SlideShare a Scribd company logo
1 of 31
Corruption and Fraud Risk Management using
ISO 31000
03.06.15
Project manager
Valentyn Sysoev
Kyiv, Ukraine
Consulting, audit
E-mail : v.sysoev@auditagency.com.ua
Valentyn has more than 8 years experience on information security area as
consultant, auditor and advisor. Valentyn provided services for financial,
insurance, industrial, energy and others customers as an expert on
information security and risk management.
Valentyn leads the consulting and audit projects as well as projects related
to IS audit and IS assurance, crisis and business continuity management,
international standards implementation – specifically PCIDSS, ISO27001
ISMS, ISO31000 Risk Management, ISO21500 Project Management,
ISO38500 Corporate Governance of IT, ITIL 3, Cobit 5, VISA and
MasterCard.
Education and certification:
• Master’s degree on information security
• CISА - Certified Information System Auditor (ISACA)
• CISM - Certified Information Security Manager (ISACA)
• Certified ISO/IEC 27001 Lead Auditor (PECB)
• Certified ISO 27005 Risk Manager (PECB)
Common information:
• Information security governance
• Crisis management and business continuity management
• Incident management
• Antifraud, fraud detection
• Physical and HR security
• Information and operational risks management
• Project Management
• Corporate Governance
Specialization
Chosen experience:
• More than 30 projects in consulting: ISMS according ISO 27001,
PCI DSS, Pin Security, BCPDR, ISO 9001, ISO 31000, information
and operational security risks, security awareness, incident and
business continuity management.
• More than 25 projects on IT&IS audit: to comply ISO27001, Cobit
4.1, PCI DSS, IS internal controls audit, third party audit.
• More than 5 projects on information system assurance:
information systems and networks penetration tests, social
engineering, physical penetration test, vulnerability scanning.
© Active Audit Agency03.06.2015 3
Summary of Webinar
• In this webinar, participants develop the competence to master a model for implementing
corruption and fraud risk management processes throughout their organization using the ISO
31000:2009 standard as a reference framework.
• During this training, I will present the ISO 31000 general risk management standard, the process
model it recommends, and how companies may use the standard for corruption and fraud risk
management.
Learning objectives
• To understand the concepts, approaches, methods and techniques allowing an effective
corruption and fraud risk management according to ISO 31000
• To acquire the competence to implement, maintain and manage an ongoing corruption and
fraud risk management using ISO 31000
• To acquire the competence to effectively advise organizations on the best practices in corruption
and fraud risk management
03.06.2015 © Active Audit Agency 4
Scope and Objectives
• Corruption and fraud risk assessment is required by the Law of Ukraine
«On Prevention of Corruption»
o The head of legal entity shall ensure the corruption and fraud risk
assessment within its organization and provide adequate controls.
o Anti-corruption programs shall be developed subject to corruption
and fraud risk assessment and be inclusive of “guidelines, standards
and procedures on corruption and fraud risk management within the
organization”.
• Risk assessment framework is based on International Standard ISO/IEC
31000:2009 “Risk management — Principles and guidelines on
Implementation” as well as on international background of such
corruption risk assessment methodologies and corruption prevention
planning as in Slovenia, Serbia, Montenegro, Australia and USA.
03.06.2015 © Active Audit Agency 5
Background
03.06.2015 © Active Audit Agency 6
Corruption and fraud risks
assessment - main stages
Corruption risks assessment
2. Corruption and fraud risks detection
2.1 Functions and
processes description
2.2 Detecting threats
and risk factors
2.3 Existing controls
Analysis
2.4 Corruption and
fraud risk description
3. Corruption and fraud risks analysis and evaluation
3.1 Threat likelihood
assessment
3.2 Impact
assessment
3.3 Risk levels
evaluation
3.4 Risks assessment
report
4. Corruption and fraud risk response
4.1 Risk response actions 4.2 Residual risks
4.3 Corruption and fraud
prevention plan
5.Communicationandconsulting
6.RisksMonitoringandreview
1. Preparation and planning
1.1 Preparatory actions
1.2 Understanding the
organization and its environment
1.3 Assessment planning
• Choose a format
– Self assessment, i.e. internally by institution’s personnel without
external experts involvement or
– Together with invited experts, skilled and knowledgeable to the
methodology of corruption and fraud risks assessment or
– Fully outsourced to external experts
• Working group creation
– Structure, privileges, training
• Communicating to institution’s personnel
• Develop the plan
03.06.2015 © Active Audit Agency 7
Stage 1.1
Preparatory actions
Risk assessment plan
03.06.2015 © Active Audit Agency 8
Stage 1.1
Preparatory actions
Terms Of delivery
# Stage Actions and tasks Responsible Start date End date
Preparation and planning of corruption risk assessment
1
Preparatory actions
Working group training
2 Risk assessment plan development
3 Understanding the
institution and its
functional
environments
Definition of external and internal parties of the
institution
4
Analysis and understanding external and internal
environments of the institution
5
Collection and
analysis of
information
Preparation of the necessary documentation and
list and sources of information
6
Collection of required documentation and
information
Processes identification and modelling7
8
Justification of the processes and models by
Working group and analysis planning
• ISO 31000 expects you to consider your organization’s context (pros and cons)
through the:
– External environment (external factors that cause/control corruption)
• independency, budged, appointment of the top management, strategies, control, security
issues, citizens, etc.
• to identify external strengths, weaknesses, opportunities and threats regards corruption
– Internal environment (internal factors that cause/control corruption)
• includes organsational aspects (legislation, processes, objectives, competences etc.), human
resouces (capabilities) and implementation of processes in practice (legal framework vs.
practice, sanctions, transparency) with the aim to consider its
– Objectives and strategies in place to achieve objectives
– Governance, structure, roles and accountabilities
– Capability of people, systems and processes
– Decision-making process,
– Human, technological and financial resources,
– Changes to processes or compliance obligations
03.06.2015 © Active Audit Agency 9
Stage 1.2
Understanding the institution and its
functional environments
• The output of this stage in the risk management process:
– pros and cons - external and internal factors that cause / control
corruption and fraud in institution
– detail organisation's objectives, processes / functions, competences,
legal framework, expectations of citizens,
– set out a number of areas which should be allocated attention
• These can then be used to prioritise the order in which you attack the next
task.
– basically, to know your organizational pros and cons regards
corruption and fraud.
03.06.2015 © Active Audit Agency 10
Stage 1.2
Understanding the institution and its
functional environments
Define the approaches and methods for risk assessment and supporting
tools development
• Common and/or anonymous surveys (questionnaires) for employees or external parties
• Brain storm
• Focus groups
• Deep/ structured interview
• Checklists
• Observing the daily activities
• Scenario analysis
• Delphi method
• Information systems analysis
• Legislation, regulatory and other documentation analysis
03.06.2015 © Active Audit Agency 11
Stage 1.3
Assessment planning
03.06.2015 © Active Audit Agency 12
Stage 2
Corruption and fraud risks detection
Corruption risks assessment
2. Corruption and fraud risks detection
2.1 Functions and
processes description
2.2 Detecting threats
and risk factors
2.3 Existing controls
Analysis
2.4 Corruption and
fraud risk description
3. Corruption and fraud risks analysis and evaluation
3.1 Threat likelihood
assessment
3.2 Impact
assessment
3.3 Risk levels
evaluation
3.4 Risks assessment
report
4. Corruption and fraud risk response
