SlideShare a Scribd company logo
1 of 9
Download to read offline
©2017
COST-EFFECTIVE FRAUD PREVENTION AND DETECTION MEASURES
When it comes to fraud risk management, one major constraint faced by organisations of all sizes
is the budget. In this session, participants will discover effective fraud prevention and detection
tools that can be implemented with very low cost and almost zero capital expenditure.
Participants will also learn the advantages and disadvantages of such tools, challenges in their
implementation, and how to effectively implement a plan to prevent and detect fraud.
CHARANJEET BHATIA, CFE, CISM
Head of Fraud Risk Management
FGB
Charanjeet Bhatia is an MBA with more than 19 years of experience in risk management, audit
and sales functions, and has worked in the banking sector in India, Tanzania, and the UAE. He is
currently working with FGB as Head of Group Fraud Risk Management and has also been
elected as Vice Chairman of the Fraud Prevention committee of the UAE Banking Federation.
Bhatia has conducted more than 500 fraud investigations as lead investigator on cases including
conflict of interest, data theft, document forgery, bribery and corruption, workplace ethics
violations, occupational fraud, syndicate fraud, electronic banking fraud and security. He has set
up fraud risk management function from scratch in previous companies and has strengthened the
function at others by covering the complete life cycle of fraud risk management.
“Association of Certified Fraud Examiners,” “Certified Fraud Examiner,” “CFE,” “ACFE,” and the
ACFE Logo are trademarks owned by the Association of Certified Fraud Examiners, Inc. The contents of
this paper may not be transmitted, re-published, modified, reproduced, distributed, copied, or sold without
the prior consent of the author.
COST-EFFECTIVE FRAUD PREVENTION AND DETECTION MEASURES
2017 ACFE Fraud Conference Middle East
©2017 1
NOTES
In this session, participants will learn how to:
 Introduce cost-effective fraud prevention and detection
tools
 Choose the appropriate tools
 Overcome challenges in the implementation of tools
 Level: Intermediate
 Recommended prerequisites: An understanding of the
fraud examination process
 Field of study: Specialised Knowledge
Introduction
While there are numerous expensive tools available to
implement fraud risk management programs, some
organisations are not able to implement them due to
budgetary constraints. In this presentation, you will learn
about cost-effective tools to aid fraud prevention and
detection measures at their organisations. You won’t need
any expensive systems and large team of staff to implement
these cost-effective tools.1
The intent of this presentation is not to undermine
sophisticated systems and technology for fraud prevention
and detection, but rather to complement them with these
frugal tools. This presentation is only covering fraud
prevention and fraud detection components of effective
fraud risk management programs.
When we talk about fraud risk management, the idea is to
address the Fraud Triangle, meaning minimise the pressure
to commit fraud, reduce the opportunities to commit fraud,
and eliminate rationalisation to justify the fraud.2
Fraud
prevention and detection programs should aim to achieve
1
Fraud Risk Management Program,
www.acfe.com/fraudrisktools/guide.aspx
2
To learn more about the Fraud Triangle, please visit
www.acfe.com/fraud-triangle.aspx
COST-EFFECTIVE FRAUD PREVENTION AND DETECTION MEASURES
2017 ACFE Fraud Conference Middle East
©2017 2
NOTES
these three key objectives by using a mix of techniques and
tools.
Let’s look at how various fraud prevention and detection
tools can be used to address the Fraud Triangle. Let’s also
look at each component of the fraud prevention program in
detail.
Triangle
Components/Tools
Pressure Opportunity Rationalisation
Fraud Awareness Y Y Y
Fraud Detection Tools Y
Deterrent Action Y Y
FRA/RCSA Y
Staff Screening Y Y
Fraud Awareness
Fraud awareness is the very basic and most commonly used
fraud prevention tool. Through fraud awareness,
stakeholders are made aware of various types of fraud, how
to protect against them, and what should be done if they
occur. Fraud awareness can be generic in nature so that
common understanding about fraud is shared with relevant
stakeholders. In certain high-risk areas, fraud awareness
should be customised and information should be shared on
a need-to-know basis. It could be a double-edge sword, as it
can educate somebody who is under pressure about the
modus operandi to commit fraud.
