SlideShare a Scribd company logo
1 of 44
Sharon P. Hamrick, CPA, CFF, CFE
                         Senior Manager, Decosimo




ASWA - Huntsville 2012
 What is Fraud in the Workplace?
     Occupational fraud and abuse is the use of one’s
      occupation for personal enrichment and can result from
      misconduct of employees, managers and/or officers.

       Common Asset Misappropriation Schemes –

          Payroll fraud
          Check tampering
          Skimming
          Expense account schemes
          Fraudulent disbursements
          False billing
          Larceny
          Inventory theft


 ASWA - Huntsville 2012
ASWA - Huntsville 2012
ASWA - Huntsville 2012
ASWA - Huntsville 2012
ASWA - Huntsville 2012
ASWA - Huntsville 2012
   41% of perpetrators are employees; 38% of perpetrators are managers
   Median losses of frauds by employees = $60,000; by managers = $182,000
   Frauds lasted a median of 18 months before being detected
   38% of perpetrators were between the ages of 36 and 45
   Median losses by gender: Males $200,000; by female fraudsters $91,000
   Executive/upper management caused largest fraud losses
   49% of victim organizations in the study had not recovered any losses due
    to fraud




ASWA - Huntsville 2012
Opportunities




                         Fraud
Incentives/Pressures                     Rationalization


ASWA - Huntsville 2012
ASWA - Huntsville 2012
ASWA - Huntsville 2012
To n e a t t h e To p
   Management’s behavior creates an environment in the
    company - that environment can breed or condone
    fraudulent activity.

        Tips for management:

             Create and promote a comprehensive fraud policy

             Implement an entity specific code of ethics

             Consider a reporting hotline

ASWA - Huntsville 2012
   An organizational wide Fraud Policy can send a
       clear message that workplace fraud will not be
       tolerated.

         Scope of Policy
         Identify Behavior That Constitute Fraud
         Assign Responsibility for Fraud Investigation
         Reiterate Confidentiality
         Develop Procedures for Reporting Fraud
         Consequences and Corrective Action




ASWA - Huntsville 2012
Ethical
                           Mind
                   Legal              Moral
                           Set &
                           Behavior




ASWA - Huntsville 2012
   According to ACFE Reduces Fraud by 50%
           Effective Method of Deterrence
           SOX requires anonymity for whistleblowers
           Outsourcing to third parties is an option
              24 Hours/365
              Skilled Interviewer




ASWA - Huntsville 2012
   No two organization are exactly alike!
          Knowing your company-specific risk factors
           can help in fraud prevention.

             Size
             Types of products and services
             Ownership
             Financing
             Banking relationships
             Financial reporting requirements




ASWA - Huntsville 2012
   Human Resources practices and procedures
         can be very effective tools in the effort to
         prevent Workplace Fraud

              Verify references, work experience and
              education
              Criminal records checks
              Annual employee evaluations
              Permission for drug, criminal and financial
              checks if company policy or position
              requires

ASWA - Huntsville 2012
Internal Controls
    A thoughtfully designed and effectively
     implemented internal control structure is essential
     to prevent ongoing and pervasive Workplace Fraud
     from occurring and going undetected.

       Segregation of duties between recording, asset
        custody and reporting
       Supervision and oversight by management and
        board of directors
       External checks
       Monitoring to make sure internal controls
        continue to work over time
ASWA - Huntsville 2012
ASWA - Huntsville 2012
 Your company’s digital assets are perhaps
   some of its most valuable. Help shield them from
   Workplace Fraud with effective IT controls in
   place.

        Physical access to servers and computer
         center controlled
        Passwords secure and regularly changed
        Access only to necessary software
         modules
        Computer records maintained of log-ins;
        Reports generated of failed log-in attempts
         and maximum limit on number of log-in
         attempts
ASWA - Huntsville 2012
Saves Money
                         Creates Fraud Awareness
                          Enhanced Reputation
                          Compliance with SOX


ASWA - Huntsville 2012
ASWA - Huntsville 2012
ASWA - Huntsville 2012
ASWA - Huntsville 2012
ASWA - Huntsville 2012
Behavioral Red Flags Exhibited
 81% of fraudsters exhibited at least one of the listed
  behavioral red flags:
    36% Living beyond their means


      27% with financial difficulties

      19% with unusually close associations with vendors
       or customers

      18% had excessive control issues with their duties


ASWA - Huntsville 2012
ASWA - Huntsville 2012
Analytical Red Flags
   Recurring negative cash flows from operations
   Unusual general journal entries or unusual
    transactions, especially close to end of a period
   Significant related party transactions not in the
    ordinary course of business
   Abnormal profitability when compared to similar
    companies in the same industry
   Abnormal gross profit margin or growth in gross
    profit margin when compared to similar companies in
    the same industry
   Management override


