SlideShare a Scribd company logo
1 of 27
Download to read offline
Uncovering Fraud in Key
Financial Accounts using
Data Analysis
November 12, 2013

Special Guest Presenter:
Don Sparks, CIA, CISA, CRMA
Vice President, Audimation Services Inc
Partner with CaseWare IDEA

Copyright © 2013 FraudResourceNet™ LLC

About Peter Goldmann, MSc., CFE
 President and Founder of White
Collar Crime 101
Publisher of White-Collar Crime
Fighter
Developer of FraudAware® AntiFraud Training Monthly Columnist,
The Fraud Examiner,
ACFE Newsletter
 Member of Editorial Advisory Board,
ACFE
 Author of “Fraud in the Markets”
Explains how fraud fueled the financial
crisis.
Copyright © 2013 FraudResourceNet™ LLC
About Jim Kaplan, MSc, CIA,
CFE
President and Founder of
AuditNet®, the global resource
for auditors (now available on
Apple and Android devices)
Auditor, Web Site Guru,
Internet for Auditors Pioneer
Recipient of the IIA’s 2007
Bradford Cadmus Memorial
Award.
Author of “The Auditor’s Guide
to Internet Resources” 2nd
Edition

Copyright © 2013 FraudResourceNet™ LLC

CIA, CISA, CRMA, ARM
 Vice President Industry Relations 




Don Sparks




Audimation Services, Inc.
24-years property/casualty insurance
internal audit experience (12 as CAE)
ISACA Central Florida Board
NAIC IT Working Papers Committee
6-years The IIA – eLearning: GAIN,
Flash Surveys, & Role of Audit in SOX
2002 monthly 2 hour web broadcasts
Co-Author of GTAG 13 & GTAG 16
June 2011, Creator & Programmer
Auditchannel.tv

Copyright © 2013 FraudResourceNet™ LLC
Webinar Housekeeping


This webinar and its material are the property of AuditNet® and FraudAware®.
Unauthorized usage or recording of this webinar or any of its material is strictly
forbidden. We will be recording the webinar and you will be provided access to that
recording within 5 business days after the webinar. Downloading or otherwise
duplicating the webinar recording is expressly prohibited.



Webinar will be recorded and will be made available as soon as possible.



Please complete the evaluation to help us continuously improve our Webinars.



You must answer the polling questions to qualify for CPE per NASBA.



Submit questions via the chat box on your screen and we will answer them either
during or at the conclusion.



If GTW stops working you may need to close and restart. You can always dial in
and listen and follow along with the handout.

Copyright © 2013 FraudResourceNet™ LLC

Disclaimers


The views expressed by the presenters do not necessarily
represent the views, positions, or opinions of FraudResourceNet
LLC (FRN) or the presenters’ respective organizations. These
materials, and the oral presentation accompanying them, are for
educational purposes only and do not constitute accounting or legal
advice or create an accountant-client relationship.
While FRN makes every effort to ensure information is accurate and
complete, FRN makes no representations, guarantees, or
warranties as to the accuracy or completeness of the information
provided via this presentation. FRN specifically disclaims all liability
for any claims or damages that may result from the information
contained in this presentation, including any websites maintained by
third parties and linked to the FRN website. Any mention of
commercial products is for information only; it does not imply
recommendation or endorsement by FraudResourceNet LLC.

Copyright © 2013 FraudResourceNet™ LLC

5
Today’s Agenda
 The auditor’s role in detecting and preventing fraud
 Drilling into financial & operational data to look for 
red flags of fraud [procurement/AR/disbursements/ 
operations/inventory/etc.]
 Which business processes/procedures lend 
themselves best to data analysis for fraud 
 Preparing for a transaction‐level data analysis test
 Gathering the data you need to do a fraud analysis
 How to reduce false positives 

Copyright © 2013 FraudResourceNet™ LLC

The Auditor’s Role

 IPPF Standard 1210.A3
 Internal auditors must have
sufficient knowledge of…available
technology based audit techniques
to perform their assigned work

Copyright © 2013 FraudResourceNet™ LLC
IIA Guidance – GTAG 13
Internal auditors require appropriate
skills and should use available
technological tools to help them
maintain a successful fraud
management program that covers
prevention, detection, and
investigation. As such, all audit
professionals — not just IT audit
specialists — are expected to be
increasingly proficient in areas such as
data analysis and the use of
technology to help them meet the
demands of the job.