4.1 Risk response actions 4.2 Residual risks
4.3 Corruption and fraud
prevention plan
5.Communicationandconsulting
6.RisksMonitoringandreview
1. Preparation and planning
1.1 Preparatory actions
1.2 Understanding the
organization and its environment
1.3 Assessment planning
Why to describe functions and processes
Corruption and fraud are usually connected to decision making process and appears because of
vulnerability to corruptionfraud from the process and conditions perspective related to it. Thus we
need to analyze main and secondary processes of organization in detail to identify if they are
vulnerable to corruption and fraud..
03.06.2015 © Active Audit Agency 13
Stage 2.1
Functions and processes description
Institution’s function 1 Institution’s function 2 Institution’s function n
Process1.1
Process1.2
Process1.n
Process2.1
Process2.2
Process2.n
Processn.1
Processn.2
Processn.n
Institution
Fraud factors Fraud factors Fraud factors
Fraudthreat
Fraudthreat
Fraudthreat
Fraudthreat
Fraudthreat
Fraudthreat
Fraudthreat
Fraudthreat
Fraudthreat
Functions and processes description order
The functions and processes of the institution have to be reviewed from
upper level to lower levels. The order to perform description has to be the
following:
• Function description;
• Processes (high level) description for the every function;
• Sub-processes description (low level processes);
• Operations/ procedures / steps description for each process.
03.06.2015 © Active Audit Agency 14
Stage 2.1
Functions and processes description
Institution’s functions Processes Sub-processes and tasks
Tools to be used for business-process description
In order to describe and perform the modelling of functions and business-
processes you may use the following software:
• MS Visio or other diagram editor ;
• MS Word or other word processing software;
• MS Excel or other electronic spreadsheet software;
• Specific software if available (ARIS, Industry Print, QPR Suite …).
03.06.2015 © Active Audit Agency 15
Stage 2.1
Functions and processes description
Define IN
and OUT
for the
process
Define the
resources
Produce a
process
model
Describe a
process
model in
selected
format
Check a
process
model
Document and
approve
Tools to define corruptionfraud action threats and factors
 The definition of corruptionfraud action factors and threats is done
based on:
 information, gathered by working group during interview
 internal normative documentation, which governs the activities of the
institution and/or business unit,
 information from business process observation and its performance.
 also we may use the other methods and tools chosen earlier during risk
assessment planning phase.
03.06.2015 © Active Audit Agency 16
Stages 2.2
Risk threats and factors definition
Corruption and fraud factors detection
 The goal of this stage is to detect the whole list of possible corruption
and fraud factors, which may exist in the functions, processes,
procedures, regulations, information systems etc., and can be used to
exploit the potential corruption action threats.
 The corruption and fraud factors are:
 process or group of the processes shortcomings,
 absence or insufficiency of corruption prevention controls,
 contradictions of the requirements or the possibility of theirs dual
interpretation,
 complexity or excessive bureaucracy of the process
– that is all what may lead to misuse of the official position to gain undue
advantage.
03.06.2015 © Active Audit Agency 17
Stages 2.2
Risk threats and factors definition
Corruption and fraud factors
03.06.2015 © Active Audit Agency 18
Stages 2.2
Risk threats and factors definition
Human
Factor (H)
Ethical factors and
conflict of interest (E)
• Realization of institution’s anti-corruption policy
• Unregulated the conflict of interest
• Material and intangible gifts, donations to workers
• Donations, charity funding to the institution
• Protection of whistleblowers (informers)
• False motives
• Financial perturbations
• Pressure and intrusions
• The level of realization
Organizational and
operational factors (O)
• Collisions and contradictions
in regulatory acts and
regulations
• Decision making process is
arbitrary
• Terms of decision making are
arbitrary
• The functions, rights,
responsibilities and
accountability are blurred
• Abuse of contacts
• Information is closed
• Unregulated relationships
with interested parties
• Excessive burdens
Corruption and fraud action threats detection
The corruption and fraud factors doesn’t produce any impact by
themselves, corruption and fraud action threats must exist in order to
exploit them.
03.06.2015 © Active Audit Agency 19
Stages 2.2
Risk threats and factors definition
CORRUPTION
 Bribery  Nepotism
 Stealing  Conflict of Interest
 Fraud  Collusion
 Extortion  Exaction
 Abuse  Resource exploitation
• As the result of this stage all existing controls on corruption prevention
must be described, which may control or compensate possible corruption
factors.
03.06.2015 © Active Audit Agency 20
Stages 2.3
Existing controls Analysis
Corruption factors Corruption threat Existing control
1
Legislated recruitment process is inefficient.
Conflict of interest
Nepotism
Abuse
Theft
Standard provisions
for recruitment
process
2
Notifications of Code of ethics and conflict of interest
Policy violation are insufficient
Conflict of interest
Nepotism
Standard provisions
and Code of ethics
3
The process of whistleblowers’ work and protection is
not established.
Abuse
Imposture
Theft
Information misuse
No control
4
Employees are not motivated to report about
corruption offences
Imposture
Theft
Bribery
Information misuse
Hot line
• Risk should be described based on corruptionfraud threat and factors,
taking into account existing control and prevention measures.
03.06.2015 © Active Audit Agency 21
Stages 2.4
Corruption and fraud risk description
Corruption factors Corruption threat Existing control Corruption and Fraud Risk
1
Recruitment process is
inefficient.
Conflict of interest
Nepotism
Abuse
Theft
Standard
provisions for
recruitment
process
Inefficiency of recruitment process may
lead to the risks of corruptive offense
(conflict of interest, nepotism, collusion,
patronage, bribery, abuse) in the
organization
2
Notifications of Code of
ethics and conflict of
interest Policy violation
are insufficient
Conflict of interest
Nepotism
Standard
provisions and
Code of ethics
Insufficiency of process for
communicating the violation of Code of
ethics and conflict of interest Policy may
lead to corruption (conflict of interest,
nepotism, extortion, bribery, abuse) in
the organization
3
The process of
whistleblowers’ work
and protection is not
established.
Abuse
Imposture
Theft
Information misuse
No control
Not established within an institution a
process to work and protect
whistleblowers and to protect their
identity may lead to corruption (conflict
of interest, nepotism, extortion, bribery,
abuse) in the organization
03.06.2015 © Active Audit Agency 22
Stage 3
Corruption and fraud risks analysis
and evaluation
Corruption risks assessment
2. Corruption and fraud risks detection
2.1 Functions and
processes description
2.2 Detecting threats
and risk factors
2.3 Existing controls
Analysis
2.4 Corruption and
fraud risk description
3. Corruption and fraud risks analysis and evaluation
3.1 Threat likelihood
assessment
3.2 Impact
assessment
3.3 Risk levels
evaluation
3.4 Risks assessment
report
4. Corruption and fraud risk response
4.1 Risk response actions 4.2 Residual risks
4.3 Corruption and fraud
prevention plan
5.Communicationandconsulting
6.RisksMonitoringandreview
1. Preparation and planning
1.1 Preparatory actions
1.2 Understanding the
organization and its environment
1.3 Assessment planning
• The likelihood level evaluation and corresponding risk prioritization are based on
corruptionfraud threat and factors, estimated by the members of working group
taking into account existing control and prevention measures and theirs effectiveness
03.06.2015 © Active Audit Agency 23
Stage 3.1
Threat likelihood assessment
Likelihood level Likelihood level description
4- SURE
Probably or almost certainly (act may be committed in the short term and perhaps even
several times) - means that a corruption and fraud act was committed or may be
committed in the next few months and can be repeated (monthly, weekly ...)
3 - POSIBLE
Perhaps (act may be committed in the medium term) - means that a corruption and
