SlideShare a Scribd company logo
6/20/2014
1
Copyright © FraudResourceNet LLC
Fraud Incident Response
Planning Essentials
June 11, 2014
Richard Cascarino, CFE
Richard Cascarino & Associates
Copyright © FraudResourceNet LLC
President and Founder of White Collar Crime 101
• Publisher of White-Collar Crime Fighter
• Developer of FraudAware® Anti-Fraud Training
• Monthly Columnist, The Fraud Examiner, ACFE Newsletter
Member of Editorial Advisory Board, ACFE
Author of “Fraud in the Markets”
• Explains how fraud fueled the financial crisis.
About Peter Goldmann, MSc., CFE
6/20/2014
2
Copyright © FraudResourceNet LLC
About Richard Cascarino, MBA, CIA, CISM, 
CFE, CRSA 
Principal of Richard Cascarino &
Associates based in Colorado
USA
Over 30 years experience in IT
audit training and consultancy
Past President of the Institute of
Internal Auditors in South Africa
Member of ISACA
Member of ACFE Board of
Regents (Higher Education)
Copyright © FraudResourceNet LLC
This webinar and its material are the property of FraudResourceNet LLC.
Unauthorized usage or recording of this webinar or any of its material is strictly
forbidden. We are recording the webinar and you will be provided with a link
access to that recording as detailed below. Downloading or otherwise
duplicating the webinar recording is expressly prohibited.
Webinar recording link will be sent via email within 5-7 business days.
NASBA rules require us to ask polling questions during the Webinar and CPE
certificates will be sent via email to those who answer ALL the polling questions
The CPE certificates and link to the recording will be sent to the email address
you registered with in GTW. We are not responsible for delivery problems due to
spam filters, attachment restrictions or other controls in place for your email
client.
Submit questions via the chat box on your screen and we will answer them
either during or at the conclusion.
After the Webinar is over you will have an opportunity to provide feedback.
Please complete the feedback questionnaire to help us continuously improve
our Webinars
If GTW stops working you may need to close and restart. You can always dial in
and listen and follow along with the handout.
Webinar Housekeeping
6/20/2014
3
Copyright © FraudResourceNet LLC
The views expressed by the presenters do not necessarily represent the views, 
positions, or opinions of FraudResourceNet LLC (FRN) or the presenters’ 
respective organizations. These materials, and the oral presentation 
accompanying them, are for educational purposes only and do not constitute 
accounting or legal advice or create an accountant‐client relationship. 
While FRN makes every effort to ensure information is accurate and complete, 
FRN makes no representations, guarantees, or warranties as to the accuracy or 
completeness of the information provided via this presentation. FRN 
specifically disclaims all liability for any claims or damages that may result from 
the information contained in this presentation, including any websites 
maintained by third parties and linked to the FRN website
Any mention of commercial products is for information only; it does not imply 
recommendation or endorsement by FraudResourceNet LLC
5
Disclaimers
Copyright © FraudResourceNet LLC
Today’s Agenda
 Introduction Statistics on the “Fraud Problem”
 Incident Response Plan
 Incident Response Team
 Why Conduct an Investigation?
 Planning the Investigation
 Investigative Teams and Resources
 Collecting & Preserving Evidence
 Witness Interviews
 Forensic Procedures
 Findings of the Investigation
 Conclusions and Questions6
6/20/2014
4
Copyright © FraudResourceNet LLC
Fraud: The Big Picture
According to major accounting firms, professional fraud examiners
and law enforcement:
 Fraud costs the world $1 TRILLION per year. (5%) (ACFE)
 Business losses due to fraud increased 20% in last 12 months, from
$1.4 million to $1.7 million per billion dollars of sales. (Kroll
2010/2011 Global Fraud Report)
 75% of the companies surveyed experienced at least one incident of
fraud in the last 12 months (KPMG)
 Average cost for each incident of fraud is $160K (ACFE)
 Approximately 67% of corporate fraud committed by insiders (Kroll)
Copyright © FraudResourceNet LLC
The Worst Can Happen
"Don't look at the past and assume that's the future.
Look at the enemy's strengths and your vulnerability.
You've got to realize that the worst case does
sometimes happen."
--Richard Clarke
Former Special Advisor for Cybersecurity
6/20/2014
5
Copyright © FraudResourceNet LLC
Fraud – 3 Key Elements
9
Copyright © FraudResourceNet LLC
Fraud – It’s Not A Question of 
“If”
10
It is not a matter of if, but when.  
Having an incident response plan puts 
you in the best position to respond 
quickly and effectively.
 Pre‐incident planning
 Ongoing incident management
 Post‐incident remediation
6/20/2014
6
Copyright © FraudResourceNet LLC
Polling Question 1
The Three Elements of Fraud are:
a) Incentive, Rationalization and Opportunity
b)   Opportunity, Means and Method
c)   Rationalization Means and Opportunity
d)   Opportunity, Incentive and Means
Copyright © FraudResourceNet LLC
Goals of Incident Response
 Confirm or dispel incident
 Promote accurate info accumulation
 Establish controls for evidence
 Protects privacy rights
 Minimize disruption to operations
 Allow for legal/civil recriminations
 Provide accurate reports/recommendations
6/20/2014
7
Copyright © FraudResourceNet LLC
Incident Response Team 
Leader
 Senior internal auditor
 Legal counsel
 Investigation department head
 Sr. audit committee member
 Risk management director
 Corporate security director
 External auditor?
 External investigative firm?
13
Copyright © FraudResourceNet LLC
Fraud Incident Response 
Team
 Legal resources: In‐house & 
outside counsel
 Regular vs. indep. external counsel
 HR
 Internal audit
 External audit
 Internal or external investigator(s)
 Audit committee representative
14
6/20/2014
8