Copyright © 2013 FraudResourceNet™ LLC

Professional Guidance

Copyright © 2013 FraudResourceNet™ LLC
Do Patterns in Data Mean
Anything
Statistics students are asked to 
perform a simple task.  Create a 
matrix of heads and tails by 
recording the results of 200 coin 
flips.  The professor reviews the 
results and easily identifies the 
students that just made up the 
results without flipping a coin.  
How did he know?

Copyright © 2013 FraudResourceNet™ LLC

Expectations
 Are you LOOKING for fraud?
 Never going to eliminate Fraud
 Hope it never happens is ok, but a prudent auditor will
plan for being involved in fraud issues:
 Awareness of Red Flags (IPPF)
 Consider professional CAATTs (IPPF)
 Continuously improve internal control’s
 Develop work a-rounds for false positives
 COSO provides an excellent framework

Copyright © 2013 FraudResourceNet™ LLC
Largest Fraud
You can read about the biggest fraud I detected as an
internal auditor in the June 2012 Internal Auditor
magazine. There were no tips or red flags and I had
worked at this company for 10 years. The fraud scheme
was simple, saving credit balances on canceled insurance
accounts in accounts receivable, an area I assumed the
external auditors covered thoroughly.

Copyright © 2013 FraudResourceNet™ LLC

Polling Question 1
Most auditors will never detect fraud
in the organization of employment
in their lifetime:
A. True
B. False

Copyright © 2013 FraudResourceNet™ LLC
ACFE 2012 Report
Occupational Fraud and Abuse:
 Compiled from 1,388 cases
 From Jan. 2010 - Dec. 2011
 By CFEs investigating those cases
 Cases from 94 nations

“most striking about the data
gathered is how consistent the
patterns of fraud are around the
globe and over time”

Copyright © 2013 FraudResourceNet™ LLC

Proactive Anti‐Fraud Program

Copyright © 2013 FraudResourceNet™ LLC
Creating a Continuous 
Auditing Application

Source: July 2011 ISACA

Copyright © 2013 FraudResourceNet™ LLC

Why Internal Auditing Matters

Copyright © 2013 FraudResourceNet™ LLC
Audit Life Cycle

Copyright © 2013 FraudResourceNet™ LLC

Start with the Audit Program

No two audits are alike; customize to fit the
audit objective and the client
Audit
Test
Activity

Occurance/
existance

Accuracy/
valuation

Completeness

Inspection
Observation
Reconciliation
Data Analysis
Interview
Tracing
Vouching
Copyright © 2013 FraudResourceNet™ LLC

Cutoff

Classify

Disclosure
Polling Question 2
In the ISACA white paper titled Data Analytics –
A Practical Approach which of the following
phases is not included in the maturity model?
1. Ad Hoc Analysis
2. Data Cleansing
3. Repeatable
4. Consistent
5. Continuous Auditing

Copyright © 2013 FraudResourceNet™ LLC

Data Analysis Process

Copyright © 2013 FraudResourceNet™ LLC
Data Analysis Top Challenges

CFO 2012

Copyright © 2013 FraudResourceNet™ LLC

Governance – Data Access

Copyright © 2013 FraudResourceNet™ LLC
Rules for Auditors to Follow







Work on a COPY of Clients data
Document all actions taken with data
Audit tests repeatable with same results
Do not make changes to client data
Maintain custody & security of data
Properly store and destroy data

Copyright © 2013 FraudResourceNet™ LLC

What is a “Red Flag”

Understanding symptoms of fraud is
the key to detecting fraud. A symptom
of fraud may be defined as a condition
which is directly attributable to
dishonest or fraudulent activity. It may
result from the fraud itself or from the
attempt to conceal the fraud.

Internal Auditor – June 2012

Copyright © 2013 FraudResourceNet™ LLC
Polling Question 3
The most common means of detecting fraud
according to the 2012 ACFE Report to the
Nations is:
A.
B.
C.
D.
E.

Internal Auditors
External Auditors
By accident
Notified by police
Tips

Copyright © 2013 FraudResourceNet™ LLC

Where to Look

Read the local
newspaper, trade
magazines, web blogs,
etc. Could it happen
here?

Copyright © 2013 FraudResourceNet™ LLC
Where to Look – “Tips”

Is your “door” open?

