SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
Embedding Fraud Risk
   Management
Frauds occur due to…


                         Incentive or
                       Pressure (68%)




                                ?
                                      Attitude or
              Opportunity
                                    Rationalization
                (18%)
                                        (14%)




                            2
… and can encompass any industry…
                                  • Misappropriation of cash by fudging accounts or opening fictitious a/c
        Banking Frauds            • Withdrawal from deposit accounts through forged documents.


                                  • Trading on incorrect positions or outstanding unmatched trades
        Trading Frauds            • Errors in Booking and settlement of trades


                                  • Account payable and Account receivable frauds
       Financial Frauds           • Easy access to blank checks, facsimile, and manual check preparation


                                  • Unaccounted purchase order numbers or physical loss of purchase orders
Sourcing & Procurement Frauds     • Vendor collusion with employees


                                  • Access to card numbers esp. in customer service or for processing
      Credit Card Frauds          • Online misuse/Phishing


                                  • Excessive inventory write-offs without documentation or approvals.
Inventory and Production Frauds   • Consistent production overruns beyond sales demand and backlog orders




                                            3
…resulting in reputational and financial
disruption




        Source: Fraud Intelligence Report-2nd Quarter -2011 published by Mark Monitor

                                        4
How do we mitigate fraud?




                     5
Embed “fraud” in the risk framework…
                                                                              •    Business Model
              Strategic                      Business
                                                                              •    Technology Obsolescence
                                              Change                          •    Change Management
                                                                               •
                                                 Market/                       •   Geo-Political
                                                  Credit                       •   Reputation
       Industry                                                                •   Product development
                                                           Counterparty
                                 Country Risks                                 •   Pricing
                                 Data Protection,           Business                 • Information & Physical Security
                                     privacy                Continuity
                                                                                     • Registrations & Taxations
   Enterprise                         and IP
                                              Engagement                             • Legal & Contractual
                                                                       Regulatory
                          Security             Compliance
                                                                       Compliance    • Customer needs & Concentration
                          External
                           Fraud
                                                Physical &             Execution                 • Infrastructure
                                             Environmental            Management
                                                                                                 • Leadership & Culture
Operational                        Employment
                                                  Risks
                                                                                                 • Operation Efficiency
               Internal               & Work                Business              Business
                Fraud              place Safety           Interruptions           Practices      • Knowledge capital




                                                       6
…create deterrence…
                                IDENTIFICATION

                                       Fraud
              Vendors/                Detection               Govt.
              Partners




                                                                           MITIGATION
   REVIEW




                                        Fraud
                                      Deterrence


                           Fraud                    Fraud
                         Prevention                Response
            Customers                                          Employees



                                  CONTROL


                                      7
... and have structured governance using
Culture & Policies     Structure & Process             Systems &                 Legislation
                                                       Capabilities



Enterprise Standards   Control Definition across       Internal Audit Team       Cyber protection
Operational Policies   functions                       Internal and external     IT act
Disciplinary Policy    Control Self Assessment         Vulnerability Testing     Data protection laws and
                       & 3rd party review of           Disciplinary Process      governance
Awareness Programs &   Controls
Training Modules                                       Analytics and Forensics
                       Incident Handling
Whistle blower                                         Domain & subject matter
                       Scenario planning &             expertise
Code of Conduct        Testing
                                                       Trigger and red flags
                       Internal Audit



                                                   8
Infosys approach to manage fraud
 Process Map of Risks for all businesses
 Failure analysis across functions
                                                  1
  Set Triggers           Key Risk Indicator
                                                      Likely Changes
                                                                              Loss
                         Approach                                             Estimation and
                                                                              Benchmarks
                         Consequence
  Severity           3
                         Mode Analysis
                                                      Level of Severity   4


  Control                Log review &               Control Levels and        Cost of control
  definition             Failure Analysis         2 review                    considerations

 Incident Inventory from past experience
 Process Level Risk Assessment and Mitigation

                                              9
Fraud management – Maturity Model
                                                            Monitor

                                        Check
                                                                            Continuous
                                                                            Monitoring and
                                                                            Auditing
                                                      Using Software's
                       Act                            that trigger alerts
                                                                            techniques for -
                                                                            High value
                                                      and creates reports   transactions
                                    Establishing pre for financial
                                    defined values or processes
                                    attributes (Red
                                    Flags)
Identify & Plan
                  Creation of Fraud Management
                  Checklist for the process and
                  identifying the fraud prone areas
                  and implementing appropriate
                  controls


