SlideShare a Scribd company logo
1 of 14
T&E Fraud, Misuse & Waste
Detect the bad apples & make an impact
on your T&E spend program.
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
75.6% of Employees committing Expense Report Fraud are
engaged in another form of Occupational Fraud
Source: ACFE
10% people cause nearly 100% of the high risk issues
Source: Oversight Spend Analysis Report Volume 2 Fall 2015
2
Bad apples stay rotten.
In the U.S. 250,000 employees cost business
$3B from 48 million transactions
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
Time
Managers spend nearly 10 minutes reviewing
each expense report, may miss the details
Trust
Managers trust team members too
much, so will approve more often
Intuition
Hard to spot unusual transactions
Total Picture
Hard to identity patterns over time
when only looking at a sample
Training
It’s just too easy to click on the “Approve”
button without proper review
Troubling T’s of Managers
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
Items that are intentionally concealed
– Excessive padding
– Untraceable Out-of-Pocket Spend
– Intentional duplicate reports
– Personal spend submissions
– Misclassifications of expenses
– Fake purchases and receipts
4
Example: Expensing Personal Purchases
Fraud
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
Extravagant or unnecessary spending
– Excessive entertainment
– Donations, gifts, sponsorships
– Unusual mileage submissions
– Overstated expenses
– Unintentional duplicate reports
5
Example: Duplicate Mileage SubmittedWaste
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
T&E Policy Violations
– Inappropriate venues
– Purchases that violate policies
(i.e. liquor stores)
– Hiding large purchases across reports
– Mischaracterized expenses
6
Example: Circumventing Receipt Limit
Misuse
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
Finding the bad apple.
Gain visibility and focus on the high
risk activity such as:
- Suspicious transactions
- Non-compliant behavior patterns
- Process breakdowns
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
Curating the Data
Amex
Visa/MC
iExpenseConcur
Geo Code
Benchmark
TrustSphere
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
Insights On Demand
Professional Service
Templates + Tools
Business Intelligence tools
+ Analytic Components
• Multi-dimensional analysis
• Intelligence & machine learning
• Resolution capabilities
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
Multi-Dimensional Analysis
Case Management
Boolean
Recurrence
Format
Outlier
Chaining
Temporal Meta
Reasoning
Bayesian
Statistical
Aggregation
Link
1 Acquire 3 Resolve2 Analyze
Organization Data
Enriching
Data
Third Party
Data
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
Alerts for High Risk Transactions
11
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
Impact of Artificial Intelligence
© 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary.
Customer Example – Industrial
• Reduced review effort by 82%
• Eliminated Manager Approval
• Enhanced Fraud Detection
– Went from firing 1 or 2 people/quarter to 5 or 6 people/week
2016 APRIL
X
X X
X
X X X X X X X
X X X X X X X
X X X X X X X
X X X X X X X
X X X X X
T&E Fraud, Misuse & Waste
Find out what Insights On Demand could do for
your organization. Schedule a personal demo.
Request Demo

More Related Content

What's hot

Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and ControlWeaverCPAs
 
Blockchain - Use Cases
Blockchain - Use CasesBlockchain - Use Cases
Blockchain - Use CasesIBM Sverige
 
Internal Audit with Data Analytics
Internal Audit with Data AnalyticsInternal Audit with Data Analytics
Internal Audit with Data AnalyticsMitesh Katira
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingCase IQ
 
Integrating Data Analytics into a Risk-Based Audit Plan
Integrating Data Analytics into a Risk-Based Audit PlanIntegrating Data Analytics into a Risk-Based Audit Plan
Integrating Data Analytics into a Risk-Based Audit PlanCaseWare IDEA
 
Assessing AML Geographic Risk: a Methodology (November 2020)
Assessing AML Geographic Risk: a Methodology (November 2020)Assessing AML Geographic Risk: a Methodology (November 2020)
Assessing AML Geographic Risk: a Methodology (November 2020)Alessa
 
Hyperledger Overview - 20181024
Hyperledger Overview - 20181024Hyperledger Overview - 20181024
Hyperledger Overview - 20181024Arnaud Le Hors
 
Internal audit report writing
Internal audit report writingInternal audit report writing
Internal audit report writingNeha Kothari
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12Fuh George Cheo
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and ReportingBrown Smith Wallace
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiEMAC Consulting Group
 

What's hot (20)

Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
 
Blockchain - Use Cases
Blockchain - Use CasesBlockchain - Use Cases
Blockchain - Use Cases
 
Fraud & corruption
Fraud & corruptionFraud & corruption
Fraud & corruption
 
Internal Audit with Data Analytics
Internal Audit with Data AnalyticsInternal Audit with Data Analytics
Internal Audit with Data Analytics
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
 
Integrating Data Analytics into a Risk-Based Audit Plan
Integrating Data Analytics into a Risk-Based Audit PlanIntegrating Data Analytics into a Risk-Based Audit Plan
Integrating Data Analytics into a Risk-Based Audit Plan
 