ACFE RTTN

“Squirrel” File Notebook

Copyright © 2013 FraudResourceNet™ LLC

Where to Look

ACFE RTTN

Copyright © 2013 FraudResourceNet™ LLC
Where to Look

ACFE RTTN

Copyright © 2013 FraudResourceNet™ LLC

Understand what Fraud looks
like in your organization

ACFE RTTN

Copyright © 2013 FraudResourceNet™ LLC
Obvious Signals – Red Flags
 Transactions that are odd as to:
 Time of day, week, month, year, or season

 Frequency (many, few), Places (far, near, or "Far
out"), Amount (high, low, consistent, alike, different),
Parties or personalities (related parties, oddball
personalities, strange and estranged relationships,
management performing clerical functions)
 Internal controls that are not enforced or too often
compromised by higher authorities

Copyright © 2013 FraudResourceNet™ LLC

Request - Use Existing Tools

Copyright © 2013 FraudResourceNet™ LLC
Indicate Appropriate System(s)

Copyright © 2013 FraudResourceNet™ LLC

Complete Form

Copyright © 2013 FraudResourceNet™ LLC
Data Reconciliation Principles
Once the data has been obtained it must be read into your
data analysis tool. Before commencing testing, it is
important the data is reconciled back to the "client’s"
system. Potential errors are:
 Requesting the wrong data
 Being supplied with the wrong data (and/or wrong
time)
 Errors on the extraction of data from the host system
 Problems when transferring the data to PC or media
 Errors when importing the data, etc.

Copyright © 2013 FraudResourceNet™ LLC

Reducing False Positives
Balancing act – how to be surgical and precise, not a rip-saw
1. Better tuning - Test results to determine the cause and
develop an exclusion list of most common false alerts
2. Proactive defense - Prioritize the results to eliminate
many false positives (newest date, low dollar amount)
3. Involve the business - The business people may know,
carefully involve what they already know in the process

Copyright © 2013 FraudResourceNet™ LLC
Journal Entry Tests






Nonbalancing JE
Missing JE’s
Unusually large line item entries
JE posted on a specific date, time, or
week day

Copyright © 2013 FraudResourceNet™ LLC

Polling Question 4
Which one of the following is not a critical task as
defined by the IIA Red Book?
1. Achievement of the organization’s strategic objectives
2. Reliability & integrity of financial & operational information
3. Effectiveness & efficiency of operations & programs
4. Fraud Prevention and Detection
5. Compliance with laws, regulations, policies, procedures

Copyright © 2013 FraudResourceNet™ LLC
Additional JE Tests











JE by user id
Summary by account contributions
JE with rounded amounts
JE with amounts that end in 999
JE with specific comments
Summary by account number
JE by posted period and Journal Source
JE by period
Account balances by Journal Source
Account balances by period

Copyright © 2013 FraudResourceNet™ LLC

Accounts Receivable Tests

 Customers Exceeding
Credit Limit
 Aging of open receivables
 Unresolved Credit
Balances

Copyright © 2013 FraudResourceNet™ LLC
Additional AR Tests
 Debtors transaction summary
 Transactions around a certain date
 Duplicate Field Search

Copyright © 2013 FraudResourceNet™ LLC

Accounts Payable Tests








Duplicate Detection
Aging Function
Determine the pay date from set up date
Employees in Vendor Master File
Travel and Entertainment
False entries in AP

Copyright © 2013 FraudResourceNet™ LLC
Additional AP Tests
 Recurring identical amounts from the same vendor.
 Unusual even dollar or high cash disbursement
amounts for routine odd dollar or low value purchase.
 Multiple remittance addresses for the same vendor.
 Vendor addresses not the same as vendor approval
application.
 Sequential invoice numbers from the same vendor or
invoice numbers with an alpha suffix.
 Payments to vendor have increased dramatically for
no apparent reason.
 Invoices without purchase order numbers
 Transactions with rounded amounts
Copyright © 2013 FraudResourceNet™ LLC

Accounts Payable - SOD
 Processing of invoice and updates to vendor master
files
 Check preparation and posting to vendor account
 Check preparation and mailing of signed checks
 No proper documentation of additions, changes, or
deletions to vendor master file
 Excessive credit adjustments to a particular vendor
and/or credit issued by unauthorized department
(credits involving quantities and price)
 Systematic pattern of adjustments for goods returned

