SlideShare a Scribd company logo
1
UNITED KINGDOM UNITED STATES CANADA DUBAI AUSTRALIA NEW ZEALAND
Three simple steps to help stop fraud
Published by Wynyard U.S. for Jim Oakes, Wynyard Director of Financial Crime and ACFE
Regent Emeritus
STOP OCCUPATIONAL FRAUD
2
ABOUT WYNYARD
Wynyard Group is a market leader in risk management
and crime fighting software used in investigations
and intelligence operations by government agencies and
financial organisations. Wynyard solutions help solve and
prevent crime, defend against advanced persistent cyber
threats and counter terrorism. Wynyard’s powerful
software platform combines big data, advanced crime
analytics and tradecraft to identify persons of interest,
stop offenders and protect victims.
Wynyard has more than 120,000 users of its solutions
and offices in the United States, United Kingdom,
Canada, United Arab Emirates, Australia and New
Zealand. For more information visit
http://www.wynyardgroup.com
3
JIM OAKES SHARES HIS INSIGHTS ON INTERNAL FRAUD
Jim Oakes has been with Wynyard Group
since 2013 as the Director of Financial Crime.
A former Fraud Squad Detective, Jim is ACFE
Regent Emeritus, a Certified Fraud Examiner
and Certified Financial Crimes Investigator.
He is an invaluable industry expert and
advisor for Wynyard and brings over 30 years’
experience in Fraud, Security and Anti-Money
Laundering.
Jim has deep operational experience having
operated as Financial Crime Director with
some of the world’s largest banks in countries
across Europe, the Middle East, Africa, North
America, and Asia.
https://www.wynyardgroup.com/en/about/indu
stry-advisors/
4
INTERNAL FRAUD AND THREAT IS ON THE RISE
The number and frequency of internal
fraud incidents continues to rise,
according to Verizon’s 2014 Global
Data Breach Investigation Report .
The leading cause of insider threat is
staff members taking advantage of
their systems’ access privileges and
using their organizations’ corporate
LAN systems as attack vectors.
Crimes ARE being committed on
company premises.
5
INTERNAL FRAUD STAKES ARE HIGH
The consequences of internal fraud
are significant to organizations,
brands and Boards of Directors:
• Financial loss
• Reputational damage
• Losing customers’ trust
• Risk of increased regulation
• Civil and even criminal penalties
6
WHAT CAN COMPANIES DO TO COUNTER INSIDER THREATS?
Three simple steps can help alleviate
risk:
1. Be proactive in identifying and
addressing the problem
2. Strengthen employment policies
3. Employ data analytics tools to
quickly process and analyze large
volumes of data to identify events
and relationships of interest
7
STEP ONE - TACKLE THREAT FROM THE START
• Educate employees about fraud protection policies and
their responsibility to report suspicious behavior.
• Hold regular meetings to update staff on policies and the
law and reiterate watching for suspicious activities.
• Establish communications channels for those who want
to blow the whistle safely.
• Strict enforcement of password security is essential.
8
STEP TWO: STRENGTHEN EMPLOYMENT POLICIES
Strengthen pre-employment checks.
• Don’t rely on an element of trust
• Conduct effective background checks - don’t take job
applicants at their word
• Do not place a candidate who has “references pending”
into any position of trust without a background check
• Use agencies that guarantee they check references and
backgrounds and penalize them if they don’t
• Cross-reference applicants against your organization’s
internal records
9
STEP TWO: STRENGTHEN EMPLOYMENT POLICIES
Know your employees:
• Knowing and understanding your
employees is key to management’s
awareness of risk.
• Be cognizant of employees’
behavioral or personality changes.
Are employees requesting
emotional or financial help or taking
uncharacteristic actions?
10
STEP THREE: MITIGATE INSIDER RISK EARLY TO MINIMIZE
EXPOSURE
Early detection is the best form of defense.
• Detecting developing threats behind the firewall isn’t
easy.
• Quickly responding gives a much better chance to
prevent the compromise or loss of critical information.
• Early response gives valuable time to understand a
situation, stop the problem from spreading.
• Detecting insider misuse using traditional techniques can
take months or years but by then, the damage has been
done, and sometimes it’s irreparable.
• Analytics help detect suspicious user patterns, identify
and manage internal risk to quickly mitigate potential
threats.
11
RELATED NEWS AND LINKS
Insights into the world of an ex-fraudster
Local insurance fraud money-go-round has global impact
The evolution of crime analytics - Turning big data into smart data to help solve crime
Wynyard’s ACA software helps analysts to uncover hidden connections
CONTACT US TO REQUEST MORE INFORMATION ON ADVANCED ANALYTICS
SOLUTIONS TO ADDRESS INTERNAL FRAUD
12