fraud act was committed or may be committed during the year, and can be repeated
several times.
2- SELDOM
Sometimes (in exceptional cases) means that the act was not committed or had been
committed only once in the last three years and it is probable that the act will be
committed for three years.
1- NEVER
Never - it means that the act was not committed and the likelihood of committing the
act is almost impossible because of the nature of the existing measures are sufficient or
prevent corruption.
• The consequences of the risk can be assessed in three categories: financial loss,
reputational loss, and also legal impact.
03.06.2015 © Active Audit Agency 24
Stage 3.2
Impact assessment
Impact Level
Description of Impact
Financial Impact Legal Impact Reputational Impact
4-CRITICAL
Large financial loss
(> 1M USD)
Lawsuits against institutions or
employees (criminal and
administrative responsibility)
Loss of reputation among the
general population
(negative publicity in the
mainstream media of the country,
etc.)
3-HIGH
Significant financial loss
(100K – 1M USD)
Lawsuits against employees
(administrative and criminal
responsibility)
Loss of reputation among the
parties direct contacts.
(negative publicity among parties
direct contact)
2-MEDIUM
Minor financial loss
(<100K USD)
Administrative and Disciplinary
responsibility
Loss of reputation among the
professionals
(negative publicity within the
institution)
1-LOW Not expected financial loss Disciplinary responsibility
Loss of reputation among the
employees of the structural unit
department
(negative publicity within the unit)
• The risk level evaluation and corresponding risk prioritization are based on corruption
threat likelihood and impact.
03.06.2015 © Active Audit Agency 25
Stage 3.3
Risk levels evaluation
Likelihoodlevel
4-SURE 4 8 12 16
3-POSIBLE 3 6 9 12
2-SELDOM 2 4 6 8
1-NEVER 1 2 3 4
1-LOW 2-MEDIUM 3-HIGH 4-CRITICAL
Impact level
Risk level Risk criteria
CRITICAL (12-16)
Corruption acts are almost certain to occur and occur frequently. Their
impact is huge and controls should be implemented immediately.
HIGH (6-9)
Corruption acts are likely to occur and the impact from these acts is high.
Controls should be implemented as quickly as possible.
MEDIUM (3-4)
There is a potential likelihood of corruption acts occurrence. The impact
may be medium and controls should be implemented within a reasonable
period of time.
LOW (1-2)
There is a little likelihood of corruption acts occurrence. The potential
impact is low. Hence, risks monitoring and corruption controls should be
implemented if necessary
• As a result of risk assessment, Working Group should develop the Corruption and Fraud
Risk Assessment Report that includes:
o function or process
o corruptionfraud threats and factors
o Existing control
o likelihood and impact of risks
o risk level
03.06.2015 © Active Audit Agency 26
Stage 3.4
Risks assessment report
Corruption factors Corruption threat Existing control Corruption and Fraud Risk L I R
1
Recruitment process is
inefficient.
Conflict of interest
Nepotism
Abuse
Theft
Standard
provisions for
recruitment
process
Inefficiency of recruitment process
may lead to the risks of corruptive
offense (conflict of interest,
nepotism, collusion, patronage,
bribery, abuse) in the organization
4 2 8
2
Notifications of Code
of ethics and conflict of
interest Policy violation
are insufficient
Conflict of interest
Nepotism
Standard
provisions and
Code of ethics
Insufficiency of process for
communicating the violation of Code
of ethics and conflict of interest Policy
may lead to corruption (conflict of
interest, nepotism, extortion, bribery,
abuse) in the organization
3 3 9
03.06.2015 © Active Audit Agency 27
Stage 4
Corruption and fraud risk response
Corruption risks assessment
2. Corruption and fraud risks detection
2.1 Functions and
processes description
2.2 Detecting threats
and risk factors
2.3 Existing controls
Analysis
2.4 Corruption and
fraud risk description
3. Corruption and fraud risks analysis and evaluation
3.1 Threat likelihood
assessment
3.2 Impact
assessment
3.3 Risk levels
evaluation
3.4 Risks assessment
report
4. Corruption and fraud risk response
4.1 Risk response actions 4.2 Residual risks
4.3 Corruption and fraud
prevention plan
5.Communicationandconsulting
6.RisksMonitoringandreview
1. Preparation and planning
1.1 Preparatory actions
1.2 Understanding the
organization and its environment
1.3 Assessment planning
• The response measures definition, i. e. corruption response measures – is the last step
in the process of Corruption risk response development.
• This stage assumes:
o the selection of response actions
o residual risks definition
o required resources identification
o the goal and indicators to measure results
o responsible persons for plan implementation
o terms compliance and monitoring
All information mentioned above should be represented in Corruption response plan.
03.06.2015 © Active Audit Agency 28
Stage 4
Corruption and fraud risk response
Corruption risk description
Managed
risk Goal Response actions Performance targets
Residual risk
Budget
Conditions and
prospects
Responsible
person
Execution
time
Monitoring
period
L I R L I R
1
Absence of information security
management system for sensitive
information protection which may lead to
corruption (misuse of information, extortion,
bribery, abuse) in the organization.
3 3 9
Risk
reduction
Develop, document and implement Information Security
management system based on International Standard ISO/IEC
27001:2013
ISMS is implemented.
International certificate of
compliance awarded (in perspective)
2 2 4
2
Insufficient equipment to control leakage of
sensitive information and insufficient funding
may lead to corruption (information misuse,
extorsion, bribery, abuse) in the
organization.
3 2 6
Risk
reduction
Conduct information risk assessment in the scope of ISMS
implementation, define and implement technical controls for data
leakage prevention against sensitive information
Technical controls for data leakage
prevention against sensitive
information are implemented
2 2 4
4
Imperfection of the currently used software
(NDU Zvit, SPED) for reporting to the
Commission results in delays in the
information processing, which may lead to
corruption (information misuse, extorsion,
bribery, abuse) in the organization.
3 2 6
Risk
reduction
Implement the new (or improve an existing) software, which can
eliminate the delays in the information processing
N/A 2 2 4
03.06.2015 © Active Audit Agency 29
Stage 5 and 6
Communication and consulting
Risks Monitoring and review
Corruption risks assessment
2. Corruption and fraud risks detection
2.1 Functions and
processes description
2.2 Detecting threats
and risk factors
2.3 Existing controls
Analysis
2.4 Corruption and
fraud risk description
3. Corruption and fraud risks analysis and evaluation
3.1 Threat likelihood
assessment
3.2 Impact
assessment
3.3 Risk levels
evaluation
3.4 Risks assessment
report
4. Corruption and fraud risk response
4.1 Risk response actions 4.2 Residual risks
4.3 Corruption and fraud
prevention plan
5.Communicationandconsulting
6.RisksMonitoringandreview
1. Preparation and planning
1.1 Preparatory actions
1.2 Understanding the
organization and its environment
1.3 Assessment planning
Communication and consulting
• The organization should provide continuous information and communication with a
staff and internal stakeholders at all stages of the Corruption and Fraud Risk
assessment.
• Informing and consulting with external stakeholders, or a third party must also be
carried out at all stages of the Corruption and Fraud Risks assessment and Response
Plan implementation.
Risks Monitoring and review
• Monitor and risks review process should be part of the Corruption and Fraud Risk
Management. Monitoring should be done according to the Response Plan through
performance indicators that are laid in describing response actions to corruption risks
and terms determined by the Plan.
• Risk assessment review must be conducted on a regular basis (minimum annually). In
the case of the significant changes of the functions or processes of organization,
changes in legislation, etc. - may be need the additional non-planned risk review
process.
03.06.2015 © Active Audit Agency 30
Stage 5 and 6
Communication and consulting
Risks Monitoring and review
03.06.2015 © Active Audit Agency 31
Questions?
v.sysoev@auditagency.com.ua
Tell: +380509793761
Skype: valentyn.sysoev