Copyright © 2013 FraudResourceNet™ LLC
Inventory Tests

 Re-computation of Cost of Items
 Isolating Large Inventory Items
 Searching for Zero or Negative Unit
Costs

Copyright © 2013 FraudResourceNet™ LLC

Additional Tests Inventory









Aging by receipt date and ending inventory balance
Aging by receipt date and unit cost
Calculate inventory turnover ratio
Inventory location summary
Inventory received around specified dates
Last sales price lower than unit cost
Compare sales price with unit cost
Duplicate field search

Copyright © 2013 FraudResourceNet™ LLC
Polling Question 5
Which of the following could be a red flag of fraud during journal
entry testing?
(Either a dishonest act or fraud activity and/or concealment)
1. Numerous Non-balancing JE’s
2. Missing JE’s
3. Unusually large line item entries posted near the end of a
period
5. All of the above

Copyright © 2013 FraudResourceNet™ LLC

Expand Your Reach

You do not need to be a programmer or an
expert IT Auditor to make a simple script
from work already completed:
 Repeatable
 Continuous

Copyright © 2013 FraudResourceNet™ LLC
Conclusion – Some Advice
1. The data is good
2. The analysis is correct
3. The necessary data is readily available
4. The data speaks for itself
5. Management will terminate the offender
6. Only the perpetrator knew about the scam
7. Best practice at one company will work for all
8. One “tool” will work in all situations
9. Fraud can’t happen in your company
10. Know tools, competencies, company, industry!

Copyright © 2013 FraudResourceNet™ LLC

Questions?
 Any Questions?
Don’t be Shy!

Copyright © 2013 FraudResourceNet™ LLC
Thank You!
Website: http://www.fraudresourcenet.com
Jim Kaplan
FraudResourceNet™
800-385-1625
jkaplan@fraudresourcenet.com
Peter Goldmann
FraudResourceNet™
800-440-2261
pgoldmann@fraudresourcenet.com
Don Sparks
dons@audimation.com
832-327-1877

Copyright © 2013 FraudResourceNet™ LLC

Coming Up This Month
 Fraud Risks Associated with
Management Override of Controls
November 14 1:00 PM
 Using Data Analytics to Detect and
Prevent Corporate and P-Card Fraud
November 20 11:00 AM
 To register and pay go to
http://bit.ly/151WI1s

Copyright © 2013 FraudResourceNet™ LLC

More Related Content

What's hot

Research Report - Are You Equipped to Successfully Combat Fraud
Research Report - Are You Equipped to Successfully Combat FraudResearch Report - Are You Equipped to Successfully Combat Fraud
Research Report - Are You Equipped to Successfully Combat FraudDavid Hartley
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
 
ROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus ResearchROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus ResearchLaurent Pacalin
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secureMeg Weber
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Strategic Treasurer
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Jeremiah Grossman
 
2014 State of Backup for SMBs
2014 State of Backup for SMBs2014 State of Backup for SMBs
2014 State of Backup for SMBsCarbonite
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4Meg Weber
 
No More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesNo More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesJeremiah Grossman
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisFraudBusters
 
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance SectorThe Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance SectorAccenture Insurance
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?Hitachi ID Systems, Inc.
 
Ponemon 2015 EMEA Cyber Impact Report
Ponemon 2015 EMEA Cyber Impact Report Ponemon 2015 EMEA Cyber Impact Report
Ponemon 2015 EMEA Cyber Impact Report Graeme Cross
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...Raj Goel
 
Preventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach worldPreventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach worldLaurent Pacalin
 
The State of Corporate Fraud, Survey 2018
The State of Corporate Fraud, Survey 2018The State of Corporate Fraud, Survey 2018
The State of Corporate Fraud, Survey 2018aakash malhotra
 

What's hot (20)

Research Report - Are You Equipped to Successfully Combat Fraud
Research Report - Are You Equipped to Successfully Combat FraudResearch Report - Are You Equipped to Successfully Combat Fraud
Research Report - Are You Equipped to Successfully Combat Fraud
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
ROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus ResearchROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus Research
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
 
2014 State of Backup for SMBs
2014 State of Backup for SMBs2014 State of Backup for SMBs
2014 State of Backup for SMBs
 
W verb68
W verb68W verb68
W verb68
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4
 
No More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesNo More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security Guarantees
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data Analysis
 