More Related Content

What's hot

Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businesses
ntoscano50
 
Online Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client AccountsOnline Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client Accounts
corelink11
 
Ransomware
RansomwareRansomware
Ransomware
DeepakKumar4980
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
Leon Fouche
 
10 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 202110 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 2021
insightscare
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
Meg Weber
 
Implement Effective Cybersecurity Practices In 2021 With Top LA Prevention Re...
Implement Effective Cybersecurity Practices In 2021 With Top LA Prevention Re...Implement Effective Cybersecurity Practices In 2021 With Top LA Prevention Re...
Implement Effective Cybersecurity Practices In 2021 With Top LA Prevention Re...
inSOC
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
Amna
 
MP_OneSheet_VulnThreat
MP_OneSheet_VulnThreatMP_OneSheet_VulnThreat
MP_OneSheet_VulnThreat
Katherine Johnston, CFE
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye, Inc.
 
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged AccountsHow Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
BeyondTrust
 
Human Risk Management
Human Risk ManagementHuman Risk Management
Human Risk Management
John Grennan
 
Infographic: Stopping Attacks at the Identity Perimeter
Infographic: Stopping Attacks at the Identity PerimeterInfographic: Stopping Attacks at the Identity Perimeter
Infographic: Stopping Attacks at the Identity Perimeter
Enterprise Management Associates
 
Ransomware 2020 Report
Ransomware 2020 ReportRansomware 2020 Report
Ransomware 2020 Report
Fortis
 
Enemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling AccessEnemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling Access
BeyondTrust
 
Ahearn Security Presentation
Ahearn Security PresentationAhearn Security Presentation
Ahearn Security Presentation
johnjamesahearn
 
Simple Safe Steps to Cyber Security
Simple Safe Steps to Cyber SecuritySimple Safe Steps to Cyber Security
Simple Safe Steps to Cyber Security
Hudson Valley Public Relations
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Netpluz Asia Pte Ltd
 
5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats
Hannah Jenney
 
Cybersecurity Toolkit
Cybersecurity ToolkitCybersecurity Toolkit
Cybersecurity Toolkit
Claranet UK
 

What's hot (20)

Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businesses
 
Online Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client AccountsOnline Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client Accounts
 
Ransomware
RansomwareRansomware
Ransomware
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
10 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 202110 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 2021
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Implement Effective Cybersecurity Practices In 2021 With Top LA Prevention Re...
Implement Effective Cybersecurity Practices In 2021 With Top LA Prevention Re...Implement Effective Cybersecurity Practices In 2021 With Top LA Prevention Re...
Implement Effective Cybersecurity Practices In 2021 With Top LA Prevention Re...
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
MP_OneSheet_VulnThreat
MP_OneSheet_VulnThreatMP_OneSheet_VulnThreat
MP_OneSheet_VulnThreat
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged AccountsHow Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
 
Human Risk Management
Human Risk ManagementHuman Risk Management
Human Risk Management
 
Infographic: Stopping Attacks at the Identity Perimeter
Infographic: Stopping Attacks at the Identity PerimeterInfographic: Stopping Attacks at the Identity Perimeter
Infographic: Stopping Attacks at the Identity Perimeter
 