Copyright © FraudResourceNet LLC
Incident Response Methodology
 Pre‐incident preparation
 Detection
 Initial Response
 Strategy formulation
 Duplication
 Investigation
UTSA IS 6353 Security Incident
Response
 Security measure
implementation
 Network monitoring
 Recovery
 Reporting
 Follow-up
Copyright © FraudResourceNet LLC
Incident Response Plan –
Pre‐incident Planning 
 Create a team & a plan
 Define roles & responsibilities
 Train staff on plan details and 
responsibilities
 Process for escalation:
‐‐ allegation > incident > 
investigation
 Document retention policies
 Internal vs. external 
legal/investigative 
professionals
 Fraud risk assessment: 
Prioritize risks and develop 
response plans for each
 Standardize evidence collection 
protocols
 Restrict access to incident 
details to “need‐to‐know” basis
 Formalize regulatory 
compliance procedures for 
response and notification
16
6/20/2014
9
Copyright © FraudResourceNet LLC
Polling Question 2
Pre‐incident Preparation includes:
a)   Identifying the scope of suspected fraud
b)   Determining time‐frames for legal experts
c)   Defining roles and responsibilities
d)   Identifying failed business processes
Copyright © FraudResourceNet LLC
Incident Response Plan –
After It Has Occurred
 Identify scope of suspected 
fraud (individual or collusion?)
 Seek expert advice (external 
auditor, counsel, etc)
 Secure & preserve financial 
and non‐financial information
 Determine time frame for who 
(LE/regulators) needs to know 
what/when
 Adhere to relevant 
legal/regulatory 
notification mandates & 
time frames
 Ongoing & appropriate 
communication
 Consider notifying law 
enforcement if suspect 
criminal activity
 Identify weak/failed ICs & 
business processes
18
6/20/2014
10
Copyright © FraudResourceNet LLC
Incident Response Plan –
After It Has Occurred
 Alert your fraud incident manager 
that an allegation or suspicion exists
 Document date, time and details of 
initial tip/discovery
 Take notes on all observations and 
actions – if something is worth 
taking a mental note, it is worth a 
written note)
 Maintain confidentiality (enforce 
“need‐ to‐know rule about the 
suspected act). Unwarranted 
disclosure can seriously damage 
potential successful investigations. 
 Do not immediately confront the 
suspect.
 Write out in full the suspected act 
or wrongdoing including:
 What is alleged to have 
occurred
 Who is alleged to have 
committed the act
 Is the activity continuing
 Where did it occur
 What is the value of the loss 
or potential loss
 Who knows of the activity
(Continued…)
19
Copyright © FraudResourceNet LLC
Incident Response Plan –
After It Has Occurred
 Identify all documentary and other 
evidence connected to the incident:
 Invoices
 Contracts
 Purchase orders
 Checks
 Computers/mobile devices 
(Email)
 • Credit/P‐card statements
 Obtain evidence and place in a 
secure area. (Whenever possible 
without alerting any suspects)
 Protect evidence from damage or 
contamination
 List each item individually taking 
note of acquisition (incl. time, date 
and location) and where the item 
was securely stored
 Identify all potential witnesses
 Unless electronic evidence is in the 
process of being destroyed do not 
go into the suspect/target 
computer systems
 If possible, secure and/or remove 
suspect’s access to relevant 
computers/systems. Do not allow 
IT department to examine 
computer (s)
 Consider other potential suspects 
20
Source: Deloitte
6/20/2014
11
Copyright © FraudResourceNet LLC
Polling Question 3
Response after an incident includes:
a)   Standardizing evidence collection procedures
b)   Protecting evidence from damage or contamination
c)   Formalizing regulatory compliance procedures for 
response and notification
d)   Prioritizing risks and develop response plans for each
Copyright © FraudResourceNet LLC
What Prompts an Investigation?
Internal events
 Accounting irregularity
 Employee allegation/whistleblower
 Company compliance audit
 External events
 Government audit, investigation, 
subpoena, search warrant
 Competitor complaint
 Information security breach
22
6/20/2014
12
Copyright © FraudResourceNet LLC
Why Conduct an Investigation?
 Part of an effective compliance 
program
 Limits harm to the company
 Formulate a defense to possible 
allegations
 May have an obligation under 
certain laws (SOX) and regulations 
to investigate or self‐disclose
 Credit for cooperation from govt. 
(FCPA)
23
Copyright © FraudResourceNet LLC
Polling Question 4
Reasons for conducting an investigation include:
a)   It can limit harm to the company
b)   Fraud risk assessment may suggest one be carried 
out
c)   Restrict access to incident details to “need‐to‐
know” basis
d)   You can standardize evidence collection protocols
6/20/2014
13
Copyright © FraudResourceNet LLC
Planning the Investigation
 Stop suspect conduct immediately
 What are the immediate 
concerns/uncertainty?
 Asset protection/evidence preservation (Image 
suspect’s hard drive IMMEDIATELY…or wait?)
What information/evidence do you need to 
collect?
 Are there legal constraints concerning the 
collection of the required information/evidence?
25
Copyright © FraudResourceNet LLC
Planning the Investigation
 What is the appropriate scope of the 
investigation?
 Considerations should include:
 What is.are the ultimate objective(s) of 
the investigation?
 What level of discretion is required?
 What are the time constraints, if any?
 What are the resource constraints, if any?
 Do you want the investigation to be 
privileged?
Avoid artificially narrow scope 
6/20/2014
14
Copyright © FraudResourceNet LLC
Internal vs. External 
Resources
Investigative resources:  Internal or 
external. Depends on…
 Resource availability & time 
constraints
 Knowledge & experience
 Technology requirements
 Target(s) of the investigation
 Financial loss amount
 Potential for 
criminal/regulatory violation(s)
 Needs of your external auditor
 Cost
Copyright © FraudResourceNet LLC