Insurance Fraud Whitepaper
Insurance Fraud WhitepaperInsurance Fraud Whitepaper
Insurance Fraud Whitepaper
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance SectorThe Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
Ponemon 2015 EMEA Cyber Impact Report
Ponemon 2015 EMEA Cyber Impact Report Ponemon 2015 EMEA Cyber Impact Report
Ponemon 2015 EMEA Cyber Impact Report
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
 
Preventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach worldPreventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach world
 
The State of Corporate Fraud, Survey 2018
The State of Corporate Fraud, Survey 2018The State of Corporate Fraud, Survey 2018
The State of Corporate Fraud, Survey 2018
 

Similar to Uncovering Fraud in Key Financial Accounts using Data Analysis

Benford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataBenford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataFraudBusters
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditFraudBusters
 
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudUsing Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudFraudBusters
 
Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsFraudBusters
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraudBusters
 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughFraudBusters
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsFraudBusters
 
Bribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to KnowBribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to KnowFraudBusters
 
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial IntegrityFraudBusters
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisFraudBusters
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisFraudBusters
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudFraudBusters
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsFraudBusters
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsFraudBusters
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramFraudBusters
 
Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning EssentialsFraudBusters
 
DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014- Mark - Fullbright
 
Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics FraudBusters
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudFraudBusters
 

Similar to Uncovering Fraud in Key Financial Accounts using Data Analysis (20)

Benford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataBenford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial Data
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudUsing Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
 
Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data Analytics
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
 
Bribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to KnowBribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to Know
 
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red Flags
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
 
Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning Essentials
 
DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014
 
Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay Fraud
 

More from FraudBusters

Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterFraudBusters
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsFraudBusters
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud DetectionFraudBusters
 
Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFraudBusters
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudFraudBusters
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudFraudBusters
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best PracticesFraudBusters
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsFraudBusters
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraudBusters
 
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudBusters
 

More from FraudBusters (10)

Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a Fraudster
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data Analytics
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud Detection
 
Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit Software
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding Fraud
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best Practices
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your Audits
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
 
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
 

Recently uploaded

AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...yordanosyohannes2
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdfAdnet Communications
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Commonwealth
 
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...Suhani Kapoor
 
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130Suhani Kapoor
 
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service AizawlVip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawlmakika9823
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companiesprashantbhati354
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHenry Tapper
 
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...makika9823
 
Chapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th editionChapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th editionMuhammadHusnain82237
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignHenry Tapper
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarHarsh Kumar
 
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxOAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxhiddenlevers
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfHenry Tapper
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...Henry Tapper
 
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
 
🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]
 
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
 
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130
 
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service AizawlVip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companies
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview document
 
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
 
Chapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th editionChapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th edition
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaign
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh Kumar
 
Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024
 
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxOAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
 