ASWA - Huntsville 2012
Other Data Analytics
   Trend analysis – comparison to prior periods
   Comparison to forecasts, budgets
   Vertical and horizontal ratio analysis
   Correlation analysis
   Searches for duplicates
   Compliance verification
   Aging
   Benford’s law
   Beneish m-score model
   Dechow-Dichev accrual quantity


ASWA - Huntsville 2012
 Duplicate payments tests
  Benford’s Law analysis
  Rounded amount invoices
  Invoices just below approval levels
  Abnormal invoice volume activity
    Rapid increase
    High variance
  Vendors with sequential invoice Numbers or where
   numbers and dates are inconsistent
  Merge vendor and employee files


ASWA - Huntsville 2012
Examples of Phishing Emails




ASWA - Huntsville 2012
ASWA - Huntsville 2012
What is OPSEC?
   Military term         • Analytic process used to deny an
    meaning                adversary information
   Operational
     Security            • Risk assessment tool


     Universal           • Examines day-to-day activities
     concepts            • Controls information


                         • Equally applicable to individuals
  Applied in any           and businesses in general
   environment
                         • Identifies security risks

ASWA - Huntsville 2012
OPSEC Is Not:
                             An expensive
      A strict set of
                               and time-
        rules and
                              consuming
       procedures
                                process

                      Used only by
                          the
                     government or
                        military

ASWA - Huntsville 2012
Consequences
Loss of customer trust and business

Possible law suits

Legal issues

            Gramm-Leach-Bliley Act
            Fair Credit Reporting Act
            Federal Trade Commission Act
            Health Insurance Portability and Accountability
             Act (HIPPA)
            Family Educational Rights and Privacy Act
            Drivers Privacy Protection Act
            Privacy Laws
            State Laws

ASWA - Huntsville 2012
Bottom Line – Companies
   must develop and maintain
   reasonable procedures to
  protect sensitive information


ASWA - Huntsville 2012
You and Your Employees

      Know the             Know what
       threat              to protect


                     Know how
                     to protect
ASWA - Huntsville 2012
Know the Threat-Who
   Adversary – the Bad Guy

   Terrorist groups

   Criminals

   Organized crime

   Hackers/Crackers
   Insider threats – generally more costly and often
   overlooked

ASWA - Huntsville 2012
What to do if you have
                suspicions




ASWA - Huntsville 2012
What resources do you have at your disposal for
                  guidance

   Outside CPAs
   Attorney
   Internal audit
   Law enforcement




ASWA - Huntsville 2012
Legal restrictions and ramifications

                    Does your company require employees
                        sign a fraud policy statement

                     Chain of custody of documents, paper
                                 and otherwise

                    Suspect’s rights to privacy – Their work
                                      area

                           Interview do’s and don'ts




ASWA - Huntsville 2012
What a CFE can do if you have
              suspicions
   Investigate on behalf of the board of directors

   Conduct interviews

   Perform data analysis, data mining

   Search computer records
   Search sources of outside information related to
   the suspect

ASWA - Huntsville 2012
Sources
 Cornell University IT: Phish Bowl
    www.it.cornell.edu/security/safety/phishbowl.cfm
 Protect your business by understanding common
  social engineering techniques, Small Business Blog
    http://googlesmb.blogspot.com/2012/04/protect-your-
     business-by-understanding.html
 Microsoft
    www.microsoft.com/security/online-privacy/phishing-
     symptoms.aspx




ASWA - Huntsville 2012
Contact Info

                                 Sharon P. Hamrick, CPA•CFF, CFE
                                 Senior Manager, Decosimo Advisory
                                 Services
                                 sharonhamrick@decosimo.com
                                 www.linkedin.com/in/sharonhamrick



                                       423-756-7100


   The contents and opinions contained in this article are for informational purposes only. The information is
   not intended to be a substitute for professional accounting counsel. Always seek the advice of your
   accountant or other financial planner with any questions you may have regarding your financial goals.