                                                 10
To Summarize…

• Embed the culture of “risk” within the organization
• Enable the organization to own “risk”
• Have a Risk Reporting mechanism where all employees can report
  risks they see
• Have an Incident Handling system that focuses on root cause
  analysis rather than closure
• Have systems and analytics in place to monitor triggers and “red
  flags”



                               11
THANK YOU
                                      www.infosysbpo.com
The contents of this document are proprietary and confidential to Infosys Limited and may not be disclosed in
     whole or in part at any time, to any third party without the prior written consent of Infosys Limited.
© 2012 Infosys Limited. All rights reserved. Copyright in the whole and any part of this document belongs to
 Infosys Limited. This work may not be used, sold, transferred, adapted, abridged, copied or reproduced in
whole or in part, in any manner or form, or in any media, without the prior written consent of Infosys Limited.

Contenu connexe

Tendances

ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentBillyCheuk
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Tahir Abbas
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and ReportingBrown Smith Wallace
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryDecosimoCPAs
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12Fuh George Cheo
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramFraudBusters
 
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill AcuffFraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill AcuffDecosimoCPAs
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and ControlWeaverCPAs
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managersrickycfe
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingCase IQ
 
Q1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementQ1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementRon Steinkamp
 
Preventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the WorkplacePreventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the WorkplaceDecosimoCPAs
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud PreventionBlackbaud
 
McKonly & Asbury Webinar - Skimming: What the Auditor's Miss
McKonly & Asbury Webinar - Skimming: What the Auditor's MissMcKonly & Asbury Webinar - Skimming: What the Auditor's Miss
McKonly & Asbury Webinar - Skimming: What the Auditor's MissMcKonly & Asbury, LLP
 

Tendances (20)

Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
 
Fraud And Internal Controls Linked In April 2011
Fraud And Internal Controls   Linked In April 2011Fraud And Internal Controls   Linked In April 2011
Fraud And Internal Controls Linked In April 2011
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2,
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
 
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill AcuffFraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managers
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
 
Red flags fraud
Red flags fraudRed flags fraud
Red flags fraud
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
 
Q1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementQ1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk Management
 
Preventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the WorkplacePreventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the Workplace
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
 
Fraud triangle
Fraud triangleFraud triangle
Fraud triangle
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
 
McKonly & Asbury Webinar - Skimming: What the Auditor's Miss
McKonly & Asbury Webinar - Skimming: What the Auditor's MissMcKonly & Asbury Webinar - Skimming: What the Auditor's Miss
McKonly & Asbury Webinar - Skimming: What the Auditor's Miss
 

En vedette

Fraud Risk management
Fraud Risk managementFraud Risk management
Fraud Risk managementTommy Seah
 
Fraud Risk Management - Road Show in KL, Malaysia
Fraud Risk Management - Road Show in KL, MalaysiaFraud Risk Management - Road Show in KL, Malaysia
Fraud Risk Management - Road Show in KL, MalaysiaTommy Seah
 
FRAUD RISK MANAGEMENT
FRAUD RISK MANAGEMENTFRAUD RISK MANAGEMENT
FRAUD RISK MANAGEMENTTommy Seah
 
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Craig Taggart MBA
 
Fraud risk management lahore oct 15
Fraud risk management lahore oct 15Fraud risk management lahore oct 15
Fraud risk management lahore oct 15Tahir Abbas
 
Corruption and Fraud Risk Management using ISO 31000
Corruption and Fraud Risk Management using ISO 31000Corruption and Fraud Risk Management using ISO 31000
Corruption and Fraud Risk Management using ISO 31000PECB
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationScott Mongeau
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector Venktesh Venke
 
Fraud risk management and compliance
Fraud risk management and complianceFraud risk management and compliance
Fraud risk management and complianceYves LaMarre
 
Revenue assurance 101
Revenue assurance 101Revenue assurance 101
Revenue assurance 101ntel
 

En vedette (13)

Fraud Risk management
Fraud Risk managementFraud Risk management
Fraud Risk management
 
