Fraud Detection and Prevention: Transactional Analysis for Effective Fraud Detection W H I T E P A P E R
|
|
|
- Melina Carter
- 10 years ago
- Views:
Transcription
1 Fraud Detection and Prevention: Transactional Analysis for Effective Fraud Detection W H I T E P A P E R
2 FR AUD MANAGEMEN T ISSUES Fraud is a dominant form of white collar crime that continues to extract a significant toll not only on the organizations that fall prey to it, but also on investors, financial institutions, and the economy in general. There are several issues that make effective fraud management a particularly challenging task. These include: enormous and ever-expanding volumes of data; the growing complexity of systems; changes in business processes and activities; continuous evolution of newer fraud schemes to bypass existing detection techniques; risks of false alarms; and regulatory issues related to employee privacy and discrimination. As new compliance and standards initiatives such as Sarbanes-Oxley (SOX) and Statement and Auditing Standards (SAS) No. 99 create an increasingly more complex regulatory environment for organizations across the globe, demand has increased for greater scrutiny and visibility into the effectiveness of internal controls to minimize errors and reduce the opportunity for occupational fraud. This white paper focuses on the nature and scope of fraud, the limitations of traditional measures of fraud detection and prevention, and solutions based on transactional data analysis. T HE NAT URE OF FR AUD In its 2004 Report to the Nation on Occupational Fraud and Abuse 1, the Association of Certified Fraud Examiners (ACFE) defines occupational fraud as the use of one s occupation for personal enrichment through the deliberate misuse or misapplication of the employing organization s resources or assets. Frauds generally fall into three broad categories: asset misappropriations, corruption, and fraudulent financial statements. Asset misappropriations include revenue skimming, inventory theft, and payroll fraud. Common examples of corruption include accepting kickbacks and engaging in activities that represent a conflict of interests. Fraudulent statements generally involve falsifying an organization s financial statements by overstating revenues or understating liabilities and expenses. The vast majority of frauds surveyed in the ACFE study fell into the first category, asset misappropriations, which occurred in more than 90 percent of the cases reviewed. Conversely, fraudulent statements were the least commonly reported fraud (8 percent), but had the highest median loss ($1,000,000). 2 [All figures quoted in US dollars unless otherwise noted.] In addition to the direct financial costs of fraud, organizations must cope with a range of indirect costs. Damage to a company s reputation can have substantial fallout and lead to punishing market setbacks. Loss of customer confidence translates directly into reduced revenues and profits. And employee morale can suffer, impacting organizational productivity and the ability to attract and retain qualified staff. 1 Association of Certified Fraud Examiners, 2004 Report to the Nation on Occupational Fraud and Abuse, Association of Certified Fraud Examiners, Austin, TX Association of Certified Fraud Examiners, 2004 Report to the Nation on Occupational Fraud and Abuse, Association of Certified Fraud Examiners, Austin, TX
3 T HE EFFEC T O F S A RBA NES- OX L EY The new requirements of the Sarbanes-Oxley Act of 2002 state that it s no longer enough to simply maintain internal controls management must now assert annually as to the effectiveness of those controls. According to a report by PriceWaterhouseCoopers, the Securities and Exchange Commission (SEC) rules regarding implementation of SOX section 404 refer explicitly to controls related to the prevention, identification, and detection of fraud. 3 Corporate management must evaluate and test the design and operating effectiveness of anti-fraud controls on an ongoing basis. Effectively, it s simply not enough for organizations to comply with the new SOX regulations they must also prove they are taking proactive, significant action to prevent and detect fraud before it becomes an issue resulting in a material deficiency requiring external reporting. T HE E X T EN T A ND COSTS OF FR AUD The ACFE estimates that six percent of organizations revenues are lost each year as a result of occupational fraud and abuse. Within the United States, this translates into losses of approximately $660 billion. The ACFE 2004 Report covered 508 occupational fraud cases that resulted in losses of more than $761 million. The median loss for all cases in the study was $100,000, with 15 percent of the frauds causing losses of at least $1 million, and one in five causing losses of at least $500,000. Diagram 1: Distribution of Dollar Losses Dollar Loss Range ,000-9, % 2.3% Distribution of Dollar Losses 12.3% 10.2% % 10,000-49, % 12.9% 50,000-99, % 29.2% 100, , % 500, , % 8.5% 1,000,000 and up 14.6% 16.5% 0% 5% 10% 15% 20% 25% 30% 35% Percent of Cases Source: 2004 Report to the Nation on Occupational Fraud and Abuse, Association of Certified Fraud Examiners The losses are huge, and according to the ACFE study, once the loss has occurred, the chance of recovering the funds in full is only 20 percent and over a third of that recovery is thanks to adequate insurance coverage. Nearly 40 percent of survey respondents in the ACFE study reported that they recovered nothing at all. With billions of dollars funneling through the hands of fraudsters, the cost of timely detection or prevention of fraud is minimal when compared with the expense and effort expended to attempt recovery of lost funds. 3 PriceWaterhouseCoopers, The Emerging Role of Internal Audit in Mitigating Fraud and Reputation Risks,