ASWA - Huntsville 2012

More Related Content

What's hot

Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Tahir Abbas
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 
Fraud Risk Assessment
Fraud Risk AssessmentFraud Risk Assessment
Fraud Risk AssessmentTahir Abbas
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryDecosimoCPAs
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in bankssathyananda prabhu
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingCase IQ
 
Investigating Trade-Based Money Laundering
Investigating Trade-Based Money LaunderingInvestigating Trade-Based Money Laundering
Investigating Trade-Based Money LaunderingCase IQ
 
Fraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresFraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresVeriti Consulting LLC
 
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeArianto Muditomo
 
Basics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick PrimerBasics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick Primercomplianceonline123
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12Fuh George Cheo
 
Anti money laundering (aml) and financial crime
Anti money laundering (aml) and financial crimeAnti money laundering (aml) and financial crime
Anti money laundering (aml) and financial crimeRaviPrashant5
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiEMAC Consulting Group
 
Presentation AML
Presentation AMLPresentation AML
Presentation AMLMirsazzad
 
Fraud investigations session 1 slides
Fraud investigations session 1 slidesFraud investigations session 1 slides
Fraud investigations session 1 slidesZeeshan Shahid
 

What's hot (20)

Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2,
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
AML presentation
AML presentationAML presentation
AML presentation
 
Fraud Risk Assessment
Fraud Risk AssessmentFraud Risk Assessment
Fraud Risk Assessment
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in banks
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
 
Investigating Trade-Based Money Laundering
Investigating Trade-Based Money LaunderingInvestigating Trade-Based Money Laundering
Investigating Trade-Based Money Laundering
 
Fraud embezzlement
Fraud embezzlementFraud embezzlement
Fraud embezzlement
 
Fraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresFraud Investigation Process And Procedures
Fraud Investigation Process And Procedures
 
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good Practice
 
Basics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick PrimerBasics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick Primer
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12
 
Anti money laundering (aml) and financial crime
Anti money laundering (aml) and financial crimeAnti money laundering (aml) and financial crime
Anti money laundering (aml) and financial crime
 
Risk based approach
Risk based approachRisk based approach
Risk based approach
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part ii
 
Presentation AML
Presentation AMLPresentation AML
Presentation AML
 
Aml & kyc
Aml & kyc Aml & kyc
Aml & kyc
 
Fraud investigations session 1 slides
Fraud investigations session 1 slidesFraud investigations session 1 slides
Fraud investigations session 1 slides
 
Money Laundering
Money Laundering Money Laundering
Money Laundering
 

Viewers also liked

Tips for Preventing and Detecting Employee Theft in the Workplace
Tips for Preventing and Detecting Employee Theft in the WorkplaceTips for Preventing and Detecting Employee Theft in the Workplace
Tips for Preventing and Detecting Employee Theft in the WorkplaceCase IQ
 
Cyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineCyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineFtlwood Families
 
OPSEC / PERSEC
OPSEC / PERSECOPSEC / PERSEC
OPSEC / PERSECRmd Frg
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchersvicenteDiaz_KL
 
PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...
PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...
PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...Puppet
 
OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackersgrugq
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Ethical Decision Making Process
Ethical Decision Making ProcessEthical Decision Making Process
Ethical Decision Making ProcessCoky Fauzi Alfi
 
Leases- The Winding Road Ahead
Leases- The Winding Road AheadLeases- The Winding Road Ahead
Leases- The Winding Road AheadDecosimoCPAs
 
Livelihoods framework : A case of NE Upland Communities
Livelihoods framework : A case of NE Upland CommunitiesLivelihoods framework : A case of NE Upland Communities
Livelihoods framework : A case of NE Upland CommunitiesOasis India
 
Marketing Like a Boss
Marketing Like a BossMarketing Like a Boss
Marketing Like a BossBen Strahan
 
Tp Os Perigos das Redes Sociais - João R, Hugo, Gustavo e Guilherme
Tp Os Perigos das Redes Sociais - João R, Hugo, Gustavo e GuilhermeTp Os Perigos das Redes Sociais - João R, Hugo, Gustavo e Guilherme
Tp Os Perigos das Redes Sociais - João R, Hugo, Gustavo e GuilhermeLucky Fox
 
FASB Proposals Affecting Government Contractors
FASB Proposals Affecting Government ContractorsFASB Proposals Affecting Government Contractors
FASB Proposals Affecting Government ContractorsDecosimoCPAs
 

Viewers also liked (20)

OPSEC Case Study - Bush In Iraq
OPSEC Case Study - Bush In IraqOPSEC Case Study - Bush In Iraq
OPSEC Case Study - Bush In Iraq
 
Tips for Preventing and Detecting Employee Theft in the Workplace
Tips for Preventing and Detecting Employee Theft in the WorkplaceTips for Preventing and Detecting Employee Theft in the Workplace
Tips for Preventing and Detecting Employee Theft in the Workplace
 
Cyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineCyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_online
 
OPSEC / PERSEC
OPSEC / PERSECOPSEC / PERSEC
OPSEC / PERSEC
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
OPSEC for Kids
OPSEC for KidsOPSEC for Kids
OPSEC for Kids
 
OPSEC for Families
OPSEC for FamiliesOPSEC for Families
OPSEC for Families
 
PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...
PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...
PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...
 
