SlideShare a Scribd company logo
Fraud Examiner & Forensic Specialist.
Mustapha B. Mugisa, CFE, CEH
Implementing Successful
Whistleblower Strategies
The employee as an
integral part in blowing
the whistle.
Forensic. Advisory. Fraud
Forensic. Advisory. Fraud
What are the two fraud
detection methods in
your organization?
How are they implemented?
©2012 Association of Certified Fraud Examiners, Inc.
3
Frauds are much
more likely to be
detected by tips than
by any other method.
Detection of Fraud Schemes
©2012 Association of Certified Fraud Examiners, Inc. 4
Initial Detection of
Occupational Frauds
Detection of Fraud Schemes
©2012 Association of Certified Fraud Examiners, Inc. 5
Source of Tips
Detection of Fraud Schemes
©2012 Association of Certified Fraud Examiners, Inc. 6
Impact of Hotlines
Whistleblower in
Uganda
• Provides procedures for protection
of individuals who disclose
information in public interest
• Provides protection against
victimisation of such people
The Whistle blowers
Protection Act 2010
2005 Code of Corporate
Governance of US
In the 2005 Code of Corporate Governance (“Code”), the
scope of duties of the Audit Committee was expanded,
inter alia, to ensure that appropriate measures are put in
place for employees to raise any concerns in strict
confidence with respect to any act of misfeasance by the
company’s management, together with appropriate follow-
up independent investigation of the concerns raised.
Other – best practices
What has gone
wrong?
10
#1: Great strategy, poor implementation…
11
• Hotlines of local companies are
managed abroad, where attendees
don’t know the local language!
• Processes are manual – suggestion
boxes
• No assurance of confidentiality and
anonymity
Cases like this
would go free!
#2: Poor response team…
12
• Limited capacity to address the
fraud problem
• Tips are not adequately reviewed to
conclusion
Forensic. Advisory. Fraud
Case study
https://www.scethicsline.com
Web. Email. Phone.
English, Luganda and Swahili. 24/7
Scethicsline.com features…
1. Secure – ensures total confidentiality & integrity
Cases like this
would go free!
Scethicsline.com features…
2. Secure – ensures total confidentiality & integrity
Cases like this
would go free!
Supports many
organizations – we
can customize for
your company.
Scethicsline.com features…
3. Available 24/7 in English, Luganda and Swahili.
Great reporting options and case management
system.
Web. Phone. Email
We assure you of utmost confidentiality and
anonymity.
Cases like this
would go free!
Scethicsline.com features…
4. Manage your tips any time any where
Promote Transparency. Get reports on any staff
misconduct or fraud or customer complaint.
Implementation period
1-4 weeks depending on size of the
organization and readiness
Cases like this
would go free!
Q&A
Thanks for your time…
Mustapha Mugisa, CFE, CEH, CISA, MBA, CPA, CrFA
Forensic specialist & fraud examiner
0712984585, mmugisa@summitcl.com
Title of your presentation
Forensic. Advisory. Fraud
Summit Consulting
Forensic. Advisory. Fraud
www.summitcl.com
We have been
consistently ranked by
our clients as the best
in our areas.
We specialize in digital forensics, IT security,
risk management and fraud prevention.
Our whistleblower
reporting system is
secure & anonymous.
https://www.scethicsline.com or email or phone.
Available 24/7. English. Luganda and Swahili.
Are you getting the
right forensic, IT
security and anti-
fraud training?
www.iifft.org for all your training
and certification needs.

More Related Content

Similar to Whistleblower presentation

Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraud
Wynyard Group
 
ICFE Fraud Risk Management Programme Infosheet
ICFE Fraud Risk Management Programme InfosheetICFE Fraud Risk Management Programme Infosheet
ICFE Fraud Risk Management Programme Infosheet
ICFE Group of Companies
 
CREATING FRAUD POLICY.pptx
CREATING FRAUD POLICY.pptxCREATING FRAUD POLICY.pptx
CREATING FRAUD POLICY.pptx
Tawanda Chisiri
 
Sophisticated Solutions to Complex Workplace Issues
Sophisticated Solutions to Complex Workplace IssuesSophisticated Solutions to Complex Workplace Issues
Sophisticated Solutions to Complex Workplace IssuesBusiness Controls, Inc.
 
ICFE In-House Training Programme
ICFE In-House Training ProgrammeICFE In-House Training Programme
ICFE In-House Training Programme
ICFE Group of Companies
 
Fraud & Investigation Support with LDM Global_ A Comprehensive Guide.pptx
Fraud & Investigation Support with LDM Global_ A Comprehensive Guide.pptxFraud & Investigation Support with LDM Global_ A Comprehensive Guide.pptx
Fraud & Investigation Support with LDM Global_ A Comprehensive Guide.pptx
LDM Global
 
Fraud in the Public Sector
Fraud in the Public SectorFraud in the Public Sector
Fraud in the Public Sector
fmi_igf
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
FraudBusters
 
