SlideShare a Scribd company logo
1 of 36
Download to read offline
Fraud Risk Management
A Global Perspective
Canada Inc
CA V S KUMAR FCA, CFE, CIA
vsk2727@gmail.com
EFTRAC Canada Inc.
Welcome All
Yes, fraud is a serious subject but in reality it is fun and interesting, both for the investigator & fraudsters, like
a chess game.
I can only make this fraud session interesting by using few case studies; videos and by splitting the session
to 4 modules stitched nicely for easy understanding.
Logistics for this webinar & Disclaimer
• Reminder: During my talk, on & off I will be touching few basic concepts for the students to understand
better. Our experienced members and Subject Matter Experts SMEs, are well versed on fraud basics.
Appreciate if you could bear these basics in the larger interest.
• Disclaimer & Acknowledgement: Case studies; images and Videos here are presented for education
and better understanding only. We acknowledge sincere thanks to each of the references covered in this
presentation. These are NOT FOR ADVERTISEMENT For security reasons names are changed.
• Let us take a deep dive into our Fraud Risk Management session right away - 4 module structure.
Do you like challenges – become a CFE
Fraud Risk Management (FRM)
A monster concept - Bite size for you…. into 4 modules
Module 1
Fraud risk management program
Concept and Accountability
Module 2
Banking fraud
Module 3
Digital fraud & on-line
Internet of Things IoT
Module 4
FRM Tools & Global scenario
AI, ML, Data Mining, CAATs
Module 1 – Fraud Risk Management Program
1.0 Concept Overview
• Fraud
• Risk
• Management of Fraud Risk
2.0 Effective fraud risk management program
• Industry and company specific
• Organization size
• Complexities recognizing inherent risks & systemic risks.
• Bank fraud & Digital fraud focused
3.0 Accountability
• Statutory Auditor or IA or Top Management or who else?
• Board Room to Mail Room + key role of Internal Auditor
• AML investigation – (Case study: CID interaction - FAX tapping)
Module 1
Fraud risk management program
Concept and Accountability
1.0 Concept Overview – Fraud, Risk, Management of Fraud Risk
Error vs Fraud
• Error can be accidental, but there can be NO accidental fraud
• Origin of the term “Fraud” - Financial Reward Acquired Under Deception
• Deception is intentional - made for personal gain or - to damage another individual
• Deliberately deceiving another - in order to damage them - to obtain property or services unjustly
• In criminal law, fraud is a crime or offense
Internal vs External fraud
Internal: Occupational / Employee fraud; corruption, asset misappropriation, & financial statement fraud. Not
charging friends & family.
External: Risk of unexpected loss perpetrated by persons external to the organization – this can be financial
loss; material or reputational loss.
Threat – unintentional vs intentional
• A threat is what we're trying to protect against. A staff mistakenly accessing wrong info in the system; A
disgruntled staff accessing the same system to inject virus or add spyware, malware it is intentional threat.
Risk is high in case of Intentional threat.
1.0 Concept Overview – Risk and Emerging Risk
Risk
• The potential for loss of life or money or damage as a result of a threat, exploiting a vulnerability.
• Risk is the intersection of assets, threats, and vulnerabilities.
• Types of Risks include: Inherent risk; Systemic risk; Reputation risk, Regulatory risk; Transaction risk;
Employee fraud risk (occupational fraud)
FRAUD is a Risk - Fraud risk is the risk of various types of fraud, a Co could face from internal and/or external.
Emerging Risk: High risk of uncertainty - no clue; no basic information; can’t even assess the frequency &
severity of a given risk. Emerging risk is completely a beast, never experienced before but causes havoc. Best
example, right now in 2020 world is facing this, Emerging Risk “Contagion” movie released in 2011. VIDEO
https://youtu.be/VZGHGVIedzA
Laurie Garret wrote a book in 1994 “The coming Plague” reported on multiple pandemics. Says Contagion as
Partly fantasy part reality and totally possible Emerging risks in banking: Security breaches /New Regulation on
data & security SWIFT.
RISK ASSESSMENT – Banking health
RISK – Heat Map – covered in Banking fraud - AML Risk heat map in tools - STRESS TEST - As a banking
regulator in Middle East (pro-active real estate market) & in Canada, we used multiple tools for risk assessment
1.0 Concept Overview: Fraud Risk Identification Process
The fraud risk identification process should include:
• Assessment of the incentives,
• Pressures
• Opportunities to commit fraud
• Intention
Along with pressure and opportunity, fuel for committing fraud is complete with
rationalization.
Opportunities to commit fraud exist throughout any organization and it is HUGE in
banking and digital environment. Imagine if there is lax in internal controls and a lack of
segregation of duties, it is a field day for fraudsters.
Case study: Over reliance of branch manager on a shrewd staff. Unreconciled demand
draft A/c - DD issued without consideration using client A/cs & customer cash was
siphoned off with false entry in passbook only. Branch control returns fudged.
2.0 Effective Fraud Risk Management
Product & its nature: (high potential for fraud)
• Gold & bullion business / Cash business / Ease of resale
Factors to Consider for an Effective FRM
• Conducive to fraudsters
• Access ; Accounts;
• documentation;
• oversight; related party deals;
• time off access;
• more complex process high potential for fraud;
• Weak Board of Directors -strong case for fraud
• Soft touch
• Attrition rate
• Weak internal audit function - fertile for fraud
• Pressure: Dissatisfaction; classified info;
market expectation; avoid invoking BGs
Case study: Feel of segregation on books - case study: spurious gold Aged supervisor reliance
on joint custodian.
Internal auditor role is very critical, on the ground, during audit: PIN & CARD segregation /eyes
& ears open / faulty cash counting machine.
3.0 Accountability
Who on earth is accountable? Is it Statutory Auditor or Internal Auditor or
Senior Management ?
• Board Room to Mail Room & key role of Internal Auditor. Limited extent Statutory too
• “Does “one size fits for all” FRM model apply? BIG NO - Customization is key.
• In ensuring effectiveness of FRM program, Internal Auditor does play a big role in
ensuring strict compliance of following ACFE guidelines
• FRM depends on the company size; complexity and industry fitment. Vulnerability
• Risk tolerance – there is tolerance level for risk but for fraud – zero tolerance (Tone at
the Top is critical)
3.0 Accountability (Contd.)
Key elements to be present in the Fraud Risk Management documentation
& Org. structure:
• Roles and responsibilities - Board & Senior
Management
• Commitment - Tone at the Top
• Fraud awareness (training / webinar )
• Conflict disclosure
• Detailed Fraud risk assessment
• Emerging Risk radar
• Reporting protocol – follow up action
• Red flag
• Whistleblower protection
• Investigation process documented
• Corrective action & serious penalty
• Quality assurance at each stage
• Continuous monitoring
• Eyes & Ears (experience need not be yours)
• Dynamic & not static (Example COVID frauds)
World is Changing, so as Rules