Fraud Risk Management - Road Show in KL, Malaysia
Fraud Risk Management - Road Show in KL, MalaysiaFraud Risk Management - Road Show in KL, Malaysia
Fraud Risk Management - Road Show in KL, Malaysia
 
FRAUD RISK MANAGEMENT
FRAUD RISK MANAGEMENTFRAUD RISK MANAGEMENT
FRAUD RISK MANAGEMENT
 
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
 
Fraud risk management lahore oct 15
Fraud risk management lahore oct 15Fraud risk management lahore oct 15
Fraud risk management lahore oct 15
 
Corruption and Fraud Risk Management using ISO 31000
Corruption and Fraud Risk Management using ISO 31000Corruption and Fraud Risk Management using ISO 31000
Corruption and Fraud Risk Management using ISO 31000
 
CIA degree
CIA degreeCIA degree
CIA degree
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and Mitigation
 
Fraud Management Solutions
Fraud Management SolutionsFraud Management Solutions
Fraud Management Solutions
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector
 
Fraud risk management and compliance
Fraud risk management and complianceFraud risk management and compliance
Fraud risk management and compliance
 
Revenue assurance 101
Revenue assurance 101Revenue assurance 101
Revenue assurance 101
 

Similaire à Addressing Fraud Risk Management with Facts

DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFLABS SRL
 
A brief overview of operational risk
A brief overview of operational riskA brief overview of operational risk
A brief overview of operational riskDiane Christina
 
Global Networking and Offshoring HCL - Operations strategy
Global Networking and Offshoring HCL - Operations strategyGlobal Networking and Offshoring HCL - Operations strategy
Global Networking and Offshoring HCL - Operations strategyAnkur Verma
 
Riskpro Introduction
Riskpro IntroductionRiskpro Introduction
Riskpro IntroductionManoj Jain
 
Guiding Principles for Mobile Payment Readiness
Guiding Principles for Mobile Payment ReadinessGuiding Principles for Mobile Payment Readiness
Guiding Principles for Mobile Payment ReadinessPerficient, Inc.
 
Enabling Embedded Business Continuity
Enabling Embedded Business ContinuityEnabling Embedded Business Continuity
Enabling Embedded Business ContinuityMustafa KILIC
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due DiligenceResilient Systems
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksResilient Systems
 

Similaire à Addressing Fraud Risk Management with Facts (20)

Bpo risk management
Bpo risk managementBpo risk management
Bpo risk management
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013
 
Riskpro legal and compliance audits 2013
Riskpro legal and compliance audits 2013Riskpro legal and compliance audits 2013
Riskpro legal and compliance audits 2013
 
BRIDGEi2i Risk Management Solutions
BRIDGEi2i Risk Management SolutionsBRIDGEi2i Risk Management Solutions
BRIDGEi2i Risk Management Solutions
 
Insurance fraud risk management service
Insurance fraud risk management serviceInsurance fraud risk management service
Insurance fraud risk management service
 
Riskpro construction industry
Riskpro construction industryRiskpro construction industry
Riskpro construction industry
 
Bpo Risk Management
Bpo Risk ManagementBpo Risk Management
Bpo Risk Management
 
A brief overview of operational risk
A brief overview of operational riskA brief overview of operational risk
A brief overview of operational risk
 
Global Networking and Offshoring HCL - Operations strategy
Global Networking and Offshoring HCL - Operations strategyGlobal Networking and Offshoring HCL - Operations strategy
Global Networking and Offshoring HCL - Operations strategy
 
Riskpro Introduction
Riskpro IntroductionRiskpro Introduction
Riskpro Introduction
 
Guiding Principles for Mobile Payment Readiness
Guiding Principles for Mobile Payment ReadinessGuiding Principles for Mobile Payment Readiness
Guiding Principles for Mobile Payment Readiness
 
Enabling Embedded Business Continuity
Enabling Embedded Business ContinuityEnabling Embedded Business Continuity
Enabling Embedded Business Continuity
 
Riskpro brief introduction
Riskpro brief introductionRiskpro brief introduction
Riskpro brief introduction
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
 
Riskpro capital markets industry 2013
Riskpro capital markets industry 2013Riskpro capital markets industry 2013
Riskpro capital markets industry 2013
 
