SlideShare a Scribd company logo
1 of 30
Download to read offline
1/22/2014
1
Copyright © FraudResourceNet LLC
Proactive Data Analysis Techniques to 
Find Financial Statement Fraud
Special Guest Presenter:  Richard Cascarino, CFE, CIA,
CISM, CRMA Richard Cascarino & Associates
Jan 22, 2014
Copyright © FraudResourceNet LLC
President and Founder of White Collar Crime 101
• Publisher of White-Collar Crime Fighter
• Developer of FraudAware® Anti-Fraud Training
• Monthly Columnist, The Fraud Examiner, ACFE Newsletter
Member of Editorial Advisory Board, ACFE
Author of “Fraud in the Markets”
• Explains how fraud fueled the financial crisis.
About Peter Goldmann, MSc., CFE
1/22/2014
2
Copyright © FraudResourceNet LLC
About Jim Kaplan, MSc, CIA, CFE
• President and Founder of
AuditNet®, the global resource for
auditors (now available on Apple
and Android devices)
• Auditor, Web Site Guru,
• Internet for Auditors Pioneer
• Recipient of the IIA’s 2007
Bradford Cadmus Memorial
Award.
• Author of “The Auditor’s Guide to
Internet Resources” 2nd Edition
Copyright © FraudResourceNet LLC
• Principal of Richard Cascarino & Associates
based in Colorado USA
• Over 28 years experience in IT audit training
and consultancy
• Past President of the Institute of Internal
Auditors in South Africa
• Member of ISACA
• Member of Association of Certified Fraud
Examiners
• Author of Auditor's Guide to Information
Systems Auditing
About Richard Cascarino, MBA, CIA,
CISM, CFE
1/22/2014
3
Copyright © FraudResourceNet LLC
This webinar and its material are the property of FraudResourceNet LLC.
Unauthorized usage or recording of this webinar or any of its material is strictly
forbidden. We are recording the webinar and you will be provided with a link
access to that recording as detailed below. Downloading or otherwise
duplicating the webinar recording is expressly prohibited.
Webinar recording link will be sent via email within 5-7 business days.
NASBA rules require us to ask polling questions during the Webinar and CPE
certificates will be sent via email to those who answer ALL the polling questions
The CPE certificates and link to the recording will be sent to the email address
you registered with in GTW. We are not responsible for delivery problems due to
spam filters, attachment restrictions or other controls in place for your email
client.
Submit questions via the chat box on your screen and we will answer them
either during or at the conclusion.
After the Webinar is over you will have an opportunity to provide feedback.
Please complete the feedback questionnaire to help us continuously improve
our Webinars
If GTW stops working you may need to close and restart. You can always dial in
and listen and follow along with the handout.
Webinar Housekeeping
Copyright © FraudResourceNet LLC
The views expressed by the presenters do not necessarily represent the views, 
positions, or opinions of FraudResourceNet LLC (FRN) or the presenters’ 
respective organizations. These materials, and the oral presentation 
accompanying them, are for educational purposes only and do not constitute 
accounting or legal advice or create an accountant‐client relationship. 
While FRN makes every effort to ensure information is accurate and complete, 
FRN makes no representations, guarantees, or warranties as to the accuracy or 
completeness of the information provided via this presentation. FRN 
specifically disclaims all liability for any claims or damages that may result from 
the information contained in this presentation, including any websites 
maintained by third parties and linked to the FRN website
Any mention of commercial products is for information only; it does not imply 
recommendation or endorsement by FraudResourceNet LLC
6
Disclaimers
1/22/2014
4
Copyright © FraudResourceNet LLC
 Introduction: Fraud Statistics: The Growing
Fraud Threat
 Where & How Financial Statement Fraud
Occurs
 Detection/Auditing/Investigative Techniques –
Including Automation
 Entity-Level Red Flags of Fraud
 Prevention and Deterrence
 Your Questions
 Conclusion
Today’s Agenda
Copyright © FraudResourceNet LLC
According to major accounting firms, professional fraud
examiners and law enforcement: jumps significantly during
tough economic times
 Business losses due to fraud increased 20% in last 12
months, from $1.4 million to $1.7 million per billion dollars
of sales. (Kroll 2010/2011 Global Fraud Report)
 Average cost to for each incident of fraud is $160,000
(ACFE) Of Financial Statement fraud: $2 million
Approx. 67% of corporate fraud committed by insiders
(Kroll)
Approx. 50% of employees who commit fraud have been
with their employers for over 5 years (ACFE)
Fraud: The Big Picture
1/22/2014
5
Copyright © FraudResourceNet LLC
 Victims of financial fraud are stakeholders with claims
against the entity: shareholders, lenders, regulators.
 Financial fraud occurs less frequently than asset
misappropriation but the losses are substantially higher.
Financial Statement Fraud:
The Big Picture
Source: ACFE 2008 Report to the Nation
Copyright © FraudResourceNet LLC
 Selling More (Overstating revenue)
 Costing Less (Understating/not reporting
expenses)
 Owing More (Overstating debt to reduce taxes)
 Owing Less (Understating debt to boost share
price)
 Inappropriate Disclosure (Depreciation/asset
value, etc)
 Other Miscellaneous Techniques (Concealment)
Accounting Fraud
1/22/2014
6
Copyright © FraudResourceNet LLC
 Falsification, alteration, manipulation of material
financial records, supporting documents or business
transactions
 Material intentional omissions or misrepresentations of
events, transactions, accounts or other significant
information from which financial statements are
prepared
 Deliberate misapplication of accounting principles,
policies and procedures used to measure, recognize,
report and disclose economic events and business
transactions
 Intentional omission of disclosures or presentation of
inadequate disclosures regarding accounting principles
and policies and related financial amounts
Jim Gravitt and Jennifer Johnson, “Recognizing Financial Statement Fraud”
Financial Statement
Fraud Schemes
Copyright © FraudResourceNet LLC
 Missing documents
 Excessive voids or credits
 Increased reconciliation items
 Alterations on documents
 Duplicate payments
 Common names or addresses of payees or
customers
 Increased past due accounts
 Unusual spikes in payables or receivables
 Odd patterns in key ratios
Accounting Fraud: Red Flags
1/22/2014
7
Copyright © FraudResourceNet LLC
Example: Interactive Data Extraction and Analysis
 21 years young
 Database limitations:
 2.1 billion records (100,000 records for IDEA
Express) depending on the operating system
 1.8 Exabytes file size (Tera, Peta, Exa)
(Quintillion)
 Some facilities not available in IDEA (Server)
The Power of Automation
Copyright © FraudResourceNet LLC
Example: Orders
Over Credit Limit