4 Forensic accounting and fraud examination specialists, Summerford Accountancy PC, were hired by the Los Angeles Unified School District (LAUSD) to perform an examination of the District s Belmont Learning Complex project. Mired with problems and a price tag estimated at over $200 million, the construction project for the high school became the most expensive in the country before the District was forced to step in and stop construction. Using ACL data analytics technology, the Summerford Accountancy investigative audit uncovered: 48 budget transfers authorized by one employee for $49,999 each within a four-month period circumventing LAUSD s policy requiring that any spending greater than $50,000 receive approval from the Board of Education Overbilling of $2.1 million through payment applications made by the project developer, construction contractor, and some of the sub-contractors Circumvention of the proper payment codes using direct payments, resulting in outstanding encumbrances over a period of five fiscal years totalling approximately $77.8 million Globally, fraud is taking its toll as well. Total reported fraud in the UK more than doubled, from 331 million in 2003 to 756 million in While the actual number of cases was not dramatically different 229 cases of fraud over 50,000 reported in 2004 compared to 211 cases in 2003 their value was much higher, particularly in the areas of tax fraud and breach of regulations. In the Ernst & Young 8th Global Survey, nearly 50 percent of respondents reported experiencing a significant fraud in the previous year. 5 When asked what factors were most likely to prevent or detect fraud, the majority of organizations stated that internal controls are generally the best-accepted manner in which to do so. However, the E&Y survey revealed that more often than not, the internal control which was created to prevent or detect the fraud was either overridden, or not properly understood by staff responsible for implementing said control. 6 HOW FR AUDSTERS E XPLOIT COMPLE X SYSTEMS Typically, fraudsters detect or stumble upon areas with weak cross-departmental or cross-organizational controls, often the site of the interfaces between two or more computer applications or systems. The perpetrator is confident that there is very little regular crosssystem validation, given the challenges inherent in accessing and analyzing frequently incompatible data formats. Many organizations lack the in-house capability to carry out such complex tasks efficiently and in a frequent, timely fashion. The complexity grows geometrically when multiple systems are involved. 4 BDO Stoy Hayward, Fraud Explosion: White collar crime doubles in a year, Spring Ernst & Young, Fraud: The Unmanaged Risk, 8th Global Survey, Ernst & Young, Fraud: The Unmanaged Risk, 8th Global Survey,
5 The KPMG Fraud Survey 2003 reported that of the factors contributing to fraud in the organization, inadequate internal controls rated as the second highest at 39 percent, and management override of internal controls rated third at 31 percent. 7 Continuous review of the internal controls is required to ensure that the controls that have been established remain in place and remain effective. In addition to having adequate controls, the challenge is for auditors and fraud examiners to look beyond the controls and find loopholes in the system where fraud could occur. TO PRE V EN T A ND DETEC T: T HE TR A D I T I O N A L A PPROACH Organizations have traditionally sought to detect and prevent fraud by implementing appropriate internal controls. Internal Audit teams test and validate these controls during regular audit review processes. They do not, however, usually have direct responsibility for ensuring that fraud does not occur. Although Internal Audit often uncovers instances of fraud 24 percent of detected cases according to the ACFE study its role is essentially reactive. Internal controls and external audit are responsible for uncovering a further 30 percent of detected fraud, while the balance of detected cases come to light through tips or accident. Initial Detection of Occupation Frauds Diagram 2: Initial Detection of Frauds Detection Method Tip Internal Audit By Accident Internal Controls External Audit 23.8% 18.6% 21.3% 18.8% 18.4% 15.4% 10.9% 11.5% 39.6% 43.0% Notified by Police 0.9% 1.7% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Percent of Cases Source: 2004 Report to the Nation on Occupational Fraud and Abuse, Association of Certified Fraud Examiners L IMITAT I O NS O F T R A D I T I O N A L A PPROACH ES TO FR AUD DETEC T I O N In many organizations, both systems and their underlying transactions are becoming increasingly complex with data volumes often growing exponentially. While strong internal controls and appropriate audit procedures undoubtedly have a degree of effectiveness in preventing and detecting fraud, it is unrealistic to assume that they are completely effective. 7 KPMG, Fraud Survey 2003, KPMG Forensic,
6 In fact, the ACFE study discovered that more frauds were detected by accident (21 percent) than by the application of either internal controls (18 percent) or external audit (11 percent). There also remains a strong likelihood for many large organizations that a very significant number of frauds are simply never detected. The fact that so many frauds are detected by accident implies that there is great opportunity for organizations to strengthen their internal controls and audit procedures to more proactively seek out fraud and abuse. Even when frauds do come to light via traditional avenues, they are often found long after the fact, when they are well entrenched. Many detection methods, such as traditional pointin-time audit assessments, only occur on an annual basis or even less frequently in some instances. They are by nature historical examinations of data. The problem is that the longer the period the fraud remains undetected, the larger the financial loss is likely to be and the smaller the chance of recovering the funds from the perpetrator. The Austrian Ministry of Finance has an annual budget of over 110 billion per year and is responsible for the coordination of taxation and customs programs throughout Austria. The Ministry auditors must analyze enormous quantities of data from a wide variety of computer platforms, while operating under acute time pressures. In Austria, all companies and individuals must submit their tax data electronically, but are allowed to do so in many formats. ACL s flexible data analytics software has been key to the Ministry s ability to improve the scope and effectiveness of its tax audits. In one major initiative, over a four-year period, the Electronic Data Processing (EDP) audit team used ACL s powerful data analytics to identify, and then recover, 85 million in missed tax revenues and was able to stop a fraud scheme that had been exploited by the hospitality sector for years. BUILDING A BE T T ER M OUSE T R A P: T R A NSAC T I O N A L A N A LYSIS AND CO N T INUOUS M O NITO RING The Association of Certified Fraud Examiners (ACFE), 8 The Institute of Internal Auditors (IIA), 9 and the American Institute of Certified Public Accountants (AICPA) 10 all advocate the use of data analysis technologies to assist in fraud detection. Data analysis technology allows auditors and fraud investigators to obtain a quick overview of the company, develop an understanding of relationships between various data elements, and easily drill down into specific areas of interest Association of Certified Fraud Examiners, 2004 Report to the Nation on Occupational Fraud and Abuse, Association of Certified Fraud Examiners, Austin, TX The IIA Research Foundation, Proactively Detecting Occupational Fraud Using Computer Audit Reports, The IIA Research Foundation, American Institute of Certified Public Accountants, The Practicing CPA, Implementing Data Analysis Software, March Accounting Today, To CAATch a Thief: Use Software to Fight Fraud, August 9,