More Related Content

What's hot

ISO 31000:2018 Risk Management System, Framework and Implementation
ISO 31000:2018 Risk Management System, Framework and ImplementationISO 31000:2018 Risk Management System, Framework and Implementation
ISO 31000:2018 Risk Management System, Framework and ImplementationAlvin Integrated Services [AIS]
 
Implementing Enterprise Risk Management with ISO 31000:2009
Implementing Enterprise Risk Management with ISO 31000:2009Implementing Enterprise Risk Management with ISO 31000:2009
Implementing Enterprise Risk Management with ISO 31000:2009Goutama Bachtiar
 
Governance, Risk, and Compliance Services
Governance, Risk, and Compliance ServicesGovernance, Risk, and Compliance Services
Governance, Risk, and Compliance ServicesCapgemini
 
ISO 14001:2015 Integrity in Implementation and Auditing the New EMS Standard
 ISO 14001:2015 Integrity in Implementation and Auditing the New EMS Standard ISO 14001:2015 Integrity in Implementation and Auditing the New EMS Standard
ISO 14001:2015 Integrity in Implementation and Auditing the New EMS StandardPECB
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxDr Madhu Aman Sharma
 
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...PECB
 
How to Build an Enterprise Risk Management Framework
How to Build an Enterprise Risk Management FrameworkHow to Build an Enterprise Risk Management Framework
How to Build an Enterprise Risk Management FrameworkColleen Beck-Domanico
 
GRC - Isaca Training 16.9.2014
GRC - Isaca Training 16.9.2014GRC - Isaca Training 16.9.2014
GRC - Isaca Training 16.9.2014Paul Simidi
 
Governance risk and compliance
Governance risk and complianceGovernance risk and compliance
Governance risk and complianceMagdalena Matell
 
Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Andrew Smart
 
Governance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionGovernance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionRishabh Software
 
Integrating Risk into your Balanced Scorecard
Integrating Risk into your Balanced Scorecard Integrating Risk into your Balanced Scorecard
Integrating Risk into your Balanced Scorecard Andrew Smart
 
Strategic Risk Management as a CFO: Getting Risk Management Right
Strategic Risk Management as a CFO: Getting Risk Management RightStrategic Risk Management as a CFO: Getting Risk Management Right
Strategic Risk Management as a CFO: Getting Risk Management RightProformative, Inc.
 
Risk Management Process Steps Powerpoint Presentation Slides
Risk Management Process Steps Powerpoint Presentation SlidesRisk Management Process Steps Powerpoint Presentation Slides
Risk Management Process Steps Powerpoint Presentation SlidesSlideTeam
 

What's hot (20)

ISO 31000:2018 Risk Management System, Framework and Implementation
ISO 31000:2018 Risk Management System, Framework and ImplementationISO 31000:2018 Risk Management System, Framework and Implementation
ISO 31000:2018 Risk Management System, Framework and Implementation
 
Implementing Enterprise Risk Management with ISO 31000:2009
Implementing Enterprise Risk Management with ISO 31000:2009Implementing Enterprise Risk Management with ISO 31000:2009
Implementing Enterprise Risk Management with ISO 31000:2009
 
Iso 31000
Iso 31000Iso 31000
Iso 31000
 
Governance, Risk, and Compliance Services
Governance, Risk, and Compliance ServicesGovernance, Risk, and Compliance Services
Governance, Risk, and Compliance Services
 
KRI (Key Risk Indicators) & IT
KRI (Key Risk Indicators) & ITKRI (Key Risk Indicators) & IT
KRI (Key Risk Indicators) & IT
 
ISO 14001:2015 Integrity in Implementation and Auditing the New EMS Standard
 ISO 14001:2015 Integrity in Implementation and Auditing the New EMS Standard ISO 14001:2015 Integrity in Implementation and Auditing the New EMS Standard
ISO 14001:2015 Integrity in Implementation and Auditing the New EMS Standard
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
 
ERM-Enterprise Risk Management
ERM-Enterprise Risk ManagementERM-Enterprise Risk Management
ERM-Enterprise Risk Management
 
Risk and Business Continuity Management
Risk and Business Continuity ManagementRisk and Business Continuity Management
Risk and Business Continuity Management
 
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
 
How to Build an Enterprise Risk Management Framework
How to Build an Enterprise Risk Management FrameworkHow to Build an Enterprise Risk Management Framework
How to Build an Enterprise Risk Management Framework
 
GRC - Isaca Training 16.9.2014
GRC - Isaca Training 16.9.2014GRC - Isaca Training 16.9.2014
GRC - Isaca Training 16.9.2014
 
Governance risk and compliance
Governance risk and complianceGovernance risk and compliance
Governance risk and compliance
 
Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite
 
Risk management
Risk managementRisk management
Risk management
 
Governance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management SolutionGovernance, Risk & Compliance Management Solution
Governance, Risk & Compliance Management Solution
 
risk management
risk managementrisk management
risk management
 
Integrating Risk into your Balanced Scorecard
Integrating Risk into your Balanced Scorecard Integrating Risk into your Balanced Scorecard
Integrating Risk into your Balanced Scorecard
 
Strategic Risk Management as a CFO: Getting Risk Management Right
Strategic Risk Management as a CFO: Getting Risk Management RightStrategic Risk Management as a CFO: Getting Risk Management Right
Strategic Risk Management as a CFO: Getting Risk Management Right
 
Risk Management Process Steps Powerpoint Presentation Slides
Risk Management Process Steps Powerpoint Presentation SlidesRisk Management Process Steps Powerpoint Presentation Slides
Risk Management Process Steps Powerpoint Presentation Slides
 

Viewers also liked

ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationScott Mongeau
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)NCTechSymposium
 
1410 investigating the impact of fraud & corruption on economic development
1410 investigating the impact of fraud & corruption on economic development1410 investigating the impact of fraud & corruption on economic development
1410 investigating the impact of fraud & corruption on economic developmentJenny Reid
 
2016 - IQPC - The key to raising awareness and comprehension
2016 - IQPC - The key to raising awareness and comprehension2016 - IQPC - The key to raising awareness and comprehension
2016 - IQPC - The key to raising awareness and comprehensionDr Darren O'Connell AGIA
 
Fraud Risk management
Fraud Risk managementFraud Risk management
Fraud Risk managementTommy Seah
 
Addressing Fraud Risk Management with Facts
Addressing Fraud Risk Management with FactsAddressing Fraud Risk Management with Facts
Addressing Fraud Risk Management with FactsInfosys BPM
 
Enterprise Risk Management & Fraud Sample Presentation
Enterprise Risk Management & Fraud Sample PresentationEnterprise Risk Management & Fraud Sample Presentation
Enterprise Risk Management & Fraud Sample PresentationAlexander Larsen
 
Understanding the-demand-supply-equations-of-corruption-fraud-final
Understanding the-demand-supply-equations-of-corruption-fraud-finalUnderstanding the-demand-supply-equations-of-corruption-fraud-final
Understanding the-demand-supply-equations-of-corruption-fraud-finalGlobalCompact
 
