SlideShare a Scribd company logo
1 of 13
Preventing Fraud-Lesson I
CA Sailesh Cousik
The Need of the Hour
Identifying Potential Threats
Fraudster Profiles
Fraudster Motivators
Vulnerabilities by Industry
Plugging controls
Creating Awareness
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Agenda
• Keys to Fraud Prevention
• What is Fraud and understanding a Fraudster
• Concept of Red Flags and Green Flags-
• Understand Fraud Vulnerabilities
• Preventive Controls
• People
• Information Assets and Processes
• Case Study
• Organizational Risk and Governance
• Reporting and Continuous Monitoring and Reassessment
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
“QUALITY IN A SERVICE OR PRODUCT IS
NOT WHAT YOU PUT INTO IT.
IT IS WHAT THE CLIENT OR CUSTOMER
GETS OUT OF IT.”
- PETER DRUCKER
QUALITY MEANS DOING IT RIGHT
WHEN NOBODY IS LOOKING
HENRY FORD
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
What is Fraud• Black’s Law Dictionary
• Fraud consists of some deceitful practice or willful device, resorted to with intent to deprive
another of his right, or in some manner to do him an injury. As distinguished from negligence, it is
always positive, intentional.
• Indian Company’s Act
• Explains fraud as: “fraud” in relation to affairs of a company or any body corporate and includes:
any act, omission, concealment of any fact or abuse of position committed by any person or any
other person with the connivance in any manner, with intent to deceive to gain undue advantage
from or to injure the interests of, the company or its shareholders or its creditors or any other
person, whether or not there is any wrongful gain or wrongful loss.”
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Five Reasons -Why People commit Fraud
F – Fun
R – Revenge (an Eye for an Eye)
A – Anger (Taking it out on society)
U – Unethical Behaviour- (bad person)
D – Destiny ( Born for the profession )
1. Employees commit 42% of Frauds and take 12 median months to detect
2. Managers 36% and take 18 median months to detect
3. Owners 19% and take 24 median months to detect
The ACFE report to the nations provides an interesting sidelight is that the older the fraudster the higher the
fraud-Fraudster> 60 Value=.5 million USD
Fraudsters don’t come with a label
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Use of Flags in Fraud Prevention
Behaviour and Incidents
Trends or Outlier triggers suspicion/prevention
• Earnings downturn
• Flashy Lifestyle or change in spend patterns
Unusual Activities with a possible normal explanation
• Credit Card transactions with abnormal value or from a different location
• Sudden change in behaviour
Too Good to be true
• Unusually High Growth
• Lack of anything unusual
6
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Industry Wise Fraud Vulnerability
Industry No. Of Cases % of Cases Median Loss (USD)
Banking & Financials 244 17.8% 200,000
Government and Public Admin 141 10.3 % 64,000
Manufacturing 116 8.5% 250,000
Health Care 100 7.3% 175,000
Oil And Gas 49 3.6% 450,000
Transportation & Warehousing 48 3.5% 202,000
Construction 43 3.1% 245,000
Technology 39 2.9% 250,000
Wholesale Trade 31 2.3% 375,000
Real Estate 24 1.8% 555,000
Mining 13 1.0% 900,000
Source: ACFE Report to the Nations on Organizational Fraud-2014
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Fraudsters and their Gullible Targets
Victims, Accomplices and Fraudsters have similar characteristics

1. Looking Lost and in need of help
2. Overconfident and Arrogant
3. Life and routine are structured and predictable
4. Eagerness to make a quick buck
5. Flamboyant Lifestyle and known
Vices/Weaknesses
6. In positions of power or in financial crisis
7. Disgruntled employees/those with personal
problems
8. Dreamers who seek to escape reality
9. Aggressive style which spawns enemies
10. Financial Crisis
11. Available of personal information
1. Credit Card spend trends
2. Cab Booking
3. Social Media-Status , Updates & Blogs
4. Travel Sites
5. Casual Conversation- Social Engineering
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
“Fraud Periods”
What to do when Vulnerability and Risk Increase
1. Disaster and Crisis Situations
2. Long week ends-Christmas/Diwali
3. New Government Schemes- Free Laptops/TVs
4. Charity and Religious Funds with little regulatory
control and where sources are not known
5. Corporate Pressure Situations
1. Shareholder pressure
2. Earnings pressure
3. Time to market pressure
4. Timeline pressure
5. Peer pressure- No Promotions
6. Change of key legislation and tax/duty rate
structures
7. Knowledge of Valuable proprietary, trademark
information prior to registration of
copyright/trademark or patent
8. Election Time
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Preventive Controls
Recruitment/Vendor Selection
Background Check
Education/Criminality/Employment/ Drugs/Health
Compensation to be Comparable with Industry norms
In line with authority and responsibility
Continuous Training and Performance Monitoring
Counselling and clearly defined processes and policies
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Preventive Controls
System and Application Access
Physical Security
CCTV
Access Control Card
Hardware USB Access
Network Access
Application Access
System Logs
Network Logs
Printer Logs
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Keys to
Fraud Prevention
• Understand the information you have
• Logs of access both systems and applications
• Physical access logs
• Transactional records and audit trails
• Data which can be used to discover trends
• Analytical and Monitoring Tools
• Mobile Records and CCTV Footage
• Behavioral and Cultural Patterns
• Interview Techniques
• Forensic Data and Tools for data extraction
• Types of data
• Relational databases
• XML
• Meta Data
• Big Data- Images, Videos
• Case studies
• Past experiences and learnings
• Self
• Organizational
• Know what is to be used, where and in what context
Phone: +91-9029026718
Email : info@saileshcousik.co.in
THANK YOU
FOR WATCHING
ANY
QUESTIONS ?
Monday, 17 July 2017 13