1/22/2014
8
Copyright © FraudResourceNet LLC
1) Improper Revenue Recognition
Common Types of Financial
Statement Fraud
Copyright © FraudResourceNet LLC
Backdating agreements
 Stock options and other time-sensitive
valuation issues that may result in
fraudulently high revenue or low cost
basis
 Need for controls in recording
contracts/sales, including independent
verification of the terms of the agreement
and contemporaneous recording of
transactions when they are approved
 Need for in-house legal, corporate board
approval
Revenue Recognition
1/22/2014
9
Copyright © FraudResourceNet LLC
Sham Sales
 Falsify inventory records,
shipping records, and
invoices and record the
fictitious transactions as sales
 Company may pretend to
ship the inventory and hide it
from company auditors
Revenue Recognition
Copyright © FraudResourceNet LLC
Sales to Fictitious Customers
1/22/2014
10
Copyright © FraudResourceNet LLC
Channel Stuffing
 Shipping excess merchandise
to distributors
 Right of return exists/ Side
agreements
 Need to examine conditions
of sale, analyze sales returns
during cutoff period/after year-
end, review of sales and
contract files to determine if
side agreements exist
Revenue Recognition
Copyright © FraudResourceNet LLC
Bill and Hold Schemes
 Recording fictitious sales
and shipping goods to
third-party warehouse
 Need to examine shipping
documents and analyze
real estate rental costs
Look for evidence of side
agreements
Review inventory changes
Revenue Recognition
1/22/2014
11
Copyright © FraudResourceNet LLC
Holding Books Open
 Failure to match revenues with
related expenses in the period
in which they were incurred
(CA’s “35-day month)
 Examine cut-off procedures for
month, quarter and year-end
 Need for oversight and
approval controls in recording
contracts/sales
Revenue Recognition
Copyright © FraudResourceNet LLC
Not Recording Detailed
Transactions on Sub-ledger
 Overstating Sales and A/R
 Where sub-ledger does not
reconcile to General Ledger
control account
 Examine reconciliation and
top-side journal entries
Revenue Recognition
1/22/2014
12
Copyright © FraudResourceNet LLC
A side agreement would NOT be a typical
part of which of the following:
 Channel Stuffing
 Holding the Books Open
 Bill and Hold Schemes
 All of the above
Polling Question 1
Copyright © FraudResourceNet LLC
2. Management Estimates
Common Types of Financial
Statement Fraud
1/22/2014
13
Copyright © FraudResourceNet LLC
Allowance for Bad Debts
 Altering underlying A/R aging to manipulate
computation
 Refreshing of receivables by writing off aged A/R
and booking new, fictitious sales
 Use of credit memos
 Analyze Bad Debt expense and Sales accounts,
looking for similar levels of transaction activity for
the same customers
Management Estimates
Copyright © FraudResourceNet LLC
A/R Inquiries
1/22/2014
14
Copyright © FraudResourceNet LLC
Overstatement of assets by:
 Understating allowances for
receivables
 Overstating the value of inventory,
property, plant, equipment, and
other tangible assets,
 Recording assets that did not exist
Management Estimates
Copyright © FraudResourceNet LLC
Fraudulent Input from Sales or
Credit Department on Credit
Quality
 Lack of independent review of
customer’s creditworthiness
 Inadequate documentation in credit
file
 Credit analyses should be
performed by individuals who are
independent of the sales process,
periodic review of credit files
Management Estimates
1/22/2014
15
Copyright © FraudResourceNet LLC
3. Expense Manipulation
Common Types of Financial
Statement Fraud
Copyright © FraudResourceNet LLC
Under-Accruing Expenses
 Lack of monthly or quarterly reconciliation
of accruals to actual amounts
 Charging accrual “true-ups” to other,
infrequently-used accounts
 Compare monthly accruals to actual
expenses and cash disbursements, noting
variations in the adequacy of accruals
 Capitalizing expenses
Expense Manipulation
1/22/2014
16
Copyright © FraudResourceNet LLC
Expense Examination
Copyright © FraudResourceNet LLC
Overstating assets can be achieved by
(Choose all that apply):
A. Understating allowances for receivables
B. Overstating the value of inventory, property,
plant, equipment, and other tangible assets
C. Recording assets that do not exist
D. All of the above
Polling Question 2
1/22/2014
17
Copyright © FraudResourceNet LLC
Not Recording Expenses
 Paying unrecorded expenses
must be offset by not paying
other expenses
 Need to ensure adequate
segregation of duties in the
receipt of invoices and the
recording of expenses, review
invoice file for past due
invoices and collection notices
Expense Manipulation
Copyright © FraudResourceNet LLC
Not Recording Detailed
Transactions on Sub-ledger
 Understating Expenses and
A/P
 Where sub-ledger does not
reconcile to General Ledger
control account
 Examine reconciliation and
search for unrecorded
expenses
Expense Manipulation
1/22/2014
18
Copyright © FraudResourceNet LLC
Capitalizing Expenses
 Moving expenses from the P&L to the
Balance Sheet and amortizing them over
an extended period
 WorldCom – telecom line charges
 Examine capitalized asset accounts for
year-on-year changes
Expense Manipulation
Copyright © FraudResourceNet LLC
Changing Inventory
Valuation Methods
 May result in lower COGS
and higher sales margins
 Review calculation of
inventory valuation and
related disclosures
Expense Manipulation
1/22/2014
19
Copyright © FraudResourceNet LLC
Manipulating Non-Cash
Expenses
 Changing depreciation and
amortization methods
 Review calculation of
depreciation and related
disclosures
Expense Manipulation
Copyright © FraudResourceNet LLC
Moving expenses from the P&L to the
Balance Sheet is a form of…
A. Improper revenue recognition
B. Expense manipulation
C. Capitalization of expenses
D. None of the above
Polling Question 3
1/22/2014
20
Copyright © FraudResourceNet LLC
4. Detection and Investigative Techniques
For Auditors, Fraud Investigators,
Legal Staff, HR and Senior Management
Detection and Investigation
Techniques
Copyright © FraudResourceNet LLC
 What are you looking for? (Avoid spinning
your wheels).
 Where are you going to find it?
 Choose the best technique (interviewing,
audit, CAAT’s)
 Select the tool
Detection and Investigation
Techniques
1/22/2014
21
Copyright © FraudResourceNet LLC
 Where are the weakest links in the system’s
controls?
 What deviations from conventional good
accounting practices are possible?
 How are off-line transactions handled and
who has the ability to authorize these
transactions?
 What would be the simplest way to
compromise the system?
 What control features in the system can be
bypassed by higher authorities?
 What is the nature of the work environment?
Ask These Questions…
Copyright © FraudResourceNet LLC
 Be Skeptical!!!!
 Analytical Procedures
 Other Investigative Techniques
 CAATs
Tools and Techniques
1/22/2014
22
Copyright © FraudResourceNet LLC
 Always request originals.
