SlideShare a Scribd company logo
1 of 21
Download to read offline
Ways to Beat Vendor and 
Procurement Fraudsters using 
Data Analysis
March 13, 2013
Special Guest Presenter:
Katrina Kiselinchev, CIA, CPA, CFE, CFF

Copyright © 2013 FraudResourceNet™ LLC

About Peter Goldmann, MSc., CFE



President and Founder of White Collar Crime 101

Publisher of White‐Collar Crime Fighter
Developer of FraudAware® Anti‐Fraud Training 
Monthly Columnist, The Fraud Examiner, 
ACFE Newsletter

 Member of Editorial Advisory Board, ACFE
 Author of “Fraud in the Markets”
Explains how fraud fueled the financial crisis.

Copyright © 2013 FraudResourceNet™ LLC
About Jim Kaplan, MSc, CIA, CFE
 President and Founder of AuditNet®, the global resource for auditors 
 Auditor, Web Site Guru,
Internet for Auditors Pioneer
Recipient of the IIA’s 2007 Bradford Cadmus Memorial Award.
 Author of “The Auditor’s Guide to Internet Resources” 2nd Edition 

Copyright © 2013 FraudResourceNet™ LLC

About Katrina Kiselinchev, CPA, CIA, CFE, CFF







President of Inclusivitie, We Do “SMART”
Integration Partner with IDEA
Experience across industries, audit, fraud, and value
Achieved Value of $5+ Million & ROI of 2000+%, which 
included using IDEA’s SMART Analyzer .
Adjunct Professor at Georgia State University
Specific Fraud in Accounts Payable e.g. Vendor Overcharges, 
Duplicates, and Diversion of Refunds

Copyright © 2013 FraudResourceNet™ LLC
Webinar Housekeeping
This webinar and its material are the property of AuditNet® and FraudAware®.
Unauthorized usage or recording of this webinar or any of its material is strictly
forbidden. We will be recording the webinar and you will be provided access to
that recording within five business days after the webinar. Downloading or
otherwise duplicating the webinar recording is expressly prohibited.
Please complete the evaluation to help us continuously improve our Webinars.
You must answer the polling questions to qualify for CPE per NASBA.
Submit questions via the chat box on your screen and we will answer them
either during or at the conclusion.
If GTW stops working you may need to close and restart. You can always dial
in and listen and follow along with the handout.

Copyright © 2013 FraudResourceNet™ LLC

Disclaimers


The views expressed by the presenters do not necessarily represent the
views, positions, or opinions of FraudResourceNet LLC (FRN) or the
presenters’ respective organizations. These materials, and the oral
presentation accompanying them, are for educational purposes only and do
not constitute accounting or legal advice or create an accountant-client
relationship.
While FRN makes every effort to ensure information is accurate and
complete, FRN makes no representations, guarantees, or warranties as to
the accuracy or completeness of the information provided via this
presentation. FRN specifically disclaims all liability for any claims or
damages that may result from the information contained in this
presentation, including any websites maintained by third parties and linked
to the FRN website
Any mention of commercial products is for information only; it does not
imply recommendation or endorsement by FraudResourceNet LLC
Copyright © 2013 FraudResourceNet™ LLC

5
Learning Objectives






Costliest Procurement Frauds to Beware of 
Indicators of Possible Collusive Procurement Vendor Schemes 
Red Flags to Look for in Audits of Procurement Using Data Analytics 
How to Conduct the Audit Using Data Analytics
What to Do if you Find Vendor or Procurement Fraud

Copyright © 2013 FraudResourceNet™ LLC

6

Agenda
 Introduction
 Standards & Essentials
 Fraud State of the Union
 In the News: Costliest Forms of Payables Fraud 
 Accounts Payable Fraudsters
 IMA Manufacturing Company Case 
 Planning for Accounts Payable Fraud
 Data Gathering & Software Introduction
 Discovery with DA: Is There Fraud at IMA Manufacturing
 Red Flag Detection & Collusion 
 Finding Accounts Payable Fraud & Next Steps

Copyright © 2013 FraudResourceNet™ LLC

7
The Auditor’s Role

IPPF Standard 1210.A3
 Internal auditors must have sufficient 
knowledge of…available technology 
based audit techniques   to perform their 
assigned work

Copyright © 2013 FraudResourceNet™ LLC

IIA Guidance – GTAG 13
Internal auditors require appropriate skills 
and should use available technological 
tools to help them maintain a successful 
fraud management program that covers 
prevention, detection, and investigation. 
As such, all audit professionals — not just 
IT audit specialists — are expected to be 
increasingly proficient in areas such as 
data analysis and the use of technology to 
help them meet the demands of the job.