More Related Content

Similar to Preventing fraud Lesson-I

2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...Ron Steinkamp
 
Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6Accounting_Whitepapers
 
Public Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIAPublic Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIARon Steinkamp
 
Public Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGAPublic Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGARon Steinkamp
 
ACC-IIA Singapore Seminar 2015 Part 4 Prevention and Detection
ACC-IIA Singapore Seminar 2015 Part 4 Prevention and DetectionACC-IIA Singapore Seminar 2015 Part 4 Prevention and Detection
ACC-IIA Singapore Seminar 2015 Part 4 Prevention and DetectionBillyCheuk
 
Internal Control and Fraud Prevention
Internal Control and Fraud PreventionInternal Control and Fraud Prevention
Internal Control and Fraud PreventionTommy Seah
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response PlanNext Dimension Inc.
 
Financial Statement Fraud training by Tommy SEAH
Financial Statement Fraud training by Tommy SEAHFinancial Statement Fraud training by Tommy SEAH
Financial Statement Fraud training by Tommy SEAHTommy Seah
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abusesharing notes123
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseSharing Slides Training
 
AML Meets ABC Webinar Deck 2-19-14
AML Meets ABC Webinar Deck 2-19-14AML Meets ABC Webinar Deck 2-19-14
AML Meets ABC Webinar Deck 2-19-14ACFCS
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and ReportingBrown Smith Wallace
 

Similar to Preventing fraud Lesson-I (20)

2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
 
Ocupacional Fraud.pptx
Ocupacional Fraud.pptxOcupacional Fraud.pptx
Ocupacional Fraud.pptx
 
Michael Herndon - 2014 Symposium on Financial Education in Korea
Michael Herndon - 2014 Symposium on Financial Education in KoreaMichael Herndon - 2014 Symposium on Financial Education in Korea
Michael Herndon - 2014 Symposium on Financial Education in Korea
 
Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6
 
Public Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIAPublic Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIA
 
Public Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGAPublic Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGA
 
Risk in the changing world – Opportunity or threat
Risk in the changing world – Opportunity or threatRisk in the changing world – Opportunity or threat
Risk in the changing world – Opportunity or threat
 
ACC-IIA Singapore Seminar 2015 Part 4 Prevention and Detection
ACC-IIA Singapore Seminar 2015 Part 4 Prevention and DetectionACC-IIA Singapore Seminar 2015 Part 4 Prevention and Detection
ACC-IIA Singapore Seminar 2015 Part 4 Prevention and Detection
 
Internal Control and Fraud Prevention
Internal Control and Fraud PreventionInternal Control and Fraud Prevention
Internal Control and Fraud Prevention
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
Whistle blowing
Whistle blowingWhistle blowing
Whistle blowing
 
Financial Statement Fraud training by Tommy SEAH
Financial Statement Fraud training by Tommy SEAHFinancial Statement Fraud training by Tommy SEAH
Financial Statement Fraud training by Tommy SEAH
 
Summary presentation Highliths
Summary presentation HighlithsSummary presentation Highliths
Summary presentation Highliths
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 
It52015 slides
It52015 slidesIt52015 slides
It52015 slides
 
Kenya AMC Presentation 1
Kenya AMC Presentation 1Kenya AMC Presentation 1
Kenya AMC Presentation 1
 
AML Meets ABC Webinar Deck 2-19-14
AML Meets ABC Webinar Deck 2-19-14AML Meets ABC Webinar Deck 2-19-14
AML Meets ABC Webinar Deck 2-19-14
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting
 

Recently uploaded

Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?Watsoo Telematics
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 

Recently uploaded (20)

Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 

Preventing fraud Lesson-I

  • 1. Preventing Fraud-Lesson I CA Sailesh Cousik The Need of the Hour Identifying Potential Threats Fraudster Profiles Fraudster Motivators Vulnerabilities by Industry Plugging controls Creating Awareness
  • 2. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Agenda • Keys to Fraud Prevention • What is Fraud and understanding a Fraudster • Concept of Red Flags and Green Flags- • Understand Fraud Vulnerabilities • Preventive Controls • People • Information Assets and Processes • Case Study • Organizational Risk and Governance • Reporting and Continuous Monitoring and Reassessment
  • 3. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization “QUALITY IN A SERVICE OR PRODUCT IS NOT WHAT YOU PUT INTO IT. IT IS WHAT THE CLIENT OR CUSTOMER GETS OUT OF IT.” - PETER DRUCKER QUALITY MEANS DOING IT RIGHT WHEN NOBODY IS LOOKING HENRY FORD
  • 4. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization What is Fraud• Black’s Law Dictionary • Fraud consists of some deceitful practice or willful device, resorted to with intent to deprive another of his right, or in some manner to do him an injury. As distinguished from negligence, it is always positive, intentional. • Indian Company’s Act • Explains fraud as: “fraud” in relation to affairs of a company or any body corporate and includes: any act, omission, concealment of any fact or abuse of position committed by any person or any other person with the connivance in any manner, with intent to deceive to gain undue advantage from or to injure the interests of, the company or its shareholders or its creditors or any other person, whether or not there is any wrongful gain or wrongful loss.”
  • 5. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Five Reasons -Why People commit Fraud F – Fun R – Revenge (an Eye for an Eye) A – Anger (Taking it out on society) U – Unethical Behaviour- (bad person) D – Destiny ( Born for the profession ) 1. Employees commit 42% of Frauds and take 12 median months to detect 2. Managers 36% and take 18 median months to detect 3. Owners 19% and take 24 median months to detect The ACFE report to the nations provides an interesting sidelight is that the older the fraudster the higher the fraud-Fraudster> 60 Value=.5 million USD Fraudsters don’t come with a label
  • 6. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Use of Flags in Fraud Prevention Behaviour and Incidents Trends or Outlier triggers suspicion/prevention • Earnings downturn • Flashy Lifestyle or change in spend patterns Unusual Activities with a possible normal explanation • Credit Card transactions with abnormal value or from a different location • Sudden change in behaviour Too Good to be true • Unusually High Growth • Lack of anything unusual 6
  • 7. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Industry Wise Fraud Vulnerability Industry No. Of Cases % of Cases Median Loss (USD) Banking & Financials 244 17.8% 200,000 Government and Public Admin 141 10.3 % 64,000 Manufacturing 116 8.5% 250,000 Health Care 100 7.3% 175,000 Oil And Gas 49 3.6% 450,000 Transportation & Warehousing 48 3.5% 202,000 Construction 43 3.1% 245,000 Technology 39 2.9% 250,000 Wholesale Trade 31 2.3% 375,000 Real Estate 24 1.8% 555,000 Mining 13 1.0% 900,000 Source: ACFE Report to the Nations on Organizational Fraud-2014
  • 8. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Fraudsters and their Gullible Targets Victims, Accomplices and Fraudsters have similar characteristics  1. Looking Lost and in need of help 2. Overconfident and Arrogant 3. Life and routine are structured and predictable 4. Eagerness to make a quick buck 5. Flamboyant Lifestyle and known Vices/Weaknesses 6. In positions of power or in financial crisis 7. Disgruntled employees/those with personal problems 8. Dreamers who seek to escape reality 9. Aggressive style which spawns enemies 10. Financial Crisis 11. Available of personal information 1. Credit Card spend trends 2. Cab Booking 3. Social Media-Status , Updates & Blogs 4. Travel Sites 5. Casual Conversation- Social Engineering
  • 9. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization “Fraud Periods” What to do when Vulnerability and Risk Increase 1. Disaster and Crisis Situations 2. Long week ends-Christmas/Diwali 3. New Government Schemes- Free Laptops/TVs 4. Charity and Religious Funds with little regulatory control and where sources are not known 5. Corporate Pressure Situations 1. Shareholder pressure 2. Earnings pressure 3. Time to market pressure 4. Timeline pressure 5. Peer pressure- No Promotions 6. Change of key legislation and tax/duty rate structures 7. Knowledge of Valuable proprietary, trademark information prior to registration of copyright/trademark or patent 8. Election Time
  • 10. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Preventive Controls Recruitment/Vendor Selection Background Check Education/Criminality/Employment/ Drugs/Health Compensation to be Comparable with Industry norms In line with authority and responsibility Continuous Training and Performance Monitoring Counselling and clearly defined processes and policies
  • 11. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Preventive Controls System and Application Access Physical Security CCTV Access Control Card Hardware USB Access Network Access Application Access System Logs Network Logs Printer Logs
  • 12. Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Keys to Fraud Prevention • Understand the information you have • Logs of access both systems and applications • Physical access logs • Transactional records and audit trails • Data which can be used to discover trends • Analytical and Monitoring Tools • Mobile Records and CCTV Footage • Behavioral and Cultural Patterns • Interview Techniques • Forensic Data and Tools for data extraction • Types of data • Relational databases • XML • Meta Data • Big Data- Images, Videos • Case studies • Past experiences and learnings • Self • Organizational • Know what is to be used, where and in what context
  • 13. Phone: +91-9029026718 Email : info@saileshcousik.co.in THANK YOU FOR WATCHING ANY QUESTIONS ? Monday, 17 July 2017 13