Module 2: Banking Fraud
• Fraud toes the dotted line of money
• Money = Banking, Banking = Fertile ground for Fraud
Topics Covered
• Anti Money Laundering – AML
• Very High Risk cases lead to potential fraud - equally important
• International Case Studies – Risk Assessment / Credit & Gold Bullion /Large Scale
• Retail Banking – Fighting Financial Fraud – Canadian Bank
• Bank Fraud – Root Cause Analysis (RCA) is critical. Not to repeat.
• Your own history is important, but experience of others is more important, to learn
from - to pro actively arrest fraud.
Module 2
Banking fraud
12
Bank Fraud – AML
● Money laundering occurs when transferring money across borders
● Major customers of money laundering are:
○ Tax evaders
○ Drug dealers
○ Terrorist operators
● Among others, 2 key factors that affect the risk of an a/c
○ Country risk: Destination
○ Transaction risk: Volume, frequency
Case Study 1: Gold & Bullion – VH Risk Rating International
Case Study 2: Internal Controls – Fraudulent fund transfer - International
Video on Retail Banking – Fighting Financial Fraud – Canadian Bank
https://globalnews.ca/video/5040683/fighting-financial-fraud
Case Study 3: Anti Money Laundering (AML) Tracing final Account – International
Case Study 4: Regulatory review – credit portfolio - risk downgraded – International
Case studies… Very High Risk just stops large fraud / AML
• Top Management -no clue on how it happened
• Statutory auditor: off the hook due to “ off the
books” concept
• Accountability – Zero
• Internal controls – All in one place – controls on
the air
• Controlling / monitoring authorities
Case study Summary … Bank fraud
Root Cause Analysis and CAATS: Common responses – accountability haunts again
• Extremely serious – calls for severe action
• Systemic issue – responsibility lies from Big
picture principle – still accountable
• Extremely critical – to be booked
• Lack of segregation – too much reliance on
single individual
• Equally responsible and accountable
• Lots of resemblance to our Punjab National
Bank & Harshad Metha fraud cases
Module 3 – Digital Fraud and Online
• With convenience, comes risk.
• As payments move online, fraudsters follow closely.
Topics Covered
• Smart Phone – virus & take over, On-line frauds
• Internet of Things (IoT)
• Artificial Intelligence (AI) - area of computer science that emphasizes the creation of
intelligent machines that work and react like humans
Module 3
Digital fraud & online
Internet of Things IoT and AI
In simple terms IoT is the network of physical devices, home appliances etc, embedded with electronics,
SW, sensors and internet connectivity (web enabled) which enables these to connect, collect and
exchange data. DOWNSIDE: Security concerns; insecure small gadgets / gaming console in
market, opens the flood gates to fraudsters.
IoT EVERYWHERE - Smart phone, Internet, IoT whatever gadget you touch, there is convenience
tagged to potential fraud!! With Corona we are more desperate for convenience. As living with
convenience is a necessity going forward, learn how to embrace this risk & lead a lifestyle.
IoT is everywhere – smart phone/appliances/security system/ Fitbit / Scale / Sleep machine / TESLA -
Fear not, it is not Digital pandemic. Example: TESLA / Weighing scale / Sleep machine. For you, on-
hand basic solution to mitigate Digital Risk – AAA Awareness ; Adaptability; Alertness with common
sense. Technology can be like junk food. We will consume it even when we know it is bad for us.
On-line Fraud - As payments move online, fraudsters follow closely.
Global ecommerce market is predicted to grow to USD 5 Trn. in 2022 and 20 % of global consumer
sales will be online. Fraud loss is estimated to be 1.8% of online sales. Digital revolution overturned the
Fraud dynamix to a new level.
DIGITAL Fraud – Internet of Things IoT
Strike a right balance between cybersecurity technology against your
security policy needs.
Major trends: biometrics, mobile authentication, and risk-based authentication.
AI application, a major mitigation tool
Biometric – users feel & user pattern is key
• Fingerprints / Pattern matching;
• Facial-Identification and measurement of points on the face.
• Voice recognition-Voiceprint ;
• Retina Iris recognition;
• Behavioral biometrics: Using subtle factors like typing style, swipes on a mobile device,
dwell time, and technical identification.
DIGITAL Fraud Mitigation – Cybersecurity technology
Mobile authentication:
• Mobile push technology that let you swipe or accept to authorize;
• Built-in mobile biometrics;
• OTP
• Advanced analytics is one of the major solutions
VIDEO - Real time fraud prevention in a real time world
https://www.youtube.com/watch?v=sMDg7ld1tZU&app=desktop
DIGITAL Fraud Mitigation – Cybersecurity technology
SWIFT Fraud - Key findings I have conducted SWIFT controls - submitted Executive Note on Emerging risk,
highlighting SWIFT as EMERGING RISK.
•Under SWIFT South East Asia accounts for 80% of fraudulent beneficiaries (Red flag)
•USD currency used in 70 % of attempted thefts - use of Euro (Red flag )
•Sleeper cells - attackers continue to operate ‘silently’ for weeks or months after penetrating a target, learning
behaviors and patterns before launching an attack.
•Soft target of unused payment corridors: vast majority of fraudulent transactions used payment corridors
(combinations of target and beneficiary banks) that had not been used during the previous 24- 36m (Real time
Advanced Analytics AI can solve)
•Insider collusion resulted in the quick identification of financial institutions targeted by cybercriminals – in
most cases before attackers were even able to generate fraudulent messages; the exchange of relevant and
timely cyber threat intelligence has proved critical in effectively detecting and preventing attacks. (Basic
control lost)
On-line fraud - SWIFT Fraud
Module 4
FRM Tools & Global scenario
AI, ML, Data Mining, CAATs
Module 4 – Fraud Risk Management Tools & Global scenario
• Create Reporting avenues – Whistle blower / Sectional reporting like immigration
fraud / fraud against elders / Canadian Anti Fraud Center / Canada Border Service
Agency for Document fraud / anonymous / community policing / peer audit
• Computer Assisted Auditing Techniques (CAATs - used for risk based audit too.)
• AML - Anti Money Laundering – RISK HEAT MAP
• Emerging risk Analysis - Predictability
• Artificial Intelligence (AI) – Predictability
• Machine Learning
• Data mining – Big Data
• DATA Analytics
21st century fraud landscape…
We are in digital school, move to
PREDICT FRAUD
PREVENT FRAUD is traditional, still valid - Old is Gold!!
22
Accounts are plotted on a “risk chart” based on country, transaction risks
Country rating
Transaction Rating
-10 10
A
B
D
C
>10% of threshold
and <2 transactions
in 24 hours
<2% below
threshold and >3
transactions in
24 hours
Risk Heat Map in Anti Money Laundering - AML
23
Cool & Green map“Risk chart” based on country, transaction risks
Country rating
Transaction Rating
-10 10
• “No issues” accounts
• Country risk rating is low,
transaction risk rating is
low
A
B
D
C
>10% of threshold
and <2 transactions
in 24 hours
<2% below
threshold and >3
transactions in
24 hours
24
Still cool “risk chart” based on country, transaction risks
Country rating
Transaction Rating
-10 10
• “Watch list” accounts
