SlideShare a Scribd company logo
1 of 14
T&E Fraud, Misuse & Waste
Detect the bad apples & make an impact
on your T&E spend program.
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
75.6% of Employees committing Expense Report Fraud are
engaged in another form of Occupational Fraud
Source: ACFE
10% people cause nearly 100% of the high risk issues
Source: Oversight Spend Analysis Report Volume 2 Fall 2015
2
Bad apples stay rotten.
In the U.S. 250,000 employees cost business
$3B from 48 million transactions
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
Time
Managers spend nearly 10 minutes reviewing
each expense report, may miss the details
Trust
Managers trust team members too
much, so will approve more often
Intuition
Hard to spot unusual transactions
Total Picture
Hard to identity patterns over time
when only looking at a sample
Training
It’s just too easy to click on the “Approve”
button without proper review
Troubling T’s of Managers
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
Items that are intentionally concealed
– Excessive padding
– Untraceable Out-of-Pocket Spend
– Intentional duplicate reports
– Personal spend submissions
– Misclassifications of expenses
– Fake purchases and receipts
4
Example: Expensing Personal Purchases
Fraud
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
Extravagant or unnecessary spending
– Excessive entertainment
– Donations, gifts, sponsorships
– Unusual mileage submissions
– Overstated expenses
– Unintentional duplicate reports
5
Example: Duplicate Mileage SubmittedWaste
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
T&E Policy Violations
– Inappropriate venues
– Purchases that violate policies
(i.e. liquor stores)
– Hiding large purchases across reports
– Mischaracterized expenses
6
Example: Circumventing Receipt Limit
Misuse
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
Finding the bad apple.
Gain visibility and focus on the high
risk activity such as:
- Suspicious transactions
- Non-compliant behavior patterns
- Process breakdowns
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
Curating the Data
Amex
Visa/MC
iExpenseConcur
Geo Code
Benchmark
TrustSphere
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
Insights On Demand
Professional Service
Templates + Tools
Business Intelligence tools
+ Analytic Components
• Multi-dimensional analysis
• Intelligence & machine learning
• Resolution capabilities
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
Multi-Dimensional Analysis
Case Management
Boolean
Recurrence
Format
Outlier
Chaining
Temporal Meta
Reasoning
Bayesian
Statistical
Aggregation
Link
1 Acquire 3 Resolve2 Analyze
Organization Data
Enriching
Data
Third Party
Data
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
Alerts for High Risk Transactions
11
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
Impact of Artificial Intelligence
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
Customer Example – Industrial
• Reduced review effort by 82%
• Eliminated Manager Approval
• Enhanced Fraud Detection
– Went from firing 1 or 2 people/quarter to 5 or 6 people/week
2016 APRIL
X
X X
X
X X X X X X X
X X X X X X X
X X X X X X X
X X X X X X X
X X X X X
T&E Fraud, Misuse & Waste
Find out what Insights On Demand could do for
your organization. Schedule a personal demo.
Request Demo

More Related Content

What's hot

Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud PreventionBlackbaud
 
Governance risk and compliance
Governance risk and complianceGovernance risk and compliance
Governance risk and complianceMagdalena Matell
 
AML and Compliance Analytics
AML and Compliance Analytics AML and Compliance Analytics
AML and Compliance Analytics Naveen Grover
 
Role of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionRole of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionZeeshan Shahid
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12Fuh George Cheo
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and ControlWeaverCPAs
 
Fraud investigations session 1 slides
Fraud investigations session 1 slidesFraud investigations session 1 slides
Fraud investigations session 1 slidesZeeshan Shahid
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiEMAC Consulting Group
 
Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud InvestigationSalih Islam
 
Compliance framework
Compliance frameworkCompliance framework
Compliance frameworkManoj Agarwal
 
Anti Money Laundering
Anti Money Laundering Anti Money Laundering
Anti Money Laundering Besart Qerimi
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...Ron Steinkamp
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and ReportingBrown Smith Wallace
 
Information System Audit and Control
Information System Audit and ControlInformation System Audit and Control
Information System Audit and ControlAsad Raza
 
Fraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresFraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresVeriti Consulting LLC
 
Presentation AML
Presentation AMLPresentation AML
Presentation AMLMirsazzad
 
Fraud investigations session 2 slides
Fraud investigations session 2 slidesFraud investigations session 2 slides
Fraud investigations session 2 slidesZeeshan Shahid
 

What's hot (20)

Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
 
Governance risk and compliance
Governance risk and complianceGovernance risk and compliance
Governance risk and compliance
 
AML and Compliance Analytics
AML and Compliance Analytics AML and Compliance Analytics
AML and Compliance Analytics
 
Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 
Role of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionRole of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detection
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
 