Some examples of the various types of fraud awareness
tools are:
 Train the trainer programs
 Other control functions used as extended arms
 Conference calls
COST-EFFECTIVE FRAUD PREVENTION AND DETECTION MEASURES
2017 ACFE Fraud Conference Middle East
©2017 3
NOTES
 Company intranet
 Use of existing stationary, Email statement, checkbook
cover, welcome kit
 Fraud awareness as part of induction program
Fraud awarenes should be made part of the staff, vendor,
and customer onboarding process, and staff refreshers
should be done on an annual basis. Fraud awareness can
also be done through the use of screen savers on office
computers, audio message on call centre waiting lines,
ATMs, company intranet, and company websites.
Care has to be taken that mandatory fraud awareness
programs do not become a tick-box exercise, which usually
happens with a lot of mandatory programs if the audience is
not convinced of the advantages of such programs.
The content and presentation of fraud awareness initiatives
must be created with the audience in mind. For example, an
email alert should consist of a catchy headline, relevant
image, and key message in a crisp manner. No one is going
to read a long email that doesn’t directly concern them. A
fraud risk professional has to think like a marketing
professional when designing fraud awareness programs.
Review of Product and Process Before Launch
A process to review new products and processes from a
fraud risk perspective is a very good investment, as fraud
risks can be identified before launch and mitigation
measures decided. At the least, this ensures that
stakeholders make an informed decision. Some ways
through which fraud risk can be identified include:
 What can go wrong? – Onboarding, delivery,
processing
 Who can do wrong? – Staff, customers, vendors, third
parties
COST-EFFECTIVE FRAUD PREVENTION AND DETECTION MEASURES
2017 ACFE Fraud Conference Middle East
©2017 4
NOTES
 Where (premises) can it go wrong? – Internally or
externally
Standard mitigating measures should include both
prevention and detection controls, as well as some form of
built-in sampling process to identify red flags.
While it is tempting to begin by planning to review all such
documents, always consider team strength and capability
when making final decisions. If the fraud risk team is
supposed to review all the documents, and for some reason
certain types of fraud occur that were not highlighted
during review of the concerned product, it might affect the
credibility of the fraud risk team.
RCSA/Fraud Risk Assessment (FRA)
There’s no denying that fraud risk assessments are a great
fraud prevention tool in the hands of experienced fraud risk
management professionals. If the team strength permits,
this must be done by the fraud risk function.
FRA can be done at two levels, the first being organisation
wide to cover areas related to organisational policies, and it
is more of a checklist-based activity. This helps in
benchmarking the fraud risk management function and can
provide input in charting the roadmap.
The second type of FRA is done at the process or product
level and is more detailed. Even if an organisation is
already conducting RCSA, internal audits, and so on, it
makes sense to conduct an FRA because other control tests
usually evolve around pure operational risks and might not
be as detailed as the FRA in terms of approach. FRA
involves meetings with stakeholders, including people
running the process on the floor, and review of SOPs and
policies, data analytics, and testing of controls for design
COST-EFFECTIVE FRAUD PREVENTION AND DETECTION MEASURES
2017 ACFE Fraud Conference Middle East
©2017 5
NOTES
and effectiveness. Depending on the organisational
structure, process-level FRA can be done jointly with
RCSA or ops-risk teams.
Any fraud incident that happens subsequent to the FRA
should be checked to see whether it is part of an identified
risk or if it is a new risk that could not be identified during
the FRA. Similarly, if a fraud scenario was already
identified during the FRA, someone should check whether
the control design was defective or the control did not work
as intended. Such incidents should be considered when
scheduling the next FRA for the specific process area.
Fraud Detection Tools (FDT)
Data Analytics
If there’s a system available, then it can be used to
configure rules that can generate alerts. Certain systems
can also use transaction history to identify suspicious
transactions, etc. In case such a system is not available,
simple data analytics by defining queries can be done.
