The document discusses fraud risk management tools and techniques used to identify and prevent fraud, including risk heat mapping to monitor high-risk customer accounts based on country and transaction risks, computer-assisted audit techniques, artificial intelligence, machine learning and data analytics to detect patterns of potential fraudulent activity. It also covers case studies on banking, digital, and online fraud risks as well as the roles and responsibilities in an effective fraud risk management program.
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud RiskKyriba Corporation
This document summarizes a presentation on reducing fraud risks for corporate treasury departments. It includes briefings on common hacking and fraud threats like business email compromise, ransomware, and the financial fraud kill chain. The presentation emphasizes how these threats impact CFOs and their responsibilities. It then outlines treasury tools like payment guiding principles, the Kyriba payments hub, and fraud detection rules that can help protect organizations from fraud and better control financial risks and oversight. The goal is to help CFOs and treasury teams deploy the best defenses.
The initial stage of the supply chain process is the planning stage. We need to develop a plan or strategy in order to address how the products and services will satisfy the demands and necessities of the customers. In this stage, the planning should mainly focus on designing a strategy that yields maximum profit.
For managing all the resources required for designing products and providing services, a strategy has to be designed by the companies. Supply chain management mainly focuses on planning and developing a set of metrics.
1.4.2) Develop (Source)
After planning, the next step involves developing or sourcing. In this stage, we mainly concentrate on building a strong relationship with Develop of the raw materials required for
production. This involves not only identifying dependable suppliers but also determining different planning methods for shipping, delivery, and payment of the product.
Companies need to select suppliers to deliver the items and services they require to develop their product. So, in this stage, the supply chain managers need to construct a set of pricing, delivery and payment processes with suppliers and also create the metrics for controlling and improving the relationships.
Finally, the supply chain managers can combine all these processes for handling their goods and services inventory. This handling comprises receiving and examining shipments, transferring them to the manufacturing facilities and authorizing supplier payments.
1.4.3) Make
The third step in the supply chain management process is the manufacturing or making of products that were demanded by the customer. In this stage, the products are designed, produced, tested, packaged, and synchronized for delivery.
Here, the task of the supply chain manager is to schedule all the activities required for manufacturing, testing, packaging and preparation for delivery. This stage is considered as the most metric-intensive unit of the supply chain, where firms can e gauge the quality levels, production output and worker productivity.
Employees And Fraud Risks - UiTM Masters in Accounting Special LectureKenny Ong
The document discusses fraud risks and risk management strategies at CNI Holdings Berhad, a Malaysian MLM company. It describes several fraud cases CNI experienced, including ticket overclaims, undercutting sales leaders, and cash embezzlement. It then outlines CNI's framework for risk mitigation, including defining risks, reducing likelihood and impact, monitoring risks, and conducting fraud investigations. New fraud risks from changes like e-commerce are also discussed. Throughout, lessons learned about preventing fraud through effective culture, policies, and oversight are emphasized.
The document discusses how fraud and integrity risks are changing and increasing during the economic downturn. It summarizes that incentive/pressure, opportunity, and rationalization - the three conditions of the fraud triangle - are all heightened. Specific fraud risks that may emerge include issues in the supply chain, revenue leakage, bribery, anticompetitive practices, improper financial reporting, data theft, and weakened internal controls. The document recommends that organizations assess these risks, employ data analytics to detect misconduct, and implement a comprehensive antifraud framework based on the COSO model to proactively manage fraud risks.
Insider Threat: Cases and Controls to Prevent Internal Fraud and PreventionCase IQ
“I never would have imagined”, said the company owner, manager, colleague, or workplace friend. It is hard to reconcile that people would engage in fraudulent behavior in the workplace, let alone the depth of these schemes. Financial misconduct and internal fraud are among the biggest threats to today’s organizations. Without the right controls and prevention measures in place, companies are at financial and reputational risk.
Join financial crime compliance advisory and training specialist Michael Schidlow, as he reviews recent cases of internal fraud, what we can learn from them, and controls that companies can put in place to prevent fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudFraudBusters
FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware.
The two entities designed FRN as the “go-to”, easy-to-use source of “how-to” fraud prevention, detection, audit and investigation templates, guidelines, policies, training programs (recorded no CPE and live with CPE) and articles from leading subject matter experts.
FRN is a continuously expanding and improving resource, offering auditors, fraud examiners, controllers, investigators and accountants a content-rich source of cutting-edge anti-fraud tools and techniques they will want to refer to again and again.
White-Collar Crime Fighter Newsletter Subscribe Now at No Cost!
FraudResourceNet has made the premier Anti-Fraud newsletter, White-Collar Crime Fighter freely available to all. All this is required is to complete the registration form with your work email address!
The widely read newsletter, White-Collar Crime Fighter brings you expert strategies and actionable advice from the most prominent experts in the fraud-fighting business. Every two months you'll learn about the latest frauds, scams and schemes... and the newest and most effective fraud-fighting tools, techniques and technologies to put to work immediately to protect your organization.
When it comes to fraud, knowledge of the countless schemes, how they work and red flags to look for will help keep you, your organization and your clients safe.
At FraudResourceNet we understand this and take great pride in providing our FREE White Collar Crime Fighter newsletter -- filled with exclusive articles and tips to provide the knowledge you need.
Make sure you stay informed. Sign up for White Collar Crime Fighter newsletter and we’ll keep you up-to-date on special promos, training opportunities, and other news and offers from FraudResourceNet!
Signing up is easy and FREE. If you have not already subscribed to our newsletter, please sign up to get started!
Sign up for the White Collar Crime Fighter Newsletter (a $99 value ... now completely FREE)
The document summarizes a presentation on fraud risk management. It discusses why people commit fraud, proactive vs reactive fraud prevention approaches, what to do if fraud is detected, and concluding with what to do if fraud is suspected. The presentation advocates adopting a "fraud savvy model" with six elements: establishing moral rules, training, risk controls, reporting/monitoring, proactive detection, and thorough investigation/prosecution. If fraud occurs, the presenter recommends a full internal investigation, preserving evidence, seeking legal advice, and implementing fraud mitigation measures, but expresses that focusing on recovery may be better than punishment.
