SlideShare a Scribd company logo
By
3 Instances Where E-Mail Mining
For Fraud Detection…
Could’ve Prevented Financial Loss
Do You Recognize Any Of These
Corporate Fraud Headlines?
Breaking News
It’s ok if you don’t
remember…
because we’ll give you all of the details!
The databahn Times
Mike Kail
Senior Netflix executive receives bribesCase # 1:
• Mike Kail was the former VP of Information
Technology Operations
• Kail made a deal with IT service providers to receive
bribes of 12% - 15% of the total deal value
• Kail earned $490,000 in kickbacks
• Netflix uncovered the fraud after Kail left
• Netflix uncovered e-mails discussing “referral fees”
• Kail got away with the crime because he was an
upper-level employee
The databahn Times
British software company, Autonomy,
falsifies numbers
Case # 2:
• HP acquired Autonomy for $11.1 billion in 2012
• HP discovered Autonomy misrepresented its
finances – by $5.55 billion
• HP filed a $5.1 billion lawsuit against Autonomy
• E-mails were discovered between the former CFO
and founder
• Included the phrases “covered up” and
“imaginary deals”
• E-mails were checked and the truth was discovered
after the deal had gone through
The databahn Times
Former law partner shares private
information with opposing attorney
Case # 3:
• A former law partner at Willkie Farr & Gallagher, Keila
Ravelo, had suspicious communications with the
opposing counsel
• Ravelo had an established friendship with the opposing
counselor
• The law firm found e-mails and attachments concerning
the American Express litigation
• The opposing counselor sent Ravelo documents secured
under the American Express litigation protective order
What These Headlines Have In Common…
Besides Fraud
FRAUD
!
?
Proof of Fraud:
Autonomy E-mail
From The Telegraph
E-Mail conversation between the CFO and founder
E-mail Mining Would Have Saved…
Time
Money
Median fraud duration in 2014 was 18 months
Median loss in 2014 was $145,000
*stats from Association of Certified Fraud Examiners’ Report to Nations
Reputation
Your reputation is immeasurable
Internal Fraud Can Happen To Any
Company
Small Company Large Company
You need to implement a proactive approach!
You’ve Seen Enough Fraud In The
News...
YOU
Don’t become the next headline!
For more information, check out our blog at
www.databahn.com/blog
@844databahn
Databahn
databahn

More Related Content

What's hot

Legal and ethical issues in web design
Legal and ethical issues in web designLegal and ethical issues in web design
Legal and ethical issues in web design
Mike Cummins
 
Investigating & proving cybercrime
Investigating & proving cybercrimeInvestigating & proving cybercrime
Investigating & proving cybercrime
Jenny Reid
 
Cyber Security Awareness Survey: India
Cyber Security Awareness Survey: IndiaCyber Security Awareness Survey: India
Cyber Security Awareness Survey: India
Ujjwal Singh
 
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Adler Law Group
 
Electronic Communications Act (2000)
Electronic Communications Act (2000)Electronic Communications Act (2000)
Electronic Communications Act (2000)Ed Dickinson
 
What is data protection and why it is important for business
What is data protection and why it is important for businessWhat is data protection and why it is important for business
What is data protection and why it is important for business
SameerShaik43
 
CASL Compliant: It's All About Consent
CASL Compliant: It's All About ConsentCASL Compliant: It's All About Consent
CASL Compliant: It's All About Consent
SparkPost
 
Blue Compliance Presentation#2 extended presentation (serif font)
Blue Compliance Presentation#2 extended presentation (serif font)Blue Compliance Presentation#2 extended presentation (serif font)
Blue Compliance Presentation#2 extended presentation (serif font)John Nicholson
 
What Is E Commerce
What Is E CommerceWhat Is E Commerce
What Is E CommerceEd Dickinson
 
Websites: 10 Things to Consider to Avoid Litigation 3-5
Websites: 10 Things to Consider to Avoid Litigation 3-5Websites: 10 Things to Consider to Avoid Litigation 3-5
Websites: 10 Things to Consider to Avoid Litigation 3-5
accessnowinc
 