Trends in AML Compliance
Trends in AML ComplianceTrends in AML Compliance
Trends in AML Compliance
 
Assessing AML Geographic Risk: a Methodology (November 2020)
Assessing AML Geographic Risk: a Methodology (November 2020)Assessing AML Geographic Risk: a Methodology (November 2020)
Assessing AML Geographic Risk: a Methodology (November 2020)
 
Chapter 11, Tests of Controls
Chapter 11, Tests of ControlsChapter 11, Tests of Controls
Chapter 11, Tests of Controls
 
Hyperledger Overview - 20181024
Hyperledger Overview - 20181024Hyperledger Overview - 20181024
Hyperledger Overview - 20181024
 
Internal audit report writing
Internal audit report writingInternal audit report writing
Internal audit report writing
 
Fraud motivation Triangle.pptx
Fraud motivation Triangle.pptxFraud motivation Triangle.pptx
Fraud motivation Triangle.pptx
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Trends in AML Compliance and Technology
Trends in AML Compliance and TechnologyTrends in AML Compliance and Technology
Trends in AML Compliance and Technology
 
The Fraud Diamond
The Fraud DiamondThe Fraud Diamond
The Fraud Diamond
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part ii
 
Role of Audit for detection of fraud.
Role of Audit  for  detection of fraud.Role of Audit  for  detection of fraud.
Role of Audit for detection of fraud.
 

Similar to Oversight Systems: Fraud, Waste & Misuse in T&E

Merging forensics w data analytics
Merging forensics w data analyticsMerging forensics w data analytics
Merging forensics w data analyticschris75308
 
CWIN17 New-York / adopting a cloud first strategy to fuel growth
CWIN17 New-York / adopting a cloud first strategy to fuel growthCWIN17 New-York / adopting a cloud first strategy to fuel growth
CWIN17 New-York / adopting a cloud first strategy to fuel growthCapgemini
 
CWIN17 New-York / a best customer or worst nightmare putting ai to work for...
CWIN17 New-York / a best customer or worst nightmare   putting ai to work for...CWIN17 New-York / a best customer or worst nightmare   putting ai to work for...
CWIN17 New-York / a best customer or worst nightmare putting ai to work for...Capgemini
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Strategic Treasurer
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachGuardian Analytics
 
Preventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldPreventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldGuardian Analytics
 
Preventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach worldPreventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach worldLaurent Pacalin
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachLaurent Pacalin
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudFraudBusters
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesTrish McGinity, CCSK
 
Blinde la seguridad de su empresa
Blinde la seguridad de su empresaBlinde la seguridad de su empresa
Blinde la seguridad de su empresaSAP Latinoamérica
 
Pixels.camp - Machine Learning: Building Successful Products at Scale
Pixels.camp - Machine Learning: Building Successful Products at ScalePixels.camp - Machine Learning: Building Successful Products at Scale
Pixels.camp - Machine Learning: Building Successful Products at ScaleAntónio Alegria
 
Proof CEO Presentation to IPR Research Symposium
Proof CEO Presentation to IPR Research SymposiumProof CEO Presentation to IPR Research Symposium
Proof CEO Presentation to IPR Research SymposiumProof Analytics
 
IT Fraud Series: Data Analytics
IT Fraud Series: Data AnalyticsIT Fraud Series: Data Analytics
IT Fraud Series: Data AnalyticsJim Kaplan CIA CFE
 
Analytics: What is it really and how can it help my organization?
Analytics: What is it really and how can it help my organization?Analytics: What is it really and how can it help my organization?
Analytics: What is it really and how can it help my organization?SAS Canada
 
REQUE - Predictive lead scoring for recruiters and talent agencies
REQUE - Predictive lead scoring for recruiters and talent agenciesREQUE - Predictive lead scoring for recruiters and talent agencies
REQUE - Predictive lead scoring for recruiters and talent agenciesMiroslav Maráz
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 

Similar to Oversight Systems: Fraud, Waste & Misuse in T&E (20)

Merging forensics w data analytics
Merging forensics w data analyticsMerging forensics w data analytics
Merging forensics w data analytics
 
CWIN17 New-York / adopting a cloud first strategy to fuel growth
CWIN17 New-York / adopting a cloud first strategy to fuel growthCWIN17 New-York / adopting a cloud first strategy to fuel growth
CWIN17 New-York / adopting a cloud first strategy to fuel growth
 
CWIN17 New-York / a best customer or worst nightmare putting ai to work for...
CWIN17 New-York / a best customer or worst nightmare   putting ai to work for...CWIN17 New-York / a best customer or worst nightmare   putting ai to work for...
CWIN17 New-York / a best customer or worst nightmare putting ai to work for...
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
 
Preventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldPreventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach World
 
Preventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach worldPreventing ATO in a post Equifax breach world
Preventing ATO in a post Equifax breach world
 
Chanchal ODSC-fraud-2017
Chanchal ODSC-fraud-2017Chanchal ODSC-fraud-2017
Chanchal ODSC-fraud-2017
 