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud RiskKyriba Corporation
This document summarizes a presentation on reducing fraud risks for corporate treasury departments. It includes briefings on common hacking and fraud threats like business email compromise, ransomware, and the financial fraud kill chain. The presentation emphasizes how these threats impact CFOs and their responsibilities. It then outlines treasury tools like payment guiding principles, the Kyriba payments hub, and fraud detection rules that can help protect organizations from fraud and better control financial risks and oversight. The goal is to help CFOs and treasury teams deploy the best defenses.
The initial stage of the supply chain process is the planning stage. We need to develop a plan or strategy in order to address how the products and services will satisfy the demands and necessities of the customers. In this stage, the planning should mainly focus on designing a strategy that yields maximum profit.
For managing all the resources required for designing products and providing services, a strategy has to be designed by the companies. Supply chain management mainly focuses on planning and developing a set of metrics.
1.4.2) Develop (Source)
After planning, the next step involves developing or sourcing. In this stage, we mainly concentrate on building a strong relationship with Develop of the raw materials required for
production. This involves not only identifying dependable suppliers but also determining different planning methods for shipping, delivery, and payment of the product.
Companies need to select suppliers to deliver the items and services they require to develop their product. So, in this stage, the supply chain managers need to construct a set of pricing, delivery and payment processes with suppliers and also create the metrics for controlling and improving the relationships.
Finally, the supply chain managers can combine all these processes for handling their goods and services inventory. This handling comprises receiving and examining shipments, transferring them to the manufacturing facilities and authorizing supplier payments.
1.4.3) Make
The third step in the supply chain management process is the manufacturing or making of products that were demanded by the customer. In this stage, the products are designed, produced, tested, packaged, and synchronized for delivery.
Here, the task of the supply chain manager is to schedule all the activities required for manufacturing, testing, packaging and preparation for delivery. This stage is considered as the most metric-intensive unit of the supply chain, where firms can e gauge the quality levels, production output and worker productivity.
Employees And Fraud Risks - UiTM Masters in Accounting Special LectureKenny Ong
The document discusses fraud risks and risk management strategies at CNI Holdings Berhad, a Malaysian MLM company. It describes several fraud cases CNI experienced, including ticket overclaims, undercutting sales leaders, and cash embezzlement. It then outlines CNI's framework for risk mitigation, including defining risks, reducing likelihood and impact, monitoring risks, and conducting fraud investigations. New fraud risks from changes like e-commerce are also discussed. Throughout, lessons learned about preventing fraud through effective culture, policies, and oversight are emphasized.
The document discusses how fraud and integrity risks are changing and increasing during the economic downturn. It summarizes that incentive/pressure, opportunity, and rationalization - the three conditions of the fraud triangle - are all heightened. Specific fraud risks that may emerge include issues in the supply chain, revenue leakage, bribery, anticompetitive practices, improper financial reporting, data theft, and weakened internal controls. The document recommends that organizations assess these risks, employ data analytics to detect misconduct, and implement a comprehensive antifraud framework based on the COSO model to proactively manage fraud risks.
Insider Threat: Cases and Controls to Prevent Internal Fraud and PreventionCase IQ
“I never would have imagined”, said the company owner, manager, colleague, or workplace friend. It is hard to reconcile that people would engage in fraudulent behavior in the workplace, let alone the depth of these schemes. Financial misconduct and internal fraud are among the biggest threats to today’s organizations. Without the right controls and prevention measures in place, companies are at financial and reputational risk.
Join financial crime compliance advisory and training specialist Michael Schidlow, as he reviews recent cases of internal fraud, what we can learn from them, and controls that companies can put in place to prevent fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudFraudBusters
FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware.
The two entities designed FRN as the “go-to”, easy-to-use source of “how-to” fraud prevention, detection, audit and investigation templates, guidelines, policies, training programs (recorded no CPE and live with CPE) and articles from leading subject matter experts.
FRN is a continuously expanding and improving resource, offering auditors, fraud examiners, controllers, investigators and accountants a content-rich source of cutting-edge anti-fraud tools and techniques they will want to refer to again and again.
White-Collar Crime Fighter Newsletter Subscribe Now at No Cost!
FraudResourceNet has made the premier Anti-Fraud newsletter, White-Collar Crime Fighter freely available to all. All this is required is to complete the registration form with your work email address!
The widely read newsletter, White-Collar Crime Fighter brings you expert strategies and actionable advice from the most prominent experts in the fraud-fighting business. Every two months you'll learn about the latest frauds, scams and schemes... and the newest and most effective fraud-fighting tools, techniques and technologies to put to work immediately to protect your organization.
When it comes to fraud, knowledge of the countless schemes, how they work and red flags to look for will help keep you, your organization and your clients safe.
At FraudResourceNet we understand this and take great pride in providing our FREE White Collar Crime Fighter newsletter -- filled with exclusive articles and tips to provide the knowledge you need.
Make sure you stay informed. Sign up for White Collar Crime Fighter newsletter and we’ll keep you up-to-date on special promos, training opportunities, and other news and offers from FraudResourceNet!
Signing up is easy and FREE. If you have not already subscribed to our newsletter, please sign up to get started!
Sign up for the White Collar Crime Fighter Newsletter (a $99 value ... now completely FREE)
The document summarizes a presentation on fraud risk management. It discusses why people commit fraud, proactive vs reactive fraud prevention approaches, what to do if fraud is detected, and concluding with what to do if fraud is suspected. The presentation advocates adopting a "fraud savvy model" with six elements: establishing moral rules, training, risk controls, reporting/monitoring, proactive detection, and thorough investigation/prosecution. If fraud occurs, the presenter recommends a full internal investigation, preserving evidence, seeking legal advice, and implementing fraud mitigation measures, but expresses that focusing on recovery may be better than punishment.