Copyright © 2013 FraudResourceNet™ LLC
Professional Guidance

Copyright © 2013 FraudResourceNet™ LLC

Fraud State of the Union

2012 ACFE 
Report to the 
Nations

Copyright © 2013 FraudResourceNet™ LLC
Fraud State of the Union

2012 ACFE Report
to the Nations

Copyright © 2013 FraudResourceNet™ LLC

In the News: Costliest Forms of
Accounts Payable Fraud
According to ACFE's "Report to the Nation on Occupational Fraud and Abuse":
 > 39% of Fraud Cases in AP Occur in Business with < 99 Employees 
 AP Fraud Accounts for 35+% of Total Fraud
 Banking & Financial Services, Government, and Manufacturing Highest Fraud%
 Average is $75,000 Per Occurrence
Types
 Fictitious Suppliers, Users, Companies, Bank Accounts
 Overstated, Fictitious and Duplicate Expenses
 Kickback Schemes with Vendors
 Diversion of Payments
 Understated Accounts Payable

Copyright © 2013 FraudResourceNet™ LLC
In the News:
$8 Million Dollar E-Mail






US Publishers Inc.
$7.6 Billion + in Sales
29K+ Employees
Founded in 1920’s
2011: AP Department received an e‐mail from one of 
their vendors indicating that future payments should 
be directed to a new bank account. Fair enough. 
These changes do happen from time to time.
 $8 million later the company realized they were the 
victims of a pretty simple scheme by conman John 
Ramsey.

Copyright © 2013 FraudResourceNet™ LLC

In the News:
$8 Million Dollar E-Mail & Scheme






Company Established with Name “Quad Graph”
Real Vendor Name: “Quad/Graphics.”
Bank Account Opened for Ramsey’s Company
Address Change E‐Mail Sent to A/P at US Publishers
Waiting for $ to Roll In
$8MM Later…
It Could Happen to You

Copyright © 2013 FraudResourceNet™ LLC
Perpetrators

Copyright © 2013 FraudResourceNet™ LLC

Polling Question 1
Types of Accounts Payable Scheme (Choose all 
that apply):  
a)
b)
c)
d)

Fictitious Supplier
Worker’s Compensation
Diversion of Payments
Check Counterfeiting

Copyright © 2013 FraudResourceNet™ LLC
IMA MANUFACTURING CO.
Initial Contact:
Mike Manufacture, CEO of IMA Manufacturing Co. thinks 
there may be some procurement fraud going on.
 “Concerns about Suppliers, Potential Kickbacks, 
Vendors, Expenses, and Collusion
 “We Need a Data Analysis Expert”
 “What Tools Do You Use”?

Copyright © 2013 FraudResourceNet™ LLC

Background of the Case
 250+ Vendors with RFP Process, No Comparison of Vendors
 No Vendor Review or Audit Done
 Two People in AP with Overlapping Duties, Clerk & Manager
Procurement Mgr
No vacations in 2+ Years
New Rolls Royce
Off Half Day (Sick Child) 

AP Clerk
Discovered Vendor Used with No Budget
Large Vendors Vetted Through Procurement
Fake Vendor Spend=$100K+
Address Matched Spouse Office Bill Came In 
of AP Manager

Procurement Manager Terminated After Exit Interview
Claims Total of the Fraud is $100K Found
CEO Thinks There is More
Suspicions About AP Clerk
.

Copyright © 2013 FraudResourceNet™ LLC
Client Communication:
Planning for Accounts Payable Fraud






Walk‐through of Vendor Set‐Up & Screening
Procure‐to‐Pay Cycle, Statements, Entries, Due Diligence
Complete Audit Plan with Data Analysis Incorporated
Include  Request for Proposal Process, Gaps, 
Comparisons to Similar Vendor Pricing, Comparison to 
Contract Pricing
“Concerns about Suppliers, 
Potential Kickbacks, Vendors, 
Expenses, and Collusion

Copyright © 2013 FraudResourceNet™ LLC

Polling Question 2

The percentage of fraud committed by business 
owners in 2012 is... 
a)
b)
c)
d)

55%
18%
35%
22%

Copyright © 2013 FraudResourceNet™ LLC
Data Analytics for Fraud:
Software Overview
Data Analytics







Traditional Auditing

Large Amounts of Data 
Identify Red Flags Faster
Increased Coverage
Determine Trends
Continuous Analysis
Process Improvement






Small Amounts of Data
Delay in Identifying Red Flags
Decreased Coverage
Harder to ID Trends