Your privacy online: Health information at serious risk of abuse, researchers...
Your privacy online: Health information at serious risk of abuse, researchers...Your privacy online: Health information at serious risk of abuse, researchers...
Your privacy online: Health information at serious risk of abuse, researchers...
impartialnewsle68
 
How the FTC Wants You to Change Your Shopping App to be Legal
How the FTC Wants You to Change Your Shopping App to be LegalHow the FTC Wants You to Change Your Shopping App to be Legal
How the FTC Wants You to Change Your Shopping App to be LegalBrian Heidelberger
 

What's hot (13)

Legal and ethical issues in web design
Legal and ethical issues in web designLegal and ethical issues in web design
Legal and ethical issues in web design
 
Investigating & proving cybercrime
Investigating & proving cybercrimeInvestigating & proving cybercrime
Investigating & proving cybercrime
 
Cyber Security Awareness Survey: India
Cyber Security Awareness Survey: IndiaCyber Security Awareness Survey: India
Cyber Security Awareness Survey: India
 
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
 
Electronic Communications Act (2000)
Electronic Communications Act (2000)Electronic Communications Act (2000)
Electronic Communications Act (2000)
 
What is data protection and why it is important for business
What is data protection and why it is important for businessWhat is data protection and why it is important for business
What is data protection and why it is important for business
 
CASL Compliant: It's All About Consent
CASL Compliant: It's All About ConsentCASL Compliant: It's All About Consent
CASL Compliant: It's All About Consent
 
Blue Compliance Presentation#2 extended presentation (serif font)
Blue Compliance Presentation#2 extended presentation (serif font)Blue Compliance Presentation#2 extended presentation (serif font)
Blue Compliance Presentation#2 extended presentation (serif font)
 
What Is E Commerce
What Is E CommerceWhat Is E Commerce
What Is E Commerce
 
Websites: 10 Things to Consider to Avoid Litigation 3-5
Websites: 10 Things to Consider to Avoid Litigation 3-5Websites: 10 Things to Consider to Avoid Litigation 3-5
Websites: 10 Things to Consider to Avoid Litigation 3-5
 
Your privacy online: Health information at serious risk of abuse, researchers...
Your privacy online: Health information at serious risk of abuse, researchers...Your privacy online: Health information at serious risk of abuse, researchers...
Your privacy online: Health information at serious risk of abuse, researchers...
 
How the FTC Wants You to Change Your Shopping App to be Legal
How the FTC Wants You to Change Your Shopping App to be LegalHow the FTC Wants You to Change Your Shopping App to be Legal
How the FTC Wants You to Change Your Shopping App to be Legal
 
Ppt by
Ppt by Ppt by
Ppt by
 

Similar to 3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financial Loss

Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
tomciolkosz
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraudtomciolkosz
 
ETHICS03 - Equity Funding Scandal - Case Study
ETHICS03 - Equity Funding Scandal - Case StudyETHICS03 - Equity Funding Scandal - Case Study
ETHICS03 - Equity Funding Scandal - Case Study
Michael Heron
 
Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise Scam
Guardian Analytics
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
AbdullaFatiya3
 
Internet Scams, Identity Theft And
Internet Scams, Identity Theft AndInternet Scams, Identity Theft And
Internet Scams, Identity Theft And
Corey Quinn
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
Pratham Jaiswal
 
Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.
jatharrison
 
Get Paid Faster: Everything Your Law Firm Needs to Know About Automated Billi...
Get Paid Faster: Everything Your Law Firm Needs to Know About Automated Billi...Get Paid Faster: Everything Your Law Firm Needs to Know About Automated Billi...
Get Paid Faster: Everything Your Law Firm Needs to Know About Automated Billi...
Clio - Cloud-Based Legal Technology
 
Armour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explainedArmour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explained
Helena Martin
 
Business Law Training: Effectively Handling Internal Investigations
Business Law Training: Effectively Handling Internal InvestigationsBusiness Law Training: Effectively Handling Internal Investigations
Business Law Training: Effectively Handling Internal Investigations
Quarles & Brady
 
