www.pwc.com Being protected Using data analytics to detect fraud



Similar documents
Cyber Security Evolved

LGMA Qld Governance and Corporate Planning Village Forum

For Private circulation only Creative. Clear. Focused. Forensic Services

Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

Deloitte Forensic Fraud Risk Management

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances

Neil Meikle, Associate Director, Forensic Technology, PwC

Assessing the strength of your security operating model

Fraud Prevention and Detection in a Manufacturing Environment

Fraud Risk Management providing insight into fraud prevention, detection and response

Strategically Detecting And Mitigating Employee Fraud

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Fraud Solution for Financial Services

Fraud Prevention and Deterrence

ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore

Cyber security Building confidence in your digital future

Metrics by design A practical approach to measuring internal audit performance

The promise and pitfalls of cyber insurance January 2016

Breach Found. Did It Hurt?

White Paper: The Seven Elements of an Effective Compliance and Ethics Program

FRAUD & SECURITY INTELLIGENCE

Deloitte Analytics. Trusting big data: Perspective on data governance as a customer analytics investment

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services

Italy. EY s Global Information Security Survey 2013

The Sumo Logic Solution: Security and Compliance

Internet Reputation Management Guide. Building a Roadmap for Continued Success

Risk Management Policy and Framework

Using data analytics and continuous auditing for effective risk management

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Education and Training in Fraud and Forensic Accounting: A Guide for Educational Institutions, Stakeholder Organizations, Faculty and Students

THOMSON REUTERS ACCELUS

Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

A NEW APPROACH TO CYBER SECURITY

Why Nonprofits Need Nonprofit Accounting Software

GEARS Cyber-Security Services

Cyber/ Network Security. FINEX Global

Forensic Services. kpmg.hu

AUTOMATED PENETRATION TESTING PRODUCTS

The Power of Risk, Compliance & Security Management in SAP S/4HANA

Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you

You Can t Afford the Risks

Managing FCPA (Foreign Corrupt Practices Act) Risks

A Critical Need: The Importance of AML Compliance for Broker-Dealers

Best Practices to Improve Breach Readiness

Continuous Network Monitoring

BDO NORDIC. Investigation, fraud prevention and computer forensics. You can guess. You can assume. Or you can know. And knowing is always better.

Fraud Prevention Checklist for Small Businesses

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?

Navigate the regulatory maze

South Australia Police POSITION INFORMATION DOCUMENT

How To Test For Security On A Network Without Being Hacked

AUTOMATED PENETRATION TESTING PRODUCTS

Cyber Insurance Presentation

Fighting Fraud with Data Mining & Analysis

How to Negotiate During a Sales and Use Tax Audit. Tim Howe, CPA, Senior Manager Smith & Howard

Deloitte Forensic Protecting your business in the Banking sector

risk management & crisis response Building a Proactive Risk Management Program

IBM Counter Fraud Signature Solutions

Forensic Audit Building a World Class Program

Getting real about cyber threats: where are you headed?

The IBM data governance blueprint: Leveraging best practices and proven technologies

Cyber intelligence exchange in business environment : a battle for trust and data

Compliance and Ethics at the Federal Reserve Bank of New York

Using Data Analytics to Detect Fraud. Other Data Analysis Techniques

Improving claims management outcomes with predictive analytics

Fraud-Related Compliance

Internet Reputation Management Guidelines Building a Roadmap for Continued Success

Audit Advisory Tax. RISK ADVISORY SERVICES GUARDING AGAINST FRAUD, THEFT AND CORRUPTION Forensic Services. The Leader for Exceptional Client Service

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

TAKE COST CONTROL AND COMPLIANCE TO A NEW LEVEL. with ACL Travel & Entertainment Expense Fraud and Cost Control Solution

LEVERAGING OPEN SOURCE INTELLIGENCE (OSINT) TO COMBAT FRAUD

San Francisco Chapter. Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young

Discover How a 360-Degree View of the Customer Boosts Productivity and Profits. eguide

South Australia Police POSITION INFORMATION DOCUMENT

PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA

Analyzing HTTP/HTTPS Traffic Logs

Business Intelligence Project Management 101

Audit Capabilities: Beyond the Checklist. Niall Haddow, Business Leader Philip Young, Sr. IT Auditor Professional Strategies - Session S32

KNOW YOUR THIRD PARTY

Enterprise Security Architecture

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

Adopted by the Board of Directors of the Nordic Investment Bank on 17 December 2009 COMPLIANCE POLICY

Project Management Competency Standards

RSA ARCHER AUDIT MANAGEMENT

CREDIT CARD FRAUD PREVENTION IN NONPROFITS

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

Fundamentals of a Construction Audit. August 7, 2014

Transcription:

www.pwc.com Being protected Using data analytics to detect fraud

Are you currently exposed to fraudulent activities? It will surprise few to learn that occupational fraud, IP infringement, corruption, cybercrime and money laundering continue to be a major concern for organisations of all sizes, across all regions and in virtually every sector. Economic crime threatens business processes, erodes employee integrity and tarnishes reputations. Organisations own and manage data, lots of it. Structured data like log files, spreadsheets and tables. Unstructured data like emails, documents, images, and videos. This data is typically stored in multiple systems, where it s rapidly diversifying in type, exponentially increasing in volume and becoming more difficult to manage and control. While no entity is immune to the fraud threat, unfortunately, many organisations still suffer from an it can t happen here mindset. Our 2014 Global Economic Crime Survey revealed that economic crime is a persistent threat to business and business processes. More than 37% of respondents reported having been victimised by economic crime in the last three years, an increase of three percentage points compared to our 2011 survey. Small wonder that the threat of economic crime is very much on your minds. And you re likely looking at ways to minimise your exposure to fraudulent activities. Do you understand: how to become more effective in identifying and responding to serious fraud risks? what the techniques are to deliver more robust and effective analysis of key compliance issues? how to identify high-risk transactions, customers and vendors in your organisation? how to evaluate your company s compliance with internal and external controls, business rules, and organisational policies? Failure to adequately answer such questions may result in: regulatory censure deferred prosecutions significant fines imposed external oversight reputational damage serious financial losses If you don t take account of your compliance obligations, the cost and impact can be significant. You need to be able to ask sensitive and compliance-driven questions about data and receive answers in a language you understand and are able to process. PwC Being protected 2