Fraud investigations session 1 slides
Fraud investigations session 1 slidesFraud investigations session 1 slides
Fraud investigations session 1 slides
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part ii
 
Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud Investigation
 
Compliance framework
Compliance frameworkCompliance framework
Compliance framework
 
Anti Money Laundering
Anti Money Laundering Anti Money Laundering
Anti Money Laundering
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting
 
Aml training
Aml trainingAml training
Aml training
 
Information System Audit and Control
Information System Audit and ControlInformation System Audit and Control
Information System Audit and Control
 
Fraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresFraud Investigation Process And Procedures
Fraud Investigation Process And Procedures
 
Presentation AML
Presentation AMLPresentation AML
Presentation AML
 
Fraud Risk Awareness
Fraud Risk AwarenessFraud Risk Awareness
Fraud Risk Awareness
 
Fraud investigations session 2 slides
Fraud investigations session 2 slidesFraud investigations session 2 slides
Fraud investigations session 2 slides
 

Similar to Oversight Systems: Fraud, Waste & Misuse in T&E

Merging forensics w data analytics
Merging forensics w data analyticsMerging forensics w data analytics
Merging forensics w data analyticschris75308
 
CWIN17 New-York / adopting a cloud first strategy to fuel growth
CWIN17 New-York / adopting a cloud first strategy to fuel growthCWIN17 New-York / adopting a cloud first strategy to fuel growth
CWIN17 New-York / adopting a cloud first strategy to fuel growthCapgemini
 
CWIN17 New-York / a best customer or worst nightmare putting ai to work for...
CWIN17 New-York / a best customer or worst nightmare   putting ai to work for...CWIN17 New-York / a best customer or worst nightmare   putting ai to work for...
CWIN17 New-York / a best customer or worst nightmare putting ai to work for...Capgemini
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Strategic Treasurer
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachGuardian Analytics
 
Preventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldPreventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldGuardian Analytics
 
Preventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach worldPreventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach worldLaurent Pacalin
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachLaurent Pacalin
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudFraudBusters
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesTrish McGinity, CCSK
 
Blinde la seguridad de su empresa
Blinde la seguridad de su empresaBlinde la seguridad de su empresa
Blinde la seguridad de su empresaSAP Latinoamérica
 
Pixels.camp - Machine Learning: Building Successful Products at Scale
Pixels.camp - Machine Learning: Building Successful Products at ScalePixels.camp - Machine Learning: Building Successful Products at Scale
Pixels.camp - Machine Learning: Building Successful Products at ScaleAntónio Alegria
 
Proof CEO Presentation to IPR Research Symposium
Proof CEO Presentation to IPR Research SymposiumProof CEO Presentation to IPR Research Symposium
Proof CEO Presentation to IPR Research SymposiumProof Analytics
 
IT Fraud Series: Data Analytics
IT Fraud Series: Data AnalyticsIT Fraud Series: Data Analytics
IT Fraud Series: Data AnalyticsJim Kaplan CIA CFE
 
Analytics: What is it really and how can it help my organization?
Analytics: What is it really and how can it help my organization?Analytics: What is it really and how can it help my organization?
Analytics: What is it really and how can it help my organization?SAS Canada
 
REQUE - Predictive lead scoring for recruiters and talent agencies
REQUE - Predictive lead scoring for recruiters and talent agenciesREQUE - Predictive lead scoring for recruiters and talent agencies
REQUE - Predictive lead scoring for recruiters and talent agenciesMiroslav Maráz
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 

Similar to Oversight Systems: Fraud, Waste & Misuse in T&E (20)

Merging forensics w data analytics
Merging forensics w data analyticsMerging forensics w data analytics
Merging forensics w data analytics
 
CWIN17 New-York / adopting a cloud first strategy to fuel growth
CWIN17 New-York / adopting a cloud first strategy to fuel growthCWIN17 New-York / adopting a cloud first strategy to fuel growth
CWIN17 New-York / adopting a cloud first strategy to fuel growth
 
CWIN17 New-York / a best customer or worst nightmare putting ai to work for...
CWIN17 New-York / a best customer or worst nightmare   putting ai to work for...CWIN17 New-York / a best customer or worst nightmare   putting ai to work for...
CWIN17 New-York / a best customer or worst nightmare putting ai to work for...
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
 
Preventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldPreventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach World
 
Preventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach worldPreventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach world
 
Chanchal ODSC-fraud-2017
Chanchal ODSC-fraud-2017Chanchal ODSC-fraud-2017
Chanchal ODSC-fraud-2017
 
Predictive analytics 2025_br
Predictive analytics 2025_brPredictive analytics 2025_br
Predictive analytics 2025_br
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
 
Blinde la seguridad de su empresa
Blinde la seguridad de su empresaBlinde la seguridad de su empresa
Blinde la seguridad de su empresa
 