Not "If" but "When"
Not "If" but "When"Not "If" but "When"
Not "If" but "When"
JoAnna Cheshire
 
BBB October 2018 Market Monitor
BBB October 2018 Market Monitor BBB October 2018 Market Monitor
BBB October 2018 Market Monitor
Better Business Bureau Serving Greater Cleveland
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
Springboard
 
Cybercrime: A Primer
Cybercrime:  A PrimerCybercrime:  A Primer
Cybercrime: A Primer
fwscholl
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
- Mark - Fullbright
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
GDPR by Identity Methods
GDPR by Identity MethodsGDPR by Identity Methods
GDPR by Identity Methods
Eduard Lazar
 
Top Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryTop Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout History
Protected Harbor
 
Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2
Management Insights LLC
 

Similar to 3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financial Loss (20)

Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
 
ETHICS03 - Equity Funding Scandal - Case Study
ETHICS03 - Equity Funding Scandal - Case StudyETHICS03 - Equity Funding Scandal - Case Study
ETHICS03 - Equity Funding Scandal - Case Study
 
Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise Scam
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
Internet Scams, Identity Theft And
Internet Scams, Identity Theft AndInternet Scams, Identity Theft And
Internet Scams, Identity Theft And
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.
 
Get Paid Faster: Everything Your Law Firm Needs to Know About Automated Billi...
Get Paid Faster: Everything Your Law Firm Needs to Know About Automated Billi...Get Paid Faster: Everything Your Law Firm Needs to Know About Automated Billi...
Get Paid Faster: Everything Your Law Firm Needs to Know About Automated Billi...
 
Armour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explainedArmour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explained
 
Business Law Training: Effectively Handling Internal Investigations
Business Law Training: Effectively Handling Internal InvestigationsBusiness Law Training: Effectively Handling Internal Investigations
Business Law Training: Effectively Handling Internal Investigations
 
Not "If" but "When"
Not "If" but "When"Not "If" but "When"
Not "If" but "When"
 
BBB October 2018 Market Monitor
BBB October 2018 Market Monitor BBB October 2018 Market Monitor
BBB October 2018 Market Monitor
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Cybercrime: A Primer
Cybercrime:  A PrimerCybercrime:  A Primer
Cybercrime: A Primer
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
GDPR by Identity Methods
GDPR by Identity MethodsGDPR by Identity Methods
GDPR by Identity Methods
 
Top Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryTop Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout History
 
Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2
 

More from databahn

Manulife Org Chart & Sales Intelligence Presentation.pptx
Manulife Org Chart & Sales Intelligence Presentation.pptxManulife Org Chart & Sales Intelligence Presentation.pptx
Manulife Org Chart & Sales Intelligence Presentation.pptx
databahn
 
2020 Fortune 1000 list factoids and findings
2020 Fortune 1000 list factoids and findings2020 Fortune 1000 list factoids and findings
2020 Fortune 1000 list factoids and findings
databahn
 
Fortune 1000 companies' response to covid 19
Fortune 1000 companies' response to covid 19Fortune 1000 companies' response to covid 19
Fortune 1000 companies' response to covid 19
databahn
 
Industries and Fortune 1000 companies thriving during the global pandemic
Industries and Fortune 1000 companies thriving during the global pandemicIndustries and Fortune 1000 companies thriving during the global pandemic
Industries and Fortune 1000 companies thriving during the global pandemic
databahn
 
7 keys to open doors at Cigna
7 keys to open doors at Cigna7 keys to open doors at Cigna
7 keys to open doors at Cigna
databahn
 
7 keys to open doors at Goldman Sachs
7 keys to open doors at Goldman Sachs7 keys to open doors at Goldman Sachs
7 keys to open doors at Goldman Sachs
databahn
 
7 keys to open doors at Pfizer
7 keys to open doors at Pfizer7 keys to open doors at Pfizer
7 keys to open doors at Pfizer
databahn
 
