SlideShare a Scribd company logo
Using Data Analytics
to Find Fraud Indicators
Ron Steinkamp
Joe Montes
November 30, 2016
• COSO Fraud Risk Management
• What is Data Analysis?
• Data Analysis Benefits & Challenges
• Perspectives on Data Analysis
• Using Data Analysis to Find Fraud Indicators
• Exercise
2
Agenda
© 2016 All Rights Reserved
Brown Smith Wallace LLP
© 2016 All Rights Reserved 3 Brown Smith Wallace LLP
• COSO issued Fraud Risk Management Guide.
• Guidance on how to deter fraud.
• 5 Fraud Risk Management Principles.
• Aligned with the COSO Framework Components
and Principles.
• Further detailed in Points of Focus related to
each Principle.
• Can be used as a starting point to develop a
Fraud Risk Management Program.
4
COSO Fraud Risk Management Guide
© 2016 All Rights Reserved
Brown Smith Wallace LLP
1. The organization establishes and
communicates a Fraud Risk Management
Program that demonstrates the expectations of
the board of directors and senior management
and their commitment to high integrity and
ethical values regarding managing fraud risk.
CONTROL ENVIRONMENT
5
Fraud Risk Management Principles
© 2016 All Rights Reserved
Brown Smith Wallace LLP
2. The organization performs comprehensive
fraud risk assessments to identify specific fraud
schemes and risks, assess their likelihood and
significance, evaluate existing fraud control
activities, and implement actions to mitigate
residual fraud risks.
RISK ASSESSMENT
6
Fraud Risk Management Principles
© 2016 All Rights Reserved
Brown Smith Wallace LLP
3. The organization selects, develops, and
deploys preventive and detective fraud control
activities to mitigate the risk of fraud events
occurring or not being detected in a timely
manner.
CONTROL ACTIVITIES
7
Fraud Risk Management Principles
© 2016 All Rights Reserved
Brown Smith Wallace LLP
4. The organization establishes a communication
process to obtain information about potential
fraud and deploys a coordinated approach to
investigation and corrective action to address
fraud appropriately and in a timely manner.
INFORMATION & COMMUNICATION
8
Fraud Risk Management Principles
© 2016 All Rights Reserved
Brown Smith Wallace LLP
5. The organization selects, develops, an
performs ongoing evaluations to ascertain
whether each of the five principles of fraud risk
management is present and functioning and
communicates Fraud Risk Management
Program deficiencies in a timely manner to
parties responsible for taking corrective action,
including senior management and the board.
MONITORING ACTIVITIES
9
Fraud Risk Management Principles
© 2016 All Rights Reserved
Brown Smith Wallace LLP
• Data analytics is addressed as a Point of Focus
within the Fraud Risk Management Principles.
Use data analytics for fraud risk assessment and
response.
Use proactive data analytic procedures to identify
transactions or events for further investigation.
• Appendix E of the COSO Fraud Risk
Management Guide covers the use of data
analytics in fraud risk management.
10
What Does This Have to Do With Data Analytics?
© 2016 All Rights Reserved
Brown Smith Wallace LLP
© 2016 All Rights Reserved 11 Brown Smith Wallace LLP
• Process of extracting, inspecting, cleaning,
transforming, and modeling data in order to
discover useful information, derive conclusions,
and support decision-making
– Employees are not using a system field as intended
– Controls are not functioning properly
– Vendor master access should be restricted
12
Data Analysis Defined
© 2016 All Rights Reserved
Brown Smith Wallace LLP
© 2016 All Rights Reserved 13 Brown Smith Wallace LLP
• 100% vs. sampling
• Brings Operational and IT together
• Comparison to an outside source
• Identification of control weaknesses
• Re-performable
• Red flags and trends
• Log = Workpaper
14
Data Analysis Benefits
© 2016 All Rights Reserved
Brown Smith Wallace LLP
15
Challenges
© 2016 All Rights Reserved
Brown Smith Wallace LLP
Overall
•Employee Resources
• Limited know how
• Analysis is most effective with good business,
process, and system knowledge
• Check the box mentality
•What is Success?
•Technology Choices
•Boiling the Ocean
Data Quality and Availability
• Lack of access
• Disparate systems
• Weak system controls lead to bad data
• Bad data leads to bad information
• Integrity tests:
• Corruption
• Completeness
• Uniqueness
• Logical relationships
• Proper boundaries
16
Challenges
© 2016 All Rights Reserved
Brown Smith Wallace LLP
Actual Objectives
• Ability to effectively achieve objectives selected
• Defining exceptions
• Investigating exceptions
• Business processes change
17
Challenges
© 2016 All Rights Reserved
Brown Smith Wallace LLP
© 2016 All Rights Reserved 18 Brown Smith Wallace LLP
• The AICPA has said that use of technological
improvements in Audit have been incremental rather
than transformative
• To advance data analytics in Internal Audit
– Data analytics must be part of the mission
– Funding must be available to buy the tools and provide training
– Auditors must learn the appropriate skills
– Time must be budgeted and allocated
– The data must be readily available
– The data must be accurate
19
Data Surveys
© 2016 All Rights Reserved
Brown Smith Wallace LLP
• Internal Audit initially detecting fraud increased from
14.4% to 16.5% between 2012 and 2016
• Larger organizations showed Internal Audit detecting
18.6% of cases
• Greatest Inhibitors to Data Analysis Success
– Lack of appropriate skills
– Data to be integrated is not clean
– Complexity of implementation
– Inability to integrate necessary data sources
– Lack of integration with existing systems
– Solutions are difficult to use
– Inability to customize for specific needs
20
ACFE
© 2016 All Rights Reserved
Brown Smith Wallace LLP
“Not auditing the data in your company’s ERP system wastes the
amount of money and time spent implementing it.”
“Analysts can’t just be good at scripting, they have to be able to identify
risks, interpret results, and audit exceptions.”
“None of the technologies understand relationships, business changes,
or critical thinking. The Human factor will always be there. You will
never set it and forget it.”
“Everything IT serves the business and is not just an IT risk.”
“In 10 years, computers will do all of this and humans won’t be
needed.”
21
Recent Conferences
© 2016 All Rights Reserved
Brown Smith Wallace LLP
“Analytics should be used to add, drop, and accelerate audits in the
audit plan. It should not be a document updated yearly.”
“Coordination between Compliance and Internal Audit to share data
and coordinate schedules will increase everyone’s effectiveness.”
“Data analysis is worth the effort. So much to gain. Hang in there.”
