Preventing Fraud-Lesson I
CA Sailesh Cousik
The Need of the Hour
Identifying Potential Threats
Fraudster Profiles
Fraudster Motivators
Vulnerabilities by Industry
Plugging controls
Creating Awareness
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Agenda
• Keys to Fraud Prevention
• What is Fraud and understanding a Fraudster
• Concept of Red Flags and Green Flags-
• Understand Fraud Vulnerabilities
• Preventive Controls
• People
• Information Assets and Processes
• Case Study
• Organizational Risk and Governance
• Reporting and Continuous Monitoring and Reassessment
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
“QUALITY IN A SERVICE OR PRODUCT IS
NOT WHAT YOU PUT INTO IT.
IT IS WHAT THE CLIENT OR CUSTOMER
GETS OUT OF IT.”
- PETER DRUCKER
QUALITY MEANS DOING IT RIGHT
WHEN NOBODY IS LOOKING
HENRY FORD
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
What is Fraud• Black’s Law Dictionary
• Fraud consists of some deceitful practice or willful device, resorted to with intent to deprive
another of his right, or in some manner to do him an injury. As distinguished from negligence, it is
always positive, intentional.
• Indian Company’s Act
• Explains fraud as: “fraud” in relation to affairs of a company or any body corporate and includes:
any act, omission, concealment of any fact or abuse of position committed by any person or any
other person with the connivance in any manner, with intent to deceive to gain undue advantage
from or to injure the interests of, the company or its shareholders or its creditors or any other
person, whether or not there is any wrongful gain or wrongful loss.”
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Five Reasons -Why People commit Fraud
F – Fun
R – Revenge (an Eye for an Eye)
A – Anger (Taking it out on society)
U – Unethical Behaviour- (bad person)
D – Destiny ( Born for the profession )
1. Employees commit 42% of Frauds and take 12 median months to detect
2. Managers 36% and take 18 median months to detect
3. Owners 19% and take 24 median months to detect
The ACFE report to the nations provides an interesting sidelight is that the older the fraudster the higher the
fraud-Fraudster> 60 Value=.5 million USD
Fraudsters don’t come with a label
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Use of Flags in Fraud Prevention
Behaviour and Incidents
Trends or Outlier triggers suspicion/prevention
• Earnings downturn
• Flashy Lifestyle or change in spend patterns
Unusual Activities with a possible normal explanation
• Credit Card transactions with abnormal value or from a different location
• Sudden change in behaviour
Too Good to be true
• Unusually High Growth
• Lack of anything unusual
6
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Industry Wise Fraud Vulnerability
Industry No. Of Cases % of Cases Median Loss (USD)
Banking & Financials 244 17.8% 200,000
Government and Public Admin 141 10.3 % 64,000
Manufacturing 116 8.5% 250,000
Health Care 100 7.3% 175,000
Oil And Gas 49 3.6% 450,000
Transportation & Warehousing 48 3.5% 202,000
Construction 43 3.1% 245,000
Technology 39 2.9% 250,000
Wholesale Trade 31 2.3% 375,000
Real Estate 24 1.8% 555,000
Mining 13 1.0% 900,000
Source: ACFE Report to the Nations on Organizational Fraud-2014
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Fraudsters and their Gullible Targets
Victims, Accomplices and Fraudsters have similar characteristics

1. Looking Lost and in need of help
2. Overconfident and Arrogant
3. Life and routine are structured and predictable
4. Eagerness to make a quick buck
5. Flamboyant Lifestyle and known
Vices/Weaknesses
6. In positions of power or in financial crisis
7. Disgruntled employees/those with personal
problems
8. Dreamers who seek to escape reality
9. Aggressive style which spawns enemies
10. Financial Crisis
11. Available of personal information
1. Credit Card spend trends
2. Cab Booking
3. Social Media-Status , Updates & Blogs
4. Travel Sites
5. Casual Conversation- Social Engineering
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
“Fraud Periods”
What to do when Vulnerability and Risk Increase
1. Disaster and Crisis Situations
2. Long week ends-Christmas/Diwali
3. New Government Schemes- Free Laptops/TVs
4. Charity and Religious Funds with little regulatory
control and where sources are not known
5. Corporate Pressure Situations
1. Shareholder pressure
2. Earnings pressure
3. Time to market pressure
4. Timeline pressure
5. Peer pressure- No Promotions
6. Change of key legislation and tax/duty rate
structures
7. Knowledge of Valuable proprietary, trademark
information prior to registration of
copyright/trademark or patent
8. Election Time
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Preventive Controls
Recruitment/Vendor Selection
Background Check
Education/Criminality/Employment/ Drugs/Health
Compensation to be Comparable with Industry norms
In line with authority and responsibility
Continuous Training and Performance Monitoring
Counselling and clearly defined processes and policies
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Preventive Controls
System and Application Access
Physical Security
CCTV
Access Control Card
Hardware USB Access
Network Access
Application Access
System Logs
Network Logs
Printer Logs
Proprietary Material of CA Sailesh Cousik. Prepared For academic use of intended recipients only.