Financial Statement Fraud training by Tommy SEAHTommy Seah
This document advertises and provides details about a 2-day workshop on detecting and preventing financial statement fraud hosted by ProEdge Global.
The workshop aims to provide an overview of different types of financial fraud, with a focus on financial statement fraud. Attendees will learn practical techniques to combat financial statement fraud from an expert in the field.
The workshop is intended for corporate leaders, financial professionals, accountants, and auditors who want to improve their ability to detect, respond to, and prevent financial statement fraud.
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentBillyCheuk
This document discusses fraud risk assessment and management. It covers key principles of fraud risk management programs including fraud risk assessment, prevention, detection, escalation, investigation and correction. The fraud risk assessment process involves identifying inherent fraud risks, assessing the likelihood and significance of risks, and responding to reasonably likely and significant residual risks. It provides examples of fraud risks across different areas like financial reporting, misappropriation of assets, corruption, and other risks. It also discusses establishing a fraud risk assessment team and outlines the fraud risk assessment framework and process.
We had another great webinar presented by Dave Hammarberg (Director of IT and Consulting Senior Manager) and Jim Shellenberger (Senior Manager) with McKonly & Asbury! Thank you to everyone that attended and received CPE credit.
We discussed what skimming is and went into a discussion of several examples and how to detect and prevent your organization from becoming a victim of skimming.
Check out our Upcoming Events page for news and updates on our future seminars and webinars.
For more information on this topic or to submit a question for Dave or Jim, use our contact page at www.macpas.com/contact.
www.macpas.com/webinar-recap-skimming-what-the-auditors-miss
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
Webinar series from FraudResourceNet LLC on Preventing and Detecting Fraud in a High Crime Climate. Recordings of these Webinars are available for purchase from our Website fraudresourcenet.com
This Webinar focused on the subject in the title
FraudResourceNet (FRN) is the only searchable portal of practical, expert fraud prevention, detection and audit information on the Web.
FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware.
This document summarizes a webinar on fraud in the public sector. The webinar discusses the definition of fraud, sectors and industries most commonly impacted by fraud, who typically commits fraud, and reasons why fraud occurs. Specific examples of potential public sector fraud in Canada are provided. The webinar also outlines steps that can be taken to reduce fraud risk, such as establishing clear roles and responsibilities, implementing appropriate prevention and detection controls, and regularly communicating fraud management results. Common fraud detection methods and key elements of an effective fraud risk management program are also summarized.
DIFFERENCES BETWEEN ERM PRACTICES BETWEEN THE FINANCIAL AND CORPORATE SECTORS
DIFFÉRENCES DES PRATIQUES ERM ENTRE LES SECTEURS FINANCIERS ET CORPORATIFS
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Pairat Srivilairit
Combating Fraud : Putting in Place an Effective Audit System to Detect and Prevent Fraud
The 9th - Cyber Defense Initiative Conference 2009 - (CDIC 2009)
10th-11th November 2009 Queen Sirikit National Convention Center
By Pairat Srivilairit, CIA, CISA, CBA, CCSA, CFSA, CISSP, CFE
Tuesday, 10 November 2009 15:15-16:00 hrs
Combating Fraud: Putting in Place an Effective Audit System to Detect and Prevent Fraud (45 min)
Key Indicators of Fraud
Types of Fraud in Activities Reviewed
Prevention Aids by Internal Auditors
Detection and Investigation Techniques
Summary
Combating Fraud: Putting in Place an Effective Audit System to Detect and Prevent Fraud discusses implementing effective fraud detection and prevention measures. It outlines key indicators of fraud, common types of occupational fraud seen in various industries and activities, techniques used by internal auditors to detect and investigate fraud, and methods to limit fraud losses such as surprise audits and job rotation. The speaker is an experienced auditor who provides expertise on implementing anti-fraud controls and detecting insider threats in the banking sector.
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryDecosimoCPAs
Fraud prevention, detection and investigation in the payday advance industry was discussed including defining fraud and embezzlement, how they occur in the industry, and steps that can be taken to prevent fraud such as implementing policies to segregate duties and conduct regular audits. Common types of fraud like internal and external fraud were described as well as ways fraud can be detected through analytical procedures and interviews. The roles of forensic accountants and methods of investigating probable fraud cases were also outlined.
Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...Kenny Ong
The document discusses CNI Holdings Berhad's journey in mitigating fraud risks through various strategies and lessons learned. It outlines CNI's business model and areas where fraud risks exist, such as at distribution centers, among staff, and from management. The strategies discussed focus on reducing the likelihood and impact of fraud through improved culture, structures, resources, leadership, policies and procedures, tools, and crisis management plans. CNI aims to prevent, deter and address fraud at its roots by balancing oversight and addressing human factors that enable fraud.
Role of Internal Audit in fraud prevention and detectionZeeshan Shahid
The document discusses the role of internal audit in fraud prevention and detection. It covers relevant standards, fraud awareness, fraud risks and types of fraud. It describes the roles and responsibilities of management, external auditors, internal auditors in preventing and detecting fraud. It provides facts about typical fraud cases and profiles of fraudsters based on reports by the Association of Certified Fraud Examiners. The document emphasizes the importance of professional skepticism, communication with the board, and fraud risk assessments for internal auditors."
“Nearly half of all victim organizations do not recover any losses that they suffer due to fraud” according to the 2012 Report to the Nations presented by the Association of Certified Fraud Examiners. Although, there are no statistics that report the total number of entities and the amount defrauded, regardless of size, any organization can become a victim of fraud. Kyle Anne Midkiff’s white paper, Act Now Before it’s Too Late, provides five important steps to help organizations of any size prevent fraud.
The document discusses annual risk assessment and investigations related to anti-money laundering (AML) and combating the financing of terrorism (CFT). It covers several topics:
1. The AML/CFT risk management framework and why risks need to be assessed.
2. How to assess risks through identification, evaluation, and estimation of likelihood and impact. Risk matrices and scoring are presented as examples.