7 Despite the numerous benefits, many organizations only use such techniques on an occasional test basis, and often only in a reactive fashion, once a problem is suspected. In many cases, the tests performed are fairly simplistic and are unlikely to uncover more sophisticated frauds. The full power of data analysis technology has yet to be exploited by many organizations. The practice of transactional analysis is one of the most powerful and effective ways of detecting fraud within an organization. It generally includes a comprehensive series of tests designed to detect indicators of a wide range of frauds. To maximize its effectiveness as a fraud detection system, transactional analysis ideally will: Allow easy comparisons of data and transactions from multiple IT operational systems Work with a comprehensive set of indicators of potential fraud taking into account both the most common fraud schemes and those that relate specifically to the unique risks a particular organization may face Analyze all transactions within a given area and test them against the parameters that highlight indicators of fraud Perform the analyses and tests as close to the time of the transaction as possible, ideally even before the transaction has been finalized, and preferably on a continuous monitoring basis. By continuously monitoring operational data and transactions, organizations can catch frauds earlier in the fraud cycle, preventing greater losses, and quite often serving as a deterrent to other possible frauds. CH A L L ENGES TO EFFEC T I V E A PPLIC AT I O N O F T ECHNOLO GY Despite the proven and potential benefits, there have been significant challenges to effective, widespread application of transactional analysis and continuous monitoring. One challenge has been the time, cost, and technical expertise involved in extracting and comparing transactional data from multiple and different systems to detect a single instance of suspected fraud. Many indicators of potential fraud only arise when transactional data from one system is compared to that of another. Another has been developing flexible, easily adaptable continuous monitoring programs that can run alongside application systems, test data independently of those systems, and notify management in a timely manner when fraud indicators are detected. Such programs traditionally have been costly and time-consuming to create, often requiring existing systems to be retrofitted. In some organizations, difficulties arise from limited knowledge of the many types of possible fraud and how they might be perpetrated given the organization s operations. To find fraud, you have to know what it looks like. This requires a thorough understanding of the organization s internal controls, and their weaknesses, to design and conduct transactional analyses that provide meaningful results. 6
8 ACL has developed a dynamic approach to fraud detection and prevention that overcomes the technological data access, analysis, and monitoring challenges as well as the lack of organizational knowledge concerning fraud that can stymie effective application of transactional analysis and continuous monitoring. Before outlining ACL s combination of software and fraud detection expertise, we ll examine a number of statistical data analysis fraud detection techniques as well as give examples of specific types of fraud and the practical tests used to uncover those fraud activities. DATA A N A LYSIS TECHNIQUES FOR FR AUD DETEC T I O N A number of specific statistical data analysis techniques have proven their effectiveness in detecting fraud: Calculation of statistical parameters such as averages, standard deviations, and highest and lowest values to identify statistical anomalies Classifications to find patterns and associations among groups of data Stratifications of numeric values to identify unusual and outlying values Digital analysis, using Benford s Law, to identify statistically unlikely occurrences of numeric amounts Joining or matching data fields between disparate systems, typically looking for expected matches or differences for data such as name, address, telephone, or part/serial number Sounds like functions that identify fraudulent variations of valid company and employee names Duplicates testing that identifies both simple or complex combinations of duplication Gaps testing that identifies missing sequential data Summing and totaling to check control totals that may be falsified Graphing to provide visual identification of anomalous transactions 7
9 T YPIC A L T YPES OF FR AUD AND FR AUD TESTS Knowing what to look for is critical in building a fraud detection program. The following examples are based on descriptions of various types of fraud and the tests used to discover the fraud as found in Fraud Detection, Using Data Analysis Techniques to Detect Fraud. 