• Country risk rating is low,
transaction risk rating is
high
A
B
D
C
>10% of threshold
and <2 transactions
in 24 hours
<2% below
threshold and >3
transactions in
24 hours
25
Feeling warm - “risk chart” based on country risk & transaction risks
Country rating
Transaction Rating
-10 10
• “Watch list” accounts
• Country risk rating is high,
transaction risk rating is
low
A
B
D
C
>10% of threshold
and <2 transactions
in 24 hours
<2% below
threshold and >3
transactions in
24 hours
26
Hot - Real Heat Map & “risk chart” - Both high risk - country & transactions
Country rating
Transaction Rating
-10 10
• “Immediate action”
accounts
• Country risk rating is high,
transaction risk rating is
high
A
B
D
C
>10% of threshold
and <2 transactions
in 24 hours
<2% below
threshold and >3
transactions in
24 hours
27
Country rating
Transaction Rating
-10 10
• “Watch list” accounts
• Country risk rating is high,
transaction risk rating is
low
• “Watch list” accounts
• Country risk rating is low,
transaction risk rating is
high
• “No issues” accounts
• Country risk rating is low,
transaction risk rating is
low
• “Immediate action”
accounts
• Country risk rating is high,
transaction risk rating is
high
A
B
D
C
>10% of threshold
and <2 transactions
in 24 hours
<2% below
threshold and >3
transactions in
24 hours
Hot - Real Heat Map & “risk chart” - Both high risk - country & transactions
28
Each account is plotted on a “Risk Heat Map” based on country risk & transaction risks
Country rating
Transaction Rating
-10 10
• “Watch list” accounts
• Country risk rating is high,
transaction risk rating is
low
• “Watch list” accounts
• Country risk rating is low,
transaction risk rating is
high
• “No issues” accounts
• Country risk rating is low,
transaction risk rating is
low
• “Immediate action”
accounts
• Country risk rating is high,
transaction risk rating is
high
A
B
D
C
>10% of threshold
and <2 transactions
in 24 hours
<2% below
threshold and >3
transactions in
24 hours
Hot - Real Heat Map & “risk chart” - Both high risk - country & transactions
29
Account examples that might fall under each quadrant
Country rating
Transaction Rating
-10 10
• Country (L): $ transferred
from Canada to US
• Transaction (L): parents
sending money to children
in university
• Country (L): $ transferred
from Canada to US
• Transaction (H): Money
laundering, tax evasion
• Country (H): Money sent
from Canada to high risk
country
• Transaction (H): Money
laundering, tax evasion
• Country (H): Money sent
from Canada to high risk
country
• Transaction (L):
Immigrants sending money
back home
A
B
D
C
>10% of threshold
and <2 transactions
in 24 hours
<2% below
threshold and >3
transactions in
24 hours
Hot - Real Heat Map & “risk chart” - Both high risk - country & transactions
FRM Tools - DATA MINING & CAATs
Data Mining is torturing the data until it confesses.
It is a process and a valuable tool as well. Collects volumes of data with the objective of: finding hidden
patterns and analyzing relationships between numerous types of data developing predictive models (process
by which a model is created to try to best predict the probability of an outcome)
Computer Assisted Auditing Techniques (CAATs)
Powerful tool for fraud prevention and fraud detection & in risk based internal audit too.
FRM Tools - Artificial Intelligence (AI) & Machine learning (ML)
AI in simple terms – to create technology that allows computers to function in a more intelligent manner –
simulating or creating intelligence – trying to replace humans. More useful in repetitive jobs and basic
problem solving tasks and where predictability is involved
Machine Learning: ML is a form of AI that enables a system to learn from Data. Types of ML: Supervised
learning teaching AI with supervision; Learn from Surroundings; Unsupervised learning
▪ AI & ML APPLICATION in online mobile cheque deposit of cheques – without visiting the branch
▪ Email category in Gmail like promotional, primary etc done by machine learning
▪ A I Examples: SIRI / ALEXA / TESLA / AI Auto pilot in commercial flights / Google AI powered predictions
/ Rideshare APPs use AI to find best & fast route / Spam filter in your email in box is powered by AI /
credit decisions in analyzing application details in volume
VIDEO - Let us watch AI in action
https://www.youtube.com/watch?v=0oRVLf16CMU&feature=youtu.be
AI & Machine learning in Fraud radar
• The future of AI-based fraud prevention relies on the combination of supervised and unsupervised
machine learning.
• Supervised machine learning excels at examining events, factors, and trends from the past.
Historical data trains supervised machine learning models to find patterns not discernable with rules
or predictive analytics.
• Unsupervised machine learning is adept at finding anomalies, interrelationships, and valid links
between emerging factors and variables.
• Combining both unsupervised and supervised machine learning defines the future of AI-based fraud
prevention and is the foundation of the top nine ways AI prevents fraud
Artificial Intelligence in Fraud prevention radar
• Trends and patterns: AI is re-defining fraud prevention from relying only on past experiences to
taking into account emerging activities, behaviors, and trends in transaction anomalies.
• Fast: AI’s ability to detect fraud attacks in almost real time using advanced AI-based rating technologies
like Omniscore is the future of fraud management.
• Pro-active: By having an AI-based fraud prevention system do the work of evaluating historical data and
anomalies, customer experiences can stay more positive, and the more sophisticated nuanced abuse
attacks can be stopped.
• Minimizing fraud loss: Provides fraud analysts with real-time risk scores and greater insight into
where best to set threshold scores to maximize sales and minimize fraud losses
• Aids in compliance: internal business policies regarding the sales of specific products to specific
countries based on distribution and reseller agreements.
• Fraud prevention Using Neural Networks analyzing frequency / type of transaction / size / kind of
retailer involved – throws out exceptions – red flag.
Slide after slide on risk, fraud, loss, investigation – Fraud Cycle Continues
Fraud & Investigation
NEVER ENDS
VIDEO :Analytics, Tools and Innovation – Global Trend
https://youtu.be/gF_sh3EtWF4
SUMMARY
KEY, PRACTICAL TAKE AWAY FOR YOU - FROM NOW ON
Remember: Where there is money or financial gain, there is fraud. You being a professional is part of the game
You can play any role, be a student, Practicing CA or Employed CA, Subject Matter Expert, Board member,
Executive, Administrator, Administrative Assistant, Personal Assistant, Mail Room clerk, Businessman MSME or
Large .
Individual accountability – it is YOU, tap your forensic brain. be skeptical & be alert.
Keep your eyes and ears open. Report in any form to save your skin and to save your entity and your loved ones;
Extreme caution in reporting, submit special reports immediately on High or Very High risk cases without
waiting for the audit to complete.
It is time to Predict fraud using evolving technology, while keeping the basics of prevention in tact
Fraud is interesting, as an investigator only!!!
Do you like challenges…
BECOME A CFE
Thank you!!
CA V S KUMAR FCA, CFE, CIA
vsk2727@gmail.com
EFTRAC Canada Inc.