Invasive species commanders_guide
Invasive species commanders_guideInvasive species commanders_guide
Invasive species commanders_guide
 
OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackers
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Ethical Decision Making Process
Ethical Decision Making ProcessEthical Decision Making Process
Ethical Decision Making Process
 
Pier conference opening remarks
Pier conference opening remarksPier conference opening remarks
Pier conference opening remarks
 
Developing Essential Early Intervention Skills
Developing Essential Early Intervention SkillsDeveloping Essential Early Intervention Skills
Developing Essential Early Intervention Skills
 
Leases- The Winding Road Ahead
Leases- The Winding Road AheadLeases- The Winding Road Ahead
Leases- The Winding Road Ahead
 
Globalconsulting
GlobalconsultingGlobalconsulting
Globalconsulting
 
Livelihoods framework : A case of NE Upland Communities
Livelihoods framework : A case of NE Upland CommunitiesLivelihoods framework : A case of NE Upland Communities
Livelihoods framework : A case of NE Upland Communities
 
Marketing Like a Boss
Marketing Like a BossMarketing Like a Boss
Marketing Like a Boss
 
Tp Os Perigos das Redes Sociais - João R, Hugo, Gustavo e Guilherme
Tp Os Perigos das Redes Sociais - João R, Hugo, Gustavo e GuilhermeTp Os Perigos das Redes Sociais - João R, Hugo, Gustavo e Guilherme
Tp Os Perigos das Redes Sociais - João R, Hugo, Gustavo e Guilherme
 
FASB Proposals Affecting Government Contractors
FASB Proposals Affecting Government ContractorsFASB Proposals Affecting Government Contractors
FASB Proposals Affecting Government Contractors
 

Similar to Preventing and Detecting Fraud in the Workplace

Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
ACFE 2017 - Audit and Fraud Joining Forces
ACFE 2017 - Audit and Fraud Joining ForcesACFE 2017 - Audit and Fraud Joining Forces
ACFE 2017 - Audit and Fraud Joining ForcesJen Dunham, CFE
 
Who needs business intelligence?
Who needs business intelligence?Who needs business intelligence?
Who needs business intelligence?Norman Manley
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
Callcredit's Fraud Summit 2016 - Plenary session
Callcredit's Fraud Summit 2016 - Plenary sessionCallcredit's Fraud Summit 2016 - Plenary session
Callcredit's Fraud Summit 2016 - Plenary sessionCallcredit123
 
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016Harmaldeep Cassam
 
Thieves Within: Preventing Fraud in Small & Medium-Sized Organizations
Thieves Within: Preventing Fraud in Small & Medium-Sized OrganizationsThieves Within: Preventing Fraud in Small & Medium-Sized Organizations
Thieves Within: Preventing Fraud in Small & Medium-Sized OrganizationsAllen, Gibbs & Houlik, L.C.
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 
Binary Scam Watch Monitor | Restriction Of Online Scam
Binary Scam Watch Monitor | Restriction Of Online ScamBinary Scam Watch Monitor | Restriction Of Online Scam
Binary Scam Watch Monitor | Restriction Of Online ScamBinaryScamWatchMonitor
 
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...SolarWinds
 
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksRachel Hamilton
 
Unrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALUnrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALWayne Anderson
 
Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!pdallen
 
People Screening-2014 review
People Screening-2014 reviewPeople Screening-2014 review
People Screening-2014 reviewKrzys Berkieta
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsCA Technologies
 

Similar to Preventing and Detecting Fraud in the Workplace (20)

Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
ACFE 2017 - Audit and Fraud Joining Forces
ACFE 2017 - Audit and Fraud Joining ForcesACFE 2017 - Audit and Fraud Joining Forces
ACFE 2017 - Audit and Fraud Joining Forces
 
Detecting and Preventing Fraud in Nonprofits
Detecting and Preventing Fraud in NonprofitsDetecting and Preventing Fraud in Nonprofits
Detecting and Preventing Fraud in Nonprofits
 