3. The implications of risk assessments, including improving policies/procedures and informed decision-making about risk appetite based on residual risk.
This document provides an introduction to fraud, including definitions, types of fraud, who can commit fraud, potential triggers of fraud, reasons for fraud, and impacts of fraud. It defines fraud as any dishonest act or omission intended to gain advantage. Common types of fraud include cheating, forgery, misappropriation, and fraudulent transactions. Employees, customers, and outsiders can all perpetrate fraud. Triggers may include lifestyle changes or high-risk transactions. Fraud is often committed due to financial problems, knowledge of weaknesses, and rationalization. Impacts include financial, regulatory, and reputational risks for institutions, as well as punishments for individuals.
Fraud Risk Assessment: An Expert’s BlueprintFraudBusters
Webinar series from FraudResourceNet LLC on Preventing and Detecting Fraud in a High Crime Climate. Recordings of these Webinars are available for purchase from our Website fraudresourcenet.com
This Webinar focused on the subject in the title
FraudResourceNet (FRN) is the only searchable portal of practical, expert fraud prevention, detection and audit information on the Web.
FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware.
Payment fraud is a persistent threat in today's digital world. Even some of these fraud events were found connected with the best credit card payment companies to top credit card payment processing. Visit us at: https://webpays.com/best-credit-card-payment-companies.html
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Financial Statement Fraud training by Tommy SEAHTommy Seah
This document advertises and provides details about a 2-day workshop on detecting and preventing financial statement fraud hosted by ProEdge Global.
The workshop aims to provide an overview of different types of financial fraud, with a focus on financial statement fraud. Attendees will learn practical techniques to combat financial statement fraud from an expert in the field.
The workshop is intended for corporate leaders, financial professionals, accountants, and auditors who want to improve their ability to detect, respond to, and prevent financial statement fraud.
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentBillyCheuk
This document discusses fraud risk assessment and management. It covers key principles of fraud risk management programs including fraud risk assessment, prevention, detection, escalation, investigation and correction. The fraud risk assessment process involves identifying inherent fraud risks, assessing the likelihood and significance of risks, and responding to reasonably likely and significant residual risks. It provides examples of fraud risks across different areas like financial reporting, misappropriation of assets, corruption, and other risks. It also discusses establishing a fraud risk assessment team and outlines the fraud risk assessment framework and process.
We had another great webinar presented by Dave Hammarberg (Director of IT and Consulting Senior Manager) and Jim Shellenberger (Senior Manager) with McKonly & Asbury! Thank you to everyone that attended and received CPE credit.
We discussed what skimming is and went into a discussion of several examples and how to detect and prevent your organization from becoming a victim of skimming.
Check out our Upcoming Events page for news and updates on our future seminars and webinars.
For more information on this topic or to submit a question for Dave or Jim, use our contact page at www.macpas.com/contact.
www.macpas.com/webinar-recap-skimming-what-the-auditors-miss
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
Webinar series from FraudResourceNet LLC on Preventing and Detecting Fraud in a High Crime Climate. Recordings of these Webinars are available for purchase from our Website fraudresourcenet.com
This Webinar focused on the subject in the title
FraudResourceNet (FRN) is the only searchable portal of practical, expert fraud prevention, detection and audit information on the Web.
FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware.
This document summarizes a webinar on fraud in the public sector. The webinar discusses the definition of fraud, sectors and industries most commonly impacted by fraud, who typically commits fraud, and reasons why fraud occurs. Specific examples of potential public sector fraud in Canada are provided. The webinar also outlines steps that can be taken to reduce fraud risk, such as establishing clear roles and responsibilities, implementing appropriate prevention and detection controls, and regularly communicating fraud management results. Common fraud detection methods and key elements of an effective fraud risk management program are also summarized.
DIFFERENCES BETWEEN ERM PRACTICES BETWEEN THE FINANCIAL AND CORPORATE SECTORS
DIFFÉRENCES DES PRATIQUES ERM ENTRE LES SECTEURS FINANCIERS ET CORPORATIFS
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Pairat Srivilairit
Combating Fraud : Putting in Place an Effective Audit System to Detect and Prevent Fraud
The 9th - Cyber Defense Initiative Conference 2009 - (CDIC 2009)
10th-11th November 2009 Queen Sirikit National Convention Center
By Pairat Srivilairit, CIA, CISA, CBA, CCSA, CFSA, CISSP, CFE
Tuesday, 10 November 2009 15:15-16:00 hrs
Combating Fraud: Putting in Place an Effective Audit System to Detect and Prevent Fraud (45 min)
Key Indicators of Fraud
Types of Fraud in Activities Reviewed
Prevention Aids by Internal Auditors
Detection and Investigation Techniques
Summary
Combating Fraud: Putting in Place an Effective Audit System to Detect and Prevent Fraud discusses implementing effective fraud detection and prevention measures. It outlines key indicators of fraud, common types of occupational fraud seen in various industries and activities, techniques used by internal auditors to detect and investigate fraud, and methods to limit fraud losses such as surprise audits and job rotation. The speaker is an experienced auditor who provides expertise on implementing anti-fraud controls and detecting insider threats in the banking sector.
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryDecosimoCPAs
Fraud prevention, detection and investigation in the payday advance industry was discussed including defining fraud and embezzlement, how they occur in the industry, and steps that can be taken to prevent fraud such as implementing policies to segregate duties and conduct regular audits. Common types of fraud like internal and external fraud were described as well as ways fraud can be detected through analytical procedures and interviews. The roles of forensic accountants and methods of investigating probable fraud cases were also outlined.
Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...Kenny Ong
The document discusses CNI Holdings Berhad's journey in mitigating fraud risks through various strategies and lessons learned. It outlines CNI's business model and areas where fraud risks exist, such as at distribution centers, among staff, and from management. The strategies discussed focus on reducing the likelihood and impact of fraud through improved culture, structures, resources, leadership, policies and procedures, tools, and crisis management plans. CNI aims to prevent, deter and address fraud at its roots by balancing oversight and addressing human factors that enable fraud.