 Ask yourself whether transactions make sense.
 Have documents been altered?
 Look to see where the documents are maintained.
 Do employees have close personal relationships with
vendors?
 Is there a lack of supporting documentation?
 Do background checks identify related parties and DBAs?
 Does an answer not make sense?
 Are you avoided more than usual?
 When asking a relatively simple question, are you
unexpectedly referred to someone high up in the
organization?
 Go with your gut!
BE SKEPTICAL!!!!!
Copyright © FraudResourceNet LLC
 Increased scrap.
 Excessive purchases.
 Unexplained inventory shortages or
adjustments.
 Significant increase or decrease in account
balances.
 Cash shortages or overages.
 Deviations from specifications.
Analytical Red Flags
1/22/2014
23
Copyright © FraudResourceNet LLC
WorldCom’s massive accounting fraud
was characterized PRIMARILY by:
A. Not recording detailed transactions on sub-
ledger
B. Not recording expenses
C. Capitalizing expenses
D. None of the above
Polling Question 4
Copyright © FraudResourceNet LLC
Range from simple to complex;
Identify trends or anomalies
Four Key Steps:
1. Develop an expectation/hypothesis
2. Determine the acceptable deviation from the
expected value
3. Compare the result of the analytical procedure to the
expected value
4. Investigate and evaluate any significant differences
Analytical Procedures
1/22/2014
24
Copyright © FraudResourceNet LLC
Unusual Financial statement ratios such as:
 Increased revenues with
• decreased inventory.
 Increased revenues with
• decreased receivables.
 Increased inventory with
• decreased payables.
 Increased volume with
• increased cost per unit.
Analytical Anomalies
Copyright © FraudResourceNet LLC
Financial Statement Analysis
 Vertical – a/k/a “common-sized statements”
 Analyzes each line as a % of its relevant total
 Income items as a % of total revenue
 Expenses as a % of total expense
 Identifies disproportionate items
 Identifies fluctuations between periods
 Horizontal – a/k/a “time-series analysis”
 Measures $ and % changes from period to period
 Identifies fluctuations and seasonality
Data Analysis: Testing for Red Flags
1/22/2014
25
Copyright © FraudResourceNet LLC
 Data Selection.
 Data Cleaning.
 Data Enrichment.
 Data Coding/Reduction.
 Data Mining.
 Interpretation/Reporting.
 Action.
 Measurement and Evaluation.
Knowledge Discovery
Copyright © FraudResourceNet LLC
Data Mining/Analysis
 Using file interrogation software to
examine underlying data
 General Ledgers
 Vendor files
 Payroll
 A/P and A/R
Data Analysis –
Testing for Red Flags
1/22/2014
26
Copyright © FraudResourceNet LLC
Using File Interrogation Software is an 
example of:
a) Data Mining / Analysis
b) Knowledge Discovery
c) Vertical Analysis
d) Horizontal Analysis
Polling Question 5
Copyright © FraudResourceNet LLC
 Public Document Reviews & Background
Investigations
 Interviews of Knowledgeable Persons
 Confidential Sources
Other Investigative Techniques
1/22/2014
27
Copyright © FraudResourceNet LLC
Entity-Level Red Flags
 Internal control gaps, deficiencies, 
weaknesses
 Business results that continually 
outperform expectations 
 Management override of controls
 Rapid or significant turnover of 
resources, especially senior 
management or employees in key 
positions
 Employee, customer or vendor 
complaints
 Inadequate segregation of duties
 Unusual end‐of‐month or end‐of‐
quarter variations 
 High‐level of related‐party 
transactions
 Systems are manual and/or 
decentralized
 Repeated changes of 
independent public accountants
 Continuous problems with 
various regulatory agencies
 Disclosures of Investigations
 Suspicion of illegal activities
Copyright © FraudResourceNet LLC
Prevention, Deterrence
and Detection
 Prevention
 Tone at the top
 Value system (“Code of
Ethics / Conduct”)
 Positive workplace
environment
 Hiring, promoting and
retaining appropriate
employees
 Training and awareness
programs
 Confirmation / affirmation
of Code of Conduct/Ethics
 Ombudsman programs
 Whistleblower programs
 Incident response / case
management processes
 Investigative procedures
 Discipline, prosecution and
recovery guidelines
 Prevention
 Tone at the top
 Value system (“Code of
Ethics / Conduct”)
 Positive workplace
environment
 Hiring, promoting and
retaining appropriate
employees
 Training and awareness
programs
 Confirmation / affirmation
of Code of Conduct/Ethics
 Ombudsman programs
 Whistleblower programs
 Incident response / case
management processes
 Investigative procedures
 Discipline, prosecution and
recovery guidelines
 Deterrence
 “Active” oversight by Board
and/or Audit Committee
– Fraud risk assessment and
related measures
– Code confirmation /
affirmation process
– Management’s involvement in
financial reporting process
and override of control
– Process to receive, retain and
treat complaints of fraud /
unethical conduct
– Internal and external audit
effectiveness
 Internal audit
– Evaluation of adequacy /
effectiveness of internal
controls
 Disciplinary examples
 Detection
 Identification and
measurement of fraud risk
(“fraud risk assessment”)
 Processes &procedures to
mitigate identified fraud risk
 Effective internal controls at
entity and process level
 On-going monitoring
activities
 Computer-assisted audit
techniques
 Investigation of:
– Internal control
weaknesses / breaches
– Non-response to Code
confirmation / affirmation
– Reported issues
 Detection
 Identification and
measurement of fraud risk
(“fraud risk assessment”)
 Processes &procedures to
mitigate identified fraud risk
 Effective internal controls at
entity and process level
 On-going monitoring
activities
 Computer-assisted audit
techniques
 Investigation of:
– Internal control
weaknesses / breaches
– Non-response to Code
confirmation / affirmation
– Reported issues
1/22/2014
28
Copyright © FraudResourceNet LLC
CAATs IDEA
Copyright © FraudResourceNet LLC
CAATs ACL
1/22/2014
29
Copyright © FraudResourceNet LLC
Common Analytical Mistakes
 Failure to maintain proper documentation
 Failure to notify decision makers
 Failure to control digital evidence
 Failure to report incidents in a timely manner
 Underestimating the scope of the incident
 No incident response plan in place
 Technical mistakes:
 Altering date and time stamps on evidence systems before 
recording them
 Killing rogue processes
 Patching the system back together before investigation
 Not recording commands used
 Using untrusted commands and tools
 Overwriting evidence by installing tools
Copyright © FraudResourceNet LLC
Questions?
1/22/2014
30
Copyright © FraudResourceNet LLC
Peter Goldmann
FraudResourceNet LLC
800-440-2261
www.fraudresourcenet.com
pgoldmann@fraudresourcenet.com
Jim Kaplan
FraudResourceNet LLC
800-385-1625
www.fraudresourcenet.com
jkaplan@fraudresourcenet.com
Richard Cascarino
Cascarino Associates
rcasc@rcascarino.com
Thank You!