BDO Anti Bribery & Corruption Advisory
BDO Anti Bribery & Corruption AdvisoryBDO Anti Bribery & Corruption Advisory
BDO Anti Bribery & Corruption Advisory
BDO Indonesia
 
How to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewHow to prepare for your first anti fraud review
How to prepare for your first anti fraud review
Jim Kaplan CIA CFE
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
IDology, Inc
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke Patchlink
Ben Rothke
 
Fraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management | Fraud Risk Assessment - EY IndiaFraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management | Fraud Risk Assessment - EY India
Ernst & Young
 
Fraud Risk Management - Are Your Doing Enough - EY India
Fraud Risk Management - Are Your Doing Enough - EY IndiaFraud Risk Management - Are Your Doing Enough - EY India
Fraud Risk Management - Are Your Doing Enough - EY India
SadanandGahivare
 
Fraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management | Fraud Risk Assessment - EY IndiaFraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management | Fraud Risk Assessment - EY India
NishantSisodiya
 
Fraud Risk Management - Are Your Doing Enough - EY India
Fraud Risk Management - Are Your Doing Enough - EY IndiaFraud Risk Management - Are Your Doing Enough - EY India
Fraud Risk Management - Are Your Doing Enough - EY India
sathish kriishnan
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Clio - Cloud-Based Legal Technology
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20
Marc S. Sokol
 
Investigation and forensic audit in a computerized work environment
Investigation and forensic audit in a computerized work environmentInvestigation and forensic audit in a computerized work environment
Investigation and forensic audit in a computerized work environment
Godwin Emmanuel Oyedokun MBA MSc ACA ACIB FCTI FCFIP CFE
 

Similar to Whistleblower presentation (20)

Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraud
 
ICFE Fraud Risk Management Programme Infosheet
ICFE Fraud Risk Management Programme InfosheetICFE Fraud Risk Management Programme Infosheet
ICFE Fraud Risk Management Programme Infosheet
 
CREATING FRAUD POLICY.pptx
CREATING FRAUD POLICY.pptxCREATING FRAUD POLICY.pptx
CREATING FRAUD POLICY.pptx
 
Sophisticated Solutions to Complex Workplace Issues
Sophisticated Solutions to Complex Workplace IssuesSophisticated Solutions to Complex Workplace Issues
Sophisticated Solutions to Complex Workplace Issues
 
ICFE In-House Training Programme
ICFE In-House Training ProgrammeICFE In-House Training Programme
ICFE In-House Training Programme
 
Fraud & Investigation Support with LDM Global_ A Comprehensive Guide.pptx
Fraud & Investigation Support with LDM Global_ A Comprehensive Guide.pptxFraud & Investigation Support with LDM Global_ A Comprehensive Guide.pptx
Fraud & Investigation Support with LDM Global_ A Comprehensive Guide.pptx
 
Fraud in the Public Sector
Fraud in the Public SectorFraud in the Public Sector
Fraud in the Public Sector
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Kenya AMC Presentation 2
Kenya AMC Presentation 2Kenya AMC Presentation 2
Kenya AMC Presentation 2
 
BDO Anti Bribery & Corruption Advisory
BDO Anti Bribery & Corruption AdvisoryBDO Anti Bribery & Corruption Advisory
BDO Anti Bribery & Corruption Advisory
 
How to prepare for your first anti fraud review
How to prepare for your first anti fraud reviewHow to prepare for your first anti fraud review
How to prepare for your first anti fraud review
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke Patchlink
 
Fraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management | Fraud Risk Assessment - EY IndiaFraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management | Fraud Risk Assessment - EY India
 
Fraud Risk Management - Are Your Doing Enough - EY India
Fraud Risk Management - Are Your Doing Enough - EY IndiaFraud Risk Management - Are Your Doing Enough - EY India
Fraud Risk Management - Are Your Doing Enough - EY India
 
Fraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management | Fraud Risk Assessment - EY IndiaFraud Risk Management | Fraud Risk Assessment - EY India
Fraud Risk Management | Fraud Risk Assessment - EY India
 
Fraud Risk Management - Are Your Doing Enough - EY India
Fraud Risk Management - Are Your Doing Enough - EY IndiaFraud Risk Management - Are Your Doing Enough - EY India
Fraud Risk Management - Are Your Doing Enough - EY India
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay Compliant
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20
 
Investigation and forensic audit in a computerized work environment
Investigation and forensic audit in a computerized work environmentInvestigation and forensic audit in a computerized work environment
Investigation and forensic audit in a computerized work environment
 

More from Mustapha Mugisa

The role of the board outside the Boardroom briefing.pptx
The role of the board outside the Boardroom briefing.pptxThe role of the board outside the Boardroom briefing.pptx
The role of the board outside the Boardroom briefing.pptx
Mustapha Mugisa
 
Fraud in banking_a heatmap.pptx
Fraud in banking_a heatmap.pptxFraud in banking_a heatmap.pptx
Fraud in banking_a heatmap.pptx
Mustapha Mugisa
 