Role of Internal Audit in fraud prevention and detectionZeeshan Shahid
The document discusses the role of internal audit in fraud prevention and detection. It covers relevant standards, fraud awareness, fraud risks and types of fraud. It describes the roles and responsibilities of management, external auditors, internal auditors in preventing and detecting fraud. It provides facts about typical fraud cases and profiles of fraudsters based on reports by the Association of Certified Fraud Examiners. The document emphasizes the importance of professional skepticism, communication with the board, and fraud risk assessments for internal auditors."
“Nearly half of all victim organizations do not recover any losses that they suffer due to fraud” according to the 2012 Report to the Nations presented by the Association of Certified Fraud Examiners. Although, there are no statistics that report the total number of entities and the amount defrauded, regardless of size, any organization can become a victim of fraud. Kyle Anne Midkiff’s white paper, Act Now Before it’s Too Late, provides five important steps to help organizations of any size prevent fraud.
The document discusses annual risk assessment and investigations related to anti-money laundering (AML) and combating the financing of terrorism (CFT). It covers several topics:
1. The AML/CFT risk management framework and why risks need to be assessed.
2. How to assess risks through identification, evaluation, and estimation of likelihood and impact. Risk matrices and scoring are presented as examples.
3. The implications of risk assessments, including improving policies/procedures and informed decision-making about risk appetite based on residual risk.
This document provides an introduction to fraud, including definitions, types of fraud, who can commit fraud, potential triggers of fraud, reasons for fraud, and impacts of fraud. It defines fraud as any dishonest act or omission intended to gain advantage. Common types of fraud include cheating, forgery, misappropriation, and fraudulent transactions. Employees, customers, and outsiders can all perpetrate fraud. Triggers may include lifestyle changes or high-risk transactions. Fraud is often committed due to financial problems, knowledge of weaknesses, and rationalization. Impacts include financial, regulatory, and reputational risks for institutions, as well as punishments for individuals.
Fraud Risk Assessment: An Expert’s BlueprintFraudBusters
Webinar series from FraudResourceNet LLC on Preventing and Detecting Fraud in a High Crime Climate. Recordings of these Webinars are available for purchase from our Website fraudresourcenet.com
This Webinar focused on the subject in the title
FraudResourceNet (FRN) is the only searchable portal of practical, expert fraud prevention, detection and audit information on the Web.
FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware.
Payment fraud is a persistent threat in today's digital world. Even some of these fraud events were found connected with the best credit card payment companies to top credit card payment processing. Visit us at: https://webpays.com/best-credit-card-payment-companies.html
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
1. Fraud Risk Management
A Global Perspective
Canada Inc
CA V S KUMAR FCA, CFE, CIA
vsk2727@gmail.com
EFTRAC Canada Inc.
2. Welcome All
Yes, fraud is a serious subject but in reality it is fun and interesting, both for the investigator & fraudsters, like
a chess game.
I can only make this fraud session interesting by using few case studies; videos and by splitting the session
to 4 modules stitched nicely for easy understanding.
Logistics for this webinar & Disclaimer
• Reminder: During my talk, on & off I will be touching few basic concepts for the students to understand
better. Our experienced members and Subject Matter Experts SMEs, are well versed on fraud basics.
Appreciate if you could bear these basics in the larger interest.
• Disclaimer & Acknowledgement: Case studies; images and Videos here are presented for education
and better understanding only. We acknowledge sincere thanks to each of the references covered in this
presentation. These are NOT FOR ADVERTISEMENT For security reasons names are changed.
• Let us take a deep dive into our Fraud Risk Management session right away - 4 module structure.
Do you like challenges – become a CFE
3. Fraud Risk Management (FRM)
A monster concept - Bite size for you…. into 4 modules
Module 1
Fraud risk management program
Concept and Accountability
Module 2
Banking fraud
Module 3
Digital fraud & on-line
Internet of Things IoT
Module 4
FRM Tools & Global scenario
AI, ML, Data Mining, CAATs
4. Module 1 – Fraud Risk Management Program
1.0 Concept Overview
• Fraud
• Risk
• Management of Fraud Risk
2.0 Effective fraud risk management program
• Industry and company specific
• Organization size
• Complexities recognizing inherent risks & systemic risks.
• Bank fraud & Digital fraud focused
3.0 Accountability
• Statutory Auditor or IA or Top Management or who else?
• Board Room to Mail Room + key role of Internal Auditor
• AML investigation – (Case study: CID interaction - FAX tapping)
Module 1
Fraud risk management program
Concept and Accountability
5. 1.0 Concept Overview – Fraud, Risk, Management of Fraud Risk
Error vs Fraud
• Error can be accidental, but there can be NO accidental fraud
• Origin of the term “Fraud” - Financial Reward Acquired Under Deception
• Deception is intentional - made for personal gain or - to damage another individual
• Deliberately deceiving another - in order to damage them - to obtain property or services unjustly
• In criminal law, fraud is a crime or offense
Internal vs External fraud
Internal: Occupational / Employee fraud; corruption, asset misappropriation, & financial statement fraud. Not
charging friends & family.
External: Risk of unexpected loss perpetrated by persons external to the organization – this can be financial
loss; material or reputational loss.
Threat – unintentional vs intentional
• A threat is what we're trying to protect against. A staff mistakenly accessing wrong info in the system; A
disgruntled staff accessing the same system to inject virus or add spyware, malware it is intentional threat.
Risk is high in case of Intentional threat.
6. 1.0 Concept Overview – Risk and Emerging Risk
Risk
• The potential for loss of life or money or damage as a result of a threat, exploiting a vulnerability.
• Risk is the intersection of assets, threats, and vulnerabilities.
• Types of Risks include: Inherent risk; Systemic risk; Reputation risk, Regulatory risk; Transaction risk;
Employee fraud risk (occupational fraud)
FRAUD is a Risk - Fraud risk is the risk of various types of fraud, a Co could face from internal and/or external.