Preserving Evidence
Information preservation:
 Time urgency – is essential to prevent suspect(s) from 
destroying/deleting evidence before collection
 Distribute a preservation notice to key staff 
 Ensure proper backup tape rotation (stop if need to 
preserve relevant evidence)
 Dumpster/Recoverable Items 
6/20/2014
15
Copyright © FraudResourceNet LLC
Collecting Evidence
Information collection:
 What is available?
 Don’t forget mobile 
communication/computing devices 
& other mobile storage devices 
(thumb drives, etc.)
 Chain‐of‐custody
 Generally, more is better…
Copyright © FraudResourceNet LLC
Where the Evidence Resides
Volatile data in kernel structures
Slack space
Free or unallocated space
The logical file system
events log
application logs
the registry
the swap file
special application files
temporary files
the recycle bin
the printer spool
email sent or received
6/20/2014
16
Copyright © FraudResourceNet LLC
Forensic Procedures for Data 
Collection/Preservation/Review
Use forensic technology:
 Digital Evidence Forensics/Disk Imaging
 Forensic Data Analytics
 eDiscovery tools/techniques (E‐mails, business 
docs—to be done by an expert)
Copyright © FraudResourceNet LLC
eDiscovery Tools/Techniques
eDiscovery workflow/process (should be 
formalized in advance– who will review docs 
for relevance, preservation procedures, etc.)
Apply Predictive Coding (Legal tool for 
streamlining document review using a 
document review platform)
6/20/2014
17
Copyright © FraudResourceNet LLC
Polling Question 5
A critical aspect of obtaining evidence is:
a)   Ensuring tape retention policies are adhered to
b)   Generally, less is better
c)   Ensuring swap files are deleted
d)   Maintaining the Chain of Custody
Copyright © FraudResourceNet LLC
Witness Interviews
 Preparation
 Review documents
 Who ‐When ‐Where ‐What order
 Conducting the interview
 Neutral/objective finder of fact
 Never alone—someone takes notes
 Limit information sharing
 Right kinds of questions when
 Legal considerations
 Upjohn warning: Lawyer reps 
company
 Preserving privilege
 Providing counsel to the witness
6/20/2014
18
Copyright © FraudResourceNet LLC
When NOT to Investigate … Maybe
 Amount stolen is minimal
 Nothing more than a red flag (need additional 
evidence)
 Want to avoid negative publicity
 Perpetrator resigns/departs on own
 Confession
 Law enforcement takes over
Copyright © FraudResourceNet LLC
Findings of the Investigation
 Written or oral report? (Written may not be nec. 
If you don’t prosecute and just reprimand)
 Determine what to do with current employees 
involved in conduct at issue
 Consult with counsel to determine if mandatory 
disclosure is required
 Consider implementing stronger controls or 
company policies
6/20/2014
19
Copyright © FraudResourceNet LLC
Incident Response Plan –
Post‐Incident Remediation 
 Assess gaps and evaluate effectiveness of plan, procedures, and 
training
 Adjust incident response plan & protocols; communicate and train
 Test incident response plan periodically and stay aware of internal 
& external risks
 Maintain an incident report in accordance with relevant legal & 
regulatory standards
 Improve weak & failed ICs and business processes
 Restore customer/client relations as necessary
Copyright © FraudResourceNet LLC
Incident Response Plan –
Information Security Breach
 Prompt notification of appropriate regulators (esp. financial 
institutions)
 Prompt notification of law enforcement (Usually federal)
 Mobilize efforts to contain the incident—prevent further
breaches/damage
 Notify customers immediately
 Activate remediation measures—card replacement, credit 
monitoring services, etc.
 Train employees to recognize breach red flags quickly.
6/20/2014
20
Copyright © FraudResourceNet LLC
Common Mistakes
Failure to maintain proper documentation
Failure to notify decision makers
Failure to control digital evidence
Failure to report the incident in a timely manner
Underestimating the scope of the incident
No incident response plan in place
Technical mistakes
• Altering date and time stampson evidence systems before recording them
• Killing rogue processes
• Patching the system back together before investigation
• Not recording commands used
• Using untrusted commands and tools
• Overwriting evidence by installing tools
Copyright © FraudResourceNet LLC
Incident Response Checklist
Question
Have you developed and implemented a written data security breach disclosure and notification process?
Do you have in place a manual or automated system for tracking privacy incidents to ensure all are detected,
reported and responded to in a consistent way?
Are you aware of Federal and state privacy regulations?
Do you have an incident response process that includes:
Who to contact when they suspect a loss or compromise of PII data?
An evaluation of the scope, the amount of damage and the number of individuals affected by the data breach.
Notification of the individuals whose data has been compromised.
Public relations management.
Mitigation and forensics.
Regulatory reporting.
Do you have a help desk and call procedure for all individuals whose data may have been compromised?
Have you ensured the enterprise breach disclosure effort is scalable to address the scope of the breach?
Are you prepared to offer appropriate remediation measures that are timely and effective? Examples include
free credit monitoring services, fraud alert services, identity monitoring and personalized remediation
services.
6/20/2014
21
Copyright © FraudResourceNet LLC
Questions?
Any Questions?
Don’t be Shy!
Copyright © FraudResourceNet LLC
Peter Goldmann
FraudResourceNet LLC
800-440-2261
www.fraudresourcenet.com
pgoldmann@fraudresourcenet.com
Richard Cascarino, MBA, CIA, CRMA, CFE, CISM
Cell: +1 970 291 1497 ‐ South Africa +27 (0)78 980 7685
Tel +1 303 747 6087 (Skype Worldwide)
Tel: +1 970 367 5429
eMail: rcasc@rcascarino.com
Web: http://www.rcascarino.com
Skype: Richard.Cascarino
Thank You!