“Every control review can have a fraud focus with data analytics and
the right auditors.”
Intelligence should not be acquired just for the sake of integrating more
data; the strategic focus should be on ‘acquiring intelligence with a
purpose’.”
22
Recent Conferences
© 2016 All Rights Reserved
Brown Smith Wallace LLP
© 2016 All Rights Reserved 23 Brown Smith Wallace LLP
• First Thing!
• Various standard steps
to understand a file
• Experience
Hours
Reputation
24
Data Integrity Verification
© 2016 All Rights Reserved
Brown Smith Wallace LLP
Main Categories
• Statistics
• Counts
• Totals
• Blanks
• Classifies
• Duplicates
• Gaps
• Logical Relationships
25
Data Integrity Verification
© 2016 All Rights Reserved
Brown Smith Wallace LLP
Ghost Employee red flags
• Duplicate addresses, routing numbers, SSNs
• Employee record has been accessed/edited by one person
• HR compared v. Payroll v. other systems
• No withholdings or deductions
• No vacation or sick time
• No overtime for hourly
• Blank fields
• PO Box
26
Payroll
© 2016 All Rights Reserved
Brown Smith Wallace LLP
Payment Red Flags
• Frequent changes to bank numbers
• Terminated employees with current pay
• Employees with multiple bank accounts
• Bank accounts with multiple employees
• Excessive Overtime
27
Payroll Continued
© 2016 All Rights Reserved
Brown Smith Wallace LLP
Process Red Flags
• Segregation of duties
• Date Comparisons
• Quantity Comparisons
• Amount Comparison
28
Accounts Payable
© 2016 All Rights Reserved
Brown Smith Wallace LLP
Employee / Vendor Red Flags
• Same name
• Matching addresses or
routing numbers
• Last name or Initials as part
of vendor name
• Disclosure and emergency
contact comparison
29
AP Continued
© 2016 All Rights Reserved
Brown Smith Wallace LLP
Vendor Red Flags
• Same vendor with different vendor number
• Vendor type does not match vendor spend
• Vendor type does not match purchaser
• Frequent or Inappropriate changes
• Inactive vendor with activity
• Unusual payment terms
• PO Box or no address
• One-time vendors
30
AP Continued
© 2016 All Rights Reserved
Brown Smith Wallace LLP
Payable Red Flags
• Frequent or Inappropriate changes
• Single payment run
• Payment runs at unusual times
• Checks to different address than master
• Invoice and check sequence
31
AP Continued
© 2016 All Rights Reserved
Brown Smith Wallace LLP
Duplicate Red Flags
Same expense reimbursed more than once
• Identify employees that report expenses for the same
transaction dates on multiple expense reports. This makes
duplication harder to identify.
• Look at transactions not paid via company card, could also be
duplicate of card transaction (same date, transaction amount,
and vendor/expense type).
• Identify same transaction reported on
different individuals’ expense reports.
32
Travel & Entertainment
© 2016 All Rights Reserved
Brown Smith Wallace LLP
Other Red Flags
• Unexpected dates, vendor names, individual names, or
keywords
• Round dollars (gift cards, cash)
• Employees who have more than the average quantity or
amount of transactions in higher risk or specific expense
categories.
• Identify expenses with unusual
Merchant Category Codes
(MCC) based on company
policy or transaction type
selected by the employee.
• Spending zip code
33
T & E Continued
© 2016 All Rights Reserved
Brown Smith Wallace LLP
Other Red Flags
• Weekends or holidays
• Declined or disputed transactions
• Large transactions
• Active cards v. current employee
• Approval workflow
• Missing receipts
34
P-Card
© 2016 All Rights Reserved
Brown Smith Wallace LLP
Foreign Corrupt Practices Act
• It is unlawful to make a corrupt payment to a foreign official for
the purpose of influencing the official in order to assist in
obtaining/retaining business
• Companies who file reports with the SEC must maintain
records that accurately reflect transactions and the nature and
quantity of corporate assets and liabilities
• Yates memo made it personal
• Lower fines by making corruption as
difficult to perpetrate as you can
35
FCPA
© 2016 All Rights Reserved
Brown Smith Wallace LLP
Other Red Flags
• Names and addresses on the SAM list, etc.
• Keyword search in payables, general ledger, P-Cards, T&E
• Journal entries with unexpected account combinations of
accounts (e.g. debit to sales/credit to cash)
• Analyze sales and commission information
• Identify payroll, travel advances, or
travel reimbursements to non-employee
• Test currency exchange expectations
• Purchasing costs
36
FCPA
© 2016 All Rights Reserved
Brown Smith Wallace LLP
© 2016 All Rights Reserved 37 Brown Smith Wallace LLP
What data analysis procedures can we utilize
to help identify a fraud where employees
create approximately 2 million fake
bank/credit card accounts?
38
Question???
© 2016 All Rights Reserved
Brown Smith Wallace LLP
Employees/Managers/Locations Who
• Consistently meet or beat performance quotas
• Have more than average number of accounts that have not been
accessed by account holder (activity files exist for everything)
• Have more than average number of accounts opened without
customer service interaction (in person, phone, app, online is traced)
• Have more than average number of accounts closed within # days of
opening
• Have more than average number of accounts opened for the same
customer within # of days
• Have complaints against them (textual analysis of complaint tracking
system)
Challenges
• What about the really good salesperson?
• No complaints, surely has a bad month,
• Widespread could cause averages to be skewed
39
Audience Participation
© 2016 All Rights Reserved
Brown Smith Wallace LLP
• Fraud is not going away and we need to devise better
methods to prevent and detect it as early as possible.
• The new COSO Fraud Risk Management Guide encourages
the use of data analytics.
• Data analysis is a great preventative and detective control for
fraud.
• If people think you are watching, they are less likely to try to
commit fraud
• Payroll, P2P, T&E, and FCPA are great places to start
• Hindsight is 20/20, but it can be applied to the future.
40
In Summary
© 2016 All Rights Reserved
Brown Smith Wallace LLP
Any Questions?
Ron Steinkamp | rsteinkamp@bswllc.com | 314-983-1238
Joe Montes | jmontes@bswllc.com | 314-983-1380
41
A Measurable Difference
© 2016 All Rights Reserved
Brown Smith Wallace LLP
6 CityPlace Drive, Suite 900│ St. Louis, Missouri 63141 │ 314.983.1200
1520 S. Fifth St., Suite 309 │ St. Charles, Missouri 63303 │ 636.255.3000
2220 S. State Route 157, Ste. 300 │ Glen Carbon, Illinois 62034 │ 618.654.3100
1.888.279.2792 │ bswllc.com
Brown Smith Wallace is a Missouri Limited Liability Partnership