12 Type of Fraud Tests Used to Discover This Fraud Fictitious vendors Run checks to uncover post office boxes used as addresses and to find any matches between vendor and employee addresses and/or phone numbers Be alert for vendors with similar sounding names or more than one vendor with the same address and phone number Altered invoices Search for duplicates Check for invoice amounts not matching contracts or purchase order amounts Fixed bidding Summarize contract amount by vendor and compare vendor summaries for several years to determine if a single vendor is winning most bids Calculate days between close for bids and contract submission date by vendor to see if the last bidder consistently wins the contract Goods not received Search for purchase quantities that do not agree with contract quantities Check if inventory levels are changing appropriate to supposed delivery of goods Duplicate invoices Review for duplicate invoice numbers, duplicate date, and invoice amounts Inflated prices Compare prices across vendors to see if prices from a particular vendor are unreasonably high Excess quantities Review for unexplained increases in inventory purchased Determine if purchase quantities of raw materials are appropriate for production level Check to see if increases in quantities ordered compare similarly to previous contracts or years or when compared to other plants Duplicate payments Search for identical invoice numbers and payments amounts Check for repeated requests for refunds for invoices paid twice Carbon copies Search for duplicates within all company checks cashed; conduct a second search for gaps in check numbers Duplicate serial numbers Determine if high value equipment a company already owns is being repurchased by checking serial numbers for duplicates and involvement of same personnel in purchasing and shipping processes Payroll fraud Find out if a terminated employee is still on payroll by comparing the date of termination with the pay period covered by the paycheck and extract all pay transactions for departure date less than date of current pay period Accounts payable Reveal transactions not matching contract amounts by linking Accounts Payable files to contract and inventory files and examining contract date, price, ordered quantity, inventory receipt quantity, invoice quantity, and payment amount by contract 12 Coderre, David G. Fraud Detection, Using Data Analysis to Detect Fraud, (Vancouver, BC: Global Audit Publications, 1999):
10 Application Areas for Transactional Analysis Enterprising fraudsters can and will exploit weakness wherever they find it. Computerized transactional analysis has proven itself a reliable aid in fraud detection in a wide range of business processes, including: Accounts Receivable Accounts Payable General Ledger Materials Management and Inventory Control Salaries and Payroll Purchase Order Management Conflict of Interest Kickbacks Bid Rigging Policy and Administration Vendor Management Retail Loss Prevention Sales Analysis Work In Progress Cash Disbursements Customer Service Management Loans Deposits Real Estate Loans Credit Card Management Life Insurance Travel Claims IMPLEMEN T ING A FR AUD D E T EC T I O N PRO GR A M Instead of responding on a reactive basis to fraud within an organization, it s more effective to use data access technologies and strong internal controls to detect and, more importantly, prevent fraud from ever occurring in the first place. Any complete fraud detection program must include the following steps: 13 Build a profile of potential frauds. This profile includes a list of the many different areas in which fraud may occur and the types of fraud that are possible in that area. This can be developed as part of a risk assessment. Test data for possible indicators of fraud. A complete testing program should include ad hoc or random testing in addition to more formalized or regular tests. 13 ACL Services Ltd., Using ACL to Detect Fraud: An ACL Workshop, October
11 Improve controls by implementing continuous monitoring. Strengthen controls over transaction authorizations and use continuous monitoring to test and validate the effectiveness of your controls. Review information from data testing and continuous monitoring. Investigate patterns and fraud indicators that emerge from the fraud detection tests and continuous monitoring. Repeat the steps. This process of building a profile, testing data, improving controls and reviewing information needs to be repeated on a regular basis. ACL T ECHNOLO GY EN A BLES TIMELY FR AUD DETEC T I O N A ND PRE V EN T I O N ACL s approach to fraud detection and prevention is based on comprehensive analysis of the transactional data flowing through financial and operational systems. Using ACL technology to access and analyze unlimited volumes of data from virtually any enterprise application, organizations can quickly identify suspicious transactions that may represent fraud, error, and abuse, and close control loopholes before fraud escalates. ACL data analytics technology supports flexible, exploratory, ad hoc investigations the kind typically undertaken by skilled auditors or fraud investigators while ACL Continuous Controls Monitoring (CCM) solutions embed automated, pre-defined analytics within core business processes that represent highrisk areas to the organization for sustainable and scalable analysis. Data Analytics Technology ACL s robust analytics technology enables analysis of even the largest volumes of transactional data in a fraction of the time once required, so that all pertinent data from any number of systems can be quickly analyzed for flagging potential indicators of fraud. Through a unique and powerful combination of data access, analysis, and integrated reporting capabilities, ACL software reaches data from virtually any source, across any system, through a consistent user interface whether housed in mainframes, servers, legacy systems, or PC networks. By independently comparing and analyzing data from ERP, CRM, SCM, or other enterprise applications, ACL technology enables immediate insight into the transactional data underlying core business processes and financial reporting. In the 2005 Internal Auditor software survey, ACL was selected by 44 percent of the participants as the tool of choice for fraud prevention and detection. Fraud Detection/Prevention Software Excel 21% Other 9% ACL 44% IDEA 8% Internally developed software 8% Access 8% PeopleSoft Query 2% Reprinted with permission from Internal Auditor (August 2005), published by The Institute of Internal Auditors, Inc. 10