Fraud risk maturity assessment.pptx
Fraud risk maturity assessment.pptxFraud risk maturity assessment.pptx
Fraud risk maturity assessment.pptx
Mustapha Mugisa
 
Effective Fraud risk management 101.pptx
Effective Fraud risk management 101.pptxEffective Fraud risk management 101.pptx
Effective Fraud risk management 101.pptx
Mustapha Mugisa
 
Key note presentation_amfiu conference
Key note presentation_amfiu conferenceKey note presentation_amfiu conference
Key note presentation_amfiu conferenceMustapha Mugisa
 
Uganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsUganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensics
Mustapha Mugisa
 

More from Mustapha Mugisa (7)

The role of the board outside the Boardroom briefing.pptx
The role of the board outside the Boardroom briefing.pptxThe role of the board outside the Boardroom briefing.pptx
The role of the board outside the Boardroom briefing.pptx
 
Fraud in banking_a heatmap.pptx
Fraud in banking_a heatmap.pptxFraud in banking_a heatmap.pptx
Fraud in banking_a heatmap.pptx
 
Fraud risk maturity assessment.pptx
Fraud risk maturity assessment.pptxFraud risk maturity assessment.pptx
Fraud risk maturity assessment.pptx
 
Effective Fraud risk management 101.pptx
Effective Fraud risk management 101.pptxEffective Fraud risk management 101.pptx
Effective Fraud risk management 101.pptx
 
Key note presentation_amfiu conference
Key note presentation_amfiu conferenceKey note presentation_amfiu conference
Key note presentation_amfiu conference
 
Uganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsUganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensics
 
Scl profile v2
Scl profile v2Scl profile v2
Scl profile v2
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Whistleblower presentation

  • 1. Fraud Examiner & Forensic Specialist. Mustapha B. Mugisa, CFE, CEH Implementing Successful Whistleblower Strategies The employee as an integral part in blowing the whistle. Forensic. Advisory. Fraud
  • 2. Forensic. Advisory. Fraud What are the two fraud detection methods in your organization? How are they implemented?
  • 3. ©2012 Association of Certified Fraud Examiners, Inc. 3 Frauds are much more likely to be detected by tips than by any other method. Detection of Fraud Schemes
  • 4. ©2012 Association of Certified Fraud Examiners, Inc. 4 Initial Detection of Occupational Frauds
  • 5. Detection of Fraud Schemes ©2012 Association of Certified Fraud Examiners, Inc. 5 Source of Tips
  • 6. Detection of Fraud Schemes ©2012 Association of Certified Fraud Examiners, Inc. 6 Impact of Hotlines
  • 8. • Provides procedures for protection of individuals who disclose information in public interest • Provides protection against victimisation of such people The Whistle blowers Protection Act 2010
  • 9. 2005 Code of Corporate Governance of US In the 2005 Code of Corporate Governance (“Code”), the scope of duties of the Audit Committee was expanded, inter alia, to ensure that appropriate measures are put in place for employees to raise any concerns in strict confidence with respect to any act of misfeasance by the company’s management, together with appropriate follow- up independent investigation of the concerns raised. Other – best practices
  • 11. #1: Great strategy, poor implementation… 11 • Hotlines of local companies are managed abroad, where attendees don’t know the local language! • Processes are manual – suggestion boxes • No assurance of confidentiality and anonymity Cases like this would go free!
  • 12. #2: Poor response team… 12 • Limited capacity to address the fraud problem • Tips are not adequately reviewed to conclusion
  • 13. Forensic. Advisory. Fraud Case study https://www.scethicsline.com Web. Email. Phone. English, Luganda and Swahili. 24/7
  • 14. Scethicsline.com features… 1. Secure – ensures total confidentiality & integrity Cases like this would go free!
  • 15. Scethicsline.com features… 2. Secure – ensures total confidentiality & integrity Cases like this would go free! Supports many organizations – we can customize for your company.
  • 16. Scethicsline.com features… 3. Available 24/7 in English, Luganda and Swahili. Great reporting options and case management system. Web. Phone. Email We assure you of utmost confidentiality and anonymity. Cases like this would go free!
  • 17. Scethicsline.com features… 4. Manage your tips any time any where Promote Transparency. Get reports on any staff misconduct or fraud or customer complaint. Implementation period 1-4 weeks depending on size of the organization and readiness Cases like this would go free!
  • 18. Q&A Thanks for your time… Mustapha Mugisa, CFE, CEH, CISA, MBA, CPA, CrFA Forensic specialist & fraud examiner 0712984585, mmugisa@summitcl.com Title of your presentation Forensic. Advisory. Fraud
  • 19. Summit Consulting Forensic. Advisory. Fraud www.summitcl.com
  • 20. We have been consistently ranked by our clients as the best in our areas. We specialize in digital forensics, IT security, risk management and fraud prevention.
  • 21. Our whistleblower reporting system is secure & anonymous. https://www.scethicsline.com or email or phone. Available 24/7. English. Luganda and Swahili.
  • 22. Are you getting the right forensic, IT security and anti- fraud training? www.iifft.org for all your training and certification needs.