Ransomware 2020 Report
Ransomware 2020 ReportRansomware 2020 Report
Ransomware 2020 Report
 
Enemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling AccessEnemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling Access
 
Ahearn Security Presentation
Ahearn Security PresentationAhearn Security Presentation
Ahearn Security Presentation
 
Simple Safe Steps to Cyber Security
Simple Safe Steps to Cyber SecuritySimple Safe Steps to Cyber Security
Simple Safe Steps to Cyber Security
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™
 
5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats
 
Cybersecurity Toolkit
Cybersecurity ToolkitCybersecurity Toolkit
Cybersecurity Toolkit
 

Viewers also liked

How Next Gen Companies are saving millions using effective communication duri...
How Next Gen Companies are saving millions using effective communication duri...How Next Gen Companies are saving millions using effective communication duri...
How Next Gen Companies are saving millions using effective communication duri...
Continuity and Resilience
 
OpenTransportNet Data Hubs: Stimulating Innovation with Open GI
OpenTransportNet Data Hubs: Stimulating Innovation with Open GIOpenTransportNet Data Hubs: Stimulating Innovation with Open GI
OpenTransportNet Data Hubs: Stimulating Innovation with Open GI
21cConsultancy_2012
 
Elevledda utvecklingssatmal vt 2016
Elevledda utvecklingssatmal vt 2016Elevledda utvecklingssatmal vt 2016
Elevledda utvecklingssatmal vt 2016
Montessori Friskola Gotland
 
Leveraging the-digital-future
Leveraging the-digital-futureLeveraging the-digital-future
Leveraging the-digital-future
Exo Futures
 
Reforma en ginebra
Reforma en ginebraReforma en ginebra
Reforma en ginebra
Irving Matos Quintal
 
Quality in the new delivery paradigm
Quality in the new delivery paradigmQuality in the new delivery paradigm
Quality in the new delivery paradigm
SPIN Chennai
 
Mbe19 Macro G.5
Mbe19 Macro G.5Mbe19 Macro G.5
Mbe19 Macro G.5
Siraphan Passprasert
 
Innovation with Rapid Application Delivery
Innovation with Rapid Application DeliveryInnovation with Rapid Application Delivery
Innovation with Rapid Application Delivery
Exo Futures
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
Agus Wicaksono
 
BCM & IT Resilience in Aadhaar
BCM  &  IT Resilience in AadhaarBCM  &  IT Resilience in Aadhaar
BCM & IT Resilience in Aadhaar
Continuity and Resilience
 
perfSONAR: getting telemetry on your network
perfSONAR: getting telemetry on your networkperfSONAR: getting telemetry on your network
perfSONAR: getting telemetry on your network
Jisc
 
พฤติกรรมการผลิต
 พฤติกรรมการผลิต พฤติกรรมการผลิต
พฤติกรรมการผลิต
tumetr1
 
The Science DMZ
The Science DMZThe Science DMZ
The Science DMZ
Jisc
 
Machine learning use cases in finance
Machine learning use cases in financeMachine learning use cases in finance
Machine learning use cases in finance
David Guerineau
 
BMP ESPA4220
BMP ESPA4220BMP ESPA4220
BMP ESPA4220
Mang Engkus
 
BMP EKMA4158 Perilaku Organisasi
BMP EKMA4158 Perilaku OrganisasiBMP EKMA4158 Perilaku Organisasi
BMP EKMA4158 Perilaku Organisasi
Mang Engkus
 
BMP EKMA4567 Perilaku Konsumen
BMP EKMA4567 Perilaku KonsumenBMP EKMA4567 Perilaku Konsumen
BMP EKMA4567 Perilaku Konsumen
Mang Engkus
 

Viewers also liked (18)

How Next Gen Companies are saving millions using effective communication duri...
How Next Gen Companies are saving millions using effective communication duri...How Next Gen Companies are saving millions using effective communication duri...
How Next Gen Companies are saving millions using effective communication duri...
 