More Related Content

Similar to EFTRAC_Canada.pdf

Financial Statement Fraud training by Tommy SEAH
Financial Statement Fraud training by Tommy SEAHFinancial Statement Fraud training by Tommy SEAH
Financial Statement Fraud training by Tommy SEAHTommy Seah
 
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentBillyCheuk
 
McKonly & Asbury Webinar - Skimming: What the Auditor's Miss
McKonly & Asbury Webinar - Skimming: What the Auditor's MissMcKonly & Asbury Webinar - Skimming: What the Auditor's Miss
McKonly & Asbury Webinar - Skimming: What the Auditor's MissMcKonly & Asbury, LLP
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
Fraud in the Public Sector
Fraud in the Public SectorFraud in the Public Sector
Fraud in the Public Sectorfmi_igf
 
AML Meets ABC Webinar Deck 2-19-14
AML Meets ABC Webinar Deck 2-19-14AML Meets ABC Webinar Deck 2-19-14
AML Meets ABC Webinar Deck 2-19-14ACFCS
 
ERM: DIFFERENCES BETWEEN SECTORS
ERM: DIFFERENCES BETWEEN SECTORSERM: DIFFERENCES BETWEEN SECTORS
ERM: DIFFERENCES BETWEEN SECTORSMichel Rochette
 
Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Pairat Srivilairit
 
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Pairat Srivilairit
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryDecosimoCPAs
 
Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...
Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...
Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...Kenny Ong
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Role of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionRole of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionZeeshan Shahid
 
Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6Accounting_Whitepapers
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in bankssathyananda prabhu
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraudBusters
 
Protect your clients from fraud - CPA's
Protect your clients from fraud - CPA'sProtect your clients from fraud - CPA's
Protect your clients from fraud - CPA'stwhiteman
 

Similar to EFTRAC_Canada.pdf (20)

Financial Statement Fraud training by Tommy SEAH
Financial Statement Fraud training by Tommy SEAHFinancial Statement Fraud training by Tommy SEAH
Financial Statement Fraud training by Tommy SEAH
 
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
 
McKonly & Asbury Webinar - Skimming: What the Auditor's Miss
McKonly & Asbury Webinar - Skimming: What the Auditor's MissMcKonly & Asbury Webinar - Skimming: What the Auditor's Miss
McKonly & Asbury Webinar - Skimming: What the Auditor's Miss
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Fraud in the Public Sector
Fraud in the Public SectorFraud in the Public Sector
Fraud in the Public Sector
 
AML Meets ABC Webinar Deck 2-19-14
AML Meets ABC Webinar Deck 2-19-14AML Meets ABC Webinar Deck 2-19-14
AML Meets ABC Webinar Deck 2-19-14
 
ERM: DIFFERENCES BETWEEN SECTORS
ERM: DIFFERENCES BETWEEN SECTORSERM: DIFFERENCES BETWEEN SECTORS
ERM: DIFFERENCES BETWEEN SECTORS
 
Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4
 
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
 
Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...
Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...
Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Role of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionRole of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detection
 
Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6
 
Risk Assessment1.ppt
Risk Assessment1.pptRisk Assessment1.ppt
Risk Assessment1.ppt
 
Risk based approach
Risk based approachRisk based approach
Risk based approach
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in banks
 
Fraud And Internal Controls Linked In April 2011
Fraud And Internal Controls   Linked In April 2011Fraud And Internal Controls   Linked In April 2011
Fraud And Internal Controls Linked In April 2011
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
 
Protect your clients from fraud - CPA's
Protect your clients from fraud - CPA'sProtect your clients from fraud - CPA's
Protect your clients from fraud - CPA's
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 

Recently uploaded (20)