More Related Content

What's hot

HIPAA Audits: The Dos and Don'ts
HIPAA Audits: The Dos and Don'tsHIPAA Audits: The Dos and Don'ts
HIPAA Audits: The Dos and Don'ts
PYA, P.C.
 
MGI Fraud Report 2017
MGI Fraud Report 2017MGI Fraud Report 2017
MGI Fraud Report 2017
Steve Greene
 
Infographic | Quality of Data & Cost of Bad Data | Sapience Analytics
Infographic | Quality of Data & Cost of Bad Data | Sapience AnalyticsInfographic | Quality of Data & Cost of Bad Data | Sapience Analytics
Infographic | Quality of Data & Cost of Bad Data | Sapience Analytics
Sapience Analytics
 
Российский обзор экономических преступлений за 2016 год
Российский обзор экономических преступлений за 2016 годРоссийский обзор экономических преступлений за 2016 год
Российский обзор экономических преступлений за 2016 год
PwC Russia
 
Findings on health information technology and electronic health records
Findings on health information technology and electronic health recordsFindings on health information technology and electronic health records
Findings on health information technology and electronic health records
Deloitte United States
 
EAI Compliance & Audit Infographic
EAI Compliance & Audit InfographicEAI Compliance & Audit Infographic
EAI Compliance & Audit Infographic
Ideba
 
Первый выпуск PwC Индекса противодействия коррупции
Первый выпуск PwC Индекса противодействия коррупцииПервый выпуск PwC Индекса противодействия коррупции
Первый выпуск PwC Индекса противодействия коррупции
PwC Russia
 
Simple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudSimple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment Fraud
Evan Francen
 
Inside the circle of trust: Data management for modern enterprises
Inside the circle of trust: Data management for modern enterprisesInside the circle of trust: Data management for modern enterprises
Inside the circle of trust: Data management for modern enterprises
Experian Data Quality
 
Payroll Fraud by Andrew Firth, Forensic Accountant
Payroll Fraud by Andrew Firth, Forensic AccountantPayroll Fraud by Andrew Firth, Forensic Accountant
Payroll Fraud by Andrew Firth, Forensic Accountant
Rushmore Forensic
 
Balancing risk with opportunity
Balancing risk with opportunityBalancing risk with opportunity
Balancing risk with opportunity
Grant Thornton LLP
 

What's hot (11)

HIPAA Audits: The Dos and Don'ts
HIPAA Audits: The Dos and Don'tsHIPAA Audits: The Dos and Don'ts
HIPAA Audits: The Dos and Don'ts
 
MGI Fraud Report 2017
MGI Fraud Report 2017MGI Fraud Report 2017
MGI Fraud Report 2017
 
Infographic | Quality of Data & Cost of Bad Data | Sapience Analytics
Infographic | Quality of Data & Cost of Bad Data | Sapience AnalyticsInfographic | Quality of Data & Cost of Bad Data | Sapience Analytics
Infographic | Quality of Data & Cost of Bad Data | Sapience Analytics
 
Российский обзор экономических преступлений за 2016 год
Российский обзор экономических преступлений за 2016 годРоссийский обзор экономических преступлений за 2016 год
Российский обзор экономических преступлений за 2016 год
 
Findings on health information technology and electronic health records
Findings on health information technology and electronic health recordsFindings on health information technology and electronic health records
Findings on health information technology and electronic health records
 
EAI Compliance & Audit Infographic
EAI Compliance & Audit InfographicEAI Compliance & Audit Infographic
EAI Compliance & Audit Infographic
 
Первый выпуск PwC Индекса противодействия коррупции
Первый выпуск PwC Индекса противодействия коррупцииПервый выпуск PwC Индекса противодействия коррупции
Первый выпуск PwC Индекса противодействия коррупции
 
Simple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudSimple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment Fraud
 
Inside the circle of trust: Data management for modern enterprises
Inside the circle of trust: Data management for modern enterprisesInside the circle of trust: Data management for modern enterprises
Inside the circle of trust: Data management for modern enterprises
 
Payroll Fraud by Andrew Firth, Forensic Accountant
Payroll Fraud by Andrew Firth, Forensic AccountantPayroll Fraud by Andrew Firth, Forensic Accountant
Payroll Fraud by Andrew Firth, Forensic Accountant
 
Balancing risk with opportunity
Balancing risk with opportunityBalancing risk with opportunity
Balancing risk with opportunity
 

Viewers also liked

MORAIS, Líria de A. A conectividade entre dançarinos na cena de dança improvi...
MORAIS, Líria de A. A conectividade entre dançarinos na cena de dança improvi...MORAIS, Líria de A. A conectividade entre dançarinos na cena de dança improvi...
MORAIS, Líria de A. A conectividade entre dançarinos na cena de dança improvi...
liriamorays
 
Resultado individual ENDURO MOSSORO 2014
Resultado individual ENDURO MOSSORO 2014Resultado individual ENDURO MOSSORO 2014
Resultado individual ENDURO MOSSORO 2014
Dangleber Pereira Leite
 
Os lusiadas
Os lusiadasOs lusiadas
Os lusiadas
Nataly Silva
 
Memahami Paedagogy
Memahami PaedagogyMemahami Paedagogy
Memahami PaedagogyDaud Muhamad
 
helloMuller: Greatest Hits 2011-2016
helloMuller: Greatest Hits 2011-2016helloMuller: Greatest Hits 2011-2016
helloMuller: Greatest Hits 2011-2016
helloMuller Ltd.
 