Riskpro Capital Markets Industry
Riskpro Capital Markets IndustryRiskpro Capital Markets Industry
Riskpro Capital Markets Industry
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber Attacks
 
Corporate Culture Index Market Overview 2.0
Corporate Culture Index Market Overview 2.0Corporate Culture Index Market Overview 2.0
Corporate Culture Index Market Overview 2.0
 
Bpo risk management 2013
Bpo risk management 2013Bpo risk management 2013
Bpo risk management 2013
 
Bpo risk management 2013
Bpo risk management 2013Bpo risk management 2013
Bpo risk management 2013
 

Plus de Infosys BPM

From fragile to agile
From fragile to agileFrom fragile to agile
From fragile to agileInfosys BPM
 
Analytics promises, pitfalls and the path forward
Analytics promises, pitfalls and the path forwardAnalytics promises, pitfalls and the path forward
Analytics promises, pitfalls and the path forwardInfosys BPM
 
BPO Future Forward: 8 Traits of a Transformational Thinker
BPO Future Forward: 8 Traits of a Transformational ThinkerBPO Future Forward: 8 Traits of a Transformational Thinker
BPO Future Forward: 8 Traits of a Transformational ThinkerInfosys BPM
 
BPO Future Forward: 6 Benefits of the Infosys BPO Approach to F&A Benchmarking
BPO Future Forward: 6 Benefits of the Infosys BPO Approach to F&A BenchmarkingBPO Future Forward: 6 Benefits of the Infosys BPO Approach to F&A Benchmarking
BPO Future Forward: 6 Benefits of the Infosys BPO Approach to F&A BenchmarkingInfosys BPM
 
BPO Future Forward - 6 Benefits of the Process Progression Model (PPM) Approa...
BPO Future Forward - 6 Benefits of the Process Progression Model (PPM) Approa...BPO Future Forward - 6 Benefits of the Process Progression Model (PPM) Approa...
BPO Future Forward - 6 Benefits of the Process Progression Model (PPM) Approa...Infosys BPM
 
BPO Future Forward – 6 Benefits of the PPM Approach to Transformation
BPO Future Forward – 6 Benefits of the PPM Approach to TransformationBPO Future Forward – 6 Benefits of the PPM Approach to Transformation
BPO Future Forward – 6 Benefits of the PPM Approach to TransformationInfosys BPM
 
Process Progression Model – A holistic transformation framework by Infosys BPO
Process Progression Model – A holistic transformation framework by Infosys BPOProcess Progression Model – A holistic transformation framework by Infosys BPO
Process Progression Model – A holistic transformation framework by Infosys BPOInfosys BPM
 
Capitalizing on Change - Unleashing the Power of Buyer-Provider Collaboration...
Capitalizing on Change - Unleashing the Power of Buyer-Provider Collaboration...Capitalizing on Change - Unleashing the Power of Buyer-Provider Collaboration...
Capitalizing on Change - Unleashing the Power of Buyer-Provider Collaboration...Infosys BPM
 
Finding the Right Business model
Finding the Right Business modelFinding the Right Business model
Finding the Right Business modelInfosys BPM
 
Idea - A simple framework for complex alliances, an idea by IT
Idea - A simple framework for complex alliances, an idea by ITIdea - A simple framework for complex alliances, an idea by IT
Idea - A simple framework for complex alliances, an idea by ITInfosys BPM
 
Delivering Transformation by creating the right Internal Utilities
Delivering Transformation by creating the right Internal UtilitiesDelivering Transformation by creating the right Internal Utilities
Delivering Transformation by creating the right Internal UtilitiesInfosys BPM
 
Customer Satisfaction. Checkmate.
Customer Satisfaction. Checkmate.Customer Satisfaction. Checkmate.
Customer Satisfaction. Checkmate.Infosys BPM
 
The Next Generation HR Outsourcing
The Next Generation HR OutsourcingThe Next Generation HR Outsourcing
The Next Generation HR OutsourcingInfosys BPM
 
Best practices-conference 2010
Best practices-conference 2010Best practices-conference 2010
Best practices-conference 2010Infosys BPM
 
Value based BPO in a Resurgent Economy
Value based BPO in a Resurgent EconomyValue based BPO in a Resurgent Economy
Value based BPO in a Resurgent EconomyInfosys BPM
 