Pixels.camp - Machine Learning: Building Successful Products at Scale
Pixels.camp - Machine Learning: Building Successful Products at ScalePixels.camp - Machine Learning: Building Successful Products at Scale
Pixels.camp - Machine Learning: Building Successful Products at Scale
 
Proof CEO Presentation to IPR Research Symposium
Proof CEO Presentation to IPR Research SymposiumProof CEO Presentation to IPR Research Symposium
Proof CEO Presentation to IPR Research Symposium
 
IT Fraud Series: Data Analytics
IT Fraud Series: Data AnalyticsIT Fraud Series: Data Analytics
IT Fraud Series: Data Analytics
 
Analytics: What is it really and how can it help my organization?
Analytics: What is it really and how can it help my organization?Analytics: What is it really and how can it help my organization?
Analytics: What is it really and how can it help my organization?
 
REQUE - Predictive lead scoring for recruiters and talent agencies
REQUE - Predictive lead scoring for recruiters and talent agenciesREQUE - Predictive lead scoring for recruiters and talent agencies
REQUE - Predictive lead scoring for recruiters and talent agencies
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 

Recently uploaded

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

Oversight Systems: Fraud, Waste & Misuse in T&E

  • 1. T&E Fraud, Misuse & Waste Detect the bad apples & make an impact on your T&E spend program.
  • 2. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. 75.6% of Employees committing Expense Report Fraud are engaged in another form of Occupational Fraud Source: ACFE 10% people cause nearly 100% of the high risk issues Source: Oversight Spend Analysis Report Volume 2 Fall 2015 2 Bad apples stay rotten. In the U.S. 250,000 employees cost business $3B from 48 million transactions
  • 3. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. Time Managers spend nearly 10 minutes reviewing each expense report, may miss the details Trust Managers trust team members too much, so will approve more often Intuition Hard to spot unusual transactions Total Picture Hard to identity patterns over time when only looking at a sample Training It’s just too easy to click on the “Approve” button without proper review Troubling T’s of Managers
  • 4. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. Items that are intentionally concealed – Excessive padding – Untraceable Out-of-Pocket Spend – Intentional duplicate reports – Personal spend submissions – Misclassifications of expenses – Fake purchases and receipts 4 Example: Expensing Personal Purchases Fraud
  • 5. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. Extravagant or unnecessary spending – Excessive entertainment – Donations, gifts, sponsorships – Unusual mileage submissions – Overstated expenses – Unintentional duplicate reports 5 Example: Duplicate Mileage SubmittedWaste
  • 6. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. T&E Policy Violations – Inappropriate venues – Purchases that violate policies (i.e. liquor stores) – Hiding large purchases across reports – Mischaracterized expenses 6 Example: Circumventing Receipt Limit Misuse
  • 7. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. Finding the bad apple. Gain visibility and focus on the high risk activity such as: - Suspicious transactions - Non-compliant behavior patterns - Process breakdowns
  • 8. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. Curating the Data Amex Visa/MC iExpenseConcur Geo Code Benchmark TrustSphere
  • 9. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. Insights On Demand Professional Service Templates + Tools Business Intelligence tools + Analytic Components • Multi-dimensional analysis • Intelligence & machine learning • Resolution capabilities
  • 10. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. Multi-Dimensional Analysis Case Management Boolean Recurrence Format Outlier Chaining Temporal Meta Reasoning Bayesian Statistical Aggregation Link 1 Acquire 3 Resolve2 Analyze Organization Data Enriching Data Third Party Data
  • 11. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. Alerts for High Risk Transactions 11
  • 12. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. Impact of Artificial Intelligence
  • 13. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. Customer Example – Industrial • Reduced review effort by 82% • Eliminated Manager Approval • Enhanced Fraud Detection – Went from firing 1 or 2 people/quarter to 5 or 6 people/week 2016 APRIL X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X
  • 14. T&E Fraud, Misuse & Waste Find out what Insights On Demand could do for your organization. Schedule a personal demo. Request Demo

Editor's Notes

  1. Bad apple – in middle of good apples
  2. 5000 Reports 833 hours 49980 Minutes 1 report=~10 mins
  3. Curate Analyze Action
  4. Boolean Logic Chaining Recurrence Format Outliers Similarity Sentiment Spatial Clustering & Consolidation Temporal Analysis Aggregation Numerical Statistics Meta Reasoning Image Linguistic
  5. Insights delivery is where we exceed the capabilities of a consultant Explain features of the workbench Explore results Modify results Drive workflow and case management on results Integrated with dashboard and benchmarks The activities of the user drives machine learning algorithms Business users understand results not analytics They can tell you when something is wrong in the results. We take their input on the results to refine the analytics for that specific client