Show First View of IDEA

Copyright © 2013 FraudResourceNet™ LLC

22

Procure-to-Pay Process

Procurement Mgr
Performs “Vendor Approval” for 
High Use & Spend Vendors 

AP Clerk
Enters Bills

Operational Mgr
Approves Bills for ONLY 
Budgeted Spend

No Additional Review
No Budget to Actual
No System Controls for Manager to Pay Bills
AP Manager
Pays Bills 
Copyright © 2013 FraudResourceNet™ LLC
Polling Question 3

What Is/Are Added Preventative Control(s) for IMA 
Manufacturing to Consider?
a. Disallow System Access to AP Manager 
for Vendor Set‐Up
b. Add Additional Review at the End
c. Neither of the Above
d. Both a and b
Copyright © 2013 FraudResourceNet™ LLC

Discovery with Data Analysis
Is There Fraud at IMA?
Audits to Perform:
 Total Vendor Spend: 
 Summarize in IDEA
 Run Duplicate Test
 Review Budgets for Vendors vs. Spend
 Join Databases by Vendor ID
 Review Vendor Addresses vs. Employees
 Strip Addresses in Both Files
 Join Databases by Address Comparison
 Request Data in Line with Tests.
Notify Management & Team this May Expand. Preliminary Request
Copyright © 2013 FraudResourceNet™ LLC
Data Gathering for Data Analysis
Request All Meta Data Fields  & Files
Accounts Payable
 Vendor Name
 Vendor ID & Site & Address
 Purchase Order
 History for X Time Period 
Demonstration of Files Provided
 Posted & Approved by ID
 Budgets by Vendor
 Comments
 Changes to Fields & Who Made Them
Employees
 Employee ID
 Employee Address
 Position
Copyright © 2013 FraudResourceNet™ LLC

Software Overview & Introduction
 Set Working Folder
 Import Data
 Check Control Totals

Copyright © 2013 FraudResourceNet™ LLC
Software Overview & Introduction
 Set Working Folder
 Import Data
 Check Control Totals

Copyright © 2013 FraudResourceNet™ LLC

Polling Question 4

How Do You Start a New Audit Using IDEA?
a) Import Data, Create Working Folder
b) Create Working Folder, Check Control Totals
c) Create Working Folder, Import Data, and Check 
Control Totals

Copyright © 2013 FraudResourceNet™ LLC
Discovery with DA: Spend
Audits to Perform:
Total Vendor Spend: 
Summarize IDEA
Duplicate Tests

Red Flag #1: Two Vendors with 
Significant % in Spend Over 
Others
Univar & Extra

Copyright © 2013 FraudResourceNet™ LLC

Discovery with DA: Duplicates

Red Flag #2: Same Two Vendors with 
Significant Duplicates
Houston, Brentag, Univar & Extra
& Other Odd Round Amounts

Copyright © 2013 FraudResourceNet™ LLC
Discovery with DA: Budgets
Audits to Perform:
Budgets to Spend
Join Budget & Expense 
Summary Databases by 
Vendor ID

Copyright © 2013 FraudResourceNet™ LLC

Discovery with DA: Budgets

Red Flag #3: Univar Spend $1.3MM vs. Budget 
of $5K. 2 Others with Overages.

Copyright © 2013 FraudResourceNet™ LLC
Discovery with DA: Address
Review Vendor Addresses vs. Employees
Strip Addresses in Both Files
Join Databases by Address 
Comparison
Employee Database v Expense

Red Flag #4: 5 Vendors Including Univar 
Match Employee Address

Copyright © 2013 FraudResourceNet™ LLC

Red Flags for Accounts Payable Fraud

 Unrecorded Liabilities
 Journal Entries
 Unauthorized Parties
 After Close
 Fictitious Vendors & Suppliers
 Duplicate Payments 
 No three way match between:
 Purchase Orders
 Receipt of Goods
 Invoice
 Budget Overruns
 Address Match for Vendor v Employee
Copyright © 2013 FraudResourceNet™ LLC
Polling Question 5

Which of the following is/are Red Flag(s)/ 
Finding(s) Identified in IMA Manufacturing Case?
1.
2.
3.
4.

Vendor Addresses Match Employee Addresses
Vendor Spend is Excessive Over Budgeted Amounts
Terminated Employees Receiving Paychecks
1 & 2 Above