Alibaba Group Holding Limited
Alibaba Group Holding LimitedAlibaba Group Holding Limited
Alibaba Group Holding Limited
Suman Nanjappa
 
Sin título 1
Sin título 1Sin título 1
Sin título 1
Abraham Solorzano
 
JIRA ServiceDesk und seine Stolpersteine bei der Einführung
JIRA ServiceDesk und seine Stolpersteine bei der EinführungJIRA ServiceDesk und seine Stolpersteine bei der Einführung
JIRA ServiceDesk und seine Stolpersteine bei der Einführung
Oliver Sträßer
 
Relação mídia vs evangélicos
Relação mídia vs evangélicosRelação mídia vs evangélicos
Relação mídia vs evangélicos
Haroldo Xavier Silva
 
Tefaweb2
Tefaweb2Tefaweb2
お見合いで趣味を聞かれたときに 「IoTとビッグデータを少々」と答えたいSEが読む資料
お見合いで趣味を聞かれたときに 「IoTとビッグデータを少々」と答えたいSEが読む資料お見合いで趣味を聞かれたときに 「IoTとビッグデータを少々」と答えたいSEが読む資料
お見合いで趣味を聞かれたときに 「IoTとビッグデータを少々」と答えたいSEが読む資料
Monta Yashi
 

Viewers also liked (13)

MORAIS, Líria de A. A conectividade entre dançarinos na cena de dança improvi...
MORAIS, Líria de A. A conectividade entre dançarinos na cena de dança improvi...MORAIS, Líria de A. A conectividade entre dançarinos na cena de dança improvi...
MORAIS, Líria de A. A conectividade entre dançarinos na cena de dança improvi...
 
Atividade
AtividadeAtividade
Atividade
 
Resultado individual ENDURO MOSSORO 2014
Resultado individual ENDURO MOSSORO 2014Resultado individual ENDURO MOSSORO 2014
Resultado individual ENDURO MOSSORO 2014
 
Os lusiadas
Os lusiadasOs lusiadas
Os lusiadas
 
Memahami Paedagogy
Memahami PaedagogyMemahami Paedagogy
Memahami Paedagogy
 
helloMuller: Greatest Hits 2011-2016
helloMuller: Greatest Hits 2011-2016helloMuller: Greatest Hits 2011-2016
helloMuller: Greatest Hits 2011-2016
 
Alibaba Group Holding Limited
Alibaba Group Holding LimitedAlibaba Group Holding Limited
Alibaba Group Holding Limited
 
Sin título 1
Sin título 1Sin título 1
Sin título 1
 
JIRA ServiceDesk und seine Stolpersteine bei der Einführung
JIRA ServiceDesk und seine Stolpersteine bei der EinführungJIRA ServiceDesk und seine Stolpersteine bei der Einführung
JIRA ServiceDesk und seine Stolpersteine bei der Einführung
 
Relação mídia vs evangélicos
Relação mídia vs evangélicosRelação mídia vs evangélicos
Relação mídia vs evangélicos
 
Tefaweb2
Tefaweb2Tefaweb2
Tefaweb2
 
お見合いで趣味を聞かれたときに 「IoTとビッグデータを少々」と答えたいSEが読む資料
お見合いで趣味を聞かれたときに 「IoTとビッグデータを少々」と答えたいSEが読む資料お見合いで趣味を聞かれたときに 「IoTとビッグデータを少々」と答えたいSEが読む資料
お見合いで趣味を聞かれたときに 「IoTとビッグデータを少々」と答えたいSEが読む資料
 
MENGELOLA SISWA
MENGELOLA SISWAMENGELOLA SISWA
MENGELOLA SISWA
 

Similar to 2016 MSCPA Fraud Conference Presentation

Internal Controls and Effective Report Writing - sent to MSCPA
Internal Controls and Effective Report Writing - sent to MSCPAInternal Controls and Effective Report Writing - sent to MSCPA
Internal Controls and Effective Report Writing - sent to MSCPARon Steinkamp
 
Data-Ed Webinar: Data Quality Success Stories
Data-Ed Webinar: Data Quality Success StoriesData-Ed Webinar: Data Quality Success Stories
Data-Ed Webinar: Data Quality Success Stories
DATAVERSITY
 
Convercent Webinar Ethisphere Strategy Report
Convercent Webinar Ethisphere Strategy ReportConvercent Webinar Ethisphere Strategy Report
Convercent Webinar Ethisphere Strategy Report
Melissa Kovach
 
Compliance Strategy and Performance
Compliance Strategy and PerformanceCompliance Strategy and Performance
Compliance Strategy and Performance
Ethisphere
 
ACC November Luncheon: Integrating Analytics Into Fraud Investigations & Comp...
ACC November Luncheon: Integrating Analytics Into Fraud Investigations & Comp...ACC November Luncheon: Integrating Analytics Into Fraud Investigations & Comp...
ACC November Luncheon: Integrating Analytics Into Fraud Investigations & Comp...
Amber Clark
 
The path to a Modern Data Architecture in Financial Services
The path to a Modern Data Architecture in Financial ServicesThe path to a Modern Data Architecture in Financial Services
The path to a Modern Data Architecture in Financial Services
Hortonworks
 
Top 10 Artifacts Needed For Data Governance
Top 10 Artifacts Needed For Data GovernanceTop 10 Artifacts Needed For Data Governance
Top 10 Artifacts Needed For Data Governance
First San Francisco Partners
 
DV 2016: Why Your Organization Needs Data and Analytics Governance
DV 2016: Why Your Organization Needs Data and Analytics GovernanceDV 2016: Why Your Organization Needs Data and Analytics Governance
DV 2016: Why Your Organization Needs Data and Analytics Governance
Tealium
 
How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...
How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...
How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...
DATAVERSITY
 
Third-Party Oversight & Governance
Third-Party Oversight & GovernanceThird-Party Oversight & Governance
Third-Party Oversight & Governance
EDR
 
Detox Your Vendor Master File Process: How to Sanitize & Stabilize your VMF P...
Detox Your Vendor Master File Process: How to Sanitize & Stabilize your VMF P...Detox Your Vendor Master File Process: How to Sanitize & Stabilize your VMF P...
Detox Your Vendor Master File Process: How to Sanitize & Stabilize your VMF P...
Lavante Inc.
 