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 

EFTRAC_Canada.pdf

  • 1. Fraud Risk Management A Global Perspective Canada Inc CA V S KUMAR FCA, CFE, CIA vsk2727@gmail.com EFTRAC Canada Inc.
  • 2. Welcome All Yes, fraud is a serious subject but in reality it is fun and interesting, both for the investigator & fraudsters, like a chess game. I can only make this fraud session interesting by using few case studies; videos and by splitting the session to 4 modules stitched nicely for easy understanding. Logistics for this webinar & Disclaimer • Reminder: During my talk, on & off I will be touching few basic concepts for the students to understand better. Our experienced members and Subject Matter Experts SMEs, are well versed on fraud basics. Appreciate if you could bear these basics in the larger interest. • Disclaimer & Acknowledgement: Case studies; images and Videos here are presented for education and better understanding only. We acknowledge sincere thanks to each of the references covered in this presentation. These are NOT FOR ADVERTISEMENT For security reasons names are changed. • Let us take a deep dive into our Fraud Risk Management session right away - 4 module structure. Do you like challenges – become a CFE
  • 3. Fraud Risk Management (FRM) A monster concept - Bite size for you…. into 4 modules Module 1 Fraud risk management program Concept and Accountability Module 2 Banking fraud Module 3 Digital fraud & on-line Internet of Things IoT Module 4 FRM Tools & Global scenario AI, ML, Data Mining, CAATs
  • 4. Module 1 – Fraud Risk Management Program 1.0 Concept Overview • Fraud • Risk • Management of Fraud Risk 2.0 Effective fraud risk management program • Industry and company specific • Organization size • Complexities recognizing inherent risks & systemic risks. • Bank fraud & Digital fraud focused 3.0 Accountability • Statutory Auditor or IA or Top Management or who else? • Board Room to Mail Room + key role of Internal Auditor • AML investigation – (Case study: CID interaction - FAX tapping) Module 1 Fraud risk management program Concept and Accountability
  • 5. 1.0 Concept Overview – Fraud, Risk, Management of Fraud Risk Error vs Fraud • Error can be accidental, but there can be NO accidental fraud • Origin of the term “Fraud” - Financial Reward Acquired Under Deception • Deception is intentional - made for personal gain or - to damage another individual • Deliberately deceiving another - in order to damage them - to obtain property or services unjustly • In criminal law, fraud is a crime or offense Internal vs External fraud Internal: Occupational / Employee fraud; corruption, asset misappropriation, & financial statement fraud. Not charging friends & family. External: Risk of unexpected loss perpetrated by persons external to the organization – this can be financial loss; material or reputational loss. Threat – unintentional vs intentional • A threat is what we're trying to protect against. A staff mistakenly accessing wrong info in the system; A disgruntled staff accessing the same system to inject virus or add spyware, malware it is intentional threat. Risk is high in case of Intentional threat.
  • 6. 1.0 Concept Overview – Risk and Emerging Risk Risk • The potential for loss of life or money or damage as a result of a threat, exploiting a vulnerability. • Risk is the intersection of assets, threats, and vulnerabilities. • Types of Risks include: Inherent risk; Systemic risk; Reputation risk, Regulatory risk; Transaction risk; Employee fraud risk (occupational fraud) FRAUD is a Risk - Fraud risk is the risk of various types of fraud, a Co could face from internal and/or external. Emerging Risk: High risk of uncertainty - no clue; no basic information; can’t even assess the frequency & severity of a given risk. Emerging risk is completely a beast, never experienced before but causes havoc. Best example, right now in 2020 world is facing this, Emerging Risk “Contagion” movie released in 2011. VIDEO https://youtu.be/VZGHGVIedzA Laurie Garret wrote a book in 1994 “The coming Plague” reported on multiple pandemics. Says Contagion as Partly fantasy part reality and totally possible Emerging risks in banking: Security breaches /New Regulation on data & security SWIFT. RISK ASSESSMENT – Banking health RISK – Heat Map – covered in Banking fraud - AML Risk heat map in tools - STRESS TEST - As a banking regulator in Middle East (pro-active real estate market) & in Canada, we used multiple tools for risk assessment
  • 7. 1.0 Concept Overview: Fraud Risk Identification Process The fraud risk identification process should include: • Assessment of the incentives, • Pressures • Opportunities to commit fraud • Intention Along with pressure and opportunity, fuel for committing fraud is complete with rationalization. Opportunities to commit fraud exist throughout any organization and it is HUGE in banking and digital environment. Imagine if there is lax in internal controls and a lack of segregation of duties, it is a field day for fraudsters. Case study: Over reliance of branch manager on a shrewd staff. Unreconciled demand draft A/c - DD issued without consideration using client A/cs & customer cash was siphoned off with false entry in passbook only. Branch control returns fudged.
  • 8. 2.0 Effective Fraud Risk Management Product & its nature: (high potential for fraud) • Gold & bullion business / Cash business / Ease of resale Factors to Consider for an Effective FRM • Conducive to fraudsters • Access ; Accounts; • documentation; • oversight; related party deals; • time off access; • more complex process high potential for fraud; • Weak Board of Directors -strong case for fraud • Soft touch • Attrition rate • Weak internal audit function - fertile for fraud • Pressure: Dissatisfaction; classified info; market expectation; avoid invoking BGs Case study: Feel of segregation on books - case study: spurious gold Aged supervisor reliance on joint custodian. Internal auditor role is very critical, on the ground, during audit: PIN & CARD segregation /eyes & ears open / faulty cash counting machine.
  • 9. 3.0 Accountability Who on earth is accountable? Is it Statutory Auditor or Internal Auditor or Senior Management ? • Board Room to Mail Room & key role of Internal Auditor. Limited extent Statutory too • “Does “one size fits for all” FRM model apply? BIG NO - Customization is key. • In ensuring effectiveness of FRM program, Internal Auditor does play a big role in ensuring strict compliance of following ACFE guidelines • FRM depends on the company size; complexity and industry fitment. Vulnerability • Risk tolerance – there is tolerance level for risk but for fraud – zero tolerance (Tone at the Top is critical)
  • 10. 3.0 Accountability (Contd.) Key elements to be present in the Fraud Risk Management documentation & Org. structure: • Roles and responsibilities - Board & Senior Management • Commitment - Tone at the Top • Fraud awareness (training / webinar ) • Conflict disclosure • Detailed Fraud risk assessment • Emerging Risk radar • Reporting protocol – follow up action • Red flag • Whistleblower protection • Investigation process documented • Corrective action & serious penalty • Quality assurance at each stage • Continuous monitoring • Eyes & Ears (experience need not be yours) • Dynamic & not static (Example COVID frauds) World is Changing, so as Rules