Unethical Behavior in Business - The Case Against HSBC
Unethical Behavior in Business - The Case Against HSBCUnethical Behavior in Business - The Case Against HSBC
Unethical Behavior in Business - The Case Against HSBCStacey Troup
 
Classifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftClassifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftDavid J Rosenthal
 
SCS Presentation - Corporate Governance
SCS Presentation - Corporate GovernanceSCS Presentation - Corporate Governance
SCS Presentation - Corporate GovernanceDwayne Jorgensen
 
Avoiding Off-Label Promotion
Avoiding Off-Label PromotionAvoiding Off-Label Promotion
Avoiding Off-Label PromotionDale Cooke
 
Shilts Fraud Risk Assessment Deck
Shilts Fraud Risk Assessment DeckShilts Fraud Risk Assessment Deck
Shilts Fraud Risk Assessment Deckchris75308
 
Sistem pemantauan ancaman serangan siber di indonesia generasi baru public
Sistem pemantauan ancaman serangan siber di indonesia generasi baru publicSistem pemantauan ancaman serangan siber di indonesia generasi baru public
Sistem pemantauan ancaman serangan siber di indonesia generasi baru publicCharles Lim
 

Viewers also liked (20)

ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and Mitigation
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
 
1410 investigating the impact of fraud & corruption on economic development
1410 investigating the impact of fraud & corruption on economic development1410 investigating the impact of fraud & corruption on economic development
1410 investigating the impact of fraud & corruption on economic development
 
2016 - IQPC - The key to raising awareness and comprehension
2016 - IQPC - The key to raising awareness and comprehension2016 - IQPC - The key to raising awareness and comprehension
2016 - IQPC - The key to raising awareness and comprehension
 
Fraud Risk management
Fraud Risk managementFraud Risk management
Fraud Risk management
 
Addressing Fraud Risk Management with Facts
Addressing Fraud Risk Management with FactsAddressing Fraud Risk Management with Facts
Addressing Fraud Risk Management with Facts
 
Enterprise Risk Management & Fraud Sample Presentation
Enterprise Risk Management & Fraud Sample PresentationEnterprise Risk Management & Fraud Sample Presentation
Enterprise Risk Management & Fraud Sample Presentation
 
Understanding the-demand-supply-equations-of-corruption-fraud-final
Understanding the-demand-supply-equations-of-corruption-fraud-finalUnderstanding the-demand-supply-equations-of-corruption-fraud-final
Understanding the-demand-supply-equations-of-corruption-fraud-final
 
Unethical Behavior in Business - The Case Against HSBC
Unethical Behavior in Business - The Case Against HSBCUnethical Behavior in Business - The Case Against HSBC
Unethical Behavior in Business - The Case Against HSBC
 
Classifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftClassifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoft
 
SCS Presentation - Corporate Governance
SCS Presentation - Corporate GovernanceSCS Presentation - Corporate Governance
SCS Presentation - Corporate Governance
 
Avoiding Off-Label Promotion
Avoiding Off-Label PromotionAvoiding Off-Label Promotion
Avoiding Off-Label Promotion
 
Finance Professionals Meeting Today’s Business Challenges
Finance Professionals Meeting Today’s Business ChallengesFinance Professionals Meeting Today’s Business Challenges
Finance Professionals Meeting Today’s Business Challenges
 
A Relevant Accountancy Profession
A Relevant Accountancy ProfessionA Relevant Accountancy Profession
A Relevant Accountancy Profession
 
Risk identification checklist
Risk identification checklistRisk identification checklist
Risk identification checklist
 
Shilts Fraud Risk Assessment Deck
Shilts Fraud Risk Assessment DeckShilts Fraud Risk Assessment Deck
Shilts Fraud Risk Assessment Deck
 
Sistem pemantauan ancaman serangan siber di indonesia generasi baru public
Sistem pemantauan ancaman serangan siber di indonesia generasi baru publicSistem pemantauan ancaman serangan siber di indonesia generasi baru public
Sistem pemantauan ancaman serangan siber di indonesia generasi baru public
 
Borobudur 11
Borobudur 11Borobudur 11
Borobudur 11
 
Turning an idea into impact
Turning an idea into impactTurning an idea into impact
Turning an idea into impact
 
Arnold schilder-iaasb-pcaob-sag-presentation
Arnold schilder-iaasb-pcaob-sag-presentationArnold schilder-iaasb-pcaob-sag-presentation
Arnold schilder-iaasb-pcaob-sag-presentation
 

Similar to Corruption and Fraud Risk Management using ISO 31000

Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...360 BSI
 
PECB Webinar: Risk-management in IT intensive SMEs
PECB Webinar: Risk-management in IT intensive SMEsPECB Webinar: Risk-management in IT intensive SMEs
PECB Webinar: Risk-management in IT intensive SMEsPECB
 
Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment KateKazhan
 
Bcu msc cg week 4 risk management
Bcu msc cg week 4 risk managementBcu msc cg week 4 risk management
Bcu msc cg week 4 risk managementStephen Ong
 
Risk management ppt 111p (training module)
Risk management ppt 111p (training module)Risk management ppt 111p (training module)
Risk management ppt 111p (training module)Sadia Razzaq
 
Risk Management Process.ppt
Risk Management Process.pptRisk Management Process.ppt
Risk Management Process.pptUday Nayakwadi
 
PECB Webinar: ISO 31000 – Risk Management and how it can help an organization
PECB Webinar: ISO 31000 – Risk Management and how it can help an organizationPECB Webinar: ISO 31000 – Risk Management and how it can help an organization
PECB Webinar: ISO 31000 – Risk Management and how it can help an organizationPECB
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is allPECB
 
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governanceACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governanceBillyCheuk
 
How to assess risk for a company
How to assess risk for a companyHow to assess risk for a company
How to assess risk for a companyOECDglobal
 
Risk Management - A Journey
Risk Management - A JourneyRisk Management - A Journey
Risk Management - A JourneyDebashis Gupta
 
Anti fraud program
Anti fraud programAnti fraud program
Anti fraud programchris75308
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 

Similar to Corruption and Fraud Risk Management using ISO 31000 (20)

Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...
 
PECB Webinar: Risk-management in IT intensive SMEs
PECB Webinar: Risk-management in IT intensive SMEsPECB Webinar: Risk-management in IT intensive SMEs
PECB Webinar: Risk-management in IT intensive SMEs
 
51_operational_risk
51_operational_risk51_operational_risk
51_operational_risk
 
Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment
 
RMP.ppt
RMP.pptRMP.ppt
RMP.ppt
 
RMP.ppt
RMP.pptRMP.ppt
RMP.ppt
 
RMP.ppt
RMP.pptRMP.ppt
RMP.ppt
 
Bcu msc cg week 4 risk management
Bcu msc cg week 4 risk managementBcu msc cg week 4 risk management
Bcu msc cg week 4 risk management
 
Rmp
RmpRmp
Rmp
 
Risk management ppt 111p (training module)
Risk management ppt 111p (training module)Risk management ppt 111p (training module)
Risk management ppt 111p (training module)
 
Risk Management Process.ppt
Risk Management Process.pptRisk Management Process.ppt
Risk Management Process.ppt
 
PECB Webinar: ISO 31000 – Risk Management and how it can help an organization
PECB Webinar: ISO 31000 – Risk Management and how it can help an organizationPECB Webinar: ISO 31000 – Risk Management and how it can help an organization
PECB Webinar: ISO 31000 – Risk Management and how it can help an organization
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is all
 
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governanceACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
 