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksRachel Hamilton
 
How Big Data and Predictive Analytics are Transforming the World of Accountin...
How Big Data and Predictive Analytics are Transforming the World of Accountin...How Big Data and Predictive Analytics are Transforming the World of Accountin...
How Big Data and Predictive Analytics are Transforming the World of Accountin...
Swenson Advisors, LLP
 
Missouri Bar - Legal Ethics and the False Claims Act - May 2018
Missouri Bar - Legal Ethics and the False Claims Act - May 2018Missouri Bar - Legal Ethics and the False Claims Act - May 2018
Missouri Bar - Legal Ethics and the False Claims Act - May 2018
Downey Law Group LLC
 
Data Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and MonitoringData Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and Monitoring
Jim Kaplan CIA CFE
 
PREPARING FOR COMPLIANCE CHANGES UNDER A NEW ADMINISTRATION
PREPARING FOR COMPLIANCE CHANGES UNDER A NEW ADMINISTRATIONPREPARING FOR COMPLIANCE CHANGES UNDER A NEW ADMINISTRATION
PREPARING FOR COMPLIANCE CHANGES UNDER A NEW ADMINISTRATION
Human Capital Media
 
FUTURE READY HR: STRATEGIES FOR POSITIVE WORKPLACE CULTURE
FUTURE READY HR: STRATEGIES FOR POSITIVE WORKPLACE CULTUREFUTURE READY HR: STRATEGIES FOR POSITIVE WORKPLACE CULTURE
FUTURE READY HR: STRATEGIES FOR POSITIVE WORKPLACE CULTURE
Human Capital Media
 
Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014
Rebecca1243
 
Enterprise policy-management
Enterprise policy-managementEnterprise policy-management
Enterprise policy-management
Amit Bhargava
 
Improve Regulatory Compliance & Risk Management Using Best Practices
Improve Regulatory Compliance & Risk Management Using Best PracticesImprove Regulatory Compliance & Risk Management Using Best Practices
Improve Regulatory Compliance & Risk Management Using Best Practices
Lavante Inc.
 

Similar to 2016 MSCPA Fraud Conference Presentation (20)

Internal Controls and Effective Report Writing - sent to MSCPA
Internal Controls and Effective Report Writing - sent to MSCPAInternal Controls and Effective Report Writing - sent to MSCPA
Internal Controls and Effective Report Writing - sent to MSCPA
 
Data-Ed Webinar: Data Quality Success Stories
Data-Ed Webinar: Data Quality Success StoriesData-Ed Webinar: Data Quality Success Stories
Data-Ed Webinar: Data Quality Success Stories
 
Convercent Webinar Ethisphere Strategy Report
Convercent Webinar Ethisphere Strategy ReportConvercent Webinar Ethisphere Strategy Report
Convercent Webinar Ethisphere Strategy Report
 
Compliance Strategy and Performance
Compliance Strategy and PerformanceCompliance Strategy and Performance
Compliance Strategy and Performance
 
ACC November Luncheon: Integrating Analytics Into Fraud Investigations & Comp...
ACC November Luncheon: Integrating Analytics Into Fraud Investigations & Comp...ACC November Luncheon: Integrating Analytics Into Fraud Investigations & Comp...
ACC November Luncheon: Integrating Analytics Into Fraud Investigations & Comp...
 
The path to a Modern Data Architecture in Financial Services
The path to a Modern Data Architecture in Financial ServicesThe path to a Modern Data Architecture in Financial Services
The path to a Modern Data Architecture in Financial Services
 
Top 10 Artifacts Needed For Data Governance
Top 10 Artifacts Needed For Data GovernanceTop 10 Artifacts Needed For Data Governance
Top 10 Artifacts Needed For Data Governance
 
DV 2016: Why Your Organization Needs Data and Analytics Governance
DV 2016: Why Your Organization Needs Data and Analytics GovernanceDV 2016: Why Your Organization Needs Data and Analytics Governance
DV 2016: Why Your Organization Needs Data and Analytics Governance
 
How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...
How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...
How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...
 
Third-Party Oversight & Governance
Third-Party Oversight & GovernanceThird-Party Oversight & Governance
Third-Party Oversight & Governance
 
Detox Your Vendor Master File Process: How to Sanitize & Stabilize your VMF P...
Detox Your Vendor Master File Process: How to Sanitize & Stabilize your VMF P...Detox Your Vendor Master File Process: How to Sanitize & Stabilize your VMF P...
Detox Your Vendor Master File Process: How to Sanitize & Stabilize your VMF P...
 
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
 
How Big Data and Predictive Analytics are Transforming the World of Accountin...
How Big Data and Predictive Analytics are Transforming the World of Accountin...How Big Data and Predictive Analytics are Transforming the World of Accountin...
How Big Data and Predictive Analytics are Transforming the World of Accountin...
 
Missouri Bar - Legal Ethics and the False Claims Act - May 2018
Missouri Bar - Legal Ethics and the False Claims Act - May 2018Missouri Bar - Legal Ethics and the False Claims Act - May 2018
Missouri Bar - Legal Ethics and the False Claims Act - May 2018
 
Data Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and MonitoringData Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and Monitoring
 
PREPARING FOR COMPLIANCE CHANGES UNDER A NEW ADMINISTRATION
PREPARING FOR COMPLIANCE CHANGES UNDER A NEW ADMINISTRATIONPREPARING FOR COMPLIANCE CHANGES UNDER A NEW ADMINISTRATION
PREPARING FOR COMPLIANCE CHANGES UNDER A NEW ADMINISTRATION
 
FUTURE READY HR: STRATEGIES FOR POSITIVE WORKPLACE CULTURE
FUTURE READY HR: STRATEGIES FOR POSITIVE WORKPLACE CULTUREFUTURE READY HR: STRATEGIES FOR POSITIVE WORKPLACE CULTURE
FUTURE READY HR: STRATEGIES FOR POSITIVE WORKPLACE CULTURE
 
Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014Contego Fraud Solutions Ltd fin tech week 2014
Contego Fraud Solutions Ltd fin tech week 2014
 