Leading in the converged future becoming an agile telco
Leading in the converged future becoming an agile telcoLeading in the converged future becoming an agile telco
Leading in the converged future becoming an agile telcoInfosys BPM
 
Digitization environment
Digitization environmentDigitization environment
Digitization environmentInfosys BPM
 
Redrafting business models tomorrow's enterprise in action
Redrafting business models   tomorrow's enterprise in actionRedrafting business models   tomorrow's enterprise in action
Redrafting business models tomorrow's enterprise in actionInfosys BPM
 
Technology the "New Normal" enabling business
Technology the "New Normal" enabling businessTechnology the "New Normal" enabling business
Technology the "New Normal" enabling businessInfosys BPM
 

Plus de Infosys BPM (19)

From fragile to agile
From fragile to agileFrom fragile to agile
From fragile to agile
 
Analytics promises, pitfalls and the path forward
Analytics promises, pitfalls and the path forwardAnalytics promises, pitfalls and the path forward
Analytics promises, pitfalls and the path forward
 
BPO Future Forward: 8 Traits of a Transformational Thinker
BPO Future Forward: 8 Traits of a Transformational ThinkerBPO Future Forward: 8 Traits of a Transformational Thinker
BPO Future Forward: 8 Traits of a Transformational Thinker
 
BPO Future Forward: 6 Benefits of the Infosys BPO Approach to F&A Benchmarking
BPO Future Forward: 6 Benefits of the Infosys BPO Approach to F&A BenchmarkingBPO Future Forward: 6 Benefits of the Infosys BPO Approach to F&A Benchmarking
BPO Future Forward: 6 Benefits of the Infosys BPO Approach to F&A Benchmarking
 
BPO Future Forward - 6 Benefits of the Process Progression Model (PPM) Approa...
BPO Future Forward - 6 Benefits of the Process Progression Model (PPM) Approa...BPO Future Forward - 6 Benefits of the Process Progression Model (PPM) Approa...
BPO Future Forward - 6 Benefits of the Process Progression Model (PPM) Approa...
 
BPO Future Forward – 6 Benefits of the PPM Approach to Transformation
BPO Future Forward – 6 Benefits of the PPM Approach to TransformationBPO Future Forward – 6 Benefits of the PPM Approach to Transformation
BPO Future Forward – 6 Benefits of the PPM Approach to Transformation
 
Process Progression Model – A holistic transformation framework by Infosys BPO
Process Progression Model – A holistic transformation framework by Infosys BPOProcess Progression Model – A holistic transformation framework by Infosys BPO
Process Progression Model – A holistic transformation framework by Infosys BPO
 
Capitalizing on Change - Unleashing the Power of Buyer-Provider Collaboration...
Capitalizing on Change - Unleashing the Power of Buyer-Provider Collaboration...Capitalizing on Change - Unleashing the Power of Buyer-Provider Collaboration...
Capitalizing on Change - Unleashing the Power of Buyer-Provider Collaboration...
 
Finding the Right Business model
Finding the Right Business modelFinding the Right Business model
Finding the Right Business model
 
Idea - A simple framework for complex alliances, an idea by IT
Idea - A simple framework for complex alliances, an idea by ITIdea - A simple framework for complex alliances, an idea by IT
Idea - A simple framework for complex alliances, an idea by IT
 
Delivering Transformation by creating the right Internal Utilities
Delivering Transformation by creating the right Internal UtilitiesDelivering Transformation by creating the right Internal Utilities
Delivering Transformation by creating the right Internal Utilities
 
Customer Satisfaction. Checkmate.
Customer Satisfaction. Checkmate.Customer Satisfaction. Checkmate.
Customer Satisfaction. Checkmate.
 