Beyond Compliance
Beyond ComplianceBeyond Compliance
Beyond Compliance
 
How to assess risk for a company
How to assess risk for a companyHow to assess risk for a company
How to assess risk for a company
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
Risk Management - A Journey
Risk Management - A JourneyRisk Management - A Journey
Risk Management - A Journey
 
Anti fraud program
Anti fraud programAnti fraud program
Anti fraud program
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 

More from PECB

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemPECB
 

More from PECB (20)

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management system
 

Recently uploaded

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 

Recently uploaded (20)

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 

Corruption and Fraud Risk Management using ISO 31000

  • 1.
  • 2. Corruption and Fraud Risk Management using ISO 31000 03.06.15
  • 3. Project manager Valentyn Sysoev Kyiv, Ukraine Consulting, audit E-mail : v.sysoev@auditagency.com.ua Valentyn has more than 8 years experience on information security area as consultant, auditor and advisor. Valentyn provided services for financial, insurance, industrial, energy and others customers as an expert on information security and risk management. Valentyn leads the consulting and audit projects as well as projects related to IS audit and IS assurance, crisis and business continuity management, international standards implementation – specifically PCIDSS, ISO27001 ISMS, ISO31000 Risk Management, ISO21500 Project Management, ISO38500 Corporate Governance of IT, ITIL 3, Cobit 5, VISA and MasterCard. Education and certification: • Master’s degree on information security • CISА - Certified Information System Auditor (ISACA) • CISM - Certified Information Security Manager (ISACA) • Certified ISO/IEC 27001 Lead Auditor (PECB) • Certified ISO 27005 Risk Manager (PECB) Common information: • Information security governance • Crisis management and business continuity management • Incident management • Antifraud, fraud detection • Physical and HR security • Information and operational risks management • Project Management • Corporate Governance Specialization Chosen experience: • More than 30 projects in consulting: ISMS according ISO 27001, PCI DSS, Pin Security, BCPDR, ISO 9001, ISO 31000, information and operational security risks, security awareness, incident and business continuity management. • More than 25 projects on IT&IS audit: to comply ISO27001, Cobit 4.1, PCI DSS, IS internal controls audit, third party audit. • More than 5 projects on information system assurance: information systems and networks penetration tests, social engineering, physical penetration test, vulnerability scanning. © Active Audit Agency03.06.2015 3
  • 4. Summary of Webinar • In this webinar, participants develop the competence to master a model for implementing corruption and fraud risk management processes throughout their organization using the ISO 31000:2009 standard as a reference framework. • During this training, I will present the ISO 31000 general risk management standard, the process model it recommends, and how companies may use the standard for corruption and fraud risk management. Learning objectives • To understand the concepts, approaches, methods and techniques allowing an effective corruption and fraud risk management according to ISO 31000 • To acquire the competence to implement, maintain and manage an ongoing corruption and fraud risk management using ISO 31000 • To acquire the competence to effectively advise organizations on the best practices in corruption and fraud risk management 03.06.2015 © Active Audit Agency 4 Scope and Objectives
  • 5. • Corruption and fraud risk assessment is required by the Law of Ukraine «On Prevention of Corruption» o The head of legal entity shall ensure the corruption and fraud risk assessment within its organization and provide adequate controls. o Anti-corruption programs shall be developed subject to corruption and fraud risk assessment and be inclusive of “guidelines, standards and procedures on corruption and fraud risk management within the organization”. • Risk assessment framework is based on International Standard ISO/IEC 31000:2009 “Risk management — Principles and guidelines on Implementation” as well as on international background of such corruption risk assessment methodologies and corruption prevention planning as in Slovenia, Serbia, Montenegro, Australia and USA. 03.06.2015 © Active Audit Agency 5 Background
  • 6. 03.06.2015 © Active Audit Agency 6 Corruption and fraud risks assessment - main stages Corruption risks assessment 2. Corruption and fraud risks detection 2.1 Functions and processes description 2.2 Detecting threats and risk factors 2.3 Existing controls Analysis 2.4 Corruption and fraud risk description 3. Corruption and fraud risks analysis and evaluation 3.1 Threat likelihood assessment 3.2 Impact assessment 3.3 Risk levels evaluation 3.4 Risks assessment report 4. Corruption and fraud risk response 4.1 Risk response actions 4.2 Residual risks 4.3 Corruption and fraud prevention plan 5.Communicationandconsulting 6.RisksMonitoringandreview 1. Preparation and planning 1.1 Preparatory actions 1.2 Understanding the organization and its environment 1.3 Assessment planning
  • 7. • Choose a format – Self assessment, i.e. internally by institution’s personnel without external experts involvement or – Together with invited experts, skilled and knowledgeable to the methodology of corruption and fraud risks assessment or – Fully outsourced to external experts • Working group creation – Structure, privileges, training • Communicating to institution’s personnel • Develop the plan 03.06.2015 © Active Audit Agency 7 Stage 1.1 Preparatory actions
  • 8. Risk assessment plan 03.06.2015 © Active Audit Agency 8 Stage 1.1 Preparatory actions Terms Of delivery # Stage Actions and tasks Responsible Start date End date Preparation and planning of corruption risk assessment 1 Preparatory actions Working group training 2 Risk assessment plan development 3 Understanding the institution and its functional environments Definition of external and internal parties of the institution 4 Analysis and understanding external and internal environments of the institution 5 Collection and analysis of information Preparation of the necessary documentation and list and sources of information 6 Collection of required documentation and information Processes identification and modelling7 8 Justification of the processes and models by Working group and analysis planning
  • 9. • ISO 31000 expects you to consider your organization’s context (pros and cons) through the: – External environment (external factors that cause/control corruption) • independency, budged, appointment of the top management, strategies, control, security issues, citizens, etc. • to identify external strengths, weaknesses, opportunities and threats regards corruption – Internal environment (internal factors that cause/control corruption) • includes organsational aspects (legislation, processes, objectives, competences etc.), human resouces (capabilities) and implementation of processes in practice (legal framework vs. practice, sanctions, transparency) with the aim to consider its – Objectives and strategies in place to achieve objectives – Governance, structure, roles and accountabilities – Capability of people, systems and processes – Decision-making process, – Human, technological and financial resources, – Changes to processes or compliance obligations 03.06.2015 © Active Audit Agency 9 Stage 1.2 Understanding the institution and its functional environments
  • 10. • The output of this stage in the risk management process: – pros and cons - external and internal factors that cause / control corruption and fraud in institution – detail organisation's objectives, processes / functions, competences, legal framework, expectations of citizens, – set out a number of areas which should be allocated attention • These can then be used to prioritise the order in which you attack the next task. – basically, to know your organizational pros and cons regards corruption and fraud. 03.06.2015 © Active Audit Agency 10 Stage 1.2 Understanding the institution and its functional environments
  • 11. Define the approaches and methods for risk assessment and supporting tools development • Common and/or anonymous surveys (questionnaires) for employees or external parties • Brain storm • Focus groups • Deep/ structured interview • Checklists • Observing the daily activities • Scenario analysis • Delphi method • Information systems analysis • Legislation, regulatory and other documentation analysis 03.06.2015 © Active Audit Agency 11 Stage 1.3 Assessment planning
