Emerging Trends in Fraud Analytics:



Similar documents
Taking Data Analytics to the Next Level

Demystifying Big Data Analytics

Using Data Analytics to Detect Fraud. Other Data Analysis Techniques

IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk

Understanding How Service Providers Charge for ediscovery Services

Using Data Analytics to Detect Fraud

Neil Meikle, Associate Director, Forensic Technology, PwC

Fraud Triangle Analytics Anti-Fraud Research and Methodologies

IBM Policy Assessment and Compliance

Global EY FIDS Forensic Data Analytics Survey 2014

From ESI to EDRM. An Overview of Electronic Discovery

Deloitte Analytics. Trusting big data: Perspective on data governance as a customer analytics investment

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

Integrated Governance, Risk and Compliance (igrc) Approach

ZEROING IN DATA TARGETING IN EDISCOVERY TO REDUCE VOLUMES AND COSTS

Information Lifecycle Governance. Surabhi Kapoor & Jan Lambrechts

IBM ediscovery Identification and Collection

We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

IBM Unstructured Data Identification and Management

Data Loss Prevention Program

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down

3 MUST-HAVES IN PUBLIC SECTOR INFORMATION GOVERNANCE

Integrating Data Analytics into Internal Audit

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

Gain control over all enterprise content

Delivering Smart Answers!

E- Discovery in Criminal Law

Information Technology: This Year s Hot Issue - Cloud Computing

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review

10 Building Blocks for Securing File Data

How To Protect Your Data From Theft

LGMA Qld Governance and Corporate Planning Village Forum

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

Information Governance Manage in Place Use Cases Workshop

Forensic Audit Building a World Class Program

Voice. listen, understand and respond. enherent. wish, choice, or opinion. openly or formally expressed. May Merriam Webster.

Antifraud program and controls assessment grid*

Cohasset Associates, Inc. NOTES Managing Electronic Records Conference 1.1. The discipline of analyzing the. Value Costs and Risks

Information Technology General Controls And Best Practices

Cybersecurity and internal audit. August 15, 2014

The Impact of HIPAA and HITECH

EnCase ediscovery. Automatically search, identify, collect, preserve, and process electronically stored information across the network.

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

From Chaos to Clarity.

How To Understand And Understand Forensic Accounting

EMC SourceOne Management and ediscovery Overview

HIPAA Compliance: Are you prepared for the new regulatory changes?

Web Protection for Your Business, Customers and Data

E-Discovery Best Practices

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services

TEXT ANALYTICS INTEGRATION

Social Business Intelligence Framework. Copyright 2012 Deloitte Development LLC. All rights reserved.

Board of Directors Meeting 12/04/2010. Operational Risk Management Charter

SharePoint Governance & Security: Where to Start

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY

Global Headquarters: 5 Speen Street Framingham, MA USA P F

SM B13: Symantec Data Insight Ketan Shah, Principal Product Manager John Dodds, Director Technical Product Manager

IBM Security Intelligence Strategy

Gatekeeper PKI Framework. February Registration Authority Operations Manual Review Criteria

White Paper. Managing Risk to Sensitive Data with SecureSphere

White Paper: The Seven Elements of an Effective Compliance and Ethics Program

Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners

ARCHIVING: A BUYER S CHECKLIST

Courtney H. Fletcher

KPMG Forensic Technology Services

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

Leveraging Data Analytics and Continuous Auditing. Internal Audit. January 9, 2014

Multichannel Customer Listening and Social Media Analytics

Document Storage Tips: Inside the Vault

Functions & Importance of a Strategic Business Plan

Viewpoint ediscovery Services

Get More Out of Your Risk Assessment. Austin Chapter of the IIA

Business Associate Management Methodology

Integration of E-Discovery and FOIA

Securing your IT infrastructure with SOC/NOC collaboration

Proactive Data Management for ediscovery

IBM Software Top tips for securing big data environments

Compliance and Security Solutions

Transcription:

Global Risk Advisory Services Emerging Trends in Fraud Analytics: Accounting for Words Text Analytics is a promising new forensic technique for the investigator 4 th Annual Text Analytics Summit Vincent Walden, CFE, CPA Pavan Jankiraman, CFE 2008 Ernst & Young LLP. All rights reserved. For Internal Use Within E&Y Only; Not for Distribution to Clients.

Topics About Unstructured (Text) Data Text Analytics Defined Practical Applications Proposed Methodology Risk Advisory Services 1

About Unstructured (Text) Data Risk Advisory Services 2

Data: Electronically Stored Information ( ESI ) Structured Databases Accounting Systems / GL CRM Numbers-Based Unstructured E-Mail Documents Presentations & Graphics Text-Based Risk Advisory Services 3

ESI in Today s Organization Text Graphics CRM Databases Accounting Systems Spreadsheets 80% Unstructured Data Presentations Source: Gartner Research 20% 80% Risk Advisory Services 4

Risk Considerations Brand or reputation damage due to leak of unstructured data Legal implications as a result of a data breach containing customer information Personal Data Privacy & Security Act and the Notification of Risk to Personal Data Act Increased risk of legal exposure due to discovery Federal Rules of Civil Procedures (ediscovery) Loss or misuse of confidential or trade secret data due to inappropriate protection Risk Advisory Services 5