Who needs business intelligence?
Who needs business intelligence?Who needs business intelligence?
Who needs business intelligence?
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Callcredit's Fraud Summit 2016 - Plenary session
Callcredit's Fraud Summit 2016 - Plenary sessionCallcredit's Fraud Summit 2016 - Plenary session
Callcredit's Fraud Summit 2016 - Plenary session
 
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
 
Thieves Within: Preventing Fraud in Small & Medium-Sized Organizations
Thieves Within: Preventing Fraud in Small & Medium-Sized OrganizationsThieves Within: Preventing Fraud in Small & Medium-Sized Organizations
Thieves Within: Preventing Fraud in Small & Medium-Sized Organizations
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
Binary Scam Watch Monitor | Restriction Of Online Scam
Binary Scam Watch Monitor | Restriction Of Online ScamBinary Scam Watch Monitor | Restriction Of Online Scam
Binary Scam Watch Monitor | Restriction Of Online Scam
 
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
 
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
 
Unrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALUnrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINAL
 
Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!
 
People Screening-2014 review
People Screening-2014 reviewPeople Screening-2014 review
People Screening-2014 review
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Aml 161014061258
Aml 161014061258Aml 161014061258
Aml 161014061258
 
Aml 161014061258
Aml 161014061258Aml 161014061258
Aml 161014061258
 
AML
AMLAML
AML
 

More from DecosimoCPAs

Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...
Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...
Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...DecosimoCPAs
 
Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...
Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...
Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...DecosimoCPAs
 
Just What is Forensic Accounting? - Sharon Hamrick & Pam Mantone
Just What is Forensic Accounting? - Sharon Hamrick & Pam MantoneJust What is Forensic Accounting? - Sharon Hamrick & Pam Mantone
Just What is Forensic Accounting? - Sharon Hamrick & Pam MantoneDecosimoCPAs
 
The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...
The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...
The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...DecosimoCPAs
 
Winning Business in Todays Market: Optimizing Bid Decisions - Joe Yearta
Winning Business in Todays Market: Optimizing Bid Decisions - Joe YeartaWinning Business in Todays Market: Optimizing Bid Decisions - Joe Yearta
Winning Business in Todays Market: Optimizing Bid Decisions - Joe YeartaDecosimoCPAs
 
Employee Benefit Plan Errors - Marshall Harvey
Employee Benefit Plan Errors - Marshall HarveyEmployee Benefit Plan Errors - Marshall Harvey
Employee Benefit Plan Errors - Marshall HarveyDecosimoCPAs
 
Accounting for Employee Benefit Plans - Cindy Lusk
Accounting for Employee Benefit Plans - Cindy LuskAccounting for Employee Benefit Plans - Cindy Lusk
Accounting for Employee Benefit Plans - Cindy LuskDecosimoCPAs
 
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill AcuffFraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill AcuffDecosimoCPAs
 
Revenue from Contracts with Customers- Tom Eiseman
Revenue from Contracts with Customers- Tom EisemanRevenue from Contracts with Customers- Tom Eiseman
Revenue from Contracts with Customers- Tom EisemanDecosimoCPAs
 
Financial Forecasts and Projections - Paul Beckman
Financial Forecasts and Projections - Paul BeckmanFinancial Forecasts and Projections - Paul Beckman
Financial Forecasts and Projections - Paul BeckmanDecosimoCPAs
 
Reporting Options for Small Businesses - Tom Eiseman
Reporting Options for Small Businesses - Tom EisemanReporting Options for Small Businesses - Tom Eiseman
Reporting Options for Small Businesses - Tom EisemanDecosimoCPAs
 
GAAP Accounting Update: A Review of Recent Changes in GAAP - Derek Daniel
GAAP Accounting Update: A Review of Recent Changes in GAAP - Derek DanielGAAP Accounting Update: A Review of Recent Changes in GAAP - Derek Daniel
GAAP Accounting Update: A Review of Recent Changes in GAAP - Derek DanielDecosimoCPAs
 
Accounting "Oopsies" - Jennifer Goodman
Accounting "Oopsies" - Jennifer GoodmanAccounting "Oopsies" - Jennifer Goodman
Accounting "Oopsies" - Jennifer GoodmanDecosimoCPAs
 
Valuation of Physician Practices - David Cranford, Shannon Farr
Valuation of Physician Practices - David Cranford, Shannon FarrValuation of Physician Practices - David Cranford, Shannon Farr
Valuation of Physician Practices - David Cranford, Shannon FarrDecosimoCPAs
 
Redstone Overview - Winning in Today's Market: Optimizing Opportunities
Redstone Overview - Winning in Today's Market: Optimizing Opportunities Redstone Overview - Winning in Today's Market: Optimizing Opportunities
Redstone Overview - Winning in Today's Market: Optimizing Opportunities DecosimoCPAs
 