More Related Content

What's hot

Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisFraudBusters
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditFraudBusters
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudFraudBusters
 
SAS for Claims Fraud
SAS for Claims FraudSAS for Claims Fraud
SAS for Claims Fraudstuartdrose
 
Q1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementQ1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementRon Steinkamp
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingCase IQ
 
Bribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to KnowBribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to KnowFraudBusters
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryDecosimoCPAs
 
Research Report - Are You Equipped to Successfully Combat Fraud
Research Report - Are You Equipped to Successfully Combat FraudResearch Report - Are You Equipped to Successfully Combat Fraud
Research Report - Are You Equipped to Successfully Combat FraudDavid Hartley
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and ControlWeaverCPAs
 
Managing Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassManaging Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassThe ID Co.
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Tahir Abbas
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...Ron Steinkamp
 
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentBillyCheuk
 

What's hot (20)

Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Fraud Awareness Program - OpenThinking
Fraud Awareness Program - OpenThinkingFraud Awareness Program - OpenThinking
Fraud Awareness Program - OpenThinking
 
SAS for Claims Fraud
SAS for Claims FraudSAS for Claims Fraud
SAS for Claims Fraud
 
Q1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementQ1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk Management
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
 
Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
 
Fraud Prevention
Fraud PreventionFraud Prevention
Fraud Prevention
 
Bribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to KnowBribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to Know
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
 
Research Report - Are You Equipped to Successfully Combat Fraud
Research Report - Are You Equipped to Successfully Combat FraudResearch Report - Are You Equipped to Successfully Combat Fraud
Research Report - Are You Equipped to Successfully Combat Fraud
 
Fraud And Internal Controls Linked In April 2011
Fraud And Internal Controls   Linked In April 2011Fraud And Internal Controls   Linked In April 2011
Fraud And Internal Controls Linked In April 2011
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
 
Into to Fraud Examination
Into to Fraud ExaminationInto to Fraud Examination
Into to Fraud Examination
 
Managing Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassManaging Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce Masterclass
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2,
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
 
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
 
Aml 161014061258
Aml 161014061258Aml 161014061258
Aml 161014061258
 

Similar to Proactive Data Analysis Techniques to Detect Financial Statement Fraud

Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudFraudBusters
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsFraudBusters
 
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...FraudBusters
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdfWilson Kao
 
Lookout! Legal Pitfalls to Avoid When Forming your Startup
Lookout! Legal Pitfalls to Avoid When Forming your StartupLookout! Legal Pitfalls to Avoid When Forming your Startup
Lookout! Legal Pitfalls to Avoid When Forming your StartupEric Wu
 
Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsFraudBusters
 
Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFraudBusters
 
2015 EastPay Info Exchange - Best Supporting Actor is Vendor Management
2015 EastPay Info Exchange - Best Supporting Actor is Vendor Management2015 EastPay Info Exchange - Best Supporting Actor is Vendor Management
2015 EastPay Info Exchange - Best Supporting Actor is Vendor ManagementBrent Siegel
 
Navigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramNavigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramPerficient, Inc.
 