More Related Content

What's hot

Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12
Fuh George Cheo
 
Fraud Prevention & Detection for Local Government
Fraud Prevention & Detection for Local GovernmentFraud Prevention & Detection for Local Government
Fraud Prevention & Detection for Local GovernmentRon Steinkamp
 
Preventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the WorkplacePreventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the Workplace
DecosimoCPAs
 
Public Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIAPublic Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIARon Steinkamp
 
Forensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection toolForensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection tool
Haládik Consulting, s.r.o.
 
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
McKonly & Asbury, LLP
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
FraudBusters
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
WeaverCPAs
 
St. Louis County Municipal League - 7 keys to fraud prevention
St. Louis County Municipal League - 7 keys to fraud preventionSt. Louis County Municipal League - 7 keys to fraud prevention
St. Louis County Municipal League - 7 keys to fraud preventionRon Steinkamp
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
Case IQ
 
Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud Investigation
Salih Islam
 
Fraud And Internal Controls Linked In April 2011
Fraud And Internal Controls   Linked In April 2011Fraud And Internal Controls   Linked In April 2011
Fraud And Internal Controls Linked In April 2011
John Hall, CPA - Keynote Speaker Consultant
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part ii
EMAC Consulting Group
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryDecosimoCPAs
 
Internal Control Issues in Fraud Cases
Internal Control Issues in Fraud CasesInternal Control Issues in Fraud Cases
Internal Control Issues in Fraud Cases
DecosimoCPAs
 
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill AcuffFraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
DecosimoCPAs
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
Pamela Mantone
 

What's hot (20)

Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12
 
Fraud Prevention & Detection for Local Government
Fraud Prevention & Detection for Local GovernmentFraud Prevention & Detection for Local Government
Fraud Prevention & Detection for Local Government
 
Preventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the WorkplacePreventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the Workplace
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Public Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIAPublic Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIA
 
Forensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection toolForensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection tool
 
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
 
St. Louis County Municipal League - 7 keys to fraud prevention
St. Louis County Municipal League - 7 keys to fraud preventionSt. Louis County Municipal League - 7 keys to fraud prevention
St. Louis County Municipal League - 7 keys to fraud prevention
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
 
Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud Investigation
 
Fraud And Internal Controls Linked In April 2011
Fraud And Internal Controls   Linked In April 2011Fraud And Internal Controls   Linked In April 2011
Fraud And Internal Controls Linked In April 2011
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part ii
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
 
Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
 
Red flags fraud
Red flags fraudRed flags fraud
Red flags fraud
 
Internal Control Issues in Fraud Cases
Internal Control Issues in Fraud CasesInternal Control Issues in Fraud Cases
Internal Control Issues in Fraud Cases
 
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill AcuffFraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
 

Similar to Fraud Incident Response Planning Essentials

Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics
FraudBusters
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
FraudBusters
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay Fraud
FraudBusters
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
FraudBusters
 
Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit Software
FraudBusters
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
FraudBusters
 
Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data Analytics
FraudBusters
 
Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud Policy
FraudBusters
 
Bribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to KnowBribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to Know
FraudBusters
 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
FraudBusters
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
FraudBusters
 
Benford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataBenford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial Data
FraudBusters
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
FraudBusters
 
It52015 slides
It52015 slidesIt52015 slides
It52015 slides
Jim Kaplan CIA CFE
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
FraudBusters
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red Flags
FraudBusters
 
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudUsing Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
FraudBusters
 
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay Fraud
FraudBusters
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data Analytics
FraudBusters
 
Financial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR AdvisorsFinancial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR Advisors
Abhishek Bali
 

Similar to Fraud Incident Response Planning Essentials (20)

Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay Fraud
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
 
Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit Software
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
 
Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data Analytics
 
Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud Policy
 
Bribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to KnowBribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to Know
 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Benford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataBenford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial Data
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
It52015 slides
It52015 slidesIt52015 slides
It52015 slides
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red Flags
 
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudUsing Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
 
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay Fraud
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data Analytics
 
Financial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR AdvisorsFinancial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR Advisors
 

More from FraudBusters

Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a Fraudster
FraudBusters
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud Detection
FraudBusters
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
FraudBusters
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
FraudBusters
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding Fraud
FraudBusters
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best Practices
FraudBusters
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your Audits
FraudBusters
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
FraudBusters
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
FraudBusters
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
FraudBusters
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data Analysis
FraudBusters
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
FraudBusters
 
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
FraudBusters
 
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
FraudBusters
 

More from FraudBusters (14)

Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a Fraudster
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud Detection
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding Fraud
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best Practices
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your Audits
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data Analysis
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
 
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
 
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Fraud Incident Response Planning Essentials