Enterprise policy-management
Enterprise policy-managementEnterprise policy-management
Enterprise policy-management
 
Improve Regulatory Compliance & Risk Management Using Best Practices
Improve Regulatory Compliance & Risk Management Using Best PracticesImprove Regulatory Compliance & Risk Management Using Best Practices
Improve Regulatory Compliance & Risk Management Using Best Practices
 

More from Ron Steinkamp

Q4-2016 Public Sector Risk Briefing - Third Party Contract Reviews (STL)
Q4-2016 Public Sector Risk Briefing - Third Party Contract Reviews (STL)Q4-2016 Public Sector Risk Briefing - Third Party Contract Reviews (STL)
Q4-2016 Public Sector Risk Briefing - Third Party Contract Reviews (STL)Ron Steinkamp
 
2016 MSCPA Fraud Conference Presentation
2016 MSCPA Fraud Conference Presentation2016 MSCPA Fraud Conference Presentation
2016 MSCPA Fraud Conference PresentationRon Steinkamp
 
Public Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGAPublic Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGARon Steinkamp
 
Public Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIAPublic Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIARon Steinkamp
 
Occupational Fraud The Facts and How to Protect Your Organization Webinar_FIN...
Occupational Fraud The Facts and How to Protect Your Organization Webinar_FIN...Occupational Fraud The Facts and How to Protect Your Organization Webinar_FIN...
Occupational Fraud The Facts and How to Protect Your Organization Webinar_FIN...Ron Steinkamp
 
Q2-2016 Public Sector Risk Briefing Employee Engagement Trends
Q2-2016 Public Sector Risk Briefing Employee Engagement TrendsQ2-2016 Public Sector Risk Briefing Employee Engagement Trends
Q2-2016 Public Sector Risk Briefing Employee Engagement TrendsRon Steinkamp
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...Ron Steinkamp
 
Trends in Local Government
Trends in Local GovernmentTrends in Local Government
Trends in Local GovernmentRon Steinkamp
 
Q1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementQ1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementRon Steinkamp
 
Contract Performance Fraud
Contract Performance FraudContract Performance Fraud
Contract Performance FraudRon Steinkamp
 
Contract Procurement Fraud
Contract Procurement FraudContract Procurement Fraud
Contract Procurement FraudRon Steinkamp
 
Q4-2015 Public Sector Risk Briefing Presentation by Ron Steinkamp
Q4-2015 Public Sector Risk Briefing Presentation by Ron SteinkampQ4-2015 Public Sector Risk Briefing Presentation by Ron Steinkamp
Q4-2015 Public Sector Risk Briefing Presentation by Ron SteinkampRon Steinkamp
 
2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot Spots2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot SpotsRon Steinkamp
 
BSW Value of Muni Audits
BSW Value of Muni AuditsBSW Value of Muni Audits
BSW Value of Muni AuditsRon Steinkamp
 
Steps to Prevent Detect Occupational Fraud in Government (Final)
Steps to Prevent  Detect Occupational Fraud in Government (Final)Steps to Prevent  Detect Occupational Fraud in Government (Final)
Steps to Prevent Detect Occupational Fraud in Government (Final)Ron Steinkamp
 
Emotional Intelligence - St. Charles - June 3, 2015
Emotional Intelligence - St. Charles - June 3, 2015Emotional Intelligence - St. Charles - June 3, 2015
Emotional Intelligence - St. Charles - June 3, 2015Ron Steinkamp
 
Emotional Intelligence - St. Louis - June 5, 2015
Emotional Intelligence - St. Louis - June 5, 2015Emotional Intelligence - St. Louis - June 5, 2015
Emotional Intelligence - St. Louis - June 5, 2015Ron Steinkamp
 
Steps to Prevent Detect Occupational Fraud in Government (Final)
Steps to Prevent  Detect Occupational Fraud in Government (Final)Steps to Prevent  Detect Occupational Fraud in Government (Final)
Steps to Prevent Detect Occupational Fraud in Government (Final)Ron Steinkamp
 
Fraud Prevention & Detection for Local Government
Fraud Prevention & Detection for Local GovernmentFraud Prevention & Detection for Local Government
Fraud Prevention & Detection for Local GovernmentRon Steinkamp
 

More from Ron Steinkamp (20)

Q4-2016 Public Sector Risk Briefing - Third Party Contract Reviews (STL)
Q4-2016 Public Sector Risk Briefing - Third Party Contract Reviews (STL)Q4-2016 Public Sector Risk Briefing - Third Party Contract Reviews (STL)
Q4-2016 Public Sector Risk Briefing - Third Party Contract Reviews (STL)
 
2016 MSCPA Fraud Conference Presentation
2016 MSCPA Fraud Conference Presentation2016 MSCPA Fraud Conference Presentation
2016 MSCPA Fraud Conference Presentation
 
Public Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGAPublic Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGA
 
Public Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIAPublic Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIA
 
Occupational Fraud The Facts and How to Protect Your Organization Webinar_FIN...
Occupational Fraud The Facts and How to Protect Your Organization Webinar_FIN...Occupational Fraud The Facts and How to Protect Your Organization Webinar_FIN...
Occupational Fraud The Facts and How to Protect Your Organization Webinar_FIN...
 
Q2-2016 Public Sector Risk Briefing Employee Engagement Trends
Q2-2016 Public Sector Risk Briefing Employee Engagement TrendsQ2-2016 Public Sector Risk Briefing Employee Engagement Trends
Q2-2016 Public Sector Risk Briefing Employee Engagement Trends
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
 
Contract Risks
Contract RisksContract Risks
Contract Risks
 
Trends in Local Government
Trends in Local GovernmentTrends in Local Government
Trends in Local Government
 
Q1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementQ1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk Management
 
Contract Performance Fraud
Contract Performance FraudContract Performance Fraud
Contract Performance Fraud
 
Contract Procurement Fraud
Contract Procurement FraudContract Procurement Fraud
Contract Procurement Fraud
 
Q4-2015 Public Sector Risk Briefing Presentation by Ron Steinkamp
Q4-2015 Public Sector Risk Briefing Presentation by Ron SteinkampQ4-2015 Public Sector Risk Briefing Presentation by Ron Steinkamp
Q4-2015 Public Sector Risk Briefing Presentation by Ron Steinkamp
 