  • 11. Module 2: Banking Fraud • Fraud toes the dotted line of money • Money = Banking, Banking = Fertile ground for Fraud Topics Covered • Anti Money Laundering – AML • Very High Risk cases lead to potential fraud - equally important • International Case Studies – Risk Assessment / Credit & Gold Bullion /Large Scale • Retail Banking – Fighting Financial Fraud – Canadian Bank • Bank Fraud – Root Cause Analysis (RCA) is critical. Not to repeat. • Your own history is important, but experience of others is more important, to learn from - to pro actively arrest fraud. Module 2 Banking fraud
  • 12. 12 Bank Fraud – AML ● Money laundering occurs when transferring money across borders ● Major customers of money laundering are: ○ Tax evaders ○ Drug dealers ○ Terrorist operators ● Among others, 2 key factors that affect the risk of an a/c ○ Country risk: Destination ○ Transaction risk: Volume, frequency
  • 13. Case Study 1: Gold & Bullion – VH Risk Rating International Case Study 2: Internal Controls – Fraudulent fund transfer - International Video on Retail Banking – Fighting Financial Fraud – Canadian Bank https://globalnews.ca/video/5040683/fighting-financial-fraud Case Study 3: Anti Money Laundering (AML) Tracing final Account – International Case Study 4: Regulatory review – credit portfolio - risk downgraded – International Case studies… Very High Risk just stops large fraud / AML
  • 14. • Top Management -no clue on how it happened • Statutory auditor: off the hook due to “ off the books” concept • Accountability – Zero • Internal controls – All in one place – controls on the air • Controlling / monitoring authorities Case study Summary … Bank fraud Root Cause Analysis and CAATS: Common responses – accountability haunts again • Extremely serious – calls for severe action • Systemic issue – responsibility lies from Big picture principle – still accountable • Extremely critical – to be booked • Lack of segregation – too much reliance on single individual • Equally responsible and accountable • Lots of resemblance to our Punjab National Bank & Harshad Metha fraud cases
  • 15. Module 3 – Digital Fraud and Online • With convenience, comes risk. • As payments move online, fraudsters follow closely. Topics Covered • Smart Phone – virus & take over, On-line frauds • Internet of Things (IoT) • Artificial Intelligence (AI) - area of computer science that emphasizes the creation of intelligent machines that work and react like humans Module 3 Digital fraud & online Internet of Things IoT and AI
  • 16. In simple terms IoT is the network of physical devices, home appliances etc, embedded with electronics, SW, sensors and internet connectivity (web enabled) which enables these to connect, collect and exchange data. DOWNSIDE: Security concerns; insecure small gadgets / gaming console in market, opens the flood gates to fraudsters. IoT EVERYWHERE - Smart phone, Internet, IoT whatever gadget you touch, there is convenience tagged to potential fraud!! With Corona we are more desperate for convenience. As living with convenience is a necessity going forward, learn how to embrace this risk & lead a lifestyle. IoT is everywhere – smart phone/appliances/security system/ Fitbit / Scale / Sleep machine / TESLA - Fear not, it is not Digital pandemic. Example: TESLA / Weighing scale / Sleep machine. For you, on- hand basic solution to mitigate Digital Risk – AAA Awareness ; Adaptability; Alertness with common sense. Technology can be like junk food. We will consume it even when we know it is bad for us. On-line Fraud - As payments move online, fraudsters follow closely. Global ecommerce market is predicted to grow to USD 5 Trn. in 2022 and 20 % of global consumer sales will be online. Fraud loss is estimated to be 1.8% of online sales. Digital revolution overturned the Fraud dynamix to a new level. DIGITAL Fraud – Internet of Things IoT
  • 17. Strike a right balance between cybersecurity technology against your security policy needs. Major trends: biometrics, mobile authentication, and risk-based authentication. AI application, a major mitigation tool Biometric – users feel & user pattern is key • Fingerprints / Pattern matching; • Facial-Identification and measurement of points on the face. • Voice recognition-Voiceprint ; • Retina Iris recognition; • Behavioral biometrics: Using subtle factors like typing style, swipes on a mobile device, dwell time, and technical identification. DIGITAL Fraud Mitigation – Cybersecurity technology
  • 18. Mobile authentication: • Mobile push technology that let you swipe or accept to authorize; • Built-in mobile biometrics; • OTP • Advanced analytics is one of the major solutions VIDEO - Real time fraud prevention in a real time world https://www.youtube.com/watch?v=sMDg7ld1tZU&app=desktop DIGITAL Fraud Mitigation – Cybersecurity technology
  • 19. SWIFT Fraud - Key findings I have conducted SWIFT controls - submitted Executive Note on Emerging risk, highlighting SWIFT as EMERGING RISK. •Under SWIFT South East Asia accounts for 80% of fraudulent beneficiaries (Red flag) •USD currency used in 70 % of attempted thefts - use of Euro (Red flag ) •Sleeper cells - attackers continue to operate ‘silently’ for weeks or months after penetrating a target, learning behaviors and patterns before launching an attack. •Soft target of unused payment corridors: vast majority of fraudulent transactions used payment corridors (combinations of target and beneficiary banks) that had not been used during the previous 24- 36m (Real time Advanced Analytics AI can solve) •Insider collusion resulted in the quick identification of financial institutions targeted by cybercriminals – in most cases before attackers were even able to generate fraudulent messages; the exchange of relevant and timely cyber threat intelligence has proved critical in effectively detecting and preventing attacks. (Basic control lost) On-line fraud - SWIFT Fraud
  • 20. Module 4 FRM Tools & Global scenario AI, ML, Data Mining, CAATs Module 4 – Fraud Risk Management Tools & Global scenario • Create Reporting avenues – Whistle blower / Sectional reporting like immigration fraud / fraud against elders / Canadian Anti Fraud Center / Canada Border Service Agency for Document fraud / anonymous / community policing / peer audit • Computer Assisted Auditing Techniques (CAATs - used for risk based audit too.) • AML - Anti Money Laundering – RISK HEAT MAP • Emerging risk Analysis - Predictability • Artificial Intelligence (AI) – Predictability • Machine Learning • Data mining – Big Data • DATA Analytics
  • 21. 21st century fraud landscape… We are in digital school, move to PREDICT FRAUD PREVENT FRAUD is traditional, still valid - Old is Gold!!
  • 22. 22 Accounts are plotted on a “risk chart” based on country, transaction risks Country rating Transaction Rating -10 10 A B D C >10% of threshold and <2 transactions in 24 hours <2% below threshold and >3 transactions in 24 hours Risk Heat Map in Anti Money Laundering - AML
  • 23. 23 Cool & Green map“Risk chart” based on country, transaction risks Country rating Transaction Rating -10 10 • “No issues” accounts • Country risk rating is low, transaction risk rating is low A B D C >10% of threshold and <2 transactions in 24 hours <2% below threshold and >3 transactions in 24 hours