12 Continuous Controls Monitoring KPMG s Fraud Survey 2003 revealed that internal controls, internal audit, and notification by employee are the three leading ways of uncovering fraud, with internal controls being the fastest growing method. Among newly instituted programs, respondents cite reviewing or strengthening internal controls more frequently than any other type of program. 14 Internal controls are increasingly being used as an anti-fraud method by organizations, a trend driven in part by the pressures of regulatory requirements such as the Sarbanes-Oxley Act, and in particular, Section 404. To help ensure these internal controls are in place and operating effectively, many organizations are turning to technologies such as continuous controls monitoring. ACL CCM solutions identify fraud, errors, and inefficiencies, by automating internal controls testing in key financial and operational processes across the enterprise through independent analysis of business transactions at the source level. Embedding audit best practices into organizations day-to-day business operations, CCM solutions apply automated, pre-defined analytics to critical control points, mapped to the COSO internal controls framework, within core business processes such as the purchase-to-payment cycle, payroll, purchasing card programs, the order-to-cash cycle, and general ledger activities. Financial management and business unit managers gain constant oversight and insight into their business operations, receiving timely notification of control breaches and gaps, so they can investigate and resolve potential problems including possibly fraudulent activities before they escalate. ACL CCM solutions access and analyze unlimited volumes of transactional data from all the different systems and applications supporting your business operations, while maintaining data integrity. The result comprehensive insight into control weaknesses and business risks, enabling informed decision-making and faster response to organizational, market, and regulatory changes. FA S T IMPLEMEN TAT I O N A ND FA S T PAYBACK The ease and speed of implementing a complete ACL solution means not only more timely detection of fraud and faster return on investment, but also more effective, systematic fraud prevention over the long term. Having an effective system for fraud prevention in place is part of business assurance the knowledge that an organization can rely on the accuracy, reliability, and integrity of all its data and transactions to make decisions with speed and confidence. ACL solutions provide audit, compliance, and financial professionals with the confidence that they are seeing the full picture giving clients the ability to find fraud, stop overpayments, and improve operational efficiency. 14 KPMG, Fraud Survey 2003, KPMG Forensic,
13 CO NCLUSI O N A well-designed and implemented fraud detection system, based on the transactional analysis of operational systems, can significantly reduce the chance of fraud occurring within an organization and then remaining undetected. The sooner that indicators of fraud are available, the greater the chance that losses can be recovered and address any control weaknesses. The timely detection of fraud directly impacts the bottom line, reducing losses for an organization. And effective detection techniques serve as a deterrent to potential fraudsters; employees who know experts are present and looking for fraud or that continuous controls monitoring is occurring on a daily basis are less likely to commit fraud because of a greater perceived likelihood that they will be caught. Finally, given new regulatory requirements such as SOX, the decision is no longer if an organization should implement a complete fraud detection and prevention program, rather how quickly that program can be put into place. To find out how ACL can help your organization combat fraud, contact us at or [email protected] to arrange for a free consultation. CO MPA NY OV ERV IE W ACL Headquarters T F acl.com [email protected] ACL is the leading global provider of Business Assurance Analytics to financial executives, compliance professionals, and auditors. Combining market-leading data analytics software and professional services expertise, ACL solutions give organizations confidence in the accuracy and integrity of transactions and the effectiveness of internal controls underlying increasingly complex business operations. Since 1987, ACL s proven technology has enabled financial decision-makers to assure controls compliance, reduce risk, detect fraud, enhance profitability, and achieve fast payback. ACL delivers its solutions in more than 130 countries through a global network of ACL offices and channel partners. Our customers include 70 percent of the Fortune 500 companies and over two-thirds of the Global 500, as well as hundreds of national, state, and local governments, and the Big Four public accounting firms. 12
CONTINUOUS CONTROLS MONITORING
Clarity. Certainty. Confidence. CONTINUOUS CONTROLS MONITORING Support Regulatory Compliance Improve Cost Management Drive Operational Performance Executives today are more challenged than ever to make
ACL EBOOK. Detecting and Preventing Fraud with Data Analytics
ACL EBOOK Detecting and Preventing Fraud with Data Analytics Contents Why use data analysis for fraud?... 4 Internal control systems, while good, are not good enough... 5 Purpose-built data analytics is
Vendor Audit and Cost Recovery: Improving Bottom Line Results WHITE PAPER
Vendor Audit and Cost Recovery: Improving Bottom Line Results WHITE PAPER 2002 ACL Services Ltd. All rights reserved. AMWE109003 ACL and the ACL logo are registered trademarks of ACL Services Ltd. All
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Contents Introduction Internal Audit as Trusted Advisor & Business Partner Big Ticket Items: Fraud, Revenue Leakage
Using Technology to Automate Fraud Detection Within Key Business Process Areas
Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd
ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances
ACL WHITEPAPER Automating Fraud Detection: The Essential Guide John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances Contents EXECUTIVE SUMMARY..................................................................3
THE ABC S OF DATA ANALYTICS
THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable
Steven Boyer Vice-President, Gallagher Bassett Services Inc.
Employee Dishonesty and Fraud Motive, Rationale & Opportunity Steven Boyer Vice-President, Gallagher Bassett Services Inc. Randall Wilson, CPA/CFF, CFE, Cr.FA Partner, National Practice Director Fraud
Deloitte Forensic Fraud Risk Management
Deloitte Forensic Fraud Risk Management Introduction Organizations cannot afford to be unconcerned about the risk of fraud. Directors and management have a fiduciary obligation and a corporate responsibility
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception
Fraud Prevention and Detection in a Manufacturing Environment
Fraud Prevention and Detection in a Manufacturing Environment Introduction The Association of Certified Fraud Examiners (ACFE) estimated in its 2008 Report to the Nation on Occupational Fraud and Abuse
FRAUD RISK ASSESSMENT
FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S A C a s e W a r e I D E A R e s e a r c h R e p o r t CaseWare IDEA Inc.
Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP [email protected]. Copyright 2015 Edward S.