Fraud is ubiquitous; it doesn t discriminate in its occurrence. The truth is that no entity is immune to this threat. * * ACFE Report to the Nations on Occupational Fraud and Abuse, 2014 37% Organisations have been victimised by economic crime Facts 56% Corporate fraud committed by company insiders $1million Median loss caused per case of financial statement fraud 25% Of major fraud cases detected by data analysis and transaction monitoring 18months Median duration of the fraud before detection Chief Audit Executives Expectation Performance Senior Management Expectation Performance Board Members Expectation Performance 40% 68% 78% 81% 34% 59% Expectation: Performance: % who expect this from internal audit % who believe internal audit performs well in this area PwC Being protected 3

There s a clear gap in stakeholder expectations with regard to Leveraging technology effectively in the execution of audit services *. * Source: PwC s 2014 State of the Internal Audit Profession Study Data-driven fraud detection Red-Flag testing Detection of known fraud patterns by Red Flag indicators Experience-based approach, targeted view and results Rule based search techniques Mathematical and statistical Detection of known and similar fraud patterns Confirmatory approach based on (theoretical) assumptions e.g. K-means Advanced analytics Exploratory of unknown fraud patterns Use of Big data techniques e.g. Anomaly Detection, Qualitative Analytics Domain Know-how Analytics Know-how Planning Scoping Investigations Reporting Identify fraud risk areas that should be investigated Identify most efficient and effective approach and data sources Support investigations by analysis of data 360 view of the fraud scenario PwC Being protected 4

PwC s forensic data analytics capabilities How we can help Our clients benefit from the expertise of our former government regulators and industry leaders with extensive experience in effectively addressing a variety of fraud related questions. This expertise is enriched by our experienced forensic data analytics professionals who can help in all aspects of national and international fraud, compliance and litigation matters, from assessing and managing fraud risks, to fraud investigation support and integrating data analytics into daily processes and value streams. Our multi-disciplinary Forensic Services team has developed innovative approaches to help you assess fraud risks, plan your response and identify opportunities to increase compliance. To achieve this, we offer a proven data analytics methodology coupled with the ability to efficiently capture and analyse global data from multiple sources and languages. We augment these capabilities with allround Forensic analytical proficiency. Threats to the purchasing process In our experience, the requisitioning of goods is a ripe area for fraud. The threat is especially great in cultures where loyalty to family, school friends, local community or even national pride are strong influences stronger perhaps than dry corporate policy statements or legalistic sounding codes of conduct. An individual within the purchasing and supply department may have a pre-existing relationship with a vendor who wants to win business from the organisation. The insider provides information on the bidding process, such as the bid amounts of competitors, to ensure an advantage for their preferred bidder. Or, the insider could approve a price higher than necessary. Alternately, your controls may not function as planned. We ve observed countless incidences of employees in approval roles acquiescing to pressure from the boss to process payments that don t meet all aspects of policy and procedure. This tension between an executive s loyalty to the company versus their connectivity to the local milieu is a real and continuing threat to controls. Our data analytics team has supported numerous clients in managing challenges in the purchasing process by: gathering and cleansing data from various sources (such as invoices, log data, voice & video streams, etc) and preparing it to be retrievable for advanced fraud analytics defining and implementing tailored data analytics for complex procurement risks/audit objectives managing the challenges of procurement compliance with proactive reviews and risk-ranking of business partners ad hoc analytics to instantly respond and uncover emerging procurement fraud patterns. PwC Being protected 5

We give you comfort during a crisis and make sure you have a good night sleep. How we support you Incident response In the event of fraud, we design and implement a tailored analysis suite to investigate the incident and prepare a response, whether strategic or remedial. Remediation/look back reviews Meet the demands of reviewing or remediating past activities by restoring and analysing archived data to identify potential failures and restore integrity. Fraud investigations & monitoring support Need help on practical aspects of proactively addressing fraud in your organisation because you may have challenges with data integrity, too many false positives or difficulties interpreting results Regulatory responses Coordinate data extraction and analysis to meet demanding regulatory deadlines. Let s talk PwC helps organisations and individuals create the value they re looking for. We re a network of firms in 157 countries with more than 184,000 people who are committed to delivering quality in assurance, tax and advisory services. Tell us what matters to you and find out more by visiting us at www.pwc.be. For additional information, please contact: Rudy Hoskens Partner, Forensic Services +32 2 710 4307 Rudy.hoskens@be.pwc.com Sally Trivino Director, Forensic Services +32 2 710 9753 Sally.trivino@be.pwc.com PwC Being protected 6

2015 PwC Belgium. All rights reserved. PwC firms help organisations and individuals create the value they re looking for. We re a network of firms in 157 countries with over 195,000 people who are committed to delivering quality in assurance, tax and advisory services. Tell us what matters to you and find out more by visiting us at www.pwc.com PwC refers to the PwC network and/or one or more of its member firms, each of which is a separate legal entity. Please see www.pwc.com/structure for further details.