  • 12. 03.06.2015 © Active Audit Agency 12 Stage 2 Corruption and fraud risks detection Corruption risks assessment 2. Corruption and fraud risks detection 2.1 Functions and processes description 2.2 Detecting threats and risk factors 2.3 Existing controls Analysis 2.4 Corruption and fraud risk description 3. Corruption and fraud risks analysis and evaluation 3.1 Threat likelihood assessment 3.2 Impact assessment 3.3 Risk levels evaluation 3.4 Risks assessment report 4. Corruption and fraud risk response 4.1 Risk response actions 4.2 Residual risks 4.3 Corruption and fraud prevention plan 5.Communicationandconsulting 6.RisksMonitoringandreview 1. Preparation and planning 1.1 Preparatory actions 1.2 Understanding the organization and its environment 1.3 Assessment planning
  • 13. Why to describe functions and processes Corruption and fraud are usually connected to decision making process and appears because of vulnerability to corruptionfraud from the process and conditions perspective related to it. Thus we need to analyze main and secondary processes of organization in detail to identify if they are vulnerable to corruption and fraud.. 03.06.2015 © Active Audit Agency 13 Stage 2.1 Functions and processes description Institution’s function 1 Institution’s function 2 Institution’s function n Process1.1 Process1.2 Process1.n Process2.1 Process2.2 Process2.n Processn.1 Processn.2 Processn.n Institution Fraud factors Fraud factors Fraud factors Fraudthreat Fraudthreat Fraudthreat Fraudthreat Fraudthreat Fraudthreat Fraudthreat Fraudthreat Fraudthreat
  • 14. Functions and processes description order The functions and processes of the institution have to be reviewed from upper level to lower levels. The order to perform description has to be the following: • Function description; • Processes (high level) description for the every function; • Sub-processes description (low level processes); • Operations/ procedures / steps description for each process. 03.06.2015 © Active Audit Agency 14 Stage 2.1 Functions and processes description Institution’s functions Processes Sub-processes and tasks
  • 15. Tools to be used for business-process description In order to describe and perform the modelling of functions and business- processes you may use the following software: • MS Visio or other diagram editor ; • MS Word or other word processing software; • MS Excel or other electronic spreadsheet software; • Specific software if available (ARIS, Industry Print, QPR Suite …). 03.06.2015 © Active Audit Agency 15 Stage 2.1 Functions and processes description Define IN and OUT for the process Define the resources Produce a process model Describe a process model in selected format Check a process model Document and approve
  • 16. Tools to define corruptionfraud action threats and factors  The definition of corruptionfraud action factors and threats is done based on:  information, gathered by working group during interview  internal normative documentation, which governs the activities of the institution and/or business unit,  information from business process observation and its performance.  also we may use the other methods and tools chosen earlier during risk assessment planning phase. 03.06.2015 © Active Audit Agency 16 Stages 2.2 Risk threats and factors definition
  • 17. Corruption and fraud factors detection  The goal of this stage is to detect the whole list of possible corruption and fraud factors, which may exist in the functions, processes, procedures, regulations, information systems etc., and can be used to exploit the potential corruption action threats.  The corruption and fraud factors are:  process or group of the processes shortcomings,  absence or insufficiency of corruption prevention controls,  contradictions of the requirements or the possibility of theirs dual interpretation,  complexity or excessive bureaucracy of the process – that is all what may lead to misuse of the official position to gain undue advantage. 03.06.2015 © Active Audit Agency 17 Stages 2.2 Risk threats and factors definition
  • 18. Corruption and fraud factors 03.06.2015 © Active Audit Agency 18 Stages 2.2 Risk threats and factors definition Human Factor (H) Ethical factors and conflict of interest (E) • Realization of institution’s anti-corruption policy • Unregulated the conflict of interest • Material and intangible gifts, donations to workers • Donations, charity funding to the institution • Protection of whistleblowers (informers) • False motives • Financial perturbations • Pressure and intrusions • The level of realization Organizational and operational factors (O) • Collisions and contradictions in regulatory acts and regulations • Decision making process is arbitrary • Terms of decision making are arbitrary • The functions, rights, responsibilities and accountability are blurred • Abuse of contacts • Information is closed • Unregulated relationships with interested parties • Excessive burdens
  • 19. Corruption and fraud action threats detection The corruption and fraud factors doesn’t produce any impact by themselves, corruption and fraud action threats must exist in order to exploit them. 03.06.2015 © Active Audit Agency 19 Stages 2.2 Risk threats and factors definition CORRUPTION  Bribery  Nepotism  Stealing  Conflict of Interest  Fraud  Collusion  Extortion  Exaction  Abuse  Resource exploitation
  • 20. • As the result of this stage all existing controls on corruption prevention must be described, which may control or compensate possible corruption factors. 03.06.2015 © Active Audit Agency 20 Stages 2.3 Existing controls Analysis Corruption factors Corruption threat Existing control 1 Legislated recruitment process is inefficient. Conflict of interest Nepotism Abuse Theft Standard provisions for recruitment process 2 Notifications of Code of ethics and conflict of interest Policy violation are insufficient Conflict of interest Nepotism Standard provisions and Code of ethics 3 The process of whistleblowers’ work and protection is not established. Abuse Imposture Theft Information misuse No control 4 Employees are not motivated to report about corruption offences Imposture Theft Bribery Information misuse Hot line
  • 21. • Risk should be described based on corruptionfraud threat and factors, taking into account existing control and prevention measures. 03.06.2015 © Active Audit Agency 21 Stages 2.4 Corruption and fraud risk description Corruption factors Corruption threat Existing control Corruption and Fraud Risk 1 Recruitment process is inefficient. Conflict of interest Nepotism Abuse Theft Standard provisions for recruitment process Inefficiency of recruitment process may lead to the risks of corruptive offense (conflict of interest, nepotism, collusion, patronage, bribery, abuse) in the organization 2 Notifications of Code of ethics and conflict of interest Policy violation are insufficient Conflict of interest Nepotism Standard provisions and Code of ethics Insufficiency of process for communicating the violation of Code of ethics and conflict of interest Policy may lead to corruption (conflict of interest, nepotism, extortion, bribery, abuse) in the organization 3 The process of whistleblowers’ work and protection is not established. Abuse Imposture Theft Information misuse No control Not established within an institution a process to work and protect whistleblowers and to protect their identity may lead to corruption (conflict of interest, nepotism, extortion, bribery, abuse) in the organization
  • 22. 03.06.2015 © Active Audit Agency 22 Stage 3 Corruption and fraud risks analysis and evaluation Corruption risks assessment 2. Corruption and fraud risks detection 2.1 Functions and processes description 2.2 Detecting threats and risk factors 2.3 Existing controls Analysis 2.4 Corruption and fraud risk description 3. Corruption and fraud risks analysis and evaluation 3.1 Threat likelihood assessment 3.2 Impact assessment 3.3 Risk levels evaluation 3.4 Risks assessment report 4. Corruption and fraud risk response 4.1 Risk response actions 4.2 Residual risks 4.3 Corruption and fraud prevention plan 5.Communicationandconsulting 6.RisksMonitoringandreview 1. Preparation and planning 1.1 Preparatory actions 1.2 Understanding the organization and its environment 1.3 Assessment planning