Financial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR AdvisorsFinancial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR AdvisorsAbhishek Bali
 
Governance risk and compliance
Governance risk and complianceGovernance risk and compliance
Governance risk and complianceMagdalena Matell
 
2017 07-26 Demystify the Government Contracting Challenges and Opportunities ...
2017 07-26 Demystify the Government Contracting Challenges and Opportunities ...2017 07-26 Demystify the Government Contracting Challenges and Opportunities ...
2017 07-26 Demystify the Government Contracting Challenges and Opportunities ...Raffa Learning Community
 
J.G. Wentworth Company Business Overview - Second Quarter 2015
J.G. Wentworth Company Business Overview - Second Quarter 2015J.G. Wentworth Company Business Overview - Second Quarter 2015
J.G. Wentworth Company Business Overview - Second Quarter 2015investorjgwpt
 
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudUsing Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudFraudBusters
 
Who What and Where Final v3
Who What and Where Final v3Who What and Where Final v3
Who What and Where Final v3Tammie Norman
 
Fraud Prevention and Internal Controls - A Winning Combination
Fraud Prevention and Internal Controls - A Winning Combination Fraud Prevention and Internal Controls - A Winning Combination
Fraud Prevention and Internal Controls - A Winning Combination DecosimoCPAs
 
Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning EssentialsFraudBusters
 

Similar to Proactive Data Analysis Techniques to Detect Financial Statement Fraud (20)

Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay Fraud
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
 
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdf
 
Lookout! Legal Pitfalls to Avoid When Forming your Startup
Lookout! Legal Pitfalls to Avoid When Forming your StartupLookout! Legal Pitfalls to Avoid When Forming your Startup
Lookout! Legal Pitfalls to Avoid When Forming your Startup
 
Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data Analytics
 
Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit Software
 
Tom tat
Tom tatTom tat
Tom tat
 
2015 EastPay Info Exchange - Best Supporting Actor is Vendor Management
2015 EastPay Info Exchange - Best Supporting Actor is Vendor Management2015 EastPay Info Exchange - Best Supporting Actor is Vendor Management
2015 EastPay Info Exchange - Best Supporting Actor is Vendor Management
 
Navigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramNavigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management Program
 
Financial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR AdvisorsFinancial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR Advisors
 
Governance risk and compliance
Governance risk and complianceGovernance risk and compliance
Governance risk and compliance
 
2017 07-26 Demystify the Government Contracting Challenges and Opportunities ...
2017 07-26 Demystify the Government Contracting Challenges and Opportunities ...2017 07-26 Demystify the Government Contracting Challenges and Opportunities ...
2017 07-26 Demystify the Government Contracting Challenges and Opportunities ...
 
conferences.aicpa.org
conferences.aicpa.orgconferences.aicpa.org
conferences.aicpa.org
 
J.G. Wentworth Company Business Overview - Second Quarter 2015
J.G. Wentworth Company Business Overview - Second Quarter 2015J.G. Wentworth Company Business Overview - Second Quarter 2015
J.G. Wentworth Company Business Overview - Second Quarter 2015
 
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudUsing Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
 
Who What and Where Final v3
Who What and Where Final v3Who What and Where Final v3
Who What and Where Final v3
 
Fraud Prevention and Internal Controls - A Winning Combination
Fraud Prevention and Internal Controls - A Winning Combination Fraud Prevention and Internal Controls - A Winning Combination
Fraud Prevention and Internal Controls - A Winning Combination
 
Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning Essentials
 
Dawgen Global Services
Dawgen Global ServicesDawgen Global Services
Dawgen Global Services
 

More from FraudBusters

Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics FraudBusters
 
Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterFraudBusters
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsFraudBusters
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud DetectionFraudBusters
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best PracticesFraudBusters
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsFraudBusters
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisFraudBusters
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraudBusters
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsFraudBusters
 
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudFraudBusters
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsFraudBusters
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisFraudBusters
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisFraudBusters
 
Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyFraudBusters
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramFraudBusters
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraudBusters
 
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial IntegrityFraudBusters
 
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudBusters
 

More from FraudBusters (19)

Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics
 
Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a Fraudster
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data Analytics
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud Detection
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best Practices
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your Audits
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
 
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay Fraud
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red Flags
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data Analysis
 
Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud Policy
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
 
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
 
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
 

Recently uploaded

0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 

Recently uploaded (20)

