SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
"Fraud Detection and
Prevention Techniques
Using Excel"
May 8, 2013
Special Guest Panelist:
Charlie Walker

Reinvent Data Limited

Copyright © 2013 FraudResourceNet LLC

About Peter Goldmann, MSc., CFE
 President and Founder of White

Collar Crime 101
 Publisher of White-Collar Crime Fighter
 Developer of FraudAware® anti-fraud

training courses
 Monthly columnist, The Fraud
Examiner, ACFE Newsletter

 Member of Editorial Advisory

Board, ACFE
 Author of Fraud in the Markets,
published by Wiley; available at
Amazon.com)

Copyright © 2013 FraudResourceNet LLC
About Jim Kaplan, CIA, CFE
 President and Founder
of AuditNet®, the global
resource for auditors
 Auditor, Author, Web
Site Guru, Internet for
Auditors Pioneer
 Recipient of the IIA’s
2007 Bradford Cadmus
Memorial Award.

Copyright © 2013 FraudResourceNet LLC

Charlie Walker

 Managing Director at

Reinvent Data Limited
 Chartered Accountant and

Excel expert
 Creator of TopCAATs, an

Excel based CAATs package
 Author of “The Ultimate

Guide to Auditing with Excel”

Copyright © 2013 FraudResourceNet LLC
Webinar Housekeeping
This webinar and its material are the property of FraudResouceNet LLC.
Unauthorized usage or recording of this webinar or any of its material is strictly
forbidden. We will be recording the webinar and you will be provided access to
that recording within five business days after the webinar. Downloading or
otherwise duplicating the webinar recording is expressly prohibited.
Please complete the evaluation to help us continuously improve our Webinars.
Unless you are part of a group viewing this webinar on a single screen, you
must answer ALL the polling questions to qualify for CPE per NASBA.
Submit questions via the chat box on your screen and we will answer them
either during or at the conclusion.
If GTW stops working you may need to close and restart. You can always dial
in and listen and follow along with the handout.

Copyright © 2013 FraudResourceNet LLC

Disclaimers
 The views expressed by the presenters do not necessarily represent the
views, positions, or opinions of FraudResourceNet LLC (FRN) or the
presenters’ respective organizations. These materials, and the oral
presentation accompanying them, are for educational purposes only and do
not constitute accounting or legal advice or create an accountant-client
relationship.
While FRN makes every effort to ensure information is accurate and
complete, FRN makes no representations, guarantees, or warranties as to
the accuracy or completeness of the information provided via this
presentation. FRN specifically disclaims all liability for any claims or
damages that may result from the information contained in this presentation,
including any websites maintained by third parties and linked to the FRN
website
Any mention of commercial products is for information only; it does not imply
recommendation or endorsement by FraudResourceNet LLC
Copyright © 2013 FraudResourceNet LLC

5
Today’s Agenda






Introduction
Fraud Statistics
Auditor’s Role in Fraud Detection
Principles of Data Analytics
Why Excel
Getting Started (including 30 tests to try
out)
 Going Forward
 Questions & Answers
Copyright © 2013 FraudResourceNet LLC

Fraud: The Big Picture
According to major accounting firms, professional fraud examiners
and law enforcement:

 Fraud costs the world $3.5 TRILLION per year. (5%) (ACFE)
 Business losses due to fraud increased 20% in last 12 months, from
$1.4 million to $1.7 million per billion dollars of sales. (Kroll 2010/2011
Global Fraud Report)
 75% of the companies surveyed experienced at least one incident of
fraud in the last 12 months (KPMG)
 Average cost for each incident of fraud is $160K (ACFE)
 Skimming is 4th most common internal fraud; $60K per incident
 Larceny is 5th most common internal fraud; $100K per incident
 Approximately 60% of corporate fraud committed by insiders (PwC)
Copyright © 2013 FraudResourceNet LLC
The Auditor’s Role

IPPF Standard 1210.A3
 Internal auditors must have
sufficient knowledge of…available
technology based audit techniques
to perform their assigned work

Copyright © 2013 FraudResourceNet LLC

IIA Guidance – GTAG 13
Internal auditors require appropriate
skills and should use available
technological tools to help them
maintain a successful fraud
management program that covers
prevention, detection, and
investigation. As such, all audit
professionals — not just IT audit
specialists — are expected to be
increasingly proficient in areas such as
data analysis and the use of
technology to help them meet the
demands of the job.