OpenTransportNet Data Hubs: Stimulating Innovation with Open GI
OpenTransportNet Data Hubs: Stimulating Innovation with Open GIOpenTransportNet Data Hubs: Stimulating Innovation with Open GI
OpenTransportNet Data Hubs: Stimulating Innovation with Open GI
 
Elevledda utvecklingssatmal vt 2016
Elevledda utvecklingssatmal vt 2016Elevledda utvecklingssatmal vt 2016
Elevledda utvecklingssatmal vt 2016
 
Leveraging the-digital-future
Leveraging the-digital-futureLeveraging the-digital-future
Leveraging the-digital-future
 
Reforma en ginebra
Reforma en ginebraReforma en ginebra
Reforma en ginebra
 
Quality in the new delivery paradigm
Quality in the new delivery paradigmQuality in the new delivery paradigm
Quality in the new delivery paradigm
 
Mbe19 Macro G.5
Mbe19 Macro G.5Mbe19 Macro G.5
Mbe19 Macro G.5
 
Innovation with Rapid Application Delivery
Innovation with Rapid Application DeliveryInnovation with Rapid Application Delivery
Innovation with Rapid Application Delivery
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
PSC 2013 ATH
PSC 2013 ATHPSC 2013 ATH
PSC 2013 ATH
 
BCM & IT Resilience in Aadhaar
BCM  &  IT Resilience in AadhaarBCM  &  IT Resilience in Aadhaar
BCM & IT Resilience in Aadhaar
 
perfSONAR: getting telemetry on your network
perfSONAR: getting telemetry on your networkperfSONAR: getting telemetry on your network
perfSONAR: getting telemetry on your network
 
พฤติกรรมการผลิต
 พฤติกรรมการผลิต พฤติกรรมการผลิต
พฤติกรรมการผลิต
 
The Science DMZ
The Science DMZThe Science DMZ
The Science DMZ
 
Machine learning use cases in finance
Machine learning use cases in financeMachine learning use cases in finance
Machine learning use cases in finance
 
BMP ESPA4220
BMP ESPA4220BMP ESPA4220
BMP ESPA4220
 
BMP EKMA4158 Perilaku Organisasi
BMP EKMA4158 Perilaku OrganisasiBMP EKMA4158 Perilaku Organisasi
BMP EKMA4158 Perilaku Organisasi
 
BMP EKMA4567 Perilaku Konsumen
BMP EKMA4567 Perilaku KonsumenBMP EKMA4567 Perilaku Konsumen
BMP EKMA4567 Perilaku Konsumen
 

Similar to Stop occupational fraud - Three simple steps to help stop fraud

Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
FraudBusters
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
IBMgbsNA
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
Nathan Desfontaines
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
JoAnna Cheshire
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
cyberprosocial
 
Cyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsCyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teams
Wynyard Group
 
Fraud in the Public Sector
Fraud in the Public SectorFraud in the Public Sector
Fraud in the Public Sector
fmi_igf
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
netwealthInvest
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge Training
Tory Quinton
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
IDology, Inc
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in Cybersecurity
Reading Works Detroit
 
Whistleblower presentation
Whistleblower presentationWhistleblower presentation
Whistleblower presentation
Mustapha Mugisa
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
CCIAOR
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Perficient, Inc.
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Eric Vanderburg
 
Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!
Craig Rispin
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
- Mark - Fullbright
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
Next Dimension Inc.
 
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for NonprofitsDWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
DWP Information Architects Inc.
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
Stephen Cobb
 

Similar to Stop occupational fraud - Three simple steps to help stop fraud (20)

Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
Cyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsCyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teams
 
Fraud in the Public Sector
Fraud in the Public SectorFraud in the Public Sector
Fraud in the Public Sector
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge Training
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in Cybersecurity
 
Whistleblower presentation
Whistleblower presentationWhistleblower presentation
Whistleblower presentation
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for NonprofitsDWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
 

More from Wynyard Group

Helping Australian agencies fight serious crime
Helping Australian agencies fight serious crimeHelping Australian agencies fight serious crime
Helping Australian agencies fight serious crime
Wynyard Group
 