How Important is Text? O.K. let s review what you didn t know and when you didn t know it. Risk Advisory Services 6

Text Analytics Defined Risk Advisory Services 7

Text Analytics: Tools & technologies that seek to identify, classify and parse words in electronic documents. Native (original electronic) documents Scanned (including paper) documents Text Analytics Cataloguing Indexing Filtering Audit Trail Central Repository Risk Advisory Services 8 Analysis & Reports

Practical Applications Risk Advisory Services 9

Practical Applications Pro-Active Fraud Detection FCPA Mergers & Acquisitions Transaction Due Diligence Identification of High Risk Departments Journal Entry Analysis Cost Accounting Data Repository Audits / Compliance Testing Risk Advisory Services 10

Data Repository Audits / Compliance Testing Create rules from ERM Policies and Procedures Enterprise Records Management Policies & Procedures Remediation CLASSIFICATION CATEGORIES Test Categories With Text Analytics Environment Retention Policy Legal Retention Policy Accounting Retention Policy Human Resources Retention Policy Engineering Retention Policy Determine Root Cause Identify Data Categorized Incorrectly Risk Advisory Services 11

Proposed Methodology & Analytics Risk Advisory Services 12

Text Analytics Methodology Step 1: Step 2: Step 3: Step 4: Step 5: Assess Key Business Risks & Co-Develop Expectations Identify & Collect Key Custodian Data Sources Process Text Data & Stage for Analysis Conduct Online Review of Text Communicate Results Week: One - Two Three Four Five Risk Advisory Services 13

Text Analytics Methodology Step 1: Step 2: Step 3: Step 4: Step 5: Assess Key Business Risks & Co-Develop Expectations Identify & Collect Key Custodian Data Sources Process Text Data & Stage for Analysis Conduct Online Review of Text Communicate Results Week: One - Two Three Four Five Risk Advisory Services 14

Risk Assessment Heat Map Prioritize by: Likelihood of Occurrence Business Impact Risk Advisory Services 15

Text Analytics Methodology Step 1: Step 2: Step 3: Step 4: Step 5: Assess Key Business Risks & Co-Develop Expectations Identify & Collect Key Custodian Data Sources Process Text Data & Stage for Analysis Conduct Online Review of Text Communicate Results Week: One - Two Three Four Five Risk Advisory Services 16

Identify Key Data Sources Drill Down Risk Advisory Services 17

Text Analytics Methodology Step 1: Step 2: Step 3: Step 4: Step 5: Assess Key Business Risks & Co-Develop Expectations Identify & Collect Key Custodian Data Sources Process Text Data & Stage for Analysis Conduct Online Review of Text Communicate Results Week: One - Two Three Four Five Risk Advisory Services 18

Text Analytics Methodology Step 1: Step 2: Step 3: Step 4: Step 5: Assess Key Business Risks & Co-Develop Expectations Identify & Collect Key Custodian Data Sources Process Text Data & Stage for Analysis Conduct Online Review of Text Communicate Results Week: One - Two Three Four Five Risk Advisory Services 19

Text Analytics Identifies the Who, What & When WHO? E-mail WHAT? WHEN? Risk Advisory Services 20

Text Analytics Identifies the Who, What & When WHO? WHAT? WHEN? Risk Advisory Services 21

Who is Communicating With Whom? Who is communicating with whom the most? Risk Advisory Services 22 Who is Joe talking to related to a particular subject matter?

Sentiment Analysis Sentiment by Concept Sentiment by Keyword and Person Risk Advisory Services 23

Text Analytics Identifies the Who, What & When WHO? WHAT? WHEN? Risk Advisory Services 24

What is Being Communicated? Term frequency within the data. Entity Extraction: Top dollar amounts, people, places, names, phone numbers, etc. Risk Advisory Services 25

What is Being Communicated? Real life example of clustering for an FCPA investigation Risk Advisory Services 26

What is Being Communicated? Real life example of clustering for an FCPA investigation Risk Advisory Services 27

What is Being Communicated? List of Key Concepts Frequency of Key Concepts Mentioned In E-Mail Risk Advisory Services 28

More Like This ML Select interesting content Pull back similar documents More Like This Risk Advisory Services 29

Text Analytics Identifies the Who, What & When WHO? WHAT? WHEN? Risk Advisory Services 30

When are Key Communications Occurring Communication frequency by topic and/or individuals Risk Advisory Services 31

Text Analytics Methodology Step 1: Step 2: Step 3: Step 4: Step 5: Assess Key Business Risks & Co-Develop Expectations Identify & Collect Key Custodian Data Sources Process Text Data & Stage for Analysis Conduct Online Review of Text Communicate Results Week: One - Two Three Four Five Risk Advisory Services 32

Don t Let This Happen To You Still, I think we can all take some pride in being one of the signature bankruptcies of our time. Risk Advisory Services 33

Questions & Answers Vincent Walden 214-754-3941 vincent.walden@ey.com ERNST & YOUNG LLP www.ey.com 2008 Ernst & Young All Rights Reserved. Ernst & Young is a registered trademark.