental Data Analysis Techniques 2016 Association of Certified Fraud Examiners, Inc. Discussion Question For each data analysis technique discussed in this section,
More informationPurchasing Card Program
Purchasing Card Program User Guidelines University of North Alabama Procurement Department Created: March 2008 / Updated 7/16/2015 University of North Alabama Purchasing Card Program 1 Table of Contents
More informationGood Corporate Governance: Essential to Prevent Conflicts of Interest and Fraud Pakistan s s Experience
Good Corporate Governance: Essential to Prevent Conflicts of Interest and Fraud Pakistan s s Experience By: Asad Ali Shah Partner, Deloitte Pakistan Council Member, Institute of Chartered Accountants of
More informationInvestigation. Investigations
Investigation The Forensic Services team of PricewaterhouseCoopers has the knowledge and experience necessary to conduct comprehensive fraud investigations. Our team in Poland has jointly performed in
More informationWhy is Internal Audit so Hard?
Why is Internal Audit so Hard? 2 2014 Why is Internal Audit so Hard? 3 2014 Why is Internal Audit so Hard? Waste Abuse Fraud 4 2014 Waves of Change 1 st Wave Personal Computers Electronic Spreadsheets
More informationAbila. MIP Fund Accounting. Solutions overview. Accounts payable. Accounts receivable reporting, billing, and sales order entry
Abila MIP Fund Accounting To help you deliver on your mission, MIP Fund Accounting is a configurable fund accounting solution that allows you to report and track information most important to you, your
More informationEmployee Embezzlement and Fraud. Defending Against Insider Threats
Employee Embezzlement and Fraud Defending Against Insider Threats Today s Approach An open dialogue and sharing of information regarding a common threat of internal losses. There is no guarantee that any
More informationKEYS TO AN EFFECTIVE DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA
KEYS TO AN EFFECTIVE ANTI-FRAUD PROGRAM WAYNE PURVES DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA AHIA 32 nd Annual Conference August 25-28, 2013 Chicago, Illinois
More informationPerforming Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained
Performing Audit Procedures in Response to Assessed Risks 1781 AU Section 318 Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained (Supersedes SAS No. 55.)
More informationGOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments
GOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments Audit Report OIG-A-2013-018 September 20, 2013 NATIONAL RAILROAD PASSENGER CORPORATION Office of Inspector General REPORT HIGHLIGHTS Why
More informationFraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A
Brochure More information from http://www.researchandmarkets.com/reports/2866056/ Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A Description: Detect fraud faster no
More informationBusiness Process Mining for Internal Fraud Risk Reduction: Results of a Case Study
Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study Mieke Jans, Nadine Lybaert, and Koen Vanhoof Hasselt University, Agoralaan Building D, 3590 Diepenbeek, Belgium http://www.uhasselt.be/
More informationAudit Guide for Audit Committees of Small Nonprofit Organizations
Audit Guide for Audit Committees of Small Nonprofit Organizations A free resource provided by the Virginia Society of Certified Public Accountants Audit Guide for Small Nonprofit Organizations A free resource
More information