Wynyard 2014-results-presentationpptx
Wynyard 2014-results-presentationpptxWynyard 2014-results-presentationpptx
Wynyard 2014-results-presentationpptx
Wynyard Group
 
Slideshare Wynyard story in icons
Slideshare Wynyard story in iconsSlideshare Wynyard story in icons
Slideshare Wynyard story in icons
Wynyard Group
 
Wynyard Group -Technology modules
Wynyard Group -Technology modulesWynyard Group -Technology modules
Wynyard Group -Technology modules
Wynyard Group
 
Cyber risk trends in 2015
Cyber risk trends in 2015Cyber risk trends in 2015
Cyber risk trends in 2015
Wynyard Group
 
Wynyard Group Annual General Meeting 2014
Wynyard Group Annual General Meeting 2014Wynyard Group Annual General Meeting 2014
Wynyard Group Annual General Meeting 2014
Wynyard Group
 
Case Studies: An overview of Wynyard's solutions and how they are used worldwide
Case Studies: An overview of Wynyard's solutions and how they are used worldwideCase Studies: An overview of Wynyard's solutions and how they are used worldwide
Case Studies: An overview of Wynyard's solutions and how they are used worldwide
Wynyard Group
 
Felony Lane Gang Problem
Felony Lane Gang ProblemFelony Lane Gang Problem
Felony Lane Gang Problem
Wynyard Group
 

More from Wynyard Group (8)

Helping Australian agencies fight serious crime
Helping Australian agencies fight serious crimeHelping Australian agencies fight serious crime
Helping Australian agencies fight serious crime
 
Wynyard 2014-results-presentationpptx
Wynyard 2014-results-presentationpptxWynyard 2014-results-presentationpptx
Wynyard 2014-results-presentationpptx
 
Slideshare Wynyard story in icons
Slideshare Wynyard story in iconsSlideshare Wynyard story in icons
Slideshare Wynyard story in icons
 
Wynyard Group -Technology modules
Wynyard Group -Technology modulesWynyard Group -Technology modules
Wynyard Group -Technology modules
 
Cyber risk trends in 2015
Cyber risk trends in 2015Cyber risk trends in 2015
Cyber risk trends in 2015
 
Wynyard Group Annual General Meeting 2014
Wynyard Group Annual General Meeting 2014Wynyard Group Annual General Meeting 2014
Wynyard Group Annual General Meeting 2014
 
Case Studies: An overview of Wynyard's solutions and how they are used worldwide
Case Studies: An overview of Wynyard's solutions and how they are used worldwideCase Studies: An overview of Wynyard's solutions and how they are used worldwide
Case Studies: An overview of Wynyard's solutions and how they are used worldwide
 
Felony Lane Gang Problem
Felony Lane Gang ProblemFelony Lane Gang Problem
Felony Lane Gang Problem
 

Recently uploaded

办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
Timothy Spann
 
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
74nqk8xf
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
g4dpvqap0
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
Sm321
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
kuntobimo2016
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
zsjl4mimo
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
Bill641377
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
nuttdpt
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
Timothy Spann
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
Social Samosa
 
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Aggregage
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
g4dpvqap0
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
Roger Valdez
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
aqzctr7x
 

Recently uploaded (20)