  • 24. 24 Still cool “risk chart” based on country, transaction risks Country rating Transaction Rating -10 10 • “Watch list” accounts • Country risk rating is low, transaction risk rating is high A B D C >10% of threshold and <2 transactions in 24 hours <2% below threshold and >3 transactions in 24 hours
  • 25. 25 Feeling warm - “risk chart” based on country risk & transaction risks Country rating Transaction Rating -10 10 • “Watch list” accounts • Country risk rating is high, transaction risk rating is low A B D C >10% of threshold and <2 transactions in 24 hours <2% below threshold and >3 transactions in 24 hours
  • 26. 26 Hot - Real Heat Map & “risk chart” - Both high risk - country & transactions Country rating Transaction Rating -10 10 • “Immediate action” accounts • Country risk rating is high, transaction risk rating is high A B D C >10% of threshold and <2 transactions in 24 hours <2% below threshold and >3 transactions in 24 hours
  • 27. 27 Country rating Transaction Rating -10 10 • “Watch list” accounts • Country risk rating is high, transaction risk rating is low • “Watch list” accounts • Country risk rating is low, transaction risk rating is high • “No issues” accounts • Country risk rating is low, transaction risk rating is low • “Immediate action” accounts • Country risk rating is high, transaction risk rating is high A B D C >10% of threshold and <2 transactions in 24 hours <2% below threshold and >3 transactions in 24 hours Hot - Real Heat Map & “risk chart” - Both high risk - country & transactions
  • 28. 28 Each account is plotted on a “Risk Heat Map” based on country risk & transaction risks Country rating Transaction Rating -10 10 • “Watch list” accounts • Country risk rating is high, transaction risk rating is low • “Watch list” accounts • Country risk rating is low, transaction risk rating is high • “No issues” accounts • Country risk rating is low, transaction risk rating is low • “Immediate action” accounts • Country risk rating is high, transaction risk rating is high A B D C >10% of threshold and <2 transactions in 24 hours <2% below threshold and >3 transactions in 24 hours Hot - Real Heat Map & “risk chart” - Both high risk - country & transactions
  • 29. 29 Account examples that might fall under each quadrant Country rating Transaction Rating -10 10 • Country (L): $ transferred from Canada to US • Transaction (L): parents sending money to children in university • Country (L): $ transferred from Canada to US • Transaction (H): Money laundering, tax evasion • Country (H): Money sent from Canada to high risk country • Transaction (H): Money laundering, tax evasion • Country (H): Money sent from Canada to high risk country • Transaction (L): Immigrants sending money back home A B D C >10% of threshold and <2 transactions in 24 hours <2% below threshold and >3 transactions in 24 hours Hot - Real Heat Map & “risk chart” - Both high risk - country & transactions
  • 30. FRM Tools - DATA MINING & CAATs Data Mining is torturing the data until it confesses. It is a process and a valuable tool as well. Collects volumes of data with the objective of: finding hidden patterns and analyzing relationships between numerous types of data developing predictive models (process by which a model is created to try to best predict the probability of an outcome) Computer Assisted Auditing Techniques (CAATs) Powerful tool for fraud prevention and fraud detection & in risk based internal audit too.
  • 31. FRM Tools - Artificial Intelligence (AI) & Machine learning (ML) AI in simple terms – to create technology that allows computers to function in a more intelligent manner – simulating or creating intelligence – trying to replace humans. More useful in repetitive jobs and basic problem solving tasks and where predictability is involved Machine Learning: ML is a form of AI that enables a system to learn from Data. Types of ML: Supervised learning teaching AI with supervision; Learn from Surroundings; Unsupervised learning ▪ AI & ML APPLICATION in online mobile cheque deposit of cheques – without visiting the branch ▪ Email category in Gmail like promotional, primary etc done by machine learning ▪ A I Examples: SIRI / ALEXA / TESLA / AI Auto pilot in commercial flights / Google AI powered predictions / Rideshare APPs use AI to find best & fast route / Spam filter in your email in box is powered by AI / credit decisions in analyzing application details in volume VIDEO - Let us watch AI in action https://www.youtube.com/watch?v=0oRVLf16CMU&feature=youtu.be
  • 32. AI & Machine learning in Fraud radar • The future of AI-based fraud prevention relies on the combination of supervised and unsupervised machine learning. • Supervised machine learning excels at examining events, factors, and trends from the past. Historical data trains supervised machine learning models to find patterns not discernable with rules or predictive analytics. • Unsupervised machine learning is adept at finding anomalies, interrelationships, and valid links between emerging factors and variables. • Combining both unsupervised and supervised machine learning defines the future of AI-based fraud prevention and is the foundation of the top nine ways AI prevents fraud
  • 33. Artificial Intelligence in Fraud prevention radar • Trends and patterns: AI is re-defining fraud prevention from relying only on past experiences to taking into account emerging activities, behaviors, and trends in transaction anomalies. • Fast: AI’s ability to detect fraud attacks in almost real time using advanced AI-based rating technologies like Omniscore is the future of fraud management. • Pro-active: By having an AI-based fraud prevention system do the work of evaluating historical data and anomalies, customer experiences can stay more positive, and the more sophisticated nuanced abuse attacks can be stopped. • Minimizing fraud loss: Provides fraud analysts with real-time risk scores and greater insight into where best to set threshold scores to maximize sales and minimize fraud losses • Aids in compliance: internal business policies regarding the sales of specific products to specific countries based on distribution and reseller agreements. • Fraud prevention Using Neural Networks analyzing frequency / type of transaction / size / kind of retailer involved – throws out exceptions – red flag.
  • 34. Slide after slide on risk, fraud, loss, investigation – Fraud Cycle Continues Fraud & Investigation NEVER ENDS VIDEO :Analytics, Tools and Innovation – Global Trend https://youtu.be/gF_sh3EtWF4
  • 35. SUMMARY KEY, PRACTICAL TAKE AWAY FOR YOU - FROM NOW ON Remember: Where there is money or financial gain, there is fraud. You being a professional is part of the game You can play any role, be a student, Practicing CA or Employed CA, Subject Matter Expert, Board member, Executive, Administrator, Administrative Assistant, Personal Assistant, Mail Room clerk, Businessman MSME or Large . Individual accountability – it is YOU, tap your forensic brain. be skeptical & be alert. Keep your eyes and ears open. Report in any form to save your skin and to save your entity and your loved ones; Extreme caution in reporting, submit special reports immediately on High or Very High risk cases without waiting for the audit to complete. It is time to Predict fraud using evolving technology, while keeping the basics of prevention in tact Fraud is interesting, as an investigator only!!!
  • 36. Do you like challenges… BECOME A CFE Thank you!! CA V S KUMAR FCA, CFE, CIA vsk2727@gmail.com EFTRAC Canada Inc.