Not to be circulated, published or used without prior authorization
Keys to
Fraud Prevention
• Understand the information you have
• Logs of access both systems and applications
• Physical access logs
• Transactional records and audit trails
• Data which can be used to discover trends
• Analytical and Monitoring Tools
• Mobile Records and CCTV Footage
• Behavioral and Cultural Patterns
• Interview Techniques
• Forensic Data and Tools for data extraction
• Types of data
• Relational databases
• XML
• Meta Data
• Big Data- Images, Videos
• Case studies
• Past experiences and learnings
• Self
• Organizational
• Know what is to be used, where and in what context
Phone: +91-9029026718
Email : info@saileshcousik.co.in
THANK YOU
FOR WATCHING
ANY
QUESTIONS ?
Monday, 17 July 2017 13

Preventing fraud Lesson-I

  • 1.
    Preventing Fraud-Lesson I CASailesh Cousik The Need of the Hour Identifying Potential Threats Fraudster Profiles Fraudster Motivators Vulnerabilities by Industry Plugging controls Creating Awareness
  • 2.
    Proprietary Material ofCA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Agenda • Keys to Fraud Prevention • What is Fraud and understanding a Fraudster • Concept of Red Flags and Green Flags- • Understand Fraud Vulnerabilities • Preventive Controls • People • Information Assets and Processes • Case Study • Organizational Risk and Governance • Reporting and Continuous Monitoring and Reassessment
  • 3.
    Proprietary Material ofCA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization “QUALITY IN A SERVICE OR PRODUCT IS NOT WHAT YOU PUT INTO IT. IT IS WHAT THE CLIENT OR CUSTOMER GETS OUT OF IT.” - PETER DRUCKER QUALITY MEANS DOING IT RIGHT WHEN NOBODY IS LOOKING HENRY FORD
  • 4.
    Proprietary Material ofCA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization What is Fraud• Black’s Law Dictionary • Fraud consists of some deceitful practice or willful device, resorted to with intent to deprive another of his right, or in some manner to do him an injury. As distinguished from negligence, it is always positive, intentional. • Indian Company’s Act • Explains fraud as: “fraud” in relation to affairs of a company or any body corporate and includes: any act, omission, concealment of any fact or abuse of position committed by any person or any other person with the connivance in any manner, with intent to deceive to gain undue advantage from or to injure the interests of, the company or its shareholders or its creditors or any other person, whether or not there is any wrongful gain or wrongful loss.”
  • 5.
    Proprietary Material ofCA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Five Reasons -Why People commit Fraud F – Fun R – Revenge (an Eye for an Eye) A – Anger (Taking it out on society) U – Unethical Behaviour- (bad person) D – Destiny ( Born for the profession ) 1. Employees commit 42% of Frauds and take 12 median months to detect 2. Managers 36% and take 18 median months to detect 3. Owners 19% and take 24 median months to detect The ACFE report to the nations provides an interesting sidelight is that the older the fraudster the higher the fraud-Fraudster> 60 Value=.5 million USD Fraudsters don’t come with a label
  • 6.