0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 

Proactive Data Analysis Techniques to Detect Financial Statement Fraud

  • 1. 1/22/2014 1 Copyright © FraudResourceNet LLC Proactive Data Analysis Techniques to  Find Financial Statement Fraud Special Guest Presenter:  Richard Cascarino, CFE, CIA, CISM, CRMA Richard Cascarino & Associates Jan 22, 2014 Copyright © FraudResourceNet LLC President and Founder of White Collar Crime 101 • Publisher of White-Collar Crime Fighter • Developer of FraudAware® Anti-Fraud Training • Monthly Columnist, The Fraud Examiner, ACFE Newsletter Member of Editorial Advisory Board, ACFE Author of “Fraud in the Markets” • Explains how fraud fueled the financial crisis. About Peter Goldmann, MSc., CFE
  • 2. 1/22/2014 2 Copyright © FraudResourceNet LLC About Jim Kaplan, MSc, CIA, CFE • President and Founder of AuditNet®, the global resource for auditors (now available on Apple and Android devices) • Auditor, Web Site Guru, • Internet for Auditors Pioneer • Recipient of the IIA’s 2007 Bradford Cadmus Memorial Award. • Author of “The Auditor’s Guide to Internet Resources” 2nd Edition Copyright © FraudResourceNet LLC • Principal of Richard Cascarino & Associates based in Colorado USA • Over 28 years experience in IT audit training and consultancy • Past President of the Institute of Internal Auditors in South Africa • Member of ISACA • Member of Association of Certified Fraud Examiners • Author of Auditor's Guide to Information Systems Auditing About Richard Cascarino, MBA, CIA, CISM, CFE
  • 3. 1/22/2014 3 Copyright © FraudResourceNet LLC This webinar and its material are the property of FraudResourceNet LLC. Unauthorized usage or recording of this webinar or any of its material is strictly forbidden. We are recording the webinar and you will be provided with a link access to that recording as detailed below. Downloading or otherwise duplicating the webinar recording is expressly prohibited. Webinar recording link will be sent via email within 5-7 business days. NASBA rules require us to ask polling questions during the Webinar and CPE certificates will be sent via email to those who answer ALL the polling questions The CPE certificates and link to the recording will be sent to the email address you registered with in GTW. We are not responsible for delivery problems due to spam filters, attachment restrictions or other controls in place for your email client. Submit questions via the chat box on your screen and we will answer them either during or at the conclusion. After the Webinar is over you will have an opportunity to provide feedback. Please complete the feedback questionnaire to help us continuously improve our Webinars If GTW stops working you may need to close and restart. You can always dial in and listen and follow along with the handout. Webinar Housekeeping Copyright © FraudResourceNet LLC The views expressed by the presenters do not necessarily represent the views,  positions, or opinions of FraudResourceNet LLC (FRN) or the presenters’  respective organizations. These materials, and the oral presentation  accompanying them, are for educational purposes only and do not constitute  accounting or legal advice or create an accountant‐client relationship.  While FRN makes every effort to ensure information is accurate and complete,  FRN makes no representations, guarantees, or warranties as to the accuracy or  completeness of the information provided via this presentation. FRN  specifically disclaims all liability for any claims or damages that may result from  the information contained in this presentation, including any websites  maintained by third parties and linked to the FRN website Any mention of commercial products is for information only; it does not imply  recommendation or endorsement by FraudResourceNet LLC 6 Disclaimers
  • 4. 1/22/2014 4 Copyright © FraudResourceNet LLC  Introduction: Fraud Statistics: The Growing Fraud Threat  Where & How Financial Statement Fraud Occurs  Detection/Auditing/Investigative Techniques – Including Automation  Entity-Level Red Flags of Fraud  Prevention and Deterrence  Your Questions  Conclusion Today’s Agenda Copyright © FraudResourceNet LLC According to major accounting firms, professional fraud examiners and law enforcement: jumps significantly during tough economic times  Business losses due to fraud increased 20% in last 12 months, from $1.4 million to $1.7 million per billion dollars of sales. (Kroll 2010/2011 Global Fraud Report)  Average cost to for each incident of fraud is $160,000 (ACFE) Of Financial Statement fraud: $2 million Approx. 67% of corporate fraud committed by insiders (Kroll) Approx. 50% of employees who commit fraud have been with their employers for over 5 years (ACFE) Fraud: The Big Picture
  • 5. 1/22/2014 5 Copyright © FraudResourceNet LLC  Victims of financial fraud are stakeholders with claims against the entity: shareholders, lenders, regulators.  Financial fraud occurs less frequently than asset misappropriation but the losses are substantially higher. Financial Statement Fraud: The Big Picture Source: ACFE 2008 Report to the Nation Copyright © FraudResourceNet LLC  Selling More (Overstating revenue)  Costing Less (Understating/not reporting expenses)  Owing More (Overstating debt to reduce taxes)  Owing Less (Understating debt to boost share price)  Inappropriate Disclosure (Depreciation/asset value, etc)  Other Miscellaneous Techniques (Concealment) Accounting Fraud
  • 6. 1/22/2014 6 Copyright © FraudResourceNet LLC  Falsification, alteration, manipulation of material financial records, supporting documents or business transactions  Material intentional omissions or misrepresentations of events, transactions, accounts or other significant information from which financial statements are prepared  Deliberate misapplication of accounting principles, policies and procedures used to measure, recognize, report and disclose economic events and business transactions  Intentional omission of disclosures or presentation of inadequate disclosures regarding accounting principles and policies and related financial amounts Jim Gravitt and Jennifer Johnson, “Recognizing Financial Statement Fraud” Financial Statement Fraud Schemes Copyright © FraudResourceNet LLC  Missing documents  Excessive voids or credits  Increased reconciliation items  Alterations on documents  Duplicate payments  Common names or addresses of payees or customers  Increased past due accounts  Unusual spikes in payables or receivables  Odd patterns in key ratios Accounting Fraud: Red Flags
  • 7. 1/22/2014 7 Copyright © FraudResourceNet LLC Example: Interactive Data Extraction and Analysis  21 years young  Database limitations:  2.1 billion records (100,000 records for IDEA Express) depending on the operating system  1.8 Exabytes file size (Tera, Peta, Exa) (Quintillion)  Some facilities not available in IDEA (Server) The Power of Automation Copyright © FraudResourceNet LLC Example: Orders Over Credit Limit