Copyright © 2013 FraudResourceNet™ LLC

Total Fraud Found & Next Steps
1)  Complete Summary of Data & Findings
a) Total by Employee with Address Matches
b) Total by Vendor
c) Total Budget vs. Spend
2)    Determine Additional Tests to Run & Perform
3) Discuss Findings with CEO Initially & Recommendations
4) Complete Interviews with Employees & Leave Alleged Matches for End
5) Review Gaps & Control Deficiencies & Provide Recommendations 
6) Recommend Management Review for Cost v Benefit & Implement ASAP
7) Determine if Client has Fraud Insurance Rider.  If not, recommend.
8) Contact Insurance Carrier (if applicable) & Begin Claim Process.
9) Contact Authorities & File Report.
10) Determine if Prosecution is Viable e.g. Dollar Amount, Management, etc.
11) Complete Report (See ACFE.com) 
12) Complete Supporting Doc for Insurance Co. & Authorities
Copyright © 2013 FraudResourceNet™ LLC
Preventing Accounts Payable Fraud
Prevention of IMA Manufacturing:
 Segregation of Duties for Set‐Up, Bill Entering, Payment, and Review 
 Restrict Access to the Software for Function of Vendor Addition
 Have Removed Approver for Payables
 Implement Controls for Budget Excess
 Implement System Controls
 Run Budget vs. Actual Monthly
Continuous Monitoring
 Complete Risk Assessment & Annual Audit Plan with Data Analysis
 Determine Monthly & Quarterly Tests by Priority
 Implement Data Analysis Testing
 Perform & Complete Ongoing Control Assessments

Copyright © 2013 FraudResourceNet™ LLC

Polling Question 6

Which Two Things Would Have Caught IMA 
Manufacturing Fraud Sooner…
a.
b.
c.
d.

Procurement Manager from Sole Vendor Selection
Budget v Actual Spend Analysis Monthly
Implement Data Analysis Testing
B & C

Copyright © 2013 FraudResourceNet™ LLC
Questions?
 Any Questions?
Don’t be Shy!

Copyright © 2013 FraudResourceNet™ LLC

Thank You!
Website: http://www.fraudresourcenet.com
Jim Kaplan
FraudResourceNet™
800-385-1625
jkaplan@fraudresourcenet.com
Peter Goldmann
FraudResourceNet™
800-440-2261
pgoldmann@fraudresourcenet.com
Katrina Kiselinchev
Inclusivitie, LLC
832-236-4778
katrina@inclusivitie.com
http://www.inclusivitie.com
Copyright © 2013 FraudResourceNet™ LLC

More Related Content

What's hot

Preventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldPreventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldGuardian Analytics
 
Detecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeDetecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeLaurent Pacalin
 
RQ Retail Management: Proven Fraud Prevention Strategies
RQ Retail Management: Proven Fraud Prevention StrategiesRQ Retail Management: Proven Fraud Prevention Strategies
RQ Retail Management: Proven Fraud Prevention StrategiesiQmetrixCorp
 
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudFraudBusters
 
Same day ach bec fraud detection prevention webinar 3 1-18
Same day ach bec fraud detection  prevention webinar 3 1-18 Same day ach bec fraud detection  prevention webinar 3 1-18
Same day ach bec fraud detection prevention webinar 3 1-18 Laurent Pacalin
 
ISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseLaurent Pacalin
 
New! Omni-Channel Fraud Prevention
New! Omni-Channel Fraud Prevention New! Omni-Channel Fraud Prevention
New! Omni-Channel Fraud Prevention Guardian Analytics
 
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...Forter
 
New fraud protection solutions
New fraud protection solutionsNew fraud protection solutions
New fraud protection solutionsLaurent Pacalin
 
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...Ken Lam
 
Forter - NOAH19 Tel Aviv
Forter - NOAH19 Tel AvivForter - NOAH19 Tel Aviv
Forter - NOAH19 Tel AvivNOAH Advisors
 

What's hot (11)

Preventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldPreventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach World
 
Detecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeDetecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-Time
 
RQ Retail Management: Proven Fraud Prevention Strategies
RQ Retail Management: Proven Fraud Prevention StrategiesRQ Retail Management: Proven Fraud Prevention Strategies
RQ Retail Management: Proven Fraud Prevention Strategies
 
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay Fraud
 
Same day ach bec fraud detection prevention webinar 3 1-18
Same day ach bec fraud detection  prevention webinar 3 1-18 Same day ach bec fraud detection  prevention webinar 3 1-18
Same day ach bec fraud detection prevention webinar 3 1-18
 
ISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email Compromise
 
New! Omni-Channel Fraud Prevention
New! Omni-Channel Fraud Prevention New! Omni-Channel Fraud Prevention
New! Omni-Channel Fraud Prevention
 
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
 
New fraud protection solutions
New fraud protection solutionsNew fraud protection solutions
New fraud protection solutions
 
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
 
Forter - NOAH19 Tel Aviv
Forter - NOAH19 Tel AvivForter - NOAH19 Tel Aviv
Forter - NOAH19 Tel Aviv
 

Similar to Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis

Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsFraudBusters
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisFraudBusters
 
Benford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataBenford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataFraudBusters
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraudBusters
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudUsing Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudFraudBusters
 
Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyFraudBusters
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramFraudBusters
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudFraudBusters
 
Mystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification BubbleMystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification BubbleShailin Dhar
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsFraudBusters
 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughFraudBusters
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Molly Alexander
 
Big Data Day LA 2016/ Data Science Track - Intuit's Payments Risk Platform, D...
Big Data Day LA 2016/ Data Science Track - Intuit's Payments Risk Platform, D...Big Data Day LA 2016/ Data Science Track - Intuit's Payments Risk Platform, D...
Big Data Day LA 2016/ Data Science Track - Intuit's Payments Risk Platform, D...Data Con LA
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraudBusters
 
Preventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Preventing Tax Evasion & Benefits Fraud Through Predictive AnalyticsPreventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Preventing Tax Evasion & Benefits Fraud Through Predictive AnalyticsCapgemini
 
Bribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to KnowBribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to KnowFraudBusters
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsFraudBusters
 

Similar to Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis (20)

Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data Analytics
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
 
Benford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataBenford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial Data
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudUsing Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
 
Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud Policy
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Mystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification BubbleMystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification Bubble
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
 
Traffic Quality Webinar
Traffic Quality WebinarTraffic Quality Webinar
Traffic Quality Webinar
 
Big Data Day LA 2016/ Data Science Track - Intuit's Payments Risk Platform, D...
Big Data Day LA 2016/ Data Science Track - Intuit's Payments Risk Platform, D...Big Data Day LA 2016/ Data Science Track - Intuit's Payments Risk Platform, D...
Big Data Day LA 2016/ Data Science Track - Intuit's Payments Risk Platform, D...
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
 
Preventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Preventing Tax Evasion & Benefits Fraud Through Predictive AnalyticsPreventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Preventing Tax Evasion & Benefits Fraud Through Predictive Analytics
 
Bribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to KnowBribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to Know
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red Flags
 

More from FraudBusters

Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics FraudBusters
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudFraudBusters
 
Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterFraudBusters
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsFraudBusters
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud DetectionFraudBusters
 
Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFraudBusters
 
Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning EssentialsFraudBusters
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsFraudBusters
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudFraudBusters
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudFraudBusters
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best PracticesFraudBusters
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsFraudBusters
 
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudBusters
 

More from FraudBusters (13)

Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay Fraud
 
Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a Fraudster
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data Analytics
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud Detection
 
Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit Software
 
Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning Essentials
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding Fraud
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best Practices
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your Audits
 
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
 

Recently uploaded

Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...First NO1 World Amil baba in Faisalabad
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdfHenry Tapper
 
Andheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot ModelsAndheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot Modelshematsharma006
 
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130  Available With RoomVIP Kolkata Call Girl Serampore 👉 8250192130  Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Roomdivyansh0kumar0
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarHarsh Kumar
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...Henry Tapper
 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...shivangimorya083
 
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一S SDS
 
Chapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th editionChapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th editionMuhammadHusnain82237
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfshaunmashale756
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignHenry Tapper
 
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designsegoetzinger
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130Suhani Kapoor
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companiesprashantbhati354
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdfAdnet Communications
 
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...Suhani Kapoor
 
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdf
 
Andheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot ModelsAndheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot Models
 
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130  Available With RoomVIP Kolkata Call Girl Serampore 👉 8250192130  Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh Kumar
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
 
Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024
 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
 
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
 
Chapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th editionChapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th edition
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdf
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaign
 
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designs
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companies
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf
 