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

Uncovering Fraud in Key Financial Accounts using Data Analysis

  • 1. Uncovering Fraud in Key Financial Accounts using Data Analysis November 12, 2013 Special Guest Presenter: Don Sparks, CIA, CISA, CRMA Vice President, Audimation Services Inc Partner with CaseWare IDEA Copyright © 2013 FraudResourceNet™ LLC About Peter Goldmann, MSc., CFE  President and Founder of White Collar Crime 101 Publisher of White-Collar Crime Fighter Developer of FraudAware® AntiFraud Training Monthly Columnist, The Fraud Examiner, ACFE Newsletter  Member of Editorial Advisory Board, ACFE  Author of “Fraud in the Markets” Explains how fraud fueled the financial crisis. Copyright © 2013 FraudResourceNet™ LLC
  • 2. About Jim Kaplan, MSc, CIA, CFE President and Founder of AuditNet®, the global resource for auditors (now available on Apple and Android devices) Auditor, Web Site Guru, Internet for Auditors Pioneer Recipient of the IIA’s 2007 Bradford Cadmus Memorial Award. Author of “The Auditor’s Guide to Internet Resources” 2nd Edition Copyright © 2013 FraudResourceNet™ LLC CIA, CISA, CRMA, ARM  Vice President Industry Relations     Don Sparks   Audimation Services, Inc. 24-years property/casualty insurance internal audit experience (12 as CAE) ISACA Central Florida Board NAIC IT Working Papers Committee 6-years The IIA – eLearning: GAIN, Flash Surveys, & Role of Audit in SOX 2002 monthly 2 hour web broadcasts Co-Author of GTAG 13 & GTAG 16 June 2011, Creator & Programmer Auditchannel.tv Copyright © 2013 FraudResourceNet™ LLC
  • 3. Webinar Housekeeping  This webinar and its material are the property of AuditNet® and FraudAware®. Unauthorized usage or recording of this webinar or any of its material is strictly forbidden. We will be recording the webinar and you will be provided access to that recording within 5 business days after the webinar. Downloading or otherwise duplicating the webinar recording is expressly prohibited.  Webinar will be recorded and will be made available as soon as possible.  Please complete the evaluation to help us continuously improve our Webinars.  You must answer the polling questions to qualify for CPE per NASBA.  Submit questions via the chat box on your screen and we will answer them either during or at the conclusion.  If GTW stops working you may need to close and restart. You can always dial in and listen and follow along with the handout. Copyright © 2013 FraudResourceNet™ LLC Disclaimers  The views expressed by the presenters do not necessarily represent the views, positions, or opinions of FraudResourceNet LLC (FRN) or the presenters’ respective organizations. These materials, and the oral presentation accompanying them, are for educational purposes only and do not constitute accounting or legal advice or create an accountant-client relationship. While FRN makes every effort to ensure information is accurate and complete, FRN makes no representations, guarantees, or warranties as to the accuracy or completeness of the information provided via this presentation. FRN specifically disclaims all liability for any claims or damages that may result from the information contained in this presentation, including any websites maintained by third parties and linked to the FRN website. Any mention of commercial products is for information only; it does not imply recommendation or endorsement by FraudResourceNet LLC. Copyright © 2013 FraudResourceNet™ LLC 5
  • 4. Today’s Agenda  The auditor’s role in detecting and preventing fraud  Drilling into financial & operational data to look for  red flags of fraud [procurement/AR/disbursements/  operations/inventory/etc.]  Which business processes/procedures lend  themselves best to data analysis for fraud   Preparing for a transaction‐level data analysis test  Gathering the data you need to do a fraud analysis  How to reduce false positives  Copyright © 2013 FraudResourceNet™ LLC The Auditor’s Role  IPPF Standard 1210.A3  Internal auditors must have sufficient knowledge of…available technology based audit techniques to perform their assigned work Copyright © 2013 FraudResourceNet™ LLC
  • 5. IIA Guidance – GTAG 13 Internal auditors require appropriate skills and should use available technological tools to help them maintain a successful fraud management program that covers prevention, detection, and investigation. As such, all audit professionals — not just IT audit specialists — are expected to be increasingly proficient in areas such as data analysis and the use of technology to help them meet the demands of the job. Copyright © 2013 FraudResourceNet™ LLC Professional Guidance Copyright © 2013 FraudResourceNet™ LLC
  • 6. Do Patterns in Data Mean Anything Statistics students are asked to  perform a simple task.  Create a  matrix of heads and tails by  recording the results of 200 coin  flips.  The professor reviews the  results and easily identifies the  students that just made up the  results without flipping a coin.   How did he know? Copyright © 2013 FraudResourceNet™ LLC Expectations  Are you LOOKING for fraud?  Never going to eliminate Fraud  Hope it never happens is ok, but a prudent auditor will plan for being involved in fraud issues:  Awareness of Red Flags (IPPF)  Consider professional CAATTs (IPPF)  Continuously improve internal control’s  Develop work a-rounds for false positives  COSO provides an excellent framework Copyright © 2013 FraudResourceNet™ LLC