2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot Spots2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot Spots
 
BSW Value of Muni Audits
BSW Value of Muni AuditsBSW Value of Muni Audits
BSW Value of Muni Audits
 
Steps to Prevent Detect Occupational Fraud in Government (Final)
Steps to Prevent  Detect Occupational Fraud in Government (Final)Steps to Prevent  Detect Occupational Fraud in Government (Final)
Steps to Prevent Detect Occupational Fraud in Government (Final)
 
Emotional Intelligence - St. Charles - June 3, 2015
Emotional Intelligence - St. Charles - June 3, 2015Emotional Intelligence - St. Charles - June 3, 2015
Emotional Intelligence - St. Charles - June 3, 2015
 
Emotional Intelligence - St. Louis - June 5, 2015
Emotional Intelligence - St. Louis - June 5, 2015Emotional Intelligence - St. Louis - June 5, 2015
Emotional Intelligence - St. Louis - June 5, 2015
 
Steps to Prevent Detect Occupational Fraud in Government (Final)
Steps to Prevent  Detect Occupational Fraud in Government (Final)Steps to Prevent  Detect Occupational Fraud in Government (Final)
Steps to Prevent Detect Occupational Fraud in Government (Final)
 
Fraud Prevention & Detection for Local Government
Fraud Prevention & Detection for Local GovernmentFraud Prevention & Detection for Local Government
Fraud Prevention & Detection for Local Government
 