Emerging Risk: High risk of uncertainty - no clue; no basic information; can’t even assess the frequency &
severity of a given risk. Emerging risk is completely a beast, never experienced before but causes havoc. Best
example, right now in 2020 world is facing this, Emerging Risk “Contagion” movie released in 2011. VIDEO
https://youtu.be/VZGHGVIedzA
Laurie Garret wrote a book in 1994 “The coming Plague” reported on multiple pandemics. Says Contagion as
Partly fantasy part reality and totally possible Emerging risks in banking: Security breaches /New Regulation on
data & security SWIFT.
RISK ASSESSMENT – Banking health
RISK – Heat Map – covered in Banking fraud - AML Risk heat map in tools - STRESS TEST - As a banking
regulator in Middle East (pro-active real estate market) & in Canada, we used multiple tools for risk assessment
7. 1.0 Concept Overview: Fraud Risk Identification Process
The fraud risk identification process should include:
• Assessment of the incentives,
• Pressures
• Opportunities to commit fraud
• Intention
Along with pressure and opportunity, fuel for committing fraud is complete with
rationalization.
Opportunities to commit fraud exist throughout any organization and it is HUGE in
banking and digital environment. Imagine if there is lax in internal controls and a lack of
segregation of duties, it is a field day for fraudsters.
Case study: Over reliance of branch manager on a shrewd staff. Unreconciled demand
draft A/c - DD issued without consideration using client A/cs & customer cash was
siphoned off with false entry in passbook only. Branch control returns fudged.
8. 2.0 Effective Fraud Risk Management
Product & its nature: (high potential for fraud)
• Gold & bullion business / Cash business / Ease of resale
Factors to Consider for an Effective FRM
• Conducive to fraudsters
• Access ; Accounts;
• documentation;
• oversight; related party deals;
• time off access;
• more complex process high potential for fraud;
• Weak Board of Directors -strong case for fraud
• Soft touch
• Attrition rate
• Weak internal audit function - fertile for fraud
• Pressure: Dissatisfaction; classified info;
market expectation; avoid invoking BGs
Case study: Feel of segregation on books - case study: spurious gold Aged supervisor reliance
on joint custodian.
Internal auditor role is very critical, on the ground, during audit: PIN & CARD segregation /eyes
& ears open / faulty cash counting machine.
9. 3.0 Accountability
Who on earth is accountable? Is it Statutory Auditor or Internal Auditor or
Senior Management ?
• Board Room to Mail Room & key role of Internal Auditor. Limited extent Statutory too
• “Does “one size fits for all” FRM model apply? BIG NO - Customization is key.
• In ensuring effectiveness of FRM program, Internal Auditor does play a big role in
ensuring strict compliance of following ACFE guidelines
• FRM depends on the company size; complexity and industry fitment. Vulnerability
• Risk tolerance – there is tolerance level for risk but for fraud – zero tolerance (Tone at
the Top is critical)
10. 3.0 Accountability (Contd.)
Key elements to be present in the Fraud Risk Management documentation
& Org. structure:
• Roles and responsibilities - Board & Senior
Management
• Commitment - Tone at the Top
• Fraud awareness (training / webinar )
• Conflict disclosure
• Detailed Fraud risk assessment
• Emerging Risk radar
• Reporting protocol – follow up action
• Red flag
• Whistleblower protection
• Investigation process documented
• Corrective action & serious penalty
• Quality assurance at each stage
• Continuous monitoring
• Eyes & Ears (experience need not be yours)
• Dynamic & not static (Example COVID frauds)
World is Changing, so as Rules
11. Module 2: Banking Fraud
• Fraud toes the dotted line of money
• Money = Banking, Banking = Fertile ground for Fraud
Topics Covered
• Anti Money Laundering – AML
• Very High Risk cases lead to potential fraud - equally important
• International Case Studies – Risk Assessment / Credit & Gold Bullion /Large Scale
• Retail Banking – Fighting Financial Fraud – Canadian Bank
• Bank Fraud – Root Cause Analysis (RCA) is critical. Not to repeat.
• Your own history is important, but experience of others is more important, to learn
from - to pro actively arrest fraud.
Module 2
Banking fraud
12. 12
Bank Fraud – AML
● Money laundering occurs when transferring money across borders
● Major customers of money laundering are:
○ Tax evaders
○ Drug dealers
○ Terrorist operators
● Among others, 2 key factors that affect the risk of an a/c
○ Country risk: Destination
○ Transaction risk: Volume, frequency
13. Case Study 1: Gold & Bullion – VH Risk Rating International
Case Study 2: Internal Controls – Fraudulent fund transfer - International
Video on Retail Banking – Fighting Financial Fraud – Canadian Bank
https://globalnews.ca/video/5040683/fighting-financial-fraud
Case Study 3: Anti Money Laundering (AML) Tracing final Account – International
Case Study 4: Regulatory review – credit portfolio - risk downgraded – International
Case studies… Very High Risk just stops large fraud / AML
14. • Top Management -no clue on how it happened
• Statutory auditor: off the hook due to “ off the
books” concept
• Accountability – Zero
• Internal controls – All in one place – controls on
the air
• Controlling / monitoring authorities
Case study Summary … Bank fraud
Root Cause Analysis and CAATS: Common responses – accountability haunts again
• Extremely serious – calls for severe action
• Systemic issue – responsibility lies from Big
picture principle – still accountable
• Extremely critical – to be booked
• Lack of segregation – too much reliance on
single individual
• Equally responsible and accountable
• Lots of resemblance to our Punjab National
Bank & Harshad Metha fraud cases
15. Module 3 – Digital Fraud and Online
• With convenience, comes risk.
• As payments move online, fraudsters follow closely.