Using Analytics to Detect Possible Fraud: Overview of Tools and Techniques
Using Analytics to Detect Possible Fraud: Overview of Tools and TechniquesUsing Analytics to Detect Possible Fraud: Overview of Tools and Techniques
Using Analytics to Detect Possible Fraud: Overview of Tools and TechniquesDecosimoCPAs
 
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...DecosimoCPAs
 
Forensics and Fraud: Red Flags and War Stories
Forensics and Fraud: Red Flags and War StoriesForensics and Fraud: Red Flags and War Stories
Forensics and Fraud: Red Flags and War StoriesDecosimoCPAs
 
Checklist presentations
Checklist presentationsChecklist presentations
Checklist presentationsDecosimoCPAs
 
What Was the FASB Thinking?
What Was the FASB Thinking? What Was the FASB Thinking?
What Was the FASB Thinking? DecosimoCPAs
 

More from DecosimoCPAs (20)

Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...
Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...
Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...
 
Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...
Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...
Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...
 
Just What is Forensic Accounting? - Sharon Hamrick & Pam Mantone
Just What is Forensic Accounting? - Sharon Hamrick & Pam MantoneJust What is Forensic Accounting? - Sharon Hamrick & Pam Mantone
Just What is Forensic Accounting? - Sharon Hamrick & Pam Mantone
 
The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...
The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...
The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...
 
Winning Business in Todays Market: Optimizing Bid Decisions - Joe Yearta
Winning Business in Todays Market: Optimizing Bid Decisions - Joe YeartaWinning Business in Todays Market: Optimizing Bid Decisions - Joe Yearta
Winning Business in Todays Market: Optimizing Bid Decisions - Joe Yearta
 
Employee Benefit Plan Errors - Marshall Harvey
Employee Benefit Plan Errors - Marshall HarveyEmployee Benefit Plan Errors - Marshall Harvey
Employee Benefit Plan Errors - Marshall Harvey
 
Accounting for Employee Benefit Plans - Cindy Lusk
Accounting for Employee Benefit Plans - Cindy LuskAccounting for Employee Benefit Plans - Cindy Lusk
Accounting for Employee Benefit Plans - Cindy Lusk
 
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill AcuffFraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
 
Revenue from Contracts with Customers- Tom Eiseman
Revenue from Contracts with Customers- Tom EisemanRevenue from Contracts with Customers- Tom Eiseman
Revenue from Contracts with Customers- Tom Eiseman
 
Financial Forecasts and Projections - Paul Beckman
Financial Forecasts and Projections - Paul BeckmanFinancial Forecasts and Projections - Paul Beckman
Financial Forecasts and Projections - Paul Beckman
 
Reporting Options for Small Businesses - Tom Eiseman
Reporting Options for Small Businesses - Tom EisemanReporting Options for Small Businesses - Tom Eiseman
Reporting Options for Small Businesses - Tom Eiseman
 
GAAP Accounting Update: A Review of Recent Changes in GAAP - Derek Daniel
GAAP Accounting Update: A Review of Recent Changes in GAAP - Derek DanielGAAP Accounting Update: A Review of Recent Changes in GAAP - Derek Daniel
GAAP Accounting Update: A Review of Recent Changes in GAAP - Derek Daniel
 
Accounting "Oopsies" - Jennifer Goodman
Accounting "Oopsies" - Jennifer GoodmanAccounting "Oopsies" - Jennifer Goodman
Accounting "Oopsies" - Jennifer Goodman
 
Valuation of Physician Practices - David Cranford, Shannon Farr
Valuation of Physician Practices - David Cranford, Shannon FarrValuation of Physician Practices - David Cranford, Shannon Farr
Valuation of Physician Practices - David Cranford, Shannon Farr
 
Redstone Overview - Winning in Today's Market: Optimizing Opportunities
Redstone Overview - Winning in Today's Market: Optimizing Opportunities Redstone Overview - Winning in Today's Market: Optimizing Opportunities
Redstone Overview - Winning in Today's Market: Optimizing Opportunities
 
Using Analytics to Detect Possible Fraud: Overview of Tools and Techniques
Using Analytics to Detect Possible Fraud: Overview of Tools and TechniquesUsing Analytics to Detect Possible Fraud: Overview of Tools and Techniques
Using Analytics to Detect Possible Fraud: Overview of Tools and Techniques
 
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...
 