Some samples might be:
 Common fields (landline number, email ID, PO
Box, fax number, mobile number, trade license
number) for unrelated customer, staff, vendor
records
 Mapping physical access records with system
access records
 Running reports on leave data versus system access
records
 Keyword alerts on communication records
Mystery Shopping
Mystery shopping is an excellent tool for identifying
vulnerabilities that could be exploited to commit fraud.
It is similar to penetration testing used to identify
COST-EFFECTIVE FRAUD PREVENTION AND DETECTION MEASURES
2017 ACFE Fraud Conference Middle East
©2017 6
NOTES
vulnerabilities in the IT infrastructure except that it
helps in identifying vulnerable processes and people.
If done by trained professionals, it can help in getting
assurance that controls are working as intended. It
should be done after consulting with senior
management but with the assurance that it must be kept
confidential. In order to avoid any legal implications,
the legal department of the company should be
consulted before initiating mystery shopping.
Mystery shopping can be done through a basic inquiry
process, which could be telephonic or a personal
meeting. Advanced mystery shopping might require
initiating onboarding process/transaction processing,
and this is where it is important to consider
safeguarding measures, as this knowledge could be
used by a corrupt mystery shopper to commit actual
fraud. Remember the adage, “Who will guard the
guards?”
Whistleblowing
No fraud risk management program can be effective
unless a whistleblowing mechanism is established in an
organisation. In order to derive full benefits of a
whistleblowing mechanism, it must be exposed both
within and outside the organisation. While it is good to
have a whistleblowing hotline, a good whistleblowing
program is not dependent upon it. A good
whistleblowing system doesn’t necessarily have to be
expensive to start and maintain. It could be set up with
publicising communication channels, providing
assurance regarding confidentiality, and promising
protection (which must be backed by solid policies and
practices). If an organisation can live up to its promises,
COST-EFFECTIVE FRAUD PREVENTION AND DETECTION MEASURES
2017 ACFE Fraud Conference Middle East
©2017 7
NOTES
then there’s no reason why a whistleblowing program
can’t be effective.
Some of the cost-effective communication channels
include:
 Email ID
 PO Box
 Webform – Intranet, website
 Phone number (could be on during working hours
on a recorded line, which should be accessible to
group of people)
Channels for whistleblowing should be made visible
through the company Intranet, website, vendor RFP
documents, customer welcome letters, staff onboarding,
etc.
For a whistleblowing program to remain effective, the
company must ensure that all alerts received by the
team are evaluated and not summarily dismissed just
because enough evidence is not available. An alert in
itself might not provide enough information to take
action, but using information about other instances
involving key people, processes, units, etc., an
evaluation should be done as the next step. Engaging
the whistleblowing program is an important step in
making progress on the investigation. While it might be
helpful to understand the motives of the whistleblower,
they should not be given a lot of attention because the
most important thing is whether allegations are true.
Another important aspect of an effective
whistleblowing program is to keep it independent, and
management must understand that if the program is to
be effective, it has be seen as independent, unbiased,
and objective. Things like identity, designation, and
COST-EFFECTIVE FRAUD PREVENTION AND DETECTION MEASURES
2017 ACFE Fraud Conference Middle East
©2017 8
NOTES
motives of a whistleblower should not play a big role
when evaluating alerts.
Walks on the Floor
Periodic walks on the floor without overtly declaring
identity might provide more intelligence for fraud
detection than any structured program. Some
considerations while undertaking this are:
 Before, during, and after office hours
 On days when certain staff are working and others
are not (Saturdays/public holidays)
 Processing areas, customer facing areas, restricted
areas
 Avoid confrontation, rather observation
 Areas near photocopiers, printers
 Quick look at dustbins
 Area around shredders
Networking
Talking to your colleagues in the same industry can
provide useful intelligence regarding ongoing fraud
trends—something unusual noted by them. This works
only when such sharing is a two-way process, and it
requires contribution by all parties involved. Care
should be taken not to divulge confidential information,
though relevant information regarding modus operandi,
detection, and response should be considered for
sharing. Sometimes having open lines with anti-fraud
professionals in other industries can also provide useful
information. Attending industry forum meetings,
conferences, etc., creates opportunities to network with
people that have similar professional interests.