MIS 520 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP [email protected] Fraud Awareness & Internal Controls Awareness Internal
Office of the Inspector General
Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs April 2005 Dear Public Officials: April
AGA Kansas City Chapter Data Analytics & Continuous Monitoring
AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help
Advanced Data Analytics, the Fraudsters Worst Enemy
Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability
Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen
Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview
FRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM
FRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM Presenter: Zamani Nxumalo SAS, National Treasury 30 March 2011 CONTENTS Key Terms & Definitions Process & Challenges Fraud
Internal Controls for Small Organizations. Jen Parker, CPA Director of Accounting & Finance US Youth Soccer
Internal Controls for Small Organizations Jen Parker, CPA Director of Accounting & Finance US Youth Soccer Fraud Statistics: The following statistics about fraud and white collar crime are from the Association
Fraud Awareness Training
UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for
Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA
Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the
PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM
IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM Auditors need to understand that while audit findings are common, they are not necessarily fraud and due care is needed in building evidence.
716 West Ave Austin, TX 78701-2727 USA
Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the
LGMA Qld Governance and Corporate Planning Village Forum
www.pwc.com.au Fraud Risk Management Fraud Risk Assessments LGMA Qld Governance and Corporate Planning Village Forum March 2015 Agenda Introductions Fraud Risk Management Fraud Statistics s Global Economic
Fraud Prevention: The Prevention and Detection of Fraud Begins with You
Fraud Prevention: The Prevention and Detection of Fraud Begins with You Takeaways What is fraud? Definition Facts Four factors Fraud risk assessment Four evaluation criteria Common fraud schemes Case studies
Leveraging Big Data to Mitigate Health Care Fraud Risk
Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud
Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you
3/27/2012 Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you Executive Summary The time to test fraud controls is before you have a fraud
ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore
With ever-increasing data volumes, more sophisticated fraud patterns, and a drive for strong corporate governance, how can organisations build a culture of integrity and compliance? Learn how data analytics
Fraud: Real Stories, Real People, Real Impact
Fraud: Real Stories, Real People, Real Impact Chris Harper, CPA, MBA Senior Manager Types of Fraud Asset misappropriation Fraudulent financial reporting Identity theft Detection Skills The Fraud Triangle
GLOBAL PORTS INVESTMENTS PLC
Adopted by the Directors of GLOBAL PORTS INVESTMENTS PLC Resolution of 14 July 2008 GLOBAL PORTS INVESTMENTS PLC (previously GLOBAL PORTS INVESTMENTS LTD) ANTI-FRAUD POLICY TABLE OF CONTENTS 1. INTRODUCTION.....
Fraud Prevention and Deterrence
Fraud Prevention and Deterrence Fraud Risk Assessment 2016 Association of Certified Fraud Examiners, Inc. What Is Fraud Risk? The vulnerability that an organization faces from individuals capable of combining
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 Introduction THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS (Effective for audits of financial statements for
ACFE FRAUD PREVENTION CHECK-UP
One of the ACFE s most valuable fraud prevention resources, the ACFE Fraud Prevention Check-Up is a simple yet powerful test of your company s fraud health. Test fraud prevention processes designed to
Introducing SAP Fraud Management. Jérôme Pugnet
Introducing SAP Fraud Management Jérôme Pugnet LEARNING POINTS Impacts and Challenges of Fraud How Big is the Problem? Fraud is Typically Found Without Technology: an Undetected Potential! What are the
TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending)
PAGE 1 of 5 TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending) ORIGINAL: 11/03 REVISED: 10/07, 09/10, 04/13 REVIEWED: EFFECTIVE DATE Acute Care
Employee Embezzlement and Fraud. Defending Against Insider Threats
Employee Embezzlement and Fraud Defending Against Insider Threats Today s Approach An open dialogue and sharing of information regarding a common threat of internal losses. There is no guarantee that any
Strategically Detecting And Mitigating Employee Fraud
A Custom Technology Adoption Profile Commissioned By SAP and Deloitte March 2014 Strategically Detecting And Mitigating Employee Fraud Executive Summary Employee fraud is a universal concern, with detection
S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma
S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma Governance, Risk, Compliance (GRC) Automation Siamak Razmazma [email protected] September 2009 Agenda Introduction to
Centre for Corporate Governance. Sample listing of fraud schemes
Centre for Corporate Governance Sample listing of fraud schemes Sample listing of fraud schemes The following listing of possible fraud schemes can be utilized by management and auditors to assist in identifying
Sharon Kurek, CPA, CFE Director of Internal Audit
Sharon Kurek, CPA, CFE Director of Internal Audit What You Will Take Aware With You Definition of Internal Auditing Scope of Audit Activities Risk and Control Process Common Audit Topics Fraud Awareness
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS Paragraphs Introduction... 1-3 Characteristics of Fraud...