Copyright © 2013 FraudResourceNet LLC
Professional Guidance

Copyright © 2013 FraudResourceNet LLC

Principles of Data Analytics to
Detect Fraud
 Using set rules to identify transactions of
higher risk
 Every company is different, has a different
environment, different systems, different
risks, etc.
 Need to use judgment to select testing
 Need to use judgment to evaluate results
 Just because a transaction matches a red
flag doesn’t mean fraud is present
 Using data analytics does not guarantee
finding fraud or finding all fraud!
Copyright © 2013 FraudResourceNet LLC
Why Excel
 You’ve already got it
installed
 You’re already using it on a
daily basis
 It’s easy to get started with
the basics
 There’s a huge amount you
can do as your skills develop
 Skills learned here can be
carried forward
Copyright © 2013 FraudResourceNet LLC

Polling Question 1

Copyright © 2013 FraudResourceNet LLC
Limitations of Excel





Requires manual formula entry
Often many steps involved
Restricted file sizes
Not really designed for this type of work

Copyright © 2013 FraudResourceNet LLC

Key Excel Features

 AutoFilters
 Pivot Tables
 IF Formulas
 VLookUp

Copyright © 2013 FraudResourceNet LLC
Getting Started
 Start with the easy stuff – no
point trying to run before you
can walk!
 Have a well thought out plan
 Invest time in getting the right
data in the right format
 Remember to save regularly
 Just do it – what’s the worst
that can happen?

Copyright © 2013 FraudResourceNet LLC

Polling Question 2

Copyright © 2013 FraudResourceNet LLC
The Data Analytics Cycle

Plan your
testing

Request
Data

Review

Continual
Learning
Evaluate
and Follow
up

Obtain and
Clean Data

Carry out
testing

Copyright © 2013 FraudResourceNet LLC

Getting the data

 Speak to IT departments not just process
owners
 Flat files (e.g. “.csv”) are best
 Be specific– the more information you can
provide the better

Copyright © 2013 FraudResourceNet LLC
Accounts Payable Testing











Duplicate Vendors
Vendor – Employee Relationships
Split transactions
Transactions posted on unusual days/dates/times
Invoice date before purchase order date
Rounded transactions
Potential Related Parties
Reversing changes to standing data
Benford’s Testing
Summarize transactions by user
Copyright © 2013 FraudResourceNet LLC

Polling Question 3

Copyright © 2013 FraudResourceNet LLC
PCards and TCards











Transactions at foreign merchants
Split transactions
Purchases on weekends/holidays
Multiple cards per cardholder
Inappropriate vendor transactions
Top Cost Centers/Card Holders
Monthly limit exceeded
Duplicate Claims
Transactions just below authorization limits
Round Amounts

Copyright © 2013 FraudResourceNet LLC

Payroll Testing











Duplicate or “ghost” employees
Duplicate payments
Excessive payments
Employees paid after termination
Unauthorized overtime
Leave never taken
Non Consecutive leave
Only person working overtime
Still in work not claiming overtime
Cancelled and re-issued checks

Copyright © 2013 FraudResourceNet LLC
Polling Question 4

Copyright © 2013 FraudResourceNet LLC

Going Forward







Build up a regular “Test set”
Don’t be afraid to experiment
Share ideas
Internally – resource library, regular meetings
Externally – forums, webinars, LinkedIn
Upgrade from Excel to dedicated CAATs
software – many of your skills will be
transferable

Copyright © 2013 FraudResourceNet LLC
TopCAATs
 Suite of over 130 tools for Auditors and
Accountants
 Runs completely within Excel
 Mixture of data analytics and Excel productivity
tools
 Allows wider variety of work/testing and greatly
improves efficiency

Copyright © 2013 FraudResourceNet LLC

Polling Question 5

Copyright © 2013 FraudResourceNet LLC
10 Excel Resources for Auditors
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.

Auditing with Excel book – www.auditingwithexcel.com/auditnet
Evaluating CAATs report – www.topcaats.com/auditnet
TopCAATs – www.topcaats.com
ActiveData for Excel http://www.mrexcel.com/auditors.shtml
Using Excel as an Audit Software available eBook from AuditNet
Using Excel to Detect Fraud (e-book).
Excel for Auditors by Bill Jelen
Fraud Detection with ActiveData For Excel
Using Excel to Ferret Out Fraud
Find Financial Fraud Using Benford’s Law

Copyright © 2013 FraudResourceNet LLC

Questions?
 Any Questions?
Don’t be Shy!