More Related Content

Recently uploaded

unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
Renandantas16
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
 

Recently uploaded (20)

B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Presentation work Paper- Cost Effective Fraud Risk Managemen

  • 1. ©2017 COST-EFFECTIVE FRAUD PREVENTION AND DETECTION MEASURES When it comes to fraud risk management, one major constraint faced by organisations of all sizes is the budget. In this session, participants will discover effective fraud prevention and detection tools that can be implemented with very low cost and almost zero capital expenditure. Participants will also learn the advantages and disadvantages of such tools, challenges in their implementation, and how to effectively implement a plan to prevent and detect fraud. CHARANJEET BHATIA, CFE, CISM Head of Fraud Risk Management FGB Charanjeet Bhatia is an MBA with more than 19 years of experience in risk management, audit and sales functions, and has worked in the banking sector in India, Tanzania, and the UAE. He is currently working with FGB as Head of Group Fraud Risk Management and has also been elected as Vice Chairman of the Fraud Prevention committee of the UAE Banking Federation. Bhatia has conducted more than 500 fraud investigations as lead investigator on cases including conflict of interest, data theft, document forgery, bribery and corruption, workplace ethics violations, occupational fraud, syndicate fraud, electronic banking fraud and security. He has set up fraud risk management function from scratch in previous companies and has strengthened the function at others by covering the complete life cycle of fraud risk management. “Association of Certified Fraud Examiners,” “Certified Fraud Examiner,” “CFE,” “ACFE,” and the ACFE Logo are trademarks owned by the Association of Certified Fraud Examiners, Inc. The contents of this paper may not be transmitted, re-published, modified, reproduced, distributed, copied, or sold without the prior consent of the author.
  • 2. COST-EFFECTIVE FRAUD PREVENTION AND DETECTION MEASURES 2017 ACFE Fraud Conference Middle East ©2017 1 NOTES In this session, participants will learn how to:  Introduce cost-effective fraud prevention and detection tools  Choose the appropriate tools  Overcome challenges in the implementation of tools  Level: Intermediate  Recommended prerequisites: An understanding of the fraud examination process  Field of study: Specialised Knowledge Introduction While there are numerous expensive tools available to implement fraud risk management programs, some organisations are not able to implement them due to budgetary constraints. In this presentation, you will learn about cost-effective tools to aid fraud prevention and detection measures at their organisations. You won’t need any expensive systems and large team of staff to implement these cost-effective tools.1 The intent of this presentation is not to undermine sophisticated systems and technology for fraud prevention and detection, but rather to complement them with these frugal tools. This presentation is only covering fraud prevention and fraud detection components of effective fraud risk management programs. When we talk about fraud risk management, the idea is to address the Fraud Triangle, meaning minimise the pressure to commit fraud, reduce the opportunities to commit fraud, and eliminate rationalisation to justify the fraud.2 Fraud prevention and detection programs should aim to achieve 1 Fraud Risk Management Program, www.acfe.com/fraudrisktools/guide.aspx 2 To learn more about the Fraud Triangle, please visit www.acfe.com/fraud-triangle.aspx
  • 3. COST-EFFECTIVE FRAUD PREVENTION AND DETECTION MEASURES 2017 ACFE Fraud Conference Middle East ©2017 2 NOTES these three key objectives by using a mix of techniques and tools. Let’s look at how various fraud prevention and detection tools can be used to address the Fraud Triangle. Let’s also look at each component of the fraud prevention program in detail. Triangle Components/Tools Pressure Opportunity Rationalisation Fraud Awareness Y Y Y Fraud Detection Tools Y Deterrent Action Y Y FRA/RCSA Y Staff Screening Y Y Fraud Awareness Fraud awareness is the very basic and most commonly used fraud prevention tool. Through fraud awareness, stakeholders are made aware of various types of fraud, how to protect against them, and what should be done if they occur. Fraud awareness can be generic in nature so that common understanding about fraud is shared with relevant stakeholders. In certain high-risk areas, fraud awareness should be customised and information should be shared on a need-to-know basis. It could be a double-edge sword, as it can educate somebody who is under pressure about the modus operandi to commit fraud. Some examples of the various types of fraud awareness tools are:  Train the trainer programs  Other control functions used as extended arms  Conference calls