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
 
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis

  • 1. Ways to Beat Vendor and  Procurement Fraudsters using  Data Analysis March 13, 2013 Special Guest Presenter: Katrina Kiselinchev, CIA, CPA, CFE, CFF Copyright © 2013 FraudResourceNet™ LLC About Peter Goldmann, MSc., CFE  President and Founder of White Collar Crime 101 Publisher of White‐Collar Crime Fighter Developer of FraudAware® Anti‐Fraud Training  Monthly Columnist, The Fraud Examiner,  ACFE Newsletter  Member of Editorial Advisory Board, ACFE  Author of “Fraud in the Markets” Explains how fraud fueled the financial crisis. Copyright © 2013 FraudResourceNet™ LLC
  • 2. About Jim Kaplan, MSc, CIA, CFE  President and Founder of AuditNet®, the global resource for auditors   Auditor, Web Site Guru, Internet for Auditors Pioneer Recipient of the IIA’s 2007 Bradford Cadmus Memorial Award.  Author of “The Auditor’s Guide to Internet Resources” 2nd Edition  Copyright © 2013 FraudResourceNet™ LLC About Katrina Kiselinchev, CPA, CIA, CFE, CFF       President of Inclusivitie, We Do “SMART” Integration Partner with IDEA Experience across industries, audit, fraud, and value Achieved Value of $5+ Million & ROI of 2000+%, which  included using IDEA’s SMART Analyzer . Adjunct Professor at Georgia State University Specific Fraud in Accounts Payable e.g. Vendor Overcharges,  Duplicates, and Diversion of Refunds Copyright © 2013 FraudResourceNet™ LLC
  • 3. Webinar Housekeeping This webinar and its material are the property of AuditNet® and FraudAware®. Unauthorized usage or recording of this webinar or any of its material is strictly forbidden. We will be recording the webinar and you will be provided access to that recording within five business days after the webinar. Downloading or otherwise duplicating the webinar recording is expressly prohibited. Please complete the evaluation to help us continuously improve our Webinars. You must answer the polling questions to qualify for CPE per NASBA. Submit questions via the chat box on your screen and we will answer them either during or at the conclusion. If GTW stops working you may need to close and restart. You can always dial in and listen and follow along with the handout. Copyright © 2013 FraudResourceNet™ LLC Disclaimers  The views expressed by the presenters do not necessarily represent the views, positions, or opinions of FraudResourceNet LLC (FRN) or the presenters’ respective organizations. These materials, and the oral presentation accompanying them, are for educational purposes only and do not constitute accounting or legal advice or create an accountant-client relationship. While FRN makes every effort to ensure information is accurate and complete, FRN makes no representations, guarantees, or warranties as to the accuracy or completeness of the information provided via this presentation. FRN specifically disclaims all liability for any claims or damages that may result from the information contained in this presentation, including any websites maintained by third parties and linked to the FRN website Any mention of commercial products is for information only; it does not imply recommendation or endorsement by FraudResourceNet LLC Copyright © 2013 FraudResourceNet™ LLC 5
  • 4. Learning Objectives      Costliest Procurement Frauds to Beware of  Indicators of Possible Collusive Procurement Vendor Schemes  Red Flags to Look for in Audits of Procurement Using Data Analytics  How to Conduct the Audit Using Data Analytics What to Do if you Find Vendor or Procurement Fraud Copyright © 2013 FraudResourceNet™ LLC 6 Agenda  Introduction  Standards & Essentials  Fraud State of the Union  In the News: Costliest Forms of Payables Fraud   Accounts Payable Fraudsters  IMA Manufacturing Company Case   Planning for Accounts Payable Fraud  Data Gathering & Software Introduction  Discovery with DA: Is There Fraud at IMA Manufacturing  Red Flag Detection & Collusion   Finding Accounts Payable Fraud & Next Steps Copyright © 2013 FraudResourceNet™ LLC 7
  • 5. The Auditor’s Role IPPF Standard 1210.A3  Internal auditors must have sufficient  knowledge of…available technology  based audit techniques   to perform their  assigned work Copyright © 2013 FraudResourceNet™ LLC IIA Guidance – GTAG 13 Internal auditors require appropriate skills  and should use available technological  tools to help them maintain a successful  fraud management program that covers  prevention, detection, and investigation.  As such, all audit professionals — not just  IT audit specialists — are expected to be  increasingly proficient in areas such as  data analysis and the use of technology to  help them meet the demands of the job. Copyright © 2013 FraudResourceNet™ LLC