Predictive analytics 2025_br
Predictive analytics 2025_brPredictive analytics 2025_br
Predictive analytics 2025_br
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
 
Blinde la seguridad de su empresa
Blinde la seguridad de su empresaBlinde la seguridad de su empresa
Blinde la seguridad de su empresa
 
Pixels.camp - Machine Learning: Building Successful Products at Scale
Pixels.camp - Machine Learning: Building Successful Products at ScalePixels.camp - Machine Learning: Building Successful Products at Scale
Pixels.camp - Machine Learning: Building Successful Products at Scale
 
Proof CEO Presentation to IPR Research Symposium
Proof CEO Presentation to IPR Research SymposiumProof CEO Presentation to IPR Research Symposium
Proof CEO Presentation to IPR Research Symposium
 
IT Fraud Series: Data Analytics
IT Fraud Series: Data AnalyticsIT Fraud Series: Data Analytics
IT Fraud Series: Data Analytics
 
Analytics: What is it really and how can it help my organization?
Analytics: What is it really and how can it help my organization?Analytics: What is it really and how can it help my organization?
Analytics: What is it really and how can it help my organization?
 
REQUE - Predictive lead scoring for recruiters and talent agencies
REQUE - Predictive lead scoring for recruiters and talent agenciesREQUE - Predictive lead scoring for recruiters and talent agencies
REQUE - Predictive lead scoring for recruiters and talent agencies
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 

Recently uploaded

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Oversight Systems: Fraud, Waste & Misuse in T&E

  • 1. T&E Fraud, Misuse & Waste Detect the bad apples & make an impact on your T&E spend program.
  • 2. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. 75.6% of Employees committing Expense Report Fraud are engaged in another form of Occupational Fraud Source: ACFE 10% people cause nearly 100% of the high risk issues Source: Oversight Spend Analysis Report Volume 2 Fall 2015 2 Bad apples stay rotten. In the U.S. 250,000 employees cost business $3B from 48 million transactions
  • 3. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. Time Managers spend nearly 10 minutes reviewing each expense report, may miss the details Trust Managers trust team members too much, so will approve more often Intuition Hard to spot unusual transactions Total Picture Hard to identity patterns over time when only looking at a sample Training It’s just too easy to click on the “Approve” button without proper review Troubling T’s of Managers
  • 4. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. Items that are intentionally concealed – Excessive padding – Untraceable Out-of-Pocket Spend – Intentional duplicate reports – Personal spend submissions – Misclassifications of expenses – Fake purchases and receipts 4 Example: Expensing Personal Purchases Fraud
  • 5. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. Extravagant or unnecessary spending – Excessive entertainment – Donations, gifts, sponsorships – Unusual mileage submissions – Overstated expenses – Unintentional duplicate reports 5 Example: Duplicate Mileage SubmittedWaste
  • 6. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. T&E Policy Violations – Inappropriate venues – Purchases that violate policies (i.e. liquor stores) – Hiding large purchases across reports – Mischaracterized expenses 6 Example: Circumventing Receipt Limit Misuse
  • 7. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. Finding the bad apple. Gain visibility and focus on the high risk activity such as: - Suspicious transactions - Non-compliant behavior patterns - Process breakdowns
  • 8. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. Curating the Data Amex Visa/MC iExpenseConcur Geo Code Benchmark TrustSphere
  • 9. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. Insights On Demand Professional Service Templates + Tools Business Intelligence tools + Analytic Components • Multi-dimensional analysis • Intelligence & machine learning • Resolution capabilities
  • 10. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. Multi-Dimensional Analysis Case Management Boolean Recurrence Format Outlier Chaining Temporal Meta Reasoning Bayesian Statistical Aggregation Link 1 Acquire 3 Resolve2 Analyze Organization Data Enriching Data Third Party Data
  • 11. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. Alerts for High Risk Transactions 11
  • 12. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. Impact of Artificial Intelligence
  • 13. © 2017 Oversight Systems. All Rights Reserved. Confidential & Proprietary. Customer Example – Industrial • Reduced review effort by 82% • Eliminated Manager Approval • Enhanced Fraud Detection – Went from firing 1 or 2 people/quarter to 5 or 6 people/week 2016 APRIL X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X
  • 14. T&E Fraud, Misuse & Waste Find out what Insights On Demand could do for your organization. Schedule a personal demo. Request Demo

Editor's Notes

  1. Bad apple – in middle of good apples
  2. 5000 Reports 833 hours 49980 Minutes 1 report=~10 mins
  3. Curate Analyze Action
  4. Boolean Logic Chaining Recurrence Format Outliers Similarity Sentiment Spatial Clustering & Consolidation Temporal Analysis Aggregation Numerical Statistics Meta Reasoning Image Linguistic
  5. Insights delivery is where we exceed the capabilities of a consultant Explain features of the workbench Explore results Modify results Drive workflow and case management on results Integrated with dashboard and benchmarks The activities of the user drives machine learning algorithms Business users understand results not analytics They can tell you when something is wrong in the results. We take their input on the results to refine the analytics for that specific client