  • 7. Largest Fraud You can read about the biggest fraud I detected as an internal auditor in the June 2012 Internal Auditor magazine. There were no tips or red flags and I had worked at this company for 10 years. The fraud scheme was simple, saving credit balances on canceled insurance accounts in accounts receivable, an area I assumed the external auditors covered thoroughly. Copyright © 2013 FraudResourceNet™ LLC Polling Question 1 Most auditors will never detect fraud in the organization of employment in their lifetime: A. True B. False Copyright © 2013 FraudResourceNet™ LLC
  • 8. ACFE 2012 Report Occupational Fraud and Abuse:  Compiled from 1,388 cases  From Jan. 2010 - Dec. 2011  By CFEs investigating those cases  Cases from 94 nations “most striking about the data gathered is how consistent the patterns of fraud are around the globe and over time” Copyright © 2013 FraudResourceNet™ LLC Proactive Anti‐Fraud Program Copyright © 2013 FraudResourceNet™ LLC
  • 9. Creating a Continuous  Auditing Application Source: July 2011 ISACA Copyright © 2013 FraudResourceNet™ LLC Why Internal Auditing Matters Copyright © 2013 FraudResourceNet™ LLC
  • 10. Audit Life Cycle Copyright © 2013 FraudResourceNet™ LLC Start with the Audit Program No two audits are alike; customize to fit the audit objective and the client Audit Test Activity Occurance/ existance Accuracy/ valuation Completeness Inspection Observation Reconciliation Data Analysis Interview Tracing Vouching Copyright © 2013 FraudResourceNet™ LLC Cutoff Classify Disclosure
  • 11. Polling Question 2 In the ISACA white paper titled Data Analytics – A Practical Approach which of the following phases is not included in the maturity model? 1. Ad Hoc Analysis 2. Data Cleansing 3. Repeatable 4. Consistent 5. Continuous Auditing Copyright © 2013 FraudResourceNet™ LLC Data Analysis Process Copyright © 2013 FraudResourceNet™ LLC
  • 12. Data Analysis Top Challenges CFO 2012 Copyright © 2013 FraudResourceNet™ LLC Governance – Data Access Copyright © 2013 FraudResourceNet™ LLC
  • 13. Rules for Auditors to Follow       Work on a COPY of Clients data Document all actions taken with data Audit tests repeatable with same results Do not make changes to client data Maintain custody & security of data Properly store and destroy data Copyright © 2013 FraudResourceNet™ LLC What is a “Red Flag” Understanding symptoms of fraud is the key to detecting fraud. A symptom of fraud may be defined as a condition which is directly attributable to dishonest or fraudulent activity. It may result from the fraud itself or from the attempt to conceal the fraud. Internal Auditor – June 2012 Copyright © 2013 FraudResourceNet™ LLC
  • 14. Polling Question 3 The most common means of detecting fraud according to the 2012 ACFE Report to the Nations is: A. B. C. D. E. Internal Auditors External Auditors By accident Notified by police Tips Copyright © 2013 FraudResourceNet™ LLC Where to Look Read the local newspaper, trade magazines, web blogs, etc. Could it happen here? Copyright © 2013 FraudResourceNet™ LLC
  • 15. Where to Look – “Tips” Is your “door” open? ACFE RTTN “Squirrel” File Notebook Copyright © 2013 FraudResourceNet™ LLC Where to Look ACFE RTTN Copyright © 2013 FraudResourceNet™ LLC
  • 16. Where to Look ACFE RTTN Copyright © 2013 FraudResourceNet™ LLC Understand what Fraud looks like in your organization ACFE RTTN Copyright © 2013 FraudResourceNet™ LLC
  • 17. Obvious Signals – Red Flags  Transactions that are odd as to:  Time of day, week, month, year, or season  Frequency (many, few), Places (far, near, or "Far out"), Amount (high, low, consistent, alike, different), Parties or personalities (related parties, oddball personalities, strange and estranged relationships, management performing clerical functions)  Internal controls that are not enforced or too often compromised by higher authorities Copyright © 2013 FraudResourceNet™ LLC Request - Use Existing Tools Copyright © 2013 FraudResourceNet™ LLC
  • 18. Indicate Appropriate System(s) Copyright © 2013 FraudResourceNet™ LLC Complete Form Copyright © 2013 FraudResourceNet™ LLC
  • 19. Data Reconciliation Principles Once the data has been obtained it must be read into your data analysis tool. Before commencing testing, it is important the data is reconciled back to the "client’s" system. Potential errors are:  Requesting the wrong data  Being supplied with the wrong data (and/or wrong time)  Errors on the extraction of data from the host system  Problems when transferring the data to PC or media  Errors when importing the data, etc. Copyright © 2013 FraudResourceNet™ LLC Reducing False Positives Balancing act – how to be surgical and precise, not a rip-saw 1. Better tuning - Test results to determine the cause and develop an exclusion list of most common false alerts 2. Proactive defense - Prioritize the results to eliminate many false positives (newest date, low dollar amount) 3. Involve the business - The business people may know, carefully involve what they already know in the process Copyright © 2013 FraudResourceNet™ LLC