  • 6. Professional Guidance Copyright © 2013 FraudResourceNet™ LLC Fraud State of the Union 2012 ACFE  Report to the  Nations Copyright © 2013 FraudResourceNet™ LLC
  • 7. Fraud State of the Union 2012 ACFE Report to the Nations Copyright © 2013 FraudResourceNet™ LLC In the News: Costliest Forms of Accounts Payable Fraud According to ACFE's "Report to the Nation on Occupational Fraud and Abuse":  > 39% of Fraud Cases in AP Occur in Business with < 99 Employees   AP Fraud Accounts for 35+% of Total Fraud  Banking & Financial Services, Government, and Manufacturing Highest Fraud%  Average is $75,000 Per Occurrence Types  Fictitious Suppliers, Users, Companies, Bank Accounts  Overstated, Fictitious and Duplicate Expenses  Kickback Schemes with Vendors  Diversion of Payments  Understated Accounts Payable Copyright © 2013 FraudResourceNet™ LLC
  • 8. In the News: $8 Million Dollar E-Mail      US Publishers Inc. $7.6 Billion + in Sales 29K+ Employees Founded in 1920’s 2011: AP Department received an e‐mail from one of  their vendors indicating that future payments should  be directed to a new bank account. Fair enough.  These changes do happen from time to time.  $8 million later the company realized they were the  victims of a pretty simple scheme by conman John  Ramsey. Copyright © 2013 FraudResourceNet™ LLC In the News: $8 Million Dollar E-Mail & Scheme      Company Established with Name “Quad Graph” Real Vendor Name: “Quad/Graphics.” Bank Account Opened for Ramsey’s Company Address Change E‐Mail Sent to A/P at US Publishers Waiting for $ to Roll In $8MM Later… It Could Happen to You Copyright © 2013 FraudResourceNet™ LLC
  • 9. Perpetrators Copyright © 2013 FraudResourceNet™ LLC Polling Question 1 Types of Accounts Payable Scheme (Choose all  that apply):   a) b) c) d) Fictitious Supplier Worker’s Compensation Diversion of Payments Check Counterfeiting Copyright © 2013 FraudResourceNet™ LLC
  • 10. IMA MANUFACTURING CO. Initial Contact: Mike Manufacture, CEO of IMA Manufacturing Co. thinks  there may be some procurement fraud going on.  “Concerns about Suppliers, Potential Kickbacks,  Vendors, Expenses, and Collusion  “We Need a Data Analysis Expert”  “What Tools Do You Use”? Copyright © 2013 FraudResourceNet™ LLC Background of the Case  250+ Vendors with RFP Process, No Comparison of Vendors  No Vendor Review or Audit Done  Two People in AP with Overlapping Duties, Clerk & Manager Procurement Mgr No vacations in 2+ Years New Rolls Royce Off Half Day (Sick Child)  AP Clerk Discovered Vendor Used with No Budget Large Vendors Vetted Through Procurement Fake Vendor Spend=$100K+ Address Matched Spouse Office Bill Came In  of AP Manager Procurement Manager Terminated After Exit Interview Claims Total of the Fraud is $100K Found CEO Thinks There is More Suspicions About AP Clerk . Copyright © 2013 FraudResourceNet™ LLC
  • 11. Client Communication: Planning for Accounts Payable Fraud     Walk‐through of Vendor Set‐Up & Screening Procure‐to‐Pay Cycle, Statements, Entries, Due Diligence Complete Audit Plan with Data Analysis Incorporated Include  Request for Proposal Process, Gaps,  Comparisons to Similar Vendor Pricing, Comparison to  Contract Pricing “Concerns about Suppliers,  Potential Kickbacks, Vendors,  Expenses, and Collusion Copyright © 2013 FraudResourceNet™ LLC Polling Question 2 The percentage of fraud committed by business  owners in 2012 is...  a) b) c) d) 55% 18% 35% 22% Copyright © 2013 FraudResourceNet™ LLC
  • 12. Data Analytics for Fraud: Software Overview Data Analytics       Traditional Auditing Large Amounts of Data  Identify Red Flags Faster Increased Coverage Determine Trends Continuous Analysis Process Improvement     Small Amounts of Data Delay in Identifying Red Flags Decreased Coverage Harder to ID Trends Show First View of IDEA Copyright © 2013 FraudResourceNet™ LLC 22 Procure-to-Pay Process Procurement Mgr Performs “Vendor Approval” for  High Use & Spend Vendors  AP Clerk Enters Bills Operational Mgr Approves Bills for ONLY  Budgeted Spend No Additional Review No Budget to Actual No System Controls for Manager to Pay Bills AP Manager Pays Bills  Copyright © 2013 FraudResourceNet™ LLC
  • 13. Polling Question 3 What Is/Are Added Preventative Control(s) for IMA  Manufacturing to Consider? a. Disallow System Access to AP Manager  for Vendor Set‐Up b. Add Additional Review at the End c. Neither of the Above d. Both a and b Copyright © 2013 FraudResourceNet™ LLC Discovery with Data Analysis Is There Fraud at IMA? Audits to Perform:  Total Vendor Spend:   Summarize in IDEA  Run Duplicate Test  Review Budgets for Vendors vs. Spend  Join Databases by Vendor ID  Review Vendor Addresses vs. Employees  Strip Addresses in Both Files  Join Databases by Address Comparison  Request Data in Line with Tests. Notify Management & Team this May Expand. Preliminary Request Copyright © 2013 FraudResourceNet™ LLC