Fraud Risk Management providing insight into fraud prevention, detection and response
Fraud Risk Management providing insight into fraud prevention, detection and response For private circulation only www.deloitte.com/in Fraud follows opportunity and attacks weakness. Know where you are
ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST
ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST 1 Our Objective To assist organizations in finding lost thousands of dollars in profits through duplicate payments, duplicate billings, overpayments,
Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner
Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner Learning Objectives: Understand how fraud can occur Learn procedures you can implement to prevent fraud Learn how to detect fraud Common Situations
Policy-Standard heading. Fraud and Corruption Policy
Policy-Standard heading Fraud and Corruption Policy September 2013 Table of contents Introduction 3 Purpose 3 Scope 3 Related Policies and Processes 3 Definition of Fraud and Corruption 4 Policy 4 Code
Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down
Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients
Continuous Controls Monitoring ISACA, Houston Chapter. August 17, 2006
Continuous Controls Monitoring ISACA, Houston Chapter August 17, 2006 Purpose of Discussion Understand impact of Continuous Controls Monitoring (CCM) on the Information Systems Audit community To perform
Perp Poetry. Fraud & Embezzlement: Lessons From the Trenches. Presented by. acumen insight. ideas attention reach. expertise depth agility talent
acumen insight Fraud & Embezzlement: Lessons From the Trenches ideas attention reach Presented by Angela Morelock, CPA, CFE, CFF, ABV, Certified Forensic Accountant www.bkdforensics.com expertise depth
Data mining life cycle in fraud auditing
Data mining life cycle in fraud auditing ELENA MONICA SABĂU Faculty of Accounting and Management Information Systems Academy of Economic Studies 6, Romană Square, District 1, Bucharest [email protected]
Neil Meikle, Associate Director, Forensic Technology, PwC
Case Study: Big Data Forensics Neil Meikle, Associate Director, Forensic Technology, PwC 6 November 2012 About me Transferred to Kuala Lumpur from PwC s Forensic Technology practice in London, England
RED FLAGS OF FRAUD MAY 13, 2014 IIA AUSTIN CHAPTER
MAY 13, 2014 IIA AUSTIN CHAPTER 2014 by the Association of Certified Fraud Examiners, Inc. Revised: 3/26/14 No portion of this work may be reproduced or transmitted in any form or by any means electronic
REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE 2012 GLOBAL FRAUD STUDY
REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE 2012 GLOBAL FRAUD STUDY Letter from the President & CEO More than 15 years ago, the ACFE s founder and Chairman, Dr. Joseph T. Wells, CFE, CPA, conceptualized
Contents. xiii xv. Case Studies Preface
Case Studies Preface xiii xv CHAPTER 1 What Is Fraud? 1 Fraud: A Definition 3 Why Fraud Happens 4 Who Is Responsible for Fraud Detection? 7 What Is a Fraud Awareness Program? 11 Screening Job Applicants
Fraud Control Theory
13 Fraud Control Theory Using a variation of a saying from the 1960s, fraud happens. Like all costs of doing business, fraud must be managed. Management must recognize that people commit fraudulent acts
Process Control Optimisation with SAP
Process Control Optimisation with SAP The procure-to-pay cycle, which includes all activities from the procurement of goods and services to receiving invoices and paying vendors, is a basic business process.
Preventing Healthcare Fraud through Predictive Modeling. Category: Improving State Operations
Preventing Healthcare Fraud through Predictive Modeling Category: Improving State Operations Commonwealth of Massachusetts Executive Office of Health and Human Services Project initiated: July 2012 Project
IBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and
Medical Fraud Detection Through Data Mining Megaputer Case Study www.megaputer.com Megaputer Intelligence, Inc. 120 West Seventh Street, Suite 310 Bloomington, IN 47404, USA +1 812-330-0110 Medical Fraud
4.11. Ontario Works Program. Chapter 4 Section. Background. Follow-up on VFM Section 3.11, 2009 Annual Report
Chapter 4 Section 4.11 Ministry of Community and Social Services Ontario Works Program Follow-up on VFM Section 3.11, 2009 Annual Report Chapter 4 Follow-up Section 4.11 Background Under the Ontario Works
KEYS TO AN EFFECTIVE DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA
KEYS TO AN EFFECTIVE ANTI-FRAUD PROGRAM WAYNE PURVES DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA AHIA 32 nd Annual Conference August 25-28, 2013 Chicago, Illinois
GOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments
GOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments Audit Report OIG-A-2013-018 September 20, 2013 NATIONAL RAILROAD PASSENGER CORPORATION Office of Inspector General REPORT HIGHLIGHTS Why
Consideration of Fraud in a Financial Statement Audit
Consideration of Fraud in a Financial Statement Audit 151 AU-C Section 240 Consideration of Fraud in a Financial Statement Audit Source: SAS No. 122; SAS No. 128. Effective for audits of financial statements
Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained
Performing Audit Procedures in Response to Assessed Risks 1781 AU Section 318 Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained (Supersedes SAS No. 55.)
Recognize the many faces of fraud
Recognize the many faces of fraud Detect and prevent fraud by finding subtle patterns and associations in your data Contents: 1 Introduction 2 The many faces of fraud 3 Detect healthcare fraud easily and
Fraud and internal controls, Part 3: Internal fraud schemes
Fraud and internal controls, Part 3: Internal fraud schemes By EVERETT COLBY, CFE, FCGA This is the third and final article in a series by Mr. Colby on Fraud and internal controls to be carried on PD Net.