Copyright © 2013 FraudResourceNet LLC
AuditNet® Survey
2013 Fraud Detection Techniques Using Technology
Please help us by taking the survey

Scan the QR Code with your Mobile Device
Or Visit
https://www.surveymonkey.com/s/Z6XZ8DW
Copyright © 2013 FraudResourceNet LLC

Coming Soon…

 “Fraudulent Documentation:
Fraudsters’ Secret Weapon ... How
to Disarm Them”, May 29
“An Expert’s Advice on Establishing
an Organization Wide Fraud Policy”,
June 5

Copyright © 2013 FraudResourceNet LLC
Thank You!
Website: http://www.fraudresourcenet.com
Jim Kaplan
FraudResourceNet™
800-385-1625
jkaplan@fraudresourcenet.com
Peter Goldmann
FraudResourceNet™
800-440-2261
pgoldmann@fraudresourcenet.com
Charlie Walker, ACA
Reinvent Data Limited
www.reinventdata.com
Charlie.walker@reinventdata.com
Copyright © 2013 FraudResourceNet LLC

Contenu connexe

Plus de FraudBusters

Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics FraudBusters
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudFraudBusters
 
Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterFraudBusters
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsFraudBusters
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud DetectionFraudBusters
 
Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFraudBusters
 
Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning EssentialsFraudBusters
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsFraudBusters
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudFraudBusters
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudFraudBusters
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best PracticesFraudBusters
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsFraudBusters
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisFraudBusters
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraudBusters
 
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudUsing Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudFraudBusters
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsFraudBusters
 
Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsFraudBusters
 
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudFraudBusters
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsFraudBusters
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisFraudBusters
 

Plus de FraudBusters (20)

Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay Fraud
 
Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a Fraudster
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data Analytics
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud Detection
 
Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit Software
 
Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning Essentials
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding Fraud
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best Practices
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your Audits
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
 
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudUsing Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
 
Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data Analytics
 
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay Fraud
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red Flags
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
 

Dernier

The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarHarsh Kumar
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Sonam Pathan
 
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfmagnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfHenry Tapper
 
Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Sonam Pathan
 
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)ECTIJ
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintSuomen Pankki
 
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...Amil baba
 
project management information system lecture notes
project management information system lecture notesproject management information system lecture notes
project management information system lecture notesongomchris
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasCherylouCamus
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managmentfactical
 
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...Amil baba
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Sonam Pathan
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojnaDharmendra Kumar
 
Overview of Inkel Unlisted Shares Price.
Overview of Inkel Unlisted Shares Price.Overview of Inkel Unlisted Shares Price.
Overview of Inkel Unlisted Shares Price.Precize Formely Leadoff
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)twfkn8xj
 
Market Morning Updates for 16th April 2024
Market Morning Updates for 16th April 2024Market Morning Updates for 16th April 2024
Market Morning Updates for 16th April 2024Devarsh Vakil
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办fqiuho152
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHenry Tapper
 

Dernier (20)

The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh Kumar
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
 
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfmagnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
 
Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713
 
🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road
 
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraint
 
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...
 
project management information system lecture notes
project management information system lecture notesproject management information system lecture notes
project management information system lecture notes
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng Pilipinas
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managment
 
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojna
 
Overview of Inkel Unlisted Shares Price.
Overview of Inkel Unlisted Shares Price.Overview of Inkel Unlisted Shares Price.
Overview of Inkel Unlisted Shares Price.
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)
 
Market Morning Updates for 16th April 2024
Market Morning Updates for 16th April 2024Market Morning Updates for 16th April 2024
Market Morning Updates for 16th April 2024
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview document
 
Q1 2024 Newsletter | Financial Synergies Wealth Advisors
Q1 2024 Newsletter | Financial Synergies Wealth AdvisorsQ1 2024 Newsletter | Financial Synergies Wealth Advisors
Q1 2024 Newsletter | Financial Synergies Wealth Advisors
 

