4. Summaries
Identify patterns & relationships…
Data overview
Get some perspective
Sankey Diagram
Looking at the flows of major
transactions
Outlier Detection
Anomalies within the data
Text Analytics
Going beyond numbers
Predictive
Assessing the likelihood
Risk Scoring
Single number showing the
risk
Unsupervised
Findings those hidden
patterns
Risk Monitoring
Risk at the entity level
6. Summaries
Identify patterns & relationships…
Data overview
Get some perspective
Sankey Diagram
Looking at the flows of major
transactions
Outlier Detection
Anomalies within the data
Text Analytics
Going beyond numbers
Predictive
Assessing the likelihood
Risk Scoring
Single number showing the
risk
Unsupervised
Findings those hidden
patterns
Risk Monitoring
Risk at the entity level
8. Summaries
Identify patterns & relationships…
Data overview
Get some perspective
Sankey Diagram
Looking at the flows of major
transactions
Outlier Detection
Anomalies within the data
Text Analytics
Going beyond numbers
Predictive
Assessing the likelihood
Risk Scoring
Single number showing the
risk
Unsupervised
Findings those hidden
patterns
Risk Monitoring
Risk at the entity level
11. Summaries
Identify patterns & relationships…
Data overview
Get some perspective
Sankey Diagram
Looking at the flows of major
transactions
Outlier Detection
Anomalies within the data
Text Analytics
Going beyond numbers
Predictive
Assessing the likelihood
Risk Scoring
Single number showing the
risk
Unsupervised
Findings those hidden
patterns
Risk Monitoring
Risk at the entity level
14. THERE IS NO TRANSFORMATION UNLESS EVERYONE BENEFITS…
• Intro / instructions
• Dropdown with your name
• Select file
• Enter Employee ID of the executive you
are auditing
Introduction
~<1 min
• Drop-down of the fields in the file
• Selects 3 key fields for analytics
• Other 5 generic fields
Mapping
~4 min
• Validate data fields (pass/fail)
• % errors
Data Validation
1 min later
• Link to the dashboard
Email Link
5-10 min later
Dashboard
4 worksheets
CREATING ELI
15. Summaries
Identify patterns & relationships…
Data overview
Get some perspective
Sankey Diagram
Looking at the flows of major
transactions
Outlier Detection
Anomalies within the data
Text Analytics
Going beyond numbers
Predictive
Assessing the likelihood
Risk Scoring
Single number showing the
risk
Unsupervised
Findings those hidden
patterns
Risk Monitoring
Risk at the entity level
17. Summaries
Identify patterns & relationships…
Data overview
Get some perspective
Sankey Diagram
Looking at the flows of major
transactions
Outlier Detection
Anomalies within the data
Text Analytics
Going beyond numbers
Predictive
Assessing the likelihood
Risk Scoring
Single number showing the
risk
Unsupervised
Findings those hidden
patterns
Risk Monitoring
Risk at the entity level
20. Summaries
Identify patterns & relationships…
Data overview
Get some perspective
Sankey Diagram
Looking at the flows of major
transactions
Outlier Detection
Anomalies within the data
Text Analytics
Going beyond numbers
Predictive
Assessing the likelihood
Risk Scoring
Single number showing the
risk
Unsupervised
Findings those hidden
patterns
Risk Monitoring
Risk at the entity level
23. UNSUPERVISED - KAMILA
Kay-means for MIxed LArge data sets
Handles continuous and categorical variables
Equitably balances both variable types
Scalable over large data sets
Can be applied over a diverse variety of data
sets
Can calculate optimal number of clusters
Unsupervised technique
Combines the popular k-means algorithm and
Gaussian-multinomial mixture models
Assumes elliptical clusters
Pseudocode
ResultsCluster Determination
24. Summaries
Identify patterns & relationships…
Data overview
Get some perspective
Sankey Diagram
Looking at the flows of major
transactions
Outlier Detection
Anomalies within the data
Text Analytics
Going beyond numbers
Predictive
Assessing the likelihood
Risk Scoring
Single number showing the
risk
Unsupervised
Findings those hidden
patterns
Risk Monitoring
Risk at the entity level
25. Errors, Waste
& Abuse
Unusual patterns…
Excessive spend as
per peer group
3x standard deviation as per
job family & career band
Excessive mileage
Potential fictitious mileage
Excessive cash
transactions below
receipt limits
Consistent claims below the
thresholds
Top Transactions
Largest transactions
Non-T&E Expenses
Employees buying AP items
or services through T&E
Even dollar amount
Unusual transactions
High Avg spend by
category per person
vs peer group
Excessive spend by category
Expenses near or
beyond termination
date
Conflicting expenses
26. Fraud
Deter it, prevent it & detect it…
Suspicious MCCs
Leveraging credit cards
classifications
False meal submission
Submitting a meal in cash while
being an attendee in another
expense
Excessive meals near
office
Using point-to-point distant
calculation
Excessive spending
with same attendee
Too much spend from various
parties on same business
guest
Duplicate Payments
Claim submissions in cash
and credit card
Excessive spending
without attendee
details
Blank or ambiguous attendees
Excessive frequency
in same restaurant
High number of meals in
same restaurant
Unexpected
combination
expenses
Conflicting expenses
27. Compliance
Controls matter more than ever…
Out of Policy
reimbursements
Testing key aspects of the
policy
Unapproved Govt.
official Expenses
Submitting a meal in cash while being
an attendee in another expense
FCPA risk indicators
Calculates
Split Transactions
Too much spend from various
parties on same business
guest
Use of unapproved
travel agency
Booking trips within the
guidance
Unauthorized use
of gift card
providers
Blank or ambiguous attendees
Expense Approval
First line of defense
Not using Corporate
Card
Conflicting expenses