Topics Covered
• Smart Phone – virus & take over, On-line frauds
• Internet of Things (IoT)
• Artificial Intelligence (AI) - area of computer science that emphasizes the creation of
intelligent machines that work and react like humans
Module 3
Digital fraud & online
Internet of Things IoT and AI
16. In simple terms IoT is the network of physical devices, home appliances etc, embedded with electronics,
SW, sensors and internet connectivity (web enabled) which enables these to connect, collect and
exchange data. DOWNSIDE: Security concerns; insecure small gadgets / gaming console in
market, opens the flood gates to fraudsters.
IoT EVERYWHERE - Smart phone, Internet, IoT whatever gadget you touch, there is convenience
tagged to potential fraud!! With Corona we are more desperate for convenience. As living with
convenience is a necessity going forward, learn how to embrace this risk & lead a lifestyle.
IoT is everywhere – smart phone/appliances/security system/ Fitbit / Scale / Sleep machine / TESLA -
Fear not, it is not Digital pandemic. Example: TESLA / Weighing scale / Sleep machine. For you, on-
hand basic solution to mitigate Digital Risk – AAA Awareness ; Adaptability; Alertness with common
sense. Technology can be like junk food. We will consume it even when we know it is bad for us.
On-line Fraud - As payments move online, fraudsters follow closely.
Global ecommerce market is predicted to grow to USD 5 Trn. in 2022 and 20 % of global consumer
sales will be online. Fraud loss is estimated to be 1.8% of online sales. Digital revolution overturned the
Fraud dynamix to a new level.
DIGITAL Fraud – Internet of Things IoT
17. Strike a right balance between cybersecurity technology against your
security policy needs.
Major trends: biometrics, mobile authentication, and risk-based authentication.
AI application, a major mitigation tool
Biometric – users feel & user pattern is key
• Fingerprints / Pattern matching;
• Facial-Identification and measurement of points on the face.
• Voice recognition-Voiceprint ;
• Retina Iris recognition;
• Behavioral biometrics: Using subtle factors like typing style, swipes on a mobile device,
dwell time, and technical identification.
DIGITAL Fraud Mitigation – Cybersecurity technology
18. Mobile authentication:
• Mobile push technology that let you swipe or accept to authorize;
• Built-in mobile biometrics;
• OTP
• Advanced analytics is one of the major solutions
VIDEO - Real time fraud prevention in a real time world
https://www.youtube.com/watch?v=sMDg7ld1tZU&app=desktop
DIGITAL Fraud Mitigation – Cybersecurity technology
19. SWIFT Fraud - Key findings I have conducted SWIFT controls - submitted Executive Note on Emerging risk,
highlighting SWIFT as EMERGING RISK.
•Under SWIFT South East Asia accounts for 80% of fraudulent beneficiaries (Red flag)
•USD currency used in 70 % of attempted thefts - use of Euro (Red flag )
•Sleeper cells - attackers continue to operate ‘silently’ for weeks or months after penetrating a target, learning
behaviors and patterns before launching an attack.
•Soft target of unused payment corridors: vast majority of fraudulent transactions used payment corridors
(combinations of target and beneficiary banks) that had not been used during the previous 24- 36m (Real time
Advanced Analytics AI can solve)
•Insider collusion resulted in the quick identification of financial institutions targeted by cybercriminals – in
most cases before attackers were even able to generate fraudulent messages; the exchange of relevant and
timely cyber threat intelligence has proved critical in effectively detecting and preventing attacks. (Basic
control lost)
On-line fraud - SWIFT Fraud
20. Module 4
FRM Tools & Global scenario
AI, ML, Data Mining, CAATs
Module 4 – Fraud Risk Management Tools & Global scenario
• Create Reporting avenues – Whistle blower / Sectional reporting like immigration
fraud / fraud against elders / Canadian Anti Fraud Center / Canada Border Service
Agency for Document fraud / anonymous / community policing / peer audit
• Computer Assisted Auditing Techniques (CAATs - used for risk based audit too.)
• AML - Anti Money Laundering – RISK HEAT MAP
• Emerging risk Analysis - Predictability
• Artificial Intelligence (AI) – Predictability
• Machine Learning
• Data mining – Big Data
• DATA Analytics
21. 21st century fraud landscape…
We are in digital school, move to
PREDICT FRAUD
PREVENT FRAUD is traditional, still valid - Old is Gold!!
22. 22
Accounts are plotted on a “risk chart” based on country, transaction risks
Country rating
Transaction Rating
-10 10
A
B
D
C
>10% of threshold
and <2 transactions
in 24 hours
<2% below
threshold and >3
transactions in
24 hours
Risk Heat Map in Anti Money Laundering - AML
23. 23
Cool & Green map“Risk chart” based on country, transaction risks
Country rating
Transaction Rating
-10 10
• “No issues” accounts
• Country risk rating is low,
transaction risk rating is
low
A
B
D
C
>10% of threshold
and <2 transactions
in 24 hours
<2% below
threshold and >3
transactions in
24 hours
24. 24
Still cool “risk chart” based on country, transaction risks
Country rating
Transaction Rating
-10 10
• “Watch list” accounts
• Country risk rating is low,
transaction risk rating is
high
A
B
D
C
>10% of threshold
and <2 transactions
in 24 hours
<2% below
threshold and >3
transactions in
24 hours
25. 25
Feeling warm - “risk chart” based on country risk & transaction risks
Country rating
Transaction Rating
-10 10
• “Watch list” accounts
• Country risk rating is high,
transaction risk rating is
low
A
B
D
C
>10% of threshold
and <2 transactions
in 24 hours
<2% below
threshold and >3
transactions in
24 hours
26. 26
Hot - Real Heat Map & “risk chart” - Both high risk - country & transactions
Country rating
Transaction Rating
-10 10
• “Immediate action”
accounts
• Country risk rating is high,
transaction risk rating is
high
A
B
D
C
>10% of threshold
and <2 transactions
in 24 hours
<2% below
threshold and >3
transactions in
24 hours
27. 27
Country rating
Transaction Rating
-10 10
• “Watch list” accounts
• Country risk rating is high,
transaction risk rating is
low
• “Watch list” accounts
• Country risk rating is low,
transaction risk rating is
high
• “No issues” accounts
• Country risk rating is low,
transaction risk rating is