  • 4. COST-EFFECTIVE FRAUD PREVENTION AND DETECTION MEASURES 2017 ACFE Fraud Conference Middle East ©2017 3 NOTES  Company intranet  Use of existing stationary, Email statement, checkbook cover, welcome kit  Fraud awareness as part of induction program Fraud awarenes should be made part of the staff, vendor, and customer onboarding process, and staff refreshers should be done on an annual basis. Fraud awareness can also be done through the use of screen savers on office computers, audio message on call centre waiting lines, ATMs, company intranet, and company websites. Care has to be taken that mandatory fraud awareness programs do not become a tick-box exercise, which usually happens with a lot of mandatory programs if the audience is not convinced of the advantages of such programs. The content and presentation of fraud awareness initiatives must be created with the audience in mind. For example, an email alert should consist of a catchy headline, relevant image, and key message in a crisp manner. No one is going to read a long email that doesn’t directly concern them. A fraud risk professional has to think like a marketing professional when designing fraud awareness programs. Review of Product and Process Before Launch A process to review new products and processes from a fraud risk perspective is a very good investment, as fraud risks can be identified before launch and mitigation measures decided. At the least, this ensures that stakeholders make an informed decision. Some ways through which fraud risk can be identified include:  What can go wrong? – Onboarding, delivery, processing  Who can do wrong? – Staff, customers, vendors, third parties
  • 5. COST-EFFECTIVE FRAUD PREVENTION AND DETECTION MEASURES 2017 ACFE Fraud Conference Middle East ©2017 4 NOTES  Where (premises) can it go wrong? – Internally or externally Standard mitigating measures should include both prevention and detection controls, as well as some form of built-in sampling process to identify red flags. While it is tempting to begin by planning to review all such documents, always consider team strength and capability when making final decisions. If the fraud risk team is supposed to review all the documents, and for some reason certain types of fraud occur that were not highlighted during review of the concerned product, it might affect the credibility of the fraud risk team. RCSA/Fraud Risk Assessment (FRA) There’s no denying that fraud risk assessments are a great fraud prevention tool in the hands of experienced fraud risk management professionals. If the team strength permits, this must be done by the fraud risk function. FRA can be done at two levels, the first being organisation wide to cover areas related to organisational policies, and it is more of a checklist-based activity. This helps in benchmarking the fraud risk management function and can provide input in charting the roadmap. The second type of FRA is done at the process or product level and is more detailed. Even if an organisation is already conducting RCSA, internal audits, and so on, it makes sense to conduct an FRA because other control tests usually evolve around pure operational risks and might not be as detailed as the FRA in terms of approach. FRA involves meetings with stakeholders, including people running the process on the floor, and review of SOPs and policies, data analytics, and testing of controls for design
  • 6. COST-EFFECTIVE FRAUD PREVENTION AND DETECTION MEASURES 2017 ACFE Fraud Conference Middle East ©2017 5 NOTES and effectiveness. Depending on the organisational structure, process-level FRA can be done jointly with RCSA or ops-risk teams. Any fraud incident that happens subsequent to the FRA should be checked to see whether it is part of an identified risk or if it is a new risk that could not be identified during the FRA. Similarly, if a fraud scenario was already identified during the FRA, someone should check whether the control design was defective or the control did not work as intended. Such incidents should be considered when scheduling the next FRA for the specific process area. Fraud Detection Tools (FDT) Data Analytics If there’s a system available, then it can be used to configure rules that can generate alerts. Certain systems can also use transaction history to identify suspicious transactions, etc. In case such a system is not available, simple data analytics by defining queries can be done. Some samples might be:  Common fields (landline number, email ID, PO Box, fax number, mobile number, trade license number) for unrelated customer, staff, vendor records  Mapping physical access records with system access records  Running reports on leave data versus system access records  Keyword alerts on communication records Mystery Shopping Mystery shopping is an excellent tool for identifying vulnerabilities that could be exploited to commit fraud. It is similar to penetration testing used to identify