  • 23. • The likelihood level evaluation and corresponding risk prioritization are based on corruptionfraud threat and factors, estimated by the members of working group taking into account existing control and prevention measures and theirs effectiveness 03.06.2015 © Active Audit Agency 23 Stage 3.1 Threat likelihood assessment Likelihood level Likelihood level description 4- SURE Probably or almost certainly (act may be committed in the short term and perhaps even several times) - means that a corruption and fraud act was committed or may be committed in the next few months and can be repeated (monthly, weekly ...) 3 - POSIBLE Perhaps (act may be committed in the medium term) - means that a corruption and fraud act was committed or may be committed during the year, and can be repeated several times. 2- SELDOM Sometimes (in exceptional cases) means that the act was not committed or had been committed only once in the last three years and it is probable that the act will be committed for three years. 1- NEVER Never - it means that the act was not committed and the likelihood of committing the act is almost impossible because of the nature of the existing measures are sufficient or prevent corruption.
  • 24. • The consequences of the risk can be assessed in three categories: financial loss, reputational loss, and also legal impact. 03.06.2015 © Active Audit Agency 24 Stage 3.2 Impact assessment Impact Level Description of Impact Financial Impact Legal Impact Reputational Impact 4-CRITICAL Large financial loss (> 1M USD) Lawsuits against institutions or employees (criminal and administrative responsibility) Loss of reputation among the general population (negative publicity in the mainstream media of the country, etc.) 3-HIGH Significant financial loss (100K – 1M USD) Lawsuits against employees (administrative and criminal responsibility) Loss of reputation among the parties direct contacts. (negative publicity among parties direct contact) 2-MEDIUM Minor financial loss (<100K USD) Administrative and Disciplinary responsibility Loss of reputation among the professionals (negative publicity within the institution) 1-LOW Not expected financial loss Disciplinary responsibility Loss of reputation among the employees of the structural unit department (negative publicity within the unit)
  • 25. • The risk level evaluation and corresponding risk prioritization are based on corruption threat likelihood and impact. 03.06.2015 © Active Audit Agency 25 Stage 3.3 Risk levels evaluation Likelihoodlevel 4-SURE 4 8 12 16 3-POSIBLE 3 6 9 12 2-SELDOM 2 4 6 8 1-NEVER 1 2 3 4 1-LOW 2-MEDIUM 3-HIGH 4-CRITICAL Impact level Risk level Risk criteria CRITICAL (12-16) Corruption acts are almost certain to occur and occur frequently. Their impact is huge and controls should be implemented immediately. HIGH (6-9) Corruption acts are likely to occur and the impact from these acts is high. Controls should be implemented as quickly as possible. MEDIUM (3-4) There is a potential likelihood of corruption acts occurrence. The impact may be medium and controls should be implemented within a reasonable period of time. LOW (1-2) There is a little likelihood of corruption acts occurrence. The potential impact is low. Hence, risks monitoring and corruption controls should be implemented if necessary
  • 26. • As a result of risk assessment, Working Group should develop the Corruption and Fraud Risk Assessment Report that includes: o function or process o corruptionfraud threats and factors o Existing control o likelihood and impact of risks o risk level 03.06.2015 © Active Audit Agency 26 Stage 3.4 Risks assessment report Corruption factors Corruption threat Existing control Corruption and Fraud Risk L I R 1 Recruitment process is inefficient. Conflict of interest Nepotism Abuse Theft Standard provisions for recruitment process Inefficiency of recruitment process may lead to the risks of corruptive offense (conflict of interest, nepotism, collusion, patronage, bribery, abuse) in the organization 4 2 8 2 Notifications of Code of ethics and conflict of interest Policy violation are insufficient Conflict of interest Nepotism Standard provisions and Code of ethics Insufficiency of process for communicating the violation of Code of ethics and conflict of interest Policy may lead to corruption (conflict of interest, nepotism, extortion, bribery, abuse) in the organization 3 3 9
  • 27. 03.06.2015 © Active Audit Agency 27 Stage 4 Corruption and fraud risk response Corruption risks assessment 2. Corruption and fraud risks detection 2.1 Functions and processes description 2.2 Detecting threats and risk factors 2.3 Existing controls Analysis 2.4 Corruption and fraud risk description 3. Corruption and fraud risks analysis and evaluation 3.1 Threat likelihood assessment 3.2 Impact assessment 3.3 Risk levels evaluation 3.4 Risks assessment report 4. Corruption and fraud risk response 4.1 Risk response actions 4.2 Residual risks 4.3 Corruption and fraud prevention plan 5.Communicationandconsulting 6.RisksMonitoringandreview 1. Preparation and planning 1.1 Preparatory actions 1.2 Understanding the organization and its environment 1.3 Assessment planning
  • 28. • The response measures definition, i. e. corruption response measures – is the last step in the process of Corruption risk response development. • This stage assumes: o the selection of response actions o residual risks definition o required resources identification o the goal and indicators to measure results o responsible persons for plan implementation o terms compliance and monitoring All information mentioned above should be represented in Corruption response plan. 03.06.2015 © Active Audit Agency 28 Stage 4 Corruption and fraud risk response Corruption risk description Managed risk Goal Response actions Performance targets Residual risk Budget Conditions and prospects Responsible person Execution time Monitoring period L I R L I R 1 Absence of information security management system for sensitive information protection which may lead to corruption (misuse of information, extortion, bribery, abuse) in the organization. 3 3 9 Risk reduction Develop, document and implement Information Security management system based on International Standard ISO/IEC 27001:2013 ISMS is implemented. International certificate of compliance awarded (in perspective) 2 2 4 2 Insufficient equipment to control leakage of sensitive information and insufficient funding may lead to corruption (information misuse, extorsion, bribery, abuse) in the organization. 3 2 6 Risk reduction Conduct information risk assessment in the scope of ISMS implementation, define and implement technical controls for data leakage prevention against sensitive information Technical controls for data leakage prevention against sensitive information are implemented 2 2 4 4 Imperfection of the currently used software (NDU Zvit, SPED) for reporting to the Commission results in delays in the information processing, which may lead to corruption (information misuse, extorsion, bribery, abuse) in the organization. 3 2 6 Risk reduction Implement the new (or improve an existing) software, which can eliminate the delays in the information processing N/A 2 2 4
  • 29. 03.06.2015 © Active Audit Agency 29 Stage 5 and 6 Communication and consulting Risks Monitoring and review Corruption risks assessment 2. Corruption and fraud risks detection 2.1 Functions and processes description 2.2 Detecting threats and risk factors 2.3 Existing controls Analysis 2.4 Corruption and fraud risk description 3. Corruption and fraud risks analysis and evaluation 3.1 Threat likelihood assessment 3.2 Impact assessment 3.3 Risk levels evaluation 3.4 Risks assessment report 4. Corruption and fraud risk response 4.1 Risk response actions 4.2 Residual risks 4.3 Corruption and fraud prevention plan 5.Communicationandconsulting 6.RisksMonitoringandreview 1. Preparation and planning 1.1 Preparatory actions 1.2 Understanding the organization and its environment 1.3 Assessment planning
  • 30. Communication and consulting • The organization should provide continuous information and communication with a staff and internal stakeholders at all stages of the Corruption and Fraud Risk assessment. • Informing and consulting with external stakeholders, or a third party must also be carried out at all stages of the Corruption and Fraud Risks assessment and Response Plan implementation. Risks Monitoring and review • Monitor and risks review process should be part of the Corruption and Fraud Risk Management. Monitoring should be done according to the Response Plan through performance indicators that are laid in describing response actions to corruption risks and terms determined by the Plan. • Risk assessment review must be conducted on a regular basis (minimum annually). In the case of the significant changes of the functions or processes of organization, changes in legislation, etc. - may be need the additional non-planned risk review process. 03.06.2015 © Active Audit Agency 30 Stage 5 and 6 Communication and consulting Risks Monitoring and review
  • 31. 03.06.2015 © Active Audit Agency 31 Questions? v.sysoev@auditagency.com.ua Tell: +380509793761 Skype: valentyn.sysoev