Fraud Detection and Prevention Techniques Using Excel

  • 1. "Fraud Detection and Prevention Techniques Using Excel" May 8, 2013 Special Guest Panelist: Charlie Walker Reinvent Data Limited Copyright © 2013 FraudResourceNet LLC About Peter Goldmann, MSc., CFE  President and Founder of White Collar Crime 101  Publisher of White-Collar Crime Fighter  Developer of FraudAware® anti-fraud training courses  Monthly columnist, The Fraud Examiner, ACFE Newsletter  Member of Editorial Advisory Board, ACFE  Author of Fraud in the Markets, published by Wiley; available at Amazon.com) Copyright © 2013 FraudResourceNet LLC
  • 2. About Jim Kaplan, CIA, CFE  President and Founder of AuditNet®, the global resource for auditors  Auditor, Author, Web Site Guru, Internet for Auditors Pioneer  Recipient of the IIA’s 2007 Bradford Cadmus Memorial Award. Copyright © 2013 FraudResourceNet LLC Charlie Walker  Managing Director at Reinvent Data Limited  Chartered Accountant and Excel expert  Creator of TopCAATs, an Excel based CAATs package  Author of “The Ultimate Guide to Auditing with Excel” Copyright © 2013 FraudResourceNet LLC
  • 3. Webinar Housekeeping This webinar and its material are the property of FraudResouceNet LLC. Unauthorized usage or recording of this webinar or any of its material is strictly forbidden. We will be recording the webinar and you will be provided access to that recording within five business days after the webinar. Downloading or otherwise duplicating the webinar recording is expressly prohibited. Please complete the evaluation to help us continuously improve our Webinars. Unless you are part of a group viewing this webinar on a single screen, you must answer ALL the polling questions to qualify for CPE per NASBA. Submit questions via the chat box on your screen and we will answer them either during or at the conclusion. If GTW stops working you may need to close and restart. You can always dial in and listen and follow along with the handout. Copyright © 2013 FraudResourceNet LLC Disclaimers  The views expressed by the presenters do not necessarily represent the views, positions, or opinions of FraudResourceNet LLC (FRN) or the presenters’ respective organizations. These materials, and the oral presentation accompanying them, are for educational purposes only and do not constitute accounting or legal advice or create an accountant-client relationship. While FRN makes every effort to ensure information is accurate and complete, FRN makes no representations, guarantees, or warranties as to the accuracy or completeness of the information provided via this presentation. FRN specifically disclaims all liability for any claims or damages that may result from the information contained in this presentation, including any websites maintained by third parties and linked to the FRN website Any mention of commercial products is for information only; it does not imply recommendation or endorsement by FraudResourceNet LLC Copyright © 2013 FraudResourceNet LLC 5
  • 4. Today’s Agenda      Introduction Fraud Statistics Auditor’s Role in Fraud Detection Principles of Data Analytics Why Excel Getting Started (including 30 tests to try out)  Going Forward  Questions & Answers Copyright © 2013 FraudResourceNet LLC Fraud: The Big Picture According to major accounting firms, professional fraud examiners and law enforcement:  Fraud costs the world $3.5 TRILLION per year. (5%) (ACFE)  Business losses due to fraud increased 20% in last 12 months, from $1.4 million to $1.7 million per billion dollars of sales. (Kroll 2010/2011 Global Fraud Report)  75% of the companies surveyed experienced at least one incident of fraud in the last 12 months (KPMG)  Average cost for each incident of fraud is $160K (ACFE)  Skimming is 4th most common internal fraud; $60K per incident  Larceny is 5th most common internal fraud; $100K per incident  Approximately 60% of corporate fraud committed by insiders (PwC) Copyright © 2013 FraudResourceNet LLC
  • 5. The Auditor’s Role IPPF Standard 1210.A3  Internal auditors must have sufficient knowledge of…available technology based audit techniques to perform their assigned work Copyright © 2013 FraudResourceNet LLC IIA Guidance – GTAG 13 Internal auditors require appropriate skills and should use available technological tools to help them maintain a successful fraud management program that covers prevention, detection, and investigation. As such, all audit professionals — not just IT audit specialists — are expected to be increasingly proficient in areas such as data analysis and the use of technology to help them meet the demands of the job. Copyright © 2013 FraudResourceNet LLC