    Proprietary Material ofCA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Use of Flags in Fraud Prevention Behaviour and Incidents Trends or Outlier triggers suspicion/prevention • Earnings downturn • Flashy Lifestyle or change in spend patterns Unusual Activities with a possible normal explanation • Credit Card transactions with abnormal value or from a different location • Sudden change in behaviour Too Good to be true • Unusually High Growth • Lack of anything unusual 6
  • 7.
    Proprietary Material ofCA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Industry Wise Fraud Vulnerability Industry No. Of Cases % of Cases Median Loss (USD) Banking & Financials 244 17.8% 200,000 Government and Public Admin 141 10.3 % 64,000 Manufacturing 116 8.5% 250,000 Health Care 100 7.3% 175,000 Oil And Gas 49 3.6% 450,000 Transportation & Warehousing 48 3.5% 202,000 Construction 43 3.1% 245,000 Technology 39 2.9% 250,000 Wholesale Trade 31 2.3% 375,000 Real Estate 24 1.8% 555,000 Mining 13 1.0% 900,000 Source: ACFE Report to the Nations on Organizational Fraud-2014
  • 8.
    Proprietary Material ofCA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Fraudsters and their Gullible Targets Victims, Accomplices and Fraudsters have similar characteristics  1. Looking Lost and in need of help 2. Overconfident and Arrogant 3. Life and routine are structured and predictable 4. Eagerness to make a quick buck 5. Flamboyant Lifestyle and known Vices/Weaknesses 6. In positions of power or in financial crisis 7. Disgruntled employees/those with personal problems 8. Dreamers who seek to escape reality 9. Aggressive style which spawns enemies 10. Financial Crisis 11. Available of personal information 1. Credit Card spend trends 2. Cab Booking 3. Social Media-Status , Updates & Blogs 4. Travel Sites 5. Casual Conversation- Social Engineering
  • 9.
    Proprietary Material ofCA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization “Fraud Periods” What to do when Vulnerability and Risk Increase 1. Disaster and Crisis Situations 2. Long week ends-Christmas/Diwali 3. New Government Schemes- Free Laptops/TVs 4. Charity and Religious Funds with little regulatory control and where sources are not known 5. Corporate Pressure Situations 1. Shareholder pressure 2. Earnings pressure 3. Time to market pressure 4. Timeline pressure 5. Peer pressure- No Promotions 6. Change of key legislation and tax/duty rate structures 7. Knowledge of Valuable proprietary, trademark information prior to registration of copyright/trademark or patent 8. Election Time
  • 10.
    Proprietary Material ofCA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Preventive Controls Recruitment/Vendor Selection Background Check Education/Criminality/Employment/ Drugs/Health Compensation to be Comparable with Industry norms In line with authority and responsibility Continuous Training and Performance Monitoring Counselling and clearly defined processes and policies
  • 11.
    Proprietary Material ofCA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Preventive Controls System and Application Access Physical Security CCTV Access Control Card Hardware USB Access Network Access Application Access System Logs Network Logs Printer Logs
  • 12.
    Proprietary Material ofCA Sailesh Cousik. Prepared For academic use of intended recipients only. Not to be circulated, published or used without prior authorization Keys to Fraud Prevention • Understand the information you have • Logs of access both systems and applications • Physical access logs • Transactional records and audit trails • Data which can be used to discover trends • Analytical and Monitoring Tools • Mobile Records and CCTV Footage • Behavioral and Cultural Patterns • Interview Techniques • Forensic Data and Tools for data extraction • Types of data • Relational databases • XML • Meta Data • Big Data- Images, Videos • Case studies • Past experiences and learnings • Self • Organizational • Know what is to be used, where and in what context
  • 13.
    Phone: +91-9029026718 Email :info@saileshcousik.co.in THANK YOU FOR WATCHING ANY QUESTIONS ? Monday, 17 July 2017 13