  • 20. Journal Entry Tests     Nonbalancing JE Missing JE’s Unusually large line item entries JE posted on a specific date, time, or week day Copyright © 2013 FraudResourceNet™ LLC Polling Question 4 Which one of the following is not a critical task as defined by the IIA Red Book? 1. Achievement of the organization’s strategic objectives 2. Reliability & integrity of financial & operational information 3. Effectiveness & efficiency of operations & programs 4. Fraud Prevention and Detection 5. Compliance with laws, regulations, policies, procedures Copyright © 2013 FraudResourceNet™ LLC
  • 21. Additional JE Tests           JE by user id Summary by account contributions JE with rounded amounts JE with amounts that end in 999 JE with specific comments Summary by account number JE by posted period and Journal Source JE by period Account balances by Journal Source Account balances by period Copyright © 2013 FraudResourceNet™ LLC Accounts Receivable Tests  Customers Exceeding Credit Limit  Aging of open receivables  Unresolved Credit Balances Copyright © 2013 FraudResourceNet™ LLC
  • 22. Additional AR Tests  Debtors transaction summary  Transactions around a certain date  Duplicate Field Search Copyright © 2013 FraudResourceNet™ LLC Accounts Payable Tests       Duplicate Detection Aging Function Determine the pay date from set up date Employees in Vendor Master File Travel and Entertainment False entries in AP Copyright © 2013 FraudResourceNet™ LLC
  • 23. Additional AP Tests  Recurring identical amounts from the same vendor.  Unusual even dollar or high cash disbursement amounts for routine odd dollar or low value purchase.  Multiple remittance addresses for the same vendor.  Vendor addresses not the same as vendor approval application.  Sequential invoice numbers from the same vendor or invoice numbers with an alpha suffix.  Payments to vendor have increased dramatically for no apparent reason.  Invoices without purchase order numbers  Transactions with rounded amounts Copyright © 2013 FraudResourceNet™ LLC Accounts Payable - SOD  Processing of invoice and updates to vendor master files  Check preparation and posting to vendor account  Check preparation and mailing of signed checks  No proper documentation of additions, changes, or deletions to vendor master file  Excessive credit adjustments to a particular vendor and/or credit issued by unauthorized department (credits involving quantities and price)  Systematic pattern of adjustments for goods returned Copyright © 2013 FraudResourceNet™ LLC
  • 24. Inventory Tests  Re-computation of Cost of Items  Isolating Large Inventory Items  Searching for Zero or Negative Unit Costs Copyright © 2013 FraudResourceNet™ LLC Additional Tests Inventory         Aging by receipt date and ending inventory balance Aging by receipt date and unit cost Calculate inventory turnover ratio Inventory location summary Inventory received around specified dates Last sales price lower than unit cost Compare sales price with unit cost Duplicate field search Copyright © 2013 FraudResourceNet™ LLC
  • 25. Polling Question 5 Which of the following could be a red flag of fraud during journal entry testing? (Either a dishonest act or fraud activity and/or concealment) 1. Numerous Non-balancing JE’s 2. Missing JE’s 3. Unusually large line item entries posted near the end of a period 5. All of the above Copyright © 2013 FraudResourceNet™ LLC Expand Your Reach You do not need to be a programmer or an expert IT Auditor to make a simple script from work already completed:  Repeatable  Continuous Copyright © 2013 FraudResourceNet™ LLC
  • 26. Conclusion – Some Advice 1. The data is good 2. The analysis is correct 3. The necessary data is readily available 4. The data speaks for itself 5. Management will terminate the offender 6. Only the perpetrator knew about the scam 7. Best practice at one company will work for all 8. One “tool” will work in all situations 9. Fraud can’t happen in your company 10. Know tools, competencies, company, industry! Copyright © 2013 FraudResourceNet™ LLC Questions?  Any Questions? Don’t be Shy! Copyright © 2013 FraudResourceNet™ LLC
  • 27. Thank You! Website: http://www.fraudresourcenet.com Jim Kaplan FraudResourceNet™ 800-385-1625 jkaplan@fraudresourcenet.com Peter Goldmann FraudResourceNet™ 800-440-2261 pgoldmann@fraudresourcenet.com Don Sparks dons@audimation.com 832-327-1877 Copyright © 2013 FraudResourceNet™ LLC Coming Up This Month  Fraud Risks Associated with Management Override of Controls November 14 1:00 PM  Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud November 20 11:00 AM  To register and pay go to http://bit.ly/151WI1s Copyright © 2013 FraudResourceNet™ LLC