7 keys to open doors at Sysco
7 keys to open doors at Sysco7 keys to open doors at Sysco
7 keys to open doors at Sysco
databahn
 
7 keys to open doors at Caterpillar
7 keys to open doors at Caterpillar7 keys to open doors at Caterpillar
7 keys to open doors at Caterpillar
databahn
 
7 keys to open doors at Walt Disney
7 keys to open doors at Walt Disney7 keys to open doors at Walt Disney
7 keys to open doors at Walt Disney
databahn
 
7 keys to open doors at PepsiCo
7 keys to open doors at PepsiCo7 keys to open doors at PepsiCo
7 keys to open doors at PepsiCo
databahn
 
7 keys to open doors at FedEx
7 keys to open doors at FedEx7 keys to open doors at FedEx
7 keys to open doors at FedEx
databahn
 
7 keys to open doors at Procter & Gamble
7 keys to open doors at Procter & Gamble7 keys to open doors at Procter & Gamble
7 keys to open doors at Procter & Gamble
databahn
 
7 keys to open doors at MetLife
7 keys to open doors at MetLife7 keys to open doors at MetLife
7 keys to open doors at MetLife
databahn
 
7 keys to open doors at Lowe's
7 keys to open doors at Lowe's7 keys to open doors at Lowe's
7 keys to open doors at Lowe's
databahn
 
7 keys to open doors at UPS
7 keys to open doors at UPS7 keys to open doors at UPS
7 keys to open doors at UPS
databahn
 
7 keys to open doors at Wells Fargo
7 keys to open doors at Wells Fargo7 keys to open doors at Wells Fargo
7 keys to open doors at Wells Fargo
databahn
 
7 keys to open doors at Microsoft
7 keys to open doors at Microsoft7 keys to open doors at Microsoft
7 keys to open doors at Microsoft
databahn
 
7 keys to open doors at Johnson & Johnson
7 keys to open doors at Johnson & Johnson7 keys to open doors at Johnson & Johnson
7 keys to open doors at Johnson & Johnson
databahn
 
7 keys to open doors at Starbucks
7 keys to open doors at Starbucks7 keys to open doors at Starbucks
7 keys to open doors at Starbucks
databahn
 

More from databahn (20)

Manulife Org Chart & Sales Intelligence Presentation.pptx
Manulife Org Chart & Sales Intelligence Presentation.pptxManulife Org Chart & Sales Intelligence Presentation.pptx
Manulife Org Chart & Sales Intelligence Presentation.pptx
 
2020 Fortune 1000 list factoids and findings
2020 Fortune 1000 list factoids and findings2020 Fortune 1000 list factoids and findings
2020 Fortune 1000 list factoids and findings
 
Fortune 1000 companies' response to covid 19
Fortune 1000 companies' response to covid 19Fortune 1000 companies' response to covid 19
Fortune 1000 companies' response to covid 19
 
Industries and Fortune 1000 companies thriving during the global pandemic
Industries and Fortune 1000 companies thriving during the global pandemicIndustries and Fortune 1000 companies thriving during the global pandemic
Industries and Fortune 1000 companies thriving during the global pandemic
 
7 keys to open doors at Cigna
7 keys to open doors at Cigna7 keys to open doors at Cigna
7 keys to open doors at Cigna
 
7 keys to open doors at Goldman Sachs
7 keys to open doors at Goldman Sachs7 keys to open doors at Goldman Sachs
7 keys to open doors at Goldman Sachs
 
7 keys to open doors at Pfizer
7 keys to open doors at Pfizer7 keys to open doors at Pfizer
7 keys to open doors at Pfizer
 
7 keys to open doors at Sysco
7 keys to open doors at Sysco7 keys to open doors at Sysco
7 keys to open doors at Sysco
 
7 keys to open doors at Caterpillar
7 keys to open doors at Caterpillar7 keys to open doors at Caterpillar
7 keys to open doors at Caterpillar
 