  • 6. Professional Guidance Copyright © 2013 FraudResourceNet LLC Principles of Data Analytics to Detect Fraud  Using set rules to identify transactions of higher risk  Every company is different, has a different environment, different systems, different risks, etc.  Need to use judgment to select testing  Need to use judgment to evaluate results  Just because a transaction matches a red flag doesn’t mean fraud is present  Using data analytics does not guarantee finding fraud or finding all fraud! Copyright © 2013 FraudResourceNet LLC
  • 7. Why Excel  You’ve already got it installed  You’re already using it on a daily basis  It’s easy to get started with the basics  There’s a huge amount you can do as your skills develop  Skills learned here can be carried forward Copyright © 2013 FraudResourceNet LLC Polling Question 1 Copyright © 2013 FraudResourceNet LLC
  • 8. Limitations of Excel     Requires manual formula entry Often many steps involved Restricted file sizes Not really designed for this type of work Copyright © 2013 FraudResourceNet LLC Key Excel Features  AutoFilters  Pivot Tables  IF Formulas  VLookUp Copyright © 2013 FraudResourceNet LLC
  • 9. Getting Started  Start with the easy stuff – no point trying to run before you can walk!  Have a well thought out plan  Invest time in getting the right data in the right format  Remember to save regularly  Just do it – what’s the worst that can happen? Copyright © 2013 FraudResourceNet LLC Polling Question 2 Copyright © 2013 FraudResourceNet LLC
  • 10. The Data Analytics Cycle Plan your testing Request Data Review Continual Learning Evaluate and Follow up Obtain and Clean Data Carry out testing Copyright © 2013 FraudResourceNet LLC Getting the data  Speak to IT departments not just process owners  Flat files (e.g. “.csv”) are best  Be specific– the more information you can provide the better Copyright © 2013 FraudResourceNet LLC
  • 11. Accounts Payable Testing           Duplicate Vendors Vendor – Employee Relationships Split transactions Transactions posted on unusual days/dates/times Invoice date before purchase order date Rounded transactions Potential Related Parties Reversing changes to standing data Benford’s Testing Summarize transactions by user Copyright © 2013 FraudResourceNet LLC Polling Question 3 Copyright © 2013 FraudResourceNet LLC
  • 12. PCards and TCards           Transactions at foreign merchants Split transactions Purchases on weekends/holidays Multiple cards per cardholder Inappropriate vendor transactions Top Cost Centers/Card Holders Monthly limit exceeded Duplicate Claims Transactions just below authorization limits Round Amounts Copyright © 2013 FraudResourceNet LLC Payroll Testing           Duplicate or “ghost” employees Duplicate payments Excessive payments Employees paid after termination Unauthorized overtime Leave never taken Non Consecutive leave Only person working overtime Still in work not claiming overtime Cancelled and re-issued checks Copyright © 2013 FraudResourceNet LLC
  • 13. Polling Question 4 Copyright © 2013 FraudResourceNet LLC Going Forward       Build up a regular “Test set” Don’t be afraid to experiment Share ideas Internally – resource library, regular meetings Externally – forums, webinars, LinkedIn Upgrade from Excel to dedicated CAATs software – many of your skills will be transferable Copyright © 2013 FraudResourceNet LLC
  • 14. TopCAATs  Suite of over 130 tools for Auditors and Accountants  Runs completely within Excel  Mixture of data analytics and Excel productivity tools  Allows wider variety of work/testing and greatly improves efficiency Copyright © 2013 FraudResourceNet LLC Polling Question 5 Copyright © 2013 FraudResourceNet LLC
  • 15. 10 Excel Resources for Auditors 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Auditing with Excel book – www.auditingwithexcel.com/auditnet Evaluating CAATs report – www.topcaats.com/auditnet TopCAATs – www.topcaats.com ActiveData for Excel http://www.mrexcel.com/auditors.shtml Using Excel as an Audit Software available eBook from AuditNet Using Excel to Detect Fraud (e-book). Excel for Auditors by Bill Jelen Fraud Detection with ActiveData For Excel Using Excel to Ferret Out Fraud Find Financial Fraud Using Benford’s Law Copyright © 2013 FraudResourceNet LLC Questions?  Any Questions? Don’t be Shy! Copyright © 2013 FraudResourceNet LLC
  • 16. AuditNet® Survey 2013 Fraud Detection Techniques Using Technology Please help us by taking the survey Scan the QR Code with your Mobile Device Or Visit https://www.surveymonkey.com/s/Z6XZ8DW Copyright © 2013 FraudResourceNet LLC Coming Soon…  “Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them”, May 29 “An Expert’s Advice on Establishing an Organization Wide Fraud Policy”, June 5 Copyright © 2013 FraudResourceNet LLC
  • 17. Thank You! Website: http://www.fraudresourcenet.com Jim Kaplan FraudResourceNet™ 800-385-1625 jkaplan@fraudresourcenet.com Peter Goldmann FraudResourceNet™ 800-440-2261 pgoldmann@fraudresourcenet.com Charlie Walker, ACA Reinvent Data Limited www.reinventdata.com Charlie.walker@reinventdata.com Copyright © 2013 FraudResourceNet LLC