  • 14. Data Gathering for Data Analysis Request All Meta Data Fields  & Files Accounts Payable  Vendor Name  Vendor ID & Site & Address  Purchase Order  History for X Time Period  Demonstration of Files Provided  Posted & Approved by ID  Budgets by Vendor  Comments  Changes to Fields & Who Made Them Employees  Employee ID  Employee Address  Position Copyright © 2013 FraudResourceNet™ LLC Software Overview & Introduction  Set Working Folder  Import Data  Check Control Totals Copyright © 2013 FraudResourceNet™ LLC
  • 15. Software Overview & Introduction  Set Working Folder  Import Data  Check Control Totals Copyright © 2013 FraudResourceNet™ LLC Polling Question 4 How Do You Start a New Audit Using IDEA? a) Import Data, Create Working Folder b) Create Working Folder, Check Control Totals c) Create Working Folder, Import Data, and Check  Control Totals Copyright © 2013 FraudResourceNet™ LLC
  • 16. Discovery with DA: Spend Audits to Perform: Total Vendor Spend:  Summarize IDEA Duplicate Tests Red Flag #1: Two Vendors with  Significant % in Spend Over  Others Univar & Extra Copyright © 2013 FraudResourceNet™ LLC Discovery with DA: Duplicates Red Flag #2: Same Two Vendors with  Significant Duplicates Houston, Brentag, Univar & Extra & Other Odd Round Amounts Copyright © 2013 FraudResourceNet™ LLC
  • 17. Discovery with DA: Budgets Audits to Perform: Budgets to Spend Join Budget & Expense  Summary Databases by  Vendor ID Copyright © 2013 FraudResourceNet™ LLC Discovery with DA: Budgets Red Flag #3: Univar Spend $1.3MM vs. Budget  of $5K. 2 Others with Overages. Copyright © 2013 FraudResourceNet™ LLC
  • 18. Discovery with DA: Address Review Vendor Addresses vs. Employees Strip Addresses in Both Files Join Databases by Address  Comparison Employee Database v Expense Red Flag #4: 5 Vendors Including Univar  Match Employee Address Copyright © 2013 FraudResourceNet™ LLC Red Flags for Accounts Payable Fraud  Unrecorded Liabilities  Journal Entries  Unauthorized Parties  After Close  Fictitious Vendors & Suppliers  Duplicate Payments   No three way match between:  Purchase Orders  Receipt of Goods  Invoice  Budget Overruns  Address Match for Vendor v Employee Copyright © 2013 FraudResourceNet™ LLC
  • 19. Polling Question 5 Which of the following is/are Red Flag(s)/  Finding(s) Identified in IMA Manufacturing Case? 1. 2. 3. 4. Vendor Addresses Match Employee Addresses Vendor Spend is Excessive Over Budgeted Amounts Terminated Employees Receiving Paychecks 1 & 2 Above Copyright © 2013 FraudResourceNet™ LLC Total Fraud Found & Next Steps 1)  Complete Summary of Data & Findings a) Total by Employee with Address Matches b) Total by Vendor c) Total Budget vs. Spend 2)    Determine Additional Tests to Run & Perform 3) Discuss Findings with CEO Initially & Recommendations 4) Complete Interviews with Employees & Leave Alleged Matches for End 5) Review Gaps & Control Deficiencies & Provide Recommendations  6) Recommend Management Review for Cost v Benefit & Implement ASAP 7) Determine if Client has Fraud Insurance Rider.  If not, recommend. 8) Contact Insurance Carrier (if applicable) & Begin Claim Process. 9) Contact Authorities & File Report. 10) Determine if Prosecution is Viable e.g. Dollar Amount, Management, etc. 11) Complete Report (See ACFE.com)  12) Complete Supporting Doc for Insurance Co. & Authorities Copyright © 2013 FraudResourceNet™ LLC
  • 20. Preventing Accounts Payable Fraud Prevention of IMA Manufacturing:  Segregation of Duties for Set‐Up, Bill Entering, Payment, and Review   Restrict Access to the Software for Function of Vendor Addition  Have Removed Approver for Payables  Implement Controls for Budget Excess  Implement System Controls  Run Budget vs. Actual Monthly Continuous Monitoring  Complete Risk Assessment & Annual Audit Plan with Data Analysis  Determine Monthly & Quarterly Tests by Priority  Implement Data Analysis Testing  Perform & Complete Ongoing Control Assessments Copyright © 2013 FraudResourceNet™ LLC Polling Question 6 Which Two Things Would Have Caught IMA  Manufacturing Fraud Sooner… a. b. c. d. Procurement Manager from Sole Vendor Selection Budget v Actual Spend Analysis Monthly Implement Data Analysis Testing B & C Copyright © 2013 FraudResourceNet™ LLC
  • 21. Questions?  Any Questions? Don’t be Shy! Copyright © 2013 FraudResourceNet™ LLC Thank You! Website: http://www.fraudresourcenet.com Jim Kaplan FraudResourceNet™ 800-385-1625 jkaplan@fraudresourcenet.com Peter Goldmann FraudResourceNet™ 800-440-2261 pgoldmann@fraudresourcenet.com Katrina Kiselinchev Inclusivitie, LLC 832-236-4778 katrina@inclusivitie.com http://www.inclusivitie.com Copyright © 2013 FraudResourceNet™ LLC