  • 7. COST-EFFECTIVE FRAUD PREVENTION AND DETECTION MEASURES 2017 ACFE Fraud Conference Middle East ©2017 6 NOTES vulnerabilities in the IT infrastructure except that it helps in identifying vulnerable processes and people. If done by trained professionals, it can help in getting assurance that controls are working as intended. It should be done after consulting with senior management but with the assurance that it must be kept confidential. In order to avoid any legal implications, the legal department of the company should be consulted before initiating mystery shopping. Mystery shopping can be done through a basic inquiry process, which could be telephonic or a personal meeting. Advanced mystery shopping might require initiating onboarding process/transaction processing, and this is where it is important to consider safeguarding measures, as this knowledge could be used by a corrupt mystery shopper to commit actual fraud. Remember the adage, “Who will guard the guards?” Whistleblowing No fraud risk management program can be effective unless a whistleblowing mechanism is established in an organisation. In order to derive full benefits of a whistleblowing mechanism, it must be exposed both within and outside the organisation. While it is good to have a whistleblowing hotline, a good whistleblowing program is not dependent upon it. A good whistleblowing system doesn’t necessarily have to be expensive to start and maintain. It could be set up with publicising communication channels, providing assurance regarding confidentiality, and promising protection (which must be backed by solid policies and practices). If an organisation can live up to its promises,
  • 8. COST-EFFECTIVE FRAUD PREVENTION AND DETECTION MEASURES 2017 ACFE Fraud Conference Middle East ©2017 7 NOTES then there’s no reason why a whistleblowing program can’t be effective. Some of the cost-effective communication channels include:  Email ID  PO Box  Webform – Intranet, website  Phone number (could be on during working hours on a recorded line, which should be accessible to group of people) Channels for whistleblowing should be made visible through the company Intranet, website, vendor RFP documents, customer welcome letters, staff onboarding, etc. For a whistleblowing program to remain effective, the company must ensure that all alerts received by the team are evaluated and not summarily dismissed just because enough evidence is not available. An alert in itself might not provide enough information to take action, but using information about other instances involving key people, processes, units, etc., an evaluation should be done as the next step. Engaging the whistleblowing program is an important step in making progress on the investigation. While it might be helpful to understand the motives of the whistleblower, they should not be given a lot of attention because the most important thing is whether allegations are true. Another important aspect of an effective whistleblowing program is to keep it independent, and management must understand that if the program is to be effective, it has be seen as independent, unbiased, and objective. Things like identity, designation, and
  • 9. COST-EFFECTIVE FRAUD PREVENTION AND DETECTION MEASURES 2017 ACFE Fraud Conference Middle East ©2017 8 NOTES motives of a whistleblower should not play a big role when evaluating alerts. Walks on the Floor Periodic walks on the floor without overtly declaring identity might provide more intelligence for fraud detection than any structured program. Some considerations while undertaking this are:  Before, during, and after office hours  On days when certain staff are working and others are not (Saturdays/public holidays)  Processing areas, customer facing areas, restricted areas  Avoid confrontation, rather observation  Areas near photocopiers, printers  Quick look at dustbins  Area around shredders Networking Talking to your colleagues in the same industry can provide useful intelligence regarding ongoing fraud trends—something unusual noted by them. This works only when such sharing is a two-way process, and it requires contribution by all parties involved. Care should be taken not to divulge confidential information, though relevant information regarding modus operandi, detection, and response should be considered for sharing. Sometimes having open lines with anti-fraud professionals in other industries can also provide useful information. Attending industry forum meetings, conferences, etc., creates opportunities to network with people that have similar professional interests.