  • 1. 6/20/2014 1 Copyright © FraudResourceNet LLC Fraud Incident Response Planning Essentials June 11, 2014 Richard Cascarino, CFE Richard Cascarino & Associates Copyright © FraudResourceNet LLC President and Founder of White Collar Crime 101 • Publisher of White-Collar Crime Fighter • Developer of FraudAware® Anti-Fraud Training • Monthly Columnist, The Fraud Examiner, ACFE Newsletter Member of Editorial Advisory Board, ACFE Author of “Fraud in the Markets” • Explains how fraud fueled the financial crisis. About Peter Goldmann, MSc., CFE
  • 2. 6/20/2014 2 Copyright © FraudResourceNet LLC About Richard Cascarino, MBA, CIA, CISM,  CFE, CRSA  Principal of Richard Cascarino & Associates based in Colorado USA Over 30 years experience in IT audit training and consultancy Past President of the Institute of Internal Auditors in South Africa Member of ISACA Member of ACFE Board of Regents (Higher Education) Copyright © FraudResourceNet LLC This webinar and its material are the property of FraudResourceNet LLC. Unauthorized usage or recording of this webinar or any of its material is strictly forbidden. We are recording the webinar and you will be provided with a link access to that recording as detailed below. Downloading or otherwise duplicating the webinar recording is expressly prohibited. Webinar recording link will be sent via email within 5-7 business days. NASBA rules require us to ask polling questions during the Webinar and CPE certificates will be sent via email to those who answer ALL the polling questions The CPE certificates and link to the recording will be sent to the email address you registered with in GTW. We are not responsible for delivery problems due to spam filters, attachment restrictions or other controls in place for your email client. Submit questions via the chat box on your screen and we will answer them either during or at the conclusion. After the Webinar is over you will have an opportunity to provide feedback. Please complete the feedback questionnaire to help us continuously improve our Webinars If GTW stops working you may need to close and restart. You can always dial in and listen and follow along with the handout. Webinar Housekeeping
  • 3. 6/20/2014 3 Copyright © FraudResourceNet LLC The views expressed by the presenters do not necessarily represent the views,  positions, or opinions of FraudResourceNet LLC (FRN) or the presenters’  respective organizations. These materials, and the oral presentation  accompanying them, are for educational purposes only and do not constitute  accounting or legal advice or create an accountant‐client relationship.  While FRN makes every effort to ensure information is accurate and complete,  FRN makes no representations, guarantees, or warranties as to the accuracy or  completeness of the information provided via this presentation. FRN  specifically disclaims all liability for any claims or damages that may result from  the information contained in this presentation, including any websites  maintained by third parties and linked to the FRN website Any mention of commercial products is for information only; it does not imply  recommendation or endorsement by FraudResourceNet LLC 5 Disclaimers Copyright © FraudResourceNet LLC Today’s Agenda  Introduction Statistics on the “Fraud Problem”  Incident Response Plan  Incident Response Team  Why Conduct an Investigation?  Planning the Investigation  Investigative Teams and Resources  Collecting & Preserving Evidence  Witness Interviews  Forensic Procedures  Findings of the Investigation  Conclusions and Questions6
  • 4. 6/20/2014 4 Copyright © FraudResourceNet LLC Fraud: The Big Picture According to major accounting firms, professional fraud examiners and law enforcement:  Fraud costs the world $1 TRILLION per year. (5%) (ACFE)  Business losses due to fraud increased 20% in last 12 months, from $1.4 million to $1.7 million per billion dollars of sales. (Kroll 2010/2011 Global Fraud Report)  75% of the companies surveyed experienced at least one incident of fraud in the last 12 months (KPMG)  Average cost for each incident of fraud is $160K (ACFE)  Approximately 67% of corporate fraud committed by insiders (Kroll) Copyright © FraudResourceNet LLC The Worst Can Happen "Don't look at the past and assume that's the future. Look at the enemy's strengths and your vulnerability. You've got to realize that the worst case does sometimes happen." --Richard Clarke Former Special Advisor for Cybersecurity
  • 5. 6/20/2014 5 Copyright © FraudResourceNet LLC Fraud – 3 Key Elements 9 Copyright © FraudResourceNet LLC Fraud – It’s Not A Question of  “If” 10 It is not a matter of if, but when.   Having an incident response plan puts  you in the best position to respond  quickly and effectively.  Pre‐incident planning  Ongoing incident management  Post‐incident remediation
  • 6. 6/20/2014 6 Copyright © FraudResourceNet LLC Polling Question 1 The Three Elements of Fraud are: a) Incentive, Rationalization and Opportunity b)   Opportunity, Means and Method c)   Rationalization Means and Opportunity d)   Opportunity, Incentive and Means Copyright © FraudResourceNet LLC Goals of Incident Response  Confirm or dispel incident  Promote accurate info accumulation  Establish controls for evidence  Protects privacy rights  Minimize disruption to operations  Allow for legal/civil recriminations  Provide accurate reports/recommendations
  • 7. 6/20/2014 7 Copyright © FraudResourceNet LLC Incident Response Team  Leader  Senior internal auditor  Legal counsel  Investigation department head  Sr. audit committee member  Risk management director  Corporate security director  External auditor?  External investigative firm? 13 Copyright © FraudResourceNet LLC Fraud Incident Response  Team  Legal resources: In‐house &  outside counsel  Regular vs. indep. external counsel  HR  Internal audit  External audit  Internal or external investigator(s)  Audit committee representative 14