  • 8. 1/22/2014 8 Copyright © FraudResourceNet LLC 1) Improper Revenue Recognition Common Types of Financial Statement Fraud Copyright © FraudResourceNet LLC Backdating agreements  Stock options and other time-sensitive valuation issues that may result in fraudulently high revenue or low cost basis  Need for controls in recording contracts/sales, including independent verification of the terms of the agreement and contemporaneous recording of transactions when they are approved  Need for in-house legal, corporate board approval Revenue Recognition
  • 9. 1/22/2014 9 Copyright © FraudResourceNet LLC Sham Sales  Falsify inventory records, shipping records, and invoices and record the fictitious transactions as sales  Company may pretend to ship the inventory and hide it from company auditors Revenue Recognition Copyright © FraudResourceNet LLC Sales to Fictitious Customers
  • 10. 1/22/2014 10 Copyright © FraudResourceNet LLC Channel Stuffing  Shipping excess merchandise to distributors  Right of return exists/ Side agreements  Need to examine conditions of sale, analyze sales returns during cutoff period/after year- end, review of sales and contract files to determine if side agreements exist Revenue Recognition Copyright © FraudResourceNet LLC Bill and Hold Schemes  Recording fictitious sales and shipping goods to third-party warehouse  Need to examine shipping documents and analyze real estate rental costs Look for evidence of side agreements Review inventory changes Revenue Recognition
  • 11. 1/22/2014 11 Copyright © FraudResourceNet LLC Holding Books Open  Failure to match revenues with related expenses in the period in which they were incurred (CA’s “35-day month)  Examine cut-off procedures for month, quarter and year-end  Need for oversight and approval controls in recording contracts/sales Revenue Recognition Copyright © FraudResourceNet LLC Not Recording Detailed Transactions on Sub-ledger  Overstating Sales and A/R  Where sub-ledger does not reconcile to General Ledger control account  Examine reconciliation and top-side journal entries Revenue Recognition
  • 12. 1/22/2014 12 Copyright © FraudResourceNet LLC A side agreement would NOT be a typical part of which of the following:  Channel Stuffing  Holding the Books Open  Bill and Hold Schemes  All of the above Polling Question 1 Copyright © FraudResourceNet LLC 2. Management Estimates Common Types of Financial Statement Fraud
  • 13. 1/22/2014 13 Copyright © FraudResourceNet LLC Allowance for Bad Debts  Altering underlying A/R aging to manipulate computation  Refreshing of receivables by writing off aged A/R and booking new, fictitious sales  Use of credit memos  Analyze Bad Debt expense and Sales accounts, looking for similar levels of transaction activity for the same customers Management Estimates Copyright © FraudResourceNet LLC A/R Inquiries
  • 14. 1/22/2014 14 Copyright © FraudResourceNet LLC Overstatement of assets by:  Understating allowances for receivables  Overstating the value of inventory, property, plant, equipment, and other tangible assets,  Recording assets that did not exist Management Estimates Copyright © FraudResourceNet LLC Fraudulent Input from Sales or Credit Department on Credit Quality  Lack of independent review of customer’s creditworthiness  Inadequate documentation in credit file  Credit analyses should be performed by individuals who are independent of the sales process, periodic review of credit files Management Estimates
  • 15. 1/22/2014 15 Copyright © FraudResourceNet LLC 3. Expense Manipulation Common Types of Financial Statement Fraud Copyright © FraudResourceNet LLC Under-Accruing Expenses  Lack of monthly or quarterly reconciliation of accruals to actual amounts  Charging accrual “true-ups” to other, infrequently-used accounts  Compare monthly accruals to actual expenses and cash disbursements, noting variations in the adequacy of accruals  Capitalizing expenses Expense Manipulation
  • 16. 1/22/2014 16 Copyright © FraudResourceNet LLC Expense Examination Copyright © FraudResourceNet LLC Overstating assets can be achieved by (Choose all that apply): A. Understating allowances for receivables B. Overstating the value of inventory, property, plant, equipment, and other tangible assets C. Recording assets that do not exist D. All of the above Polling Question 2
  • 17. 1/22/2014 17 Copyright © FraudResourceNet LLC Not Recording Expenses  Paying unrecorded expenses must be offset by not paying other expenses  Need to ensure adequate segregation of duties in the receipt of invoices and the recording of expenses, review invoice file for past due invoices and collection notices Expense Manipulation Copyright © FraudResourceNet LLC Not Recording Detailed Transactions on Sub-ledger  Understating Expenses and A/P  Where sub-ledger does not reconcile to General Ledger control account  Examine reconciliation and search for unrecorded expenses Expense Manipulation
  • 18. 1/22/2014 18 Copyright © FraudResourceNet LLC Capitalizing Expenses  Moving expenses from the P&L to the Balance Sheet and amortizing them over an extended period  WorldCom – telecom line charges  Examine capitalized asset accounts for year-on-year changes Expense Manipulation Copyright © FraudResourceNet LLC Changing Inventory Valuation Methods  May result in lower COGS and higher sales margins  Review calculation of inventory valuation and related disclosures Expense Manipulation
  • 19. 1/22/2014 19 Copyright © FraudResourceNet LLC Manipulating Non-Cash Expenses  Changing depreciation and amortization methods  Review calculation of depreciation and related disclosures Expense Manipulation Copyright © FraudResourceNet LLC Moving expenses from the P&L to the Balance Sheet is a form of… A. Improper revenue recognition B. Expense manipulation C. Capitalization of expenses D. None of the above Polling Question 3
  • 20. 1/22/2014 20 Copyright © FraudResourceNet LLC 4. Detection and Investigative Techniques For Auditors, Fraud Investigators, Legal Staff, HR and Senior Management Detection and Investigation Techniques Copyright © FraudResourceNet LLC  What are you looking for? (Avoid spinning your wheels).  Where are you going to find it?  Choose the best technique (interviewing, audit, CAAT’s)  Select the tool Detection and Investigation Techniques
  • 21. 1/22/2014 21 Copyright © FraudResourceNet LLC  Where are the weakest links in the system’s controls?  What deviations from conventional good accounting practices are possible?  How are off-line transactions handled and who has the ability to authorize these transactions?  What would be the simplest way to compromise the system?  What control features in the system can be bypassed by higher authorities?  What is the nature of the work environment? Ask These Questions… Copyright © FraudResourceNet LLC  Be Skeptical!!!!  Analytical Procedures  Other Investigative Techniques  CAATs Tools and Techniques