Forensics and Fraud: Red Flags and War Stories
Forensics and Fraud: Red Flags and War StoriesForensics and Fraud: Red Flags and War Stories
Forensics and Fraud: Red Flags and War Stories
 
Checklist presentations
Checklist presentationsChecklist presentations
Checklist presentations
 
What Was the FASB Thinking?
What Was the FASB Thinking? What Was the FASB Thinking?
What Was the FASB Thinking?
 

Recently uploaded

Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverseSiemens
 
Darshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdfDarshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdfShashank Mehta
 
How to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHow to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHelp Desk Migration
 
Paul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate ProfessionalPaul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate ProfessionalPaul Turovsky
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAScathy664059
 
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfTypes of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfASGITConsulting
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Jiastral oracle
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextP&CO
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 
Simplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansSimplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansNugget Global
 
Customizable Contents Restoration Training
Customizable Contents Restoration TrainingCustomizable Contents Restoration Training
Customizable Contents Restoration TrainingCalvinarnold843
 
Implementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptxImplementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptxRich Reba
 
MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024Chandresh Chudasama
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 

Recently uploaded (20)

Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverse
 
Darshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdfDarshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdf
 
How to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHow to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your Business
 
Paul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate ProfessionalPaul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate Professional
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAS
 
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfTypes of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdf
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider context
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 
Simplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansSimplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business Loans
 
Customizable Contents Restoration Training
Customizable Contents Restoration TrainingCustomizable Contents Restoration Training
Customizable Contents Restoration Training
 
Implementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptxImplementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptx
 
MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 

Preventing and Detecting Fraud in the Workplace

  • 1. Sharon P. Hamrick, CPA, CFF, CFE Senior Manager, Decosimo ASWA - Huntsville 2012
  • 2.  What is Fraud in the Workplace?  Occupational fraud and abuse is the use of one’s occupation for personal enrichment and can result from misconduct of employees, managers and/or officers. Common Asset Misappropriation Schemes –  Payroll fraud  Check tampering  Skimming  Expense account schemes  Fraudulent disbursements  False billing  Larceny  Inventory theft ASWA - Huntsville 2012
  • 8. 41% of perpetrators are employees; 38% of perpetrators are managers  Median losses of frauds by employees = $60,000; by managers = $182,000  Frauds lasted a median of 18 months before being detected  38% of perpetrators were between the ages of 36 and 45  Median losses by gender: Males $200,000; by female fraudsters $91,000  Executive/upper management caused largest fraud losses  49% of victim organizations in the study had not recovered any losses due to fraud ASWA - Huntsville 2012
  • 9. Opportunities Fraud Incentives/Pressures Rationalization ASWA - Huntsville 2012
  • 12. To n e a t t h e To p  Management’s behavior creates an environment in the company - that environment can breed or condone fraudulent activity.  Tips for management:  Create and promote a comprehensive fraud policy  Implement an entity specific code of ethics  Consider a reporting hotline ASWA - Huntsville 2012
  • 13. An organizational wide Fraud Policy can send a clear message that workplace fraud will not be tolerated.  Scope of Policy  Identify Behavior That Constitute Fraud  Assign Responsibility for Fraud Investigation  Reiterate Confidentiality  Develop Procedures for Reporting Fraud  Consequences and Corrective Action ASWA - Huntsville 2012
  • 14. Ethical Mind Legal Moral Set & Behavior ASWA - Huntsville 2012
  • 15. According to ACFE Reduces Fraud by 50%  Effective Method of Deterrence  SOX requires anonymity for whistleblowers  Outsourcing to third parties is an option  24 Hours/365  Skilled Interviewer ASWA - Huntsville 2012
  • 16. No two organization are exactly alike!  Knowing your company-specific risk factors can help in fraud prevention.  Size  Types of products and services  Ownership  Financing  Banking relationships  Financial reporting requirements ASWA - Huntsville 2012
  • 17. Human Resources practices and procedures can be very effective tools in the effort to prevent Workplace Fraud  Verify references, work experience and education  Criminal records checks  Annual employee evaluations  Permission for drug, criminal and financial checks if company policy or position requires ASWA - Huntsville 2012
  • 18. Internal Controls  A thoughtfully designed and effectively implemented internal control structure is essential to prevent ongoing and pervasive Workplace Fraud from occurring and going undetected.  Segregation of duties between recording, asset custody and reporting  Supervision and oversight by management and board of directors  External checks  Monitoring to make sure internal controls continue to work over time ASWA - Huntsville 2012
  • 20.  Your company’s digital assets are perhaps some of its most valuable. Help shield them from Workplace Fraud with effective IT controls in place.  Physical access to servers and computer center controlled  Passwords secure and regularly changed  Access only to necessary software modules  Computer records maintained of log-ins;  Reports generated of failed log-in attempts and maximum limit on number of log-in attempts ASWA - Huntsville 2012
  • 21. Saves Money Creates Fraud Awareness Enhanced Reputation Compliance with SOX ASWA - Huntsville 2012
  • 26. Behavioral Red Flags Exhibited  81% of fraudsters exhibited at least one of the listed behavioral red flags:  36% Living beyond their means  27% with financial difficulties  19% with unusually close associations with vendors or customers  18% had excessive control issues with their duties ASWA - Huntsville 2012
  • 28. Analytical Red Flags  Recurring negative cash flows from operations  Unusual general journal entries or unusual transactions, especially close to end of a period  Significant related party transactions not in the ordinary course of business  Abnormal profitability when compared to similar companies in the same industry  Abnormal gross profit margin or growth in gross profit margin when compared to similar companies in the same industry  Management override ASWA - Huntsville 2012
  • 29. Other Data Analytics  Trend analysis – comparison to prior periods  Comparison to forecasts, budgets  Vertical and horizontal ratio analysis  Correlation analysis  Searches for duplicates  Compliance verification  Aging  Benford’s law  Beneish m-score model  Dechow-Dichev accrual quantity ASWA - Huntsville 2012
  • 30.  Duplicate payments tests  Benford’s Law analysis  Rounded amount invoices  Invoices just below approval levels  Abnormal invoice volume activity  Rapid increase  High variance  Vendors with sequential invoice Numbers or where numbers and dates are inconsistent  Merge vendor and employee files ASWA - Huntsville 2012
  • 31. Examples of Phishing Emails ASWA - Huntsville 2012
  • 33. What is OPSEC? Military term • Analytic process used to deny an meaning adversary information Operational Security • Risk assessment tool Universal • Examines day-to-day activities concepts • Controls information • Equally applicable to individuals Applied in any and businesses in general environment • Identifies security risks ASWA - Huntsville 2012
  • 34. OPSEC Is Not: An expensive A strict set of and time- rules and consuming procedures process Used only by the government or military ASWA - Huntsville 2012
  • 35. Consequences Loss of customer trust and business Possible law suits Legal issues  Gramm-Leach-Bliley Act  Fair Credit Reporting Act  Federal Trade Commission Act  Health Insurance Portability and Accountability Act (HIPPA)  Family Educational Rights and Privacy Act  Drivers Privacy Protection Act  Privacy Laws  State Laws ASWA - Huntsville 2012
  • 36. Bottom Line – Companies must develop and maintain reasonable procedures to protect sensitive information ASWA - Huntsville 2012
  • 37. You and Your Employees Know the Know what threat to protect Know how to protect ASWA - Huntsville 2012
  • 38. Know the Threat-Who Adversary – the Bad Guy Terrorist groups Criminals Organized crime Hackers/Crackers Insider threats – generally more costly and often overlooked ASWA - Huntsville 2012
  • 39. What to do if you have suspicions ASWA - Huntsville 2012
  • 40. What resources do you have at your disposal for guidance Outside CPAs Attorney Internal audit Law enforcement ASWA - Huntsville 2012
  • 41. Legal restrictions and ramifications Does your company require employees sign a fraud policy statement Chain of custody of documents, paper and otherwise Suspect’s rights to privacy – Their work area Interview do’s and don'ts ASWA - Huntsville 2012
  • 42. What a CFE can do if you have suspicions Investigate on behalf of the board of directors Conduct interviews Perform data analysis, data mining Search computer records Search sources of outside information related to the suspect ASWA - Huntsville 2012
  • 43. Sources  Cornell University IT: Phish Bowl  www.it.cornell.edu/security/safety/phishbowl.cfm  Protect your business by understanding common social engineering techniques, Small Business Blog  http://googlesmb.blogspot.com/2012/04/protect-your- business-by-understanding.html  Microsoft  www.microsoft.com/security/online-privacy/phishing- symptoms.aspx ASWA - Huntsville 2012
  • 44. Contact Info Sharon P. Hamrick, CPA•CFF, CFE Senior Manager, Decosimo Advisory Services sharonhamrick@decosimo.com www.linkedin.com/in/sharonhamrick 423-756-7100 The contents and opinions contained in this article are for informational purposes only. The information is not intended to be a substitute for professional accounting counsel. Always seek the advice of your accountant or other financial planner with any questions you may have regarding your financial goals. ASWA - Huntsville 2012