  • 8. 6/20/2014 8 Copyright © FraudResourceNet LLC Incident Response Methodology  Pre‐incident preparation  Detection  Initial Response  Strategy formulation  Duplication  Investigation UTSA IS 6353 Security Incident Response  Security measure implementation  Network monitoring  Recovery  Reporting  Follow-up Copyright © FraudResourceNet LLC Incident Response Plan – Pre‐incident Planning   Create a team & a plan  Define roles & responsibilities  Train staff on plan details and  responsibilities  Process for escalation: ‐‐ allegation > incident >  investigation  Document retention policies  Internal vs. external  legal/investigative  professionals  Fraud risk assessment:  Prioritize risks and develop  response plans for each  Standardize evidence collection  protocols  Restrict access to incident  details to “need‐to‐know” basis  Formalize regulatory  compliance procedures for  response and notification 16
  • 9. 6/20/2014 9 Copyright © FraudResourceNet LLC Polling Question 2 Pre‐incident Preparation includes: a)   Identifying the scope of suspected fraud b)   Determining time‐frames for legal experts c)   Defining roles and responsibilities d)   Identifying failed business processes Copyright © FraudResourceNet LLC Incident Response Plan – After It Has Occurred  Identify scope of suspected  fraud (individual or collusion?)  Seek expert advice (external  auditor, counsel, etc)  Secure & preserve financial  and non‐financial information  Determine time frame for who  (LE/regulators) needs to know  what/when  Adhere to relevant  legal/regulatory  notification mandates &  time frames  Ongoing & appropriate  communication  Consider notifying law  enforcement if suspect  criminal activity  Identify weak/failed ICs &  business processes 18
  • 10. 6/20/2014 10 Copyright © FraudResourceNet LLC Incident Response Plan – After It Has Occurred  Alert your fraud incident manager  that an allegation or suspicion exists  Document date, time and details of  initial tip/discovery  Take notes on all observations and  actions – if something is worth  taking a mental note, it is worth a  written note)  Maintain confidentiality (enforce  “need‐ to‐know rule about the  suspected act). Unwarranted  disclosure can seriously damage  potential successful investigations.   Do not immediately confront the  suspect.  Write out in full the suspected act  or wrongdoing including:  What is alleged to have  occurred  Who is alleged to have  committed the act  Is the activity continuing  Where did it occur  What is the value of the loss  or potential loss  Who knows of the activity (Continued…) 19 Copyright © FraudResourceNet LLC Incident Response Plan – After It Has Occurred  Identify all documentary and other  evidence connected to the incident:  Invoices  Contracts  Purchase orders  Checks  Computers/mobile devices  (Email)  • Credit/P‐card statements  Obtain evidence and place in a  secure area. (Whenever possible  without alerting any suspects)  Protect evidence from damage or  contamination  List each item individually taking  note of acquisition (incl. time, date  and location) and where the item  was securely stored  Identify all potential witnesses  Unless electronic evidence is in the  process of being destroyed do not  go into the suspect/target  computer systems  If possible, secure and/or remove  suspect’s access to relevant  computers/systems. Do not allow  IT department to examine  computer (s)  Consider other potential suspects  20 Source: Deloitte
  • 11. 6/20/2014 11 Copyright © FraudResourceNet LLC Polling Question 3 Response after an incident includes: a)   Standardizing evidence collection procedures b)   Protecting evidence from damage or contamination c)   Formalizing regulatory compliance procedures for  response and notification d)   Prioritizing risks and develop response plans for each Copyright © FraudResourceNet LLC What Prompts an Investigation? Internal events  Accounting irregularity  Employee allegation/whistleblower  Company compliance audit  External events  Government audit, investigation,  subpoena, search warrant  Competitor complaint  Information security breach 22
  • 12. 6/20/2014 12 Copyright © FraudResourceNet LLC Why Conduct an Investigation?  Part of an effective compliance  program  Limits harm to the company  Formulate a defense to possible  allegations  May have an obligation under  certain laws (SOX) and regulations  to investigate or self‐disclose  Credit for cooperation from govt.  (FCPA) 23 Copyright © FraudResourceNet LLC Polling Question 4 Reasons for conducting an investigation include: a)   It can limit harm to the company b)   Fraud risk assessment may suggest one be carried  out c)   Restrict access to incident details to “need‐to‐ know” basis d)   You can standardize evidence collection protocols
  • 13. 6/20/2014 13 Copyright © FraudResourceNet LLC Planning the Investigation  Stop suspect conduct immediately  What are the immediate  concerns/uncertainty?  Asset protection/evidence preservation (Image  suspect’s hard drive IMMEDIATELY…or wait?) What information/evidence do you need to  collect?  Are there legal constraints concerning the  collection of the required information/evidence? 25 Copyright © FraudResourceNet LLC Planning the Investigation  What is the appropriate scope of the  investigation?  Considerations should include:  What is.are the ultimate objective(s) of  the investigation?  What level of discretion is required?  What are the time constraints, if any?  What are the resource constraints, if any?  Do you want the investigation to be  privileged? Avoid artificially narrow scope 
  • 14. 6/20/2014 14 Copyright © FraudResourceNet LLC Internal vs. External  Resources Investigative resources:  Internal or  external. Depends on…  Resource availability & time  constraints  Knowledge & experience  Technology requirements  Target(s) of the investigation  Financial loss amount  Potential for  criminal/regulatory violation(s)  Needs of your external auditor  Cost Copyright © FraudResourceNet LLC Preserving Evidence Information preservation:  Time urgency – is essential to prevent suspect(s) from  destroying/deleting evidence before collection  Distribute a preservation notice to key staff   Ensure proper backup tape rotation (stop if need to  preserve relevant evidence)  Dumpster/Recoverable Items 