Fighting Fraud with Data Mining & Analysis
Fighting Fraud with Data Mining & Analysis Leonard W. Vona December 2008 Fraud Auditing, Inc. Phone: 518-784-2250 www.fraudauditing.net E-mail: [email protected] Copyright 2008 Leonard Vona and Fraud
Total exception management
continuous control monitoring Total exception management Insight & Assurance See through the complexity of systems and processes and you will know your business inside out control PLAN report analyse improve
The Power of Risk, Compliance & Security Management in SAP S/4HANA
The Power of Risk, Compliance & Security Management in SAP S/4HANA OUR AGENDA Key Learnings Observations on Risk & Compliance Management Current State Current Challenges The SAP GRC and Security Solution
Accounts Payable Best Practices
Accounts Payable Best Practices Presented by: Eddy Castaneda, CPA, MBA Accounts Payable Best Practices Top Practices AP Top Practices Document your current AP procedures Can identify overlapping work Can
The Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements
ISA 240 February 2008 International Standard on Auditing The Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements INTERNATIONAL STANDARD ON AUDITING 240 The Auditor s Responsibilities
PMS 288 Blue or CMYK = C100-M85-Y0-C43 PMS 1255 Ochre / Yellow or CMYK = C0-M35-Y85-C30. Tax Technology
PMS 288 Blue or CMYK = C100-M85-Y0-C43 PMS 1255 Ochre / Yellow or CMYK = C0-M35-Y85-C30 Tax Technology PO Ryan has provided BASF outstanding value by recovering overpaid taxes while identifying and implementing
Compliance and Ethics at the Federal Reserve Bank of New York
Compliance and Ethics at the Federal Reserve Bank of New York Operational Risk and Internal Audit Course Marina Adams, Compliance Officer and AVP David K. Clune, Compliance and Ethics Officer Kevin White,
Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption
Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption Toby Bishop, Director, Deloitte Forensic Center Deloitte Financial Advisory Services LLP Contents Why corporate resiliency? What
MEMORANDUM. Municipal Officials. From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center
MEMORANDUM To: Municipal Officials From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center 89 Main Street, Suite 4 Montpelier, Vermont 05602-2948
Boosting enterprise security with integrated log management
IBM Software Thought Leadership White Paper May 2013 Boosting enterprise security with integrated log management Reduce security risks and improve compliance across diverse IT environments 2 Boosting enterprise
Audit: An Integral Component to a Comprehensive Travel and Expense Management Process
Audit: An Integral Component to a Comprehensive Travel and Expense Management Process Abstract Managing and controlling indirect or employee driven spending is a growing area of concern for organizations
Antifraud program and controls assessment grid*
Advisory Services Antifraud program and * Fraud risks & controls February 2008 *connectedthinking 2008 PricewaterhouseCoopers LLP. All rights reserved. PricewaterhouseCoopers refers to PricewaterhouseCoopers
Fraud Triangle Analytics Anti-Fraud Research and Methodologies
Fraud Triangle Analytics Anti-Fraud Research and Methodologies Risk Management Committee Meeting American Hotel & Lodging Association November 18, 2009 Topics for discussion Why incorporate fraud detection
Preventing Health Care Fraud
Preventing Health Care Fraud Project: Predictive Modeling for Fraud Detection at MassHealth Category: Improving State Operations Commonwealth of Massachusetts Executive Office of Health and Human Services
The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology
The State of Insurance Fraud Technology A study of insurer use, strategies and plans for anti-fraud technology September 2014 The State of Insurance Fraud Technology A study of insurer use, strategies
Sarbanes-Oxley: Beyond. Using compliance requirements to boost business performance. An RIS White Paper Sponsored by:
Beyond Sarbanes-Oxley: Using compliance requirements to boost business performance The business regulatory environment in the United States has changed. Public companies have new obligations to report
Continuous Monitoring and Auditing: What is the difference? By John Verver, ACL Services Ltd.
Continuous Monitoring and Auditing: What is the difference? By John Verver, ACL Services Ltd. Call them the twin peaks of continuity continuous auditing and continuous monitoring. There are certainly similarities
Kroll Ontrack Data Analytics. Forensic analysis and visualization of complex data sets to provide intelligence around investigations
Trade Date: 2013-08-14 11:57:00 Sum of Total Value: 287,663,728 Trade Date: 2013-08-14 11:51:00 Trader Name: Susan Wright Sum of Total Value: 443,382,018 Kroll Ontrack Data Analytics Trade Date: 2013-08-14
An Introduction to Continuous Controls Monitoring
An Introduction to Continuous Controls Monitoring Reduce compliance costs, strengthen the control environment and lessen the risk of unintentional errors and fraud Richard Hunt, Managing Director Marc
INTERNATIONAL STANDARD ON AUDITING 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS
INTERNATIONAL STANDARD ON 240 THE AUDITOR S RESPONSIBILITIES RELATING TO (Effective for audits of financial statements for periods beginning on or after December 15, 2009) CONTENTS Paragraph Introduction
www.pwc.com Being protected Using data analytics to detect fraud
www.pwc.com Being protected Using data analytics to detect fraud Are you currently exposed to fraudulent activities? It will surprise few to learn that occupational fraud, IP infringement, corruption,
Microsoft Confidential
Brock Phillips, CPA, CFE, CCEP Forensic Accounting Sr. Manager Financial Integrity Unit Microsoft Audit Group Lou DeCola, CPA, CIA, CFE Forensic Accounting Sr. Manager Financial Integrity Unit Microsoft
7/22/2014. From Treadway To the Cube (1987 2014) So, Who is COSO? What Does COSO Do?
From Treadway To the Cube (1987 2014) National Society of Accountants for Cooperatives (NSAC) CLAconnect.com Instructor: Ron Durkin, CPA/CFF, CFE, CIRA National Principal in Charge Fraud & Misconduct Investigations