办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
 
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
 
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 

Stop occupational fraud - Three simple steps to help stop fraud

  • 1. 1 UNITED KINGDOM UNITED STATES CANADA DUBAI AUSTRALIA NEW ZEALAND Three simple steps to help stop fraud Published by Wynyard U.S. for Jim Oakes, Wynyard Director of Financial Crime and ACFE Regent Emeritus STOP OCCUPATIONAL FRAUD
  • 2. 2 ABOUT WYNYARD Wynyard Group is a market leader in risk management and crime fighting software used in investigations and intelligence operations by government agencies and financial organisations. Wynyard solutions help solve and prevent crime, defend against advanced persistent cyber threats and counter terrorism. Wynyard’s powerful software platform combines big data, advanced crime analytics and tradecraft to identify persons of interest, stop offenders and protect victims. Wynyard has more than 120,000 users of its solutions and offices in the United States, United Kingdom, Canada, United Arab Emirates, Australia and New Zealand. For more information visit http://www.wynyardgroup.com
  • 3. 3 JIM OAKES SHARES HIS INSIGHTS ON INTERNAL FRAUD Jim Oakes has been with Wynyard Group since 2013 as the Director of Financial Crime. A former Fraud Squad Detective, Jim is ACFE Regent Emeritus, a Certified Fraud Examiner and Certified Financial Crimes Investigator. He is an invaluable industry expert and advisor for Wynyard and brings over 30 years’ experience in Fraud, Security and Anti-Money Laundering. Jim has deep operational experience having operated as Financial Crime Director with some of the world’s largest banks in countries across Europe, the Middle East, Africa, North America, and Asia. https://www.wynyardgroup.com/en/about/indu stry-advisors/
  • 4. 4 INTERNAL FRAUD AND THREAT IS ON THE RISE The number and frequency of internal fraud incidents continues to rise, according to Verizon’s 2014 Global Data Breach Investigation Report . The leading cause of insider threat is staff members taking advantage of their systems’ access privileges and using their organizations’ corporate LAN systems as attack vectors. Crimes ARE being committed on company premises.
  • 5. 5 INTERNAL FRAUD STAKES ARE HIGH The consequences of internal fraud are significant to organizations, brands and Boards of Directors: • Financial loss • Reputational damage • Losing customers’ trust • Risk of increased regulation • Civil and even criminal penalties
  • 6. 6 WHAT CAN COMPANIES DO TO COUNTER INSIDER THREATS? Three simple steps can help alleviate risk: 1. Be proactive in identifying and addressing the problem 2. Strengthen employment policies 3. Employ data analytics tools to quickly process and analyze large volumes of data to identify events and relationships of interest
  • 7. 7 STEP ONE - TACKLE THREAT FROM THE START • Educate employees about fraud protection policies and their responsibility to report suspicious behavior. • Hold regular meetings to update staff on policies and the law and reiterate watching for suspicious activities. • Establish communications channels for those who want to blow the whistle safely. • Strict enforcement of password security is essential.
  • 8. 8 STEP TWO: STRENGTHEN EMPLOYMENT POLICIES Strengthen pre-employment checks. • Don’t rely on an element of trust • Conduct effective background checks - don’t take job applicants at their word • Do not place a candidate who has “references pending” into any position of trust without a background check • Use agencies that guarantee they check references and backgrounds and penalize them if they don’t • Cross-reference applicants against your organization’s internal records
  • 9. 9 STEP TWO: STRENGTHEN EMPLOYMENT POLICIES Know your employees: • Knowing and understanding your employees is key to management’s awareness of risk. • Be cognizant of employees’ behavioral or personality changes. Are employees requesting emotional or financial help or taking uncharacteristic actions?
  • 10. 10 STEP THREE: MITIGATE INSIDER RISK EARLY TO MINIMIZE EXPOSURE Early detection is the best form of defense. • Detecting developing threats behind the firewall isn’t easy. • Quickly responding gives a much better chance to prevent the compromise or loss of critical information. • Early response gives valuable time to understand a situation, stop the problem from spreading. • Detecting insider misuse using traditional techniques can take months or years but by then, the damage has been done, and sometimes it’s irreparable. • Analytics help detect suspicious user patterns, identify and manage internal risk to quickly mitigate potential threats.
  • 11. 11 RELATED NEWS AND LINKS Insights into the world of an ex-fraudster Local insurance fraud money-go-round has global impact The evolution of crime analytics - Turning big data into smart data to help solve crime Wynyard’s ACA software helps analysts to uncover hidden connections CONTACT US TO REQUEST MORE INFORMATION ON ADVANCED ANALYTICS SOLUTIONS TO ADDRESS INTERNAL FRAUD
  • 12. 12