  • 15. 6/20/2014 15 Copyright © FraudResourceNet LLC Collecting Evidence Information collection:  What is available?  Don’t forget mobile  communication/computing devices  & other mobile storage devices  (thumb drives, etc.)  Chain‐of‐custody  Generally, more is better… Copyright © FraudResourceNet LLC Where the Evidence Resides Volatile data in kernel structures Slack space Free or unallocated space The logical file system events log application logs the registry the swap file special application files temporary files the recycle bin the printer spool email sent or received
  • 16. 6/20/2014 16 Copyright © FraudResourceNet LLC Forensic Procedures for Data  Collection/Preservation/Review Use forensic technology:  Digital Evidence Forensics/Disk Imaging  Forensic Data Analytics  eDiscovery tools/techniques (E‐mails, business  docs—to be done by an expert) Copyright © FraudResourceNet LLC eDiscovery Tools/Techniques eDiscovery workflow/process (should be  formalized in advance– who will review docs  for relevance, preservation procedures, etc.) Apply Predictive Coding (Legal tool for  streamlining document review using a  document review platform)
  • 17. 6/20/2014 17 Copyright © FraudResourceNet LLC Polling Question 5 A critical aspect of obtaining evidence is: a)   Ensuring tape retention policies are adhered to b)   Generally, less is better c)   Ensuring swap files are deleted d)   Maintaining the Chain of Custody Copyright © FraudResourceNet LLC Witness Interviews  Preparation  Review documents  Who ‐When ‐Where ‐What order  Conducting the interview  Neutral/objective finder of fact  Never alone—someone takes notes  Limit information sharing  Right kinds of questions when  Legal considerations  Upjohn warning: Lawyer reps  company  Preserving privilege  Providing counsel to the witness
  • 18. 6/20/2014 18 Copyright © FraudResourceNet LLC When NOT to Investigate … Maybe  Amount stolen is minimal  Nothing more than a red flag (need additional  evidence)  Want to avoid negative publicity  Perpetrator resigns/departs on own  Confession  Law enforcement takes over Copyright © FraudResourceNet LLC Findings of the Investigation  Written or oral report? (Written may not be nec.  If you don’t prosecute and just reprimand)  Determine what to do with current employees  involved in conduct at issue  Consult with counsel to determine if mandatory  disclosure is required  Consider implementing stronger controls or  company policies
  • 19. 6/20/2014 19 Copyright © FraudResourceNet LLC Incident Response Plan – Post‐Incident Remediation   Assess gaps and evaluate effectiveness of plan, procedures, and  training  Adjust incident response plan & protocols; communicate and train  Test incident response plan periodically and stay aware of internal  & external risks  Maintain an incident report in accordance with relevant legal &  regulatory standards  Improve weak & failed ICs and business processes  Restore customer/client relations as necessary Copyright © FraudResourceNet LLC Incident Response Plan – Information Security Breach  Prompt notification of appropriate regulators (esp. financial  institutions)  Prompt notification of law enforcement (Usually federal)  Mobilize efforts to contain the incident—prevent further breaches/damage  Notify customers immediately  Activate remediation measures—card replacement, credit  monitoring services, etc.  Train employees to recognize breach red flags quickly.
  • 20. 6/20/2014 20 Copyright © FraudResourceNet LLC Common Mistakes Failure to maintain proper documentation Failure to notify decision makers Failure to control digital evidence Failure to report the incident in a timely manner Underestimating the scope of the incident No incident response plan in place Technical mistakes • Altering date and time stampson evidence systems before recording them • Killing rogue processes • Patching the system back together before investigation • Not recording commands used • Using untrusted commands and tools • Overwriting evidence by installing tools Copyright © FraudResourceNet LLC Incident Response Checklist Question Have you developed and implemented a written data security breach disclosure and notification process? Do you have in place a manual or automated system for tracking privacy incidents to ensure all are detected, reported and responded to in a consistent way? Are you aware of Federal and state privacy regulations? Do you have an incident response process that includes: Who to contact when they suspect a loss or compromise of PII data? An evaluation of the scope, the amount of damage and the number of individuals affected by the data breach. Notification of the individuals whose data has been compromised. Public relations management. Mitigation and forensics. Regulatory reporting. Do you have a help desk and call procedure for all individuals whose data may have been compromised? Have you ensured the enterprise breach disclosure effort is scalable to address the scope of the breach? Are you prepared to offer appropriate remediation measures that are timely and effective? Examples include free credit monitoring services, fraud alert services, identity monitoring and personalized remediation services.
  • 21. 6/20/2014 21 Copyright © FraudResourceNet LLC Questions? Any Questions? Don’t be Shy! Copyright © FraudResourceNet LLC Peter Goldmann FraudResourceNet LLC 800-440-2261 www.fraudresourcenet.com pgoldmann@fraudresourcenet.com Richard Cascarino, MBA, CIA, CRMA, CFE, CISM Cell: +1 970 291 1497 ‐ South Africa +27 (0)78 980 7685 Tel +1 303 747 6087 (Skype Worldwide) Tel: +1 970 367 5429 eMail: rcasc@rcascarino.com Web: http://www.rcascarino.com Skype: Richard.Cascarino Thank You!