7 keys to open doors at Walt Disney
7 keys to open doors at Walt Disney7 keys to open doors at Walt Disney
7 keys to open doors at Walt Disney
 
7 keys to open doors at PepsiCo
7 keys to open doors at PepsiCo7 keys to open doors at PepsiCo
7 keys to open doors at PepsiCo
 
7 keys to open doors at FedEx
7 keys to open doors at FedEx7 keys to open doors at FedEx
7 keys to open doors at FedEx
 
7 keys to open doors at Procter & Gamble
7 keys to open doors at Procter & Gamble7 keys to open doors at Procter & Gamble
7 keys to open doors at Procter & Gamble
 
7 keys to open doors at MetLife
7 keys to open doors at MetLife7 keys to open doors at MetLife
7 keys to open doors at MetLife
 
7 keys to open doors at Lowe's
7 keys to open doors at Lowe's7 keys to open doors at Lowe's
7 keys to open doors at Lowe's
 
7 keys to open doors at UPS
7 keys to open doors at UPS7 keys to open doors at UPS
7 keys to open doors at UPS
 
7 keys to open doors at Wells Fargo
7 keys to open doors at Wells Fargo7 keys to open doors at Wells Fargo
7 keys to open doors at Wells Fargo
 
7 keys to open doors at Microsoft
7 keys to open doors at Microsoft7 keys to open doors at Microsoft
7 keys to open doors at Microsoft
 
7 keys to open doors at Johnson & Johnson
7 keys to open doors at Johnson & Johnson7 keys to open doors at Johnson & Johnson
7 keys to open doors at Johnson & Johnson
 
7 keys to open doors at Starbucks
7 keys to open doors at Starbucks7 keys to open doors at Starbucks
7 keys to open doors at Starbucks
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financial Loss

  • 1. By 3 Instances Where E-Mail Mining For Fraud Detection… Could’ve Prevented Financial Loss
  • 2. Do You Recognize Any Of These Corporate Fraud Headlines? Breaking News
  • 3. It’s ok if you don’t remember… because we’ll give you all of the details!
  • 4. The databahn Times Mike Kail Senior Netflix executive receives bribesCase # 1: • Mike Kail was the former VP of Information Technology Operations • Kail made a deal with IT service providers to receive bribes of 12% - 15% of the total deal value • Kail earned $490,000 in kickbacks • Netflix uncovered the fraud after Kail left • Netflix uncovered e-mails discussing “referral fees” • Kail got away with the crime because he was an upper-level employee
  • 5. The databahn Times British software company, Autonomy, falsifies numbers Case # 2: • HP acquired Autonomy for $11.1 billion in 2012 • HP discovered Autonomy misrepresented its finances – by $5.55 billion • HP filed a $5.1 billion lawsuit against Autonomy • E-mails were discovered between the former CFO and founder • Included the phrases “covered up” and “imaginary deals” • E-mails were checked and the truth was discovered after the deal had gone through
  • 6. The databahn Times Former law partner shares private information with opposing attorney Case # 3: • A former law partner at Willkie Farr & Gallagher, Keila Ravelo, had suspicious communications with the opposing counsel • Ravelo had an established friendship with the opposing counselor • The law firm found e-mails and attachments concerning the American Express litigation • The opposing counselor sent Ravelo documents secured under the American Express litigation protective order
  • 7. What These Headlines Have In Common… Besides Fraud FRAUD ! ?
  • 8. Proof of Fraud: Autonomy E-mail From The Telegraph E-Mail conversation between the CFO and founder
  • 9. E-mail Mining Would Have Saved… Time Money Median fraud duration in 2014 was 18 months Median loss in 2014 was $145,000 *stats from Association of Certified Fraud Examiners’ Report to Nations Reputation Your reputation is immeasurable
  • 10. Internal Fraud Can Happen To Any Company Small Company Large Company You need to implement a proactive approach!
  • 11. You’ve Seen Enough Fraud In The News... YOU Don’t become the next headline!
  • 12. For more information, check out our blog at www.databahn.com/blog @844databahn Databahn databahn