low
• “Immediate action”
accounts
• Country risk rating is high,
transaction risk rating is
high
A
B
D
C
>10% of threshold
and <2 transactions
in 24 hours
<2% below
threshold and >3
transactions in
24 hours
Hot - Real Heat Map & “risk chart” - Both high risk - country & transactions
28. 28
Each account is plotted on a “Risk Heat Map” based on country risk & transaction risks
Country rating
Transaction Rating
-10 10
• “Watch list” accounts
• Country risk rating is high,
transaction risk rating is
low
• “Watch list” accounts
• Country risk rating is low,
transaction risk rating is
high
• “No issues” accounts
• Country risk rating is low,
transaction risk rating is
low
• “Immediate action”
accounts
• Country risk rating is high,
transaction risk rating is
high
A
B
D
C
>10% of threshold
and <2 transactions
in 24 hours
<2% below
threshold and >3
transactions in
24 hours
Hot - Real Heat Map & “risk chart” - Both high risk - country & transactions
29. 29
Account examples that might fall under each quadrant
Country rating
Transaction Rating
-10 10
• Country (L): $ transferred
from Canada to US
• Transaction (L): parents
sending money to children
in university
• Country (L): $ transferred
from Canada to US
• Transaction (H): Money
laundering, tax evasion
• Country (H): Money sent
from Canada to high risk
country
• Transaction (H): Money
laundering, tax evasion
• Country (H): Money sent
from Canada to high risk
country
• Transaction (L):
Immigrants sending money
back home
A
B
D
C
>10% of threshold
and <2 transactions
in 24 hours
<2% below
threshold and >3
transactions in
24 hours
Hot - Real Heat Map & “risk chart” - Both high risk - country & transactions
30. FRM Tools - DATA MINING & CAATs
Data Mining is torturing the data until it confesses.
It is a process and a valuable tool as well. Collects volumes of data with the objective of: finding hidden
patterns and analyzing relationships between numerous types of data developing predictive models (process
by which a model is created to try to best predict the probability of an outcome)
Computer Assisted Auditing Techniques (CAATs)
Powerful tool for fraud prevention and fraud detection & in risk based internal audit too.
31. FRM Tools - Artificial Intelligence (AI) & Machine learning (ML)
AI in simple terms – to create technology that allows computers to function in a more intelligent manner –
simulating or creating intelligence – trying to replace humans. More useful in repetitive jobs and basic
problem solving tasks and where predictability is involved
Machine Learning: ML is a form of AI that enables a system to learn from Data. Types of ML: Supervised
learning teaching AI with supervision; Learn from Surroundings; Unsupervised learning
▪ AI & ML APPLICATION in online mobile cheque deposit of cheques – without visiting the branch
▪ Email category in Gmail like promotional, primary etc done by machine learning
▪ A I Examples: SIRI / ALEXA / TESLA / AI Auto pilot in commercial flights / Google AI powered predictions
/ Rideshare APPs use AI to find best & fast route / Spam filter in your email in box is powered by AI /
credit decisions in analyzing application details in volume
VIDEO - Let us watch AI in action
https://www.youtube.com/watch?v=0oRVLf16CMU&feature=youtu.be
32. AI & Machine learning in Fraud radar
• The future of AI-based fraud prevention relies on the combination of supervised and unsupervised
machine learning.
• Supervised machine learning excels at examining events, factors, and trends from the past.
Historical data trains supervised machine learning models to find patterns not discernable with rules
or predictive analytics.
• Unsupervised machine learning is adept at finding anomalies, interrelationships, and valid links
between emerging factors and variables.
• Combining both unsupervised and supervised machine learning defines the future of AI-based fraud
prevention and is the foundation of the top nine ways AI prevents fraud
33. Artificial Intelligence in Fraud prevention radar
• Trends and patterns: AI is re-defining fraud prevention from relying only on past experiences to
taking into account emerging activities, behaviors, and trends in transaction anomalies.
• Fast: AI’s ability to detect fraud attacks in almost real time using advanced AI-based rating technologies
like Omniscore is the future of fraud management.
• Pro-active: By having an AI-based fraud prevention system do the work of evaluating historical data and
anomalies, customer experiences can stay more positive, and the more sophisticated nuanced abuse
attacks can be stopped.
• Minimizing fraud loss: Provides fraud analysts with real-time risk scores and greater insight into
where best to set threshold scores to maximize sales and minimize fraud losses
• Aids in compliance: internal business policies regarding the sales of specific products to specific
countries based on distribution and reseller agreements.
• Fraud prevention Using Neural Networks analyzing frequency / type of transaction / size / kind of
retailer involved – throws out exceptions – red flag.
34. Slide after slide on risk, fraud, loss, investigation – Fraud Cycle Continues
Fraud & Investigation
NEVER ENDS
VIDEO :Analytics, Tools and Innovation – Global Trend
https://youtu.be/gF_sh3EtWF4
35. SUMMARY
KEY, PRACTICAL TAKE AWAY FOR YOU - FROM NOW ON
Remember: Where there is money or financial gain, there is fraud. You being a professional is part of the game
You can play any role, be a student, Practicing CA or Employed CA, Subject Matter Expert, Board member,
Executive, Administrator, Administrative Assistant, Personal Assistant, Mail Room clerk, Businessman MSME or
Large .
Individual accountability – it is YOU, tap your forensic brain. be skeptical & be alert.
Keep your eyes and ears open. Report in any form to save your skin and to save your entity and your loved ones;
Extreme caution in reporting, submit special reports immediately on High or Very High risk cases without
waiting for the audit to complete.
It is time to Predict fraud using evolving technology, while keeping the basics of prevention in tact
Fraud is interesting, as an investigator only!!!
36. Do you like challenges…
BECOME A CFE
Thank you!!
CA V S KUMAR FCA, CFE, CIA
vsk2727@gmail.com
EFTRAC Canada Inc.