2016 MSCPA Fraud Conference Presentation

  • 1. Using Data Analytics to Find Fraud Indicators Ron Steinkamp Joe Montes November 30, 2016
  • 2. • COSO Fraud Risk Management • What is Data Analysis? • Data Analysis Benefits & Challenges • Perspectives on Data Analysis • Using Data Analysis to Find Fraud Indicators • Exercise 2 Agenda © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 3. © 2016 All Rights Reserved 3 Brown Smith Wallace LLP
  • 4. • COSO issued Fraud Risk Management Guide. • Guidance on how to deter fraud. • 5 Fraud Risk Management Principles. • Aligned with the COSO Framework Components and Principles. • Further detailed in Points of Focus related to each Principle. • Can be used as a starting point to develop a Fraud Risk Management Program. 4 COSO Fraud Risk Management Guide © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 5. 1. The organization establishes and communicates a Fraud Risk Management Program that demonstrates the expectations of the board of directors and senior management and their commitment to high integrity and ethical values regarding managing fraud risk. CONTROL ENVIRONMENT 5 Fraud Risk Management Principles © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 6. 2. The organization performs comprehensive fraud risk assessments to identify specific fraud schemes and risks, assess their likelihood and significance, evaluate existing fraud control activities, and implement actions to mitigate residual fraud risks. RISK ASSESSMENT 6 Fraud Risk Management Principles © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 7. 3. The organization selects, develops, and deploys preventive and detective fraud control activities to mitigate the risk of fraud events occurring or not being detected in a timely manner. CONTROL ACTIVITIES 7 Fraud Risk Management Principles © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 8. 4. The organization establishes a communication process to obtain information about potential fraud and deploys a coordinated approach to investigation and corrective action to address fraud appropriately and in a timely manner. INFORMATION & COMMUNICATION 8 Fraud Risk Management Principles © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 9. 5. The organization selects, develops, an performs ongoing evaluations to ascertain whether each of the five principles of fraud risk management is present and functioning and communicates Fraud Risk Management Program deficiencies in a timely manner to parties responsible for taking corrective action, including senior management and the board. MONITORING ACTIVITIES 9 Fraud Risk Management Principles © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 10. • Data analytics is addressed as a Point of Focus within the Fraud Risk Management Principles. Use data analytics for fraud risk assessment and response. Use proactive data analytic procedures to identify transactions or events for further investigation. • Appendix E of the COSO Fraud Risk Management Guide covers the use of data analytics in fraud risk management. 10 What Does This Have to Do With Data Analytics? © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 11. © 2016 All Rights Reserved 11 Brown Smith Wallace LLP
  • 12. • Process of extracting, inspecting, cleaning, transforming, and modeling data in order to discover useful information, derive conclusions, and support decision-making – Employees are not using a system field as intended – Controls are not functioning properly – Vendor master access should be restricted 12 Data Analysis Defined © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 13. © 2016 All Rights Reserved 13 Brown Smith Wallace LLP
  • 14. • 100% vs. sampling • Brings Operational and IT together • Comparison to an outside source • Identification of control weaknesses • Re-performable • Red flags and trends • Log = Workpaper 14 Data Analysis Benefits © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 15. 15 Challenges © 2016 All Rights Reserved Brown Smith Wallace LLP Overall •Employee Resources • Limited know how • Analysis is most effective with good business, process, and system knowledge • Check the box mentality •What is Success? •Technology Choices •Boiling the Ocean
  • 16. Data Quality and Availability • Lack of access • Disparate systems • Weak system controls lead to bad data • Bad data leads to bad information • Integrity tests: • Corruption • Completeness • Uniqueness • Logical relationships • Proper boundaries 16 Challenges © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 17. Actual Objectives • Ability to effectively achieve objectives selected • Defining exceptions • Investigating exceptions • Business processes change 17 Challenges © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 18. © 2016 All Rights Reserved 18 Brown Smith Wallace LLP
  • 19. • The AICPA has said that use of technological improvements in Audit have been incremental rather than transformative • To advance data analytics in Internal Audit – Data analytics must be part of the mission – Funding must be available to buy the tools and provide training – Auditors must learn the appropriate skills – Time must be budgeted and allocated – The data must be readily available – The data must be accurate 19 Data Surveys © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 20. • Internal Audit initially detecting fraud increased from 14.4% to 16.5% between 2012 and 2016 • Larger organizations showed Internal Audit detecting 18.6% of cases • Greatest Inhibitors to Data Analysis Success – Lack of appropriate skills – Data to be integrated is not clean – Complexity of implementation – Inability to integrate necessary data sources – Lack of integration with existing systems – Solutions are difficult to use – Inability to customize for specific needs 20 ACFE © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 21. “Not auditing the data in your company’s ERP system wastes the amount of money and time spent implementing it.” “Analysts can’t just be good at scripting, they have to be able to identify risks, interpret results, and audit exceptions.” “None of the technologies understand relationships, business changes, or critical thinking. The Human factor will always be there. You will never set it and forget it.” “Everything IT serves the business and is not just an IT risk.” “In 10 years, computers will do all of this and humans won’t be needed.” 21 Recent Conferences © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 22. “Analytics should be used to add, drop, and accelerate audits in the audit plan. It should not be a document updated yearly.” “Coordination between Compliance and Internal Audit to share data and coordinate schedules will increase everyone’s effectiveness.” “Data analysis is worth the effort. So much to gain. Hang in there.” “Every control review can have a fraud focus with data analytics and the right auditors.” Intelligence should not be acquired just for the sake of integrating more data; the strategic focus should be on ‘acquiring intelligence with a purpose’.” 22 Recent Conferences © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 23. © 2016 All Rights Reserved 23 Brown Smith Wallace LLP
  • 24. • First Thing! • Various standard steps to understand a file • Experience Hours Reputation 24 Data Integrity Verification © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 25. Main Categories • Statistics • Counts • Totals • Blanks • Classifies • Duplicates • Gaps • Logical Relationships 25 Data Integrity Verification © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 26. Ghost Employee red flags • Duplicate addresses, routing numbers, SSNs • Employee record has been accessed/edited by one person • HR compared v. Payroll v. other systems • No withholdings or deductions • No vacation or sick time • No overtime for hourly • Blank fields • PO Box 26 Payroll © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 27. Payment Red Flags • Frequent changes to bank numbers • Terminated employees with current pay • Employees with multiple bank accounts • Bank accounts with multiple employees • Excessive Overtime 27 Payroll Continued © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 28. Process Red Flags • Segregation of duties • Date Comparisons • Quantity Comparisons • Amount Comparison 28 Accounts Payable © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 29. Employee / Vendor Red Flags • Same name • Matching addresses or routing numbers • Last name or Initials as part of vendor name • Disclosure and emergency contact comparison 29 AP Continued © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 30. Vendor Red Flags • Same vendor with different vendor number • Vendor type does not match vendor spend • Vendor type does not match purchaser • Frequent or Inappropriate changes • Inactive vendor with activity • Unusual payment terms • PO Box or no address • One-time vendors 30 AP Continued © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 31. Payable Red Flags • Frequent or Inappropriate changes • Single payment run • Payment runs at unusual times • Checks to different address than master • Invoice and check sequence 31 AP Continued © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 32. Duplicate Red Flags Same expense reimbursed more than once • Identify employees that report expenses for the same transaction dates on multiple expense reports. This makes duplication harder to identify. • Look at transactions not paid via company card, could also be duplicate of card transaction (same date, transaction amount, and vendor/expense type). • Identify same transaction reported on different individuals’ expense reports. 32 Travel & Entertainment © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 33. Other Red Flags • Unexpected dates, vendor names, individual names, or keywords • Round dollars (gift cards, cash) • Employees who have more than the average quantity or amount of transactions in higher risk or specific expense categories. • Identify expenses with unusual Merchant Category Codes (MCC) based on company policy or transaction type selected by the employee. • Spending zip code 33 T & E Continued © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 34. Other Red Flags • Weekends or holidays • Declined or disputed transactions • Large transactions • Active cards v. current employee • Approval workflow • Missing receipts 34 P-Card © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 35. Foreign Corrupt Practices Act • It is unlawful to make a corrupt payment to a foreign official for the purpose of influencing the official in order to assist in obtaining/retaining business • Companies who file reports with the SEC must maintain records that accurately reflect transactions and the nature and quantity of corporate assets and liabilities • Yates memo made it personal • Lower fines by making corruption as difficult to perpetrate as you can 35 FCPA © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 36. Other Red Flags • Names and addresses on the SAM list, etc. • Keyword search in payables, general ledger, P-Cards, T&E • Journal entries with unexpected account combinations of accounts (e.g. debit to sales/credit to cash) • Analyze sales and commission information • Identify payroll, travel advances, or travel reimbursements to non-employee • Test currency exchange expectations • Purchasing costs 36 FCPA © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 37. © 2016 All Rights Reserved 37 Brown Smith Wallace LLP
  • 38. What data analysis procedures can we utilize to help identify a fraud where employees create approximately 2 million fake bank/credit card accounts? 38 Question??? © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 39. Employees/Managers/Locations Who • Consistently meet or beat performance quotas • Have more than average number of accounts that have not been accessed by account holder (activity files exist for everything) • Have more than average number of accounts opened without customer service interaction (in person, phone, app, online is traced) • Have more than average number of accounts closed within # days of opening • Have more than average number of accounts opened for the same customer within # of days • Have complaints against them (textual analysis of complaint tracking system) Challenges • What about the really good salesperson? • No complaints, surely has a bad month, • Widespread could cause averages to be skewed 39 Audience Participation © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 40. • Fraud is not going away and we need to devise better methods to prevent and detect it as early as possible. • The new COSO Fraud Risk Management Guide encourages the use of data analytics. • Data analysis is a great preventative and detective control for fraud. • If people think you are watching, they are less likely to try to commit fraud • Payroll, P2P, T&E, and FCPA are great places to start • Hindsight is 20/20, but it can be applied to the future. 40 In Summary © 2016 All Rights Reserved Brown Smith Wallace LLP
  • 41. Any Questions? Ron Steinkamp | rsteinkamp@bswllc.com | 314-983-1238 Joe Montes | jmontes@bswllc.com | 314-983-1380 41 A Measurable Difference © 2016 All Rights Reserved Brown Smith Wallace LLP 6 CityPlace Drive, Suite 900│ St. Louis, Missouri 63141 │ 314.983.1200 1520 S. Fifth St., Suite 309 │ St. Charles, Missouri 63303 │ 636.255.3000 2220 S. State Route 157, Ste. 300 │ Glen Carbon, Illinois 62034 │ 618.654.3100 1.888.279.2792 │ bswllc.com Brown Smith Wallace is a Missouri Limited Liability Partnership