  • 22. 1/22/2014 22 Copyright © FraudResourceNet LLC  Always request originals.  Ask yourself whether transactions make sense.  Have documents been altered?  Look to see where the documents are maintained.  Do employees have close personal relationships with vendors?  Is there a lack of supporting documentation?  Do background checks identify related parties and DBAs?  Does an answer not make sense?  Are you avoided more than usual?  When asking a relatively simple question, are you unexpectedly referred to someone high up in the organization?  Go with your gut! BE SKEPTICAL!!!!! Copyright © FraudResourceNet LLC  Increased scrap.  Excessive purchases.  Unexplained inventory shortages or adjustments.  Significant increase or decrease in account balances.  Cash shortages or overages.  Deviations from specifications. Analytical Red Flags
  • 23. 1/22/2014 23 Copyright © FraudResourceNet LLC WorldCom’s massive accounting fraud was characterized PRIMARILY by: A. Not recording detailed transactions on sub- ledger B. Not recording expenses C. Capitalizing expenses D. None of the above Polling Question 4 Copyright © FraudResourceNet LLC Range from simple to complex; Identify trends or anomalies Four Key Steps: 1. Develop an expectation/hypothesis 2. Determine the acceptable deviation from the expected value 3. Compare the result of the analytical procedure to the expected value 4. Investigate and evaluate any significant differences Analytical Procedures
  • 24. 1/22/2014 24 Copyright © FraudResourceNet LLC Unusual Financial statement ratios such as:  Increased revenues with • decreased inventory.  Increased revenues with • decreased receivables.  Increased inventory with • decreased payables.  Increased volume with • increased cost per unit. Analytical Anomalies Copyright © FraudResourceNet LLC Financial Statement Analysis  Vertical – a/k/a “common-sized statements”  Analyzes each line as a % of its relevant total  Income items as a % of total revenue  Expenses as a % of total expense  Identifies disproportionate items  Identifies fluctuations between periods  Horizontal – a/k/a “time-series analysis”  Measures $ and % changes from period to period  Identifies fluctuations and seasonality Data Analysis: Testing for Red Flags
  • 25. 1/22/2014 25 Copyright © FraudResourceNet LLC  Data Selection.  Data Cleaning.  Data Enrichment.  Data Coding/Reduction.  Data Mining.  Interpretation/Reporting.  Action.  Measurement and Evaluation. Knowledge Discovery Copyright © FraudResourceNet LLC Data Mining/Analysis  Using file interrogation software to examine underlying data  General Ledgers  Vendor files  Payroll  A/P and A/R Data Analysis – Testing for Red Flags
  • 26. 1/22/2014 26 Copyright © FraudResourceNet LLC Using File Interrogation Software is an  example of: a) Data Mining / Analysis b) Knowledge Discovery c) Vertical Analysis d) Horizontal Analysis Polling Question 5 Copyright © FraudResourceNet LLC  Public Document Reviews & Background Investigations  Interviews of Knowledgeable Persons  Confidential Sources Other Investigative Techniques
  • 27. 1/22/2014 27 Copyright © FraudResourceNet LLC Entity-Level Red Flags  Internal control gaps, deficiencies,  weaknesses  Business results that continually  outperform expectations   Management override of controls  Rapid or significant turnover of  resources, especially senior  management or employees in key  positions  Employee, customer or vendor  complaints  Inadequate segregation of duties  Unusual end‐of‐month or end‐of‐ quarter variations   High‐level of related‐party  transactions  Systems are manual and/or  decentralized  Repeated changes of  independent public accountants  Continuous problems with  various regulatory agencies  Disclosures of Investigations  Suspicion of illegal activities Copyright © FraudResourceNet LLC Prevention, Deterrence and Detection  Prevention  Tone at the top  Value system (“Code of Ethics / Conduct”)  Positive workplace environment  Hiring, promoting and retaining appropriate employees  Training and awareness programs  Confirmation / affirmation of Code of Conduct/Ethics  Ombudsman programs  Whistleblower programs  Incident response / case management processes  Investigative procedures  Discipline, prosecution and recovery guidelines  Prevention  Tone at the top  Value system (“Code of Ethics / Conduct”)  Positive workplace environment  Hiring, promoting and retaining appropriate employees  Training and awareness programs  Confirmation / affirmation of Code of Conduct/Ethics  Ombudsman programs  Whistleblower programs  Incident response / case management processes  Investigative procedures  Discipline, prosecution and recovery guidelines  Deterrence  “Active” oversight by Board and/or Audit Committee – Fraud risk assessment and related measures – Code confirmation / affirmation process – Management’s involvement in financial reporting process and override of control – Process to receive, retain and treat complaints of fraud / unethical conduct – Internal and external audit effectiveness  Internal audit – Evaluation of adequacy / effectiveness of internal controls  Disciplinary examples  Detection  Identification and measurement of fraud risk (“fraud risk assessment”)  Processes &procedures to mitigate identified fraud risk  Effective internal controls at entity and process level  On-going monitoring activities  Computer-assisted audit techniques  Investigation of: – Internal control weaknesses / breaches – Non-response to Code confirmation / affirmation – Reported issues  Detection  Identification and measurement of fraud risk (“fraud risk assessment”)  Processes &procedures to mitigate identified fraud risk  Effective internal controls at entity and process level  On-going monitoring activities  Computer-assisted audit techniques  Investigation of: – Internal control weaknesses / breaches – Non-response to Code confirmation / affirmation – Reported issues
  • 29. 1/22/2014 29 Copyright © FraudResourceNet LLC Common Analytical Mistakes  Failure to maintain proper documentation  Failure to notify decision makers  Failure to control digital evidence  Failure to report incidents in a timely manner  Underestimating the scope of the incident  No incident response plan in place  Technical mistakes:  Altering date and time stamps on evidence systems before  recording them  Killing rogue processes  Patching the system back together before investigation  Not recording commands used  Using untrusted commands and tools  Overwriting evidence by installing tools Copyright © FraudResourceNet LLC Questions?
  • 30. 1/22/2014 30 Copyright © FraudResourceNet LLC Peter Goldmann FraudResourceNet LLC 800-440-2261 www.fraudresourcenet.com pgoldmann@fraudresourcenet.com Jim Kaplan FraudResourceNet LLC 800-385-1625 www.fraudresourcenet.com jkaplan@fraudresourcenet.com Richard Cascarino Cascarino Associates rcasc@rcascarino.com Thank You!