The Next Generation HR Outsourcing
The Next Generation HR OutsourcingThe Next Generation HR Outsourcing
The Next Generation HR Outsourcing
 
Best practices-conference 2010
Best practices-conference 2010Best practices-conference 2010
Best practices-conference 2010
 
Value based BPO in a Resurgent Economy
Value based BPO in a Resurgent EconomyValue based BPO in a Resurgent Economy
Value based BPO in a Resurgent Economy
 
Leading in the converged future becoming an agile telco
Leading in the converged future becoming an agile telcoLeading in the converged future becoming an agile telco
Leading in the converged future becoming an agile telco
 
Digitization environment
Digitization environmentDigitization environment
Digitization environment
 
Redrafting business models tomorrow's enterprise in action
Redrafting business models   tomorrow's enterprise in actionRedrafting business models   tomorrow's enterprise in action
Redrafting business models tomorrow's enterprise in action
 
Technology the "New Normal" enabling business
Technology the "New Normal" enabling businessTechnology the "New Normal" enabling business
Technology the "New Normal" enabling business
 

Dernier

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Dernier (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Addressing Fraud Risk Management with Facts

  • 1. Embedding Fraud Risk Management
  • 2. Frauds occur due to… Incentive or Pressure (68%) ? Attitude or Opportunity Rationalization (18%) (14%) 2
  • 3. … and can encompass any industry… • Misappropriation of cash by fudging accounts or opening fictitious a/c Banking Frauds • Withdrawal from deposit accounts through forged documents. • Trading on incorrect positions or outstanding unmatched trades Trading Frauds • Errors in Booking and settlement of trades • Account payable and Account receivable frauds Financial Frauds • Easy access to blank checks, facsimile, and manual check preparation • Unaccounted purchase order numbers or physical loss of purchase orders Sourcing & Procurement Frauds • Vendor collusion with employees • Access to card numbers esp. in customer service or for processing Credit Card Frauds • Online misuse/Phishing • Excessive inventory write-offs without documentation or approvals. Inventory and Production Frauds • Consistent production overruns beyond sales demand and backlog orders 3
  • 4. …resulting in reputational and financial disruption Source: Fraud Intelligence Report-2nd Quarter -2011 published by Mark Monitor 4
  • 5. How do we mitigate fraud? 5
  • 6. Embed “fraud” in the risk framework… • Business Model Strategic Business • Technology Obsolescence Change • Change Management • Market/ • Geo-Political Credit • Reputation Industry • Product development Counterparty Country Risks • Pricing Data Protection, Business • Information & Physical Security privacy Continuity • Registrations & Taxations Enterprise and IP Engagement • Legal & Contractual Regulatory Security Compliance Compliance • Customer needs & Concentration External Fraud Physical & Execution • Infrastructure Environmental Management • Leadership & Culture Operational Employment Risks • Operation Efficiency Internal & Work Business Business Fraud place Safety Interruptions Practices • Knowledge capital 6
  • 7. …create deterrence… IDENTIFICATION Fraud Vendors/ Detection Govt. Partners MITIGATION REVIEW Fraud Deterrence Fraud Fraud Prevention Response Customers Employees CONTROL 7
  • 8. ... and have structured governance using Culture & Policies Structure & Process Systems & Legislation Capabilities Enterprise Standards Control Definition across Internal Audit Team Cyber protection Operational Policies functions Internal and external IT act Disciplinary Policy Control Self Assessment Vulnerability Testing Data protection laws and & 3rd party review of Disciplinary Process governance Awareness Programs & Controls Training Modules Analytics and Forensics Incident Handling Whistle blower Domain & subject matter Scenario planning & expertise Code of Conduct Testing Trigger and red flags Internal Audit 8
  • 9. Infosys approach to manage fraud Process Map of Risks for all businesses Failure analysis across functions 1 Set Triggers Key Risk Indicator Likely Changes Loss Approach Estimation and Benchmarks Consequence Severity 3 Mode Analysis Level of Severity 4 Control Log review & Control Levels and Cost of control definition Failure Analysis 2 review considerations Incident Inventory from past experience Process Level Risk Assessment and Mitigation 9
  • 10. Fraud management – Maturity Model Monitor Check Continuous Monitoring and Auditing Using Software's Act that trigger alerts techniques for - High value and creates reports transactions Establishing pre for financial defined values or processes attributes (Red Flags) Identify & Plan Creation of Fraud Management Checklist for the process and identifying the fraud prone areas and implementing appropriate controls 10
  • 11. To Summarize… • Embed the culture of “risk” within the organization • Enable the organization to own “risk” • Have a Risk Reporting mechanism where all employees can report risks they see • Have an Incident Handling system that focuses on root cause analysis rather than closure • Have systems and analytics in place to monitor triggers and “red flags” 11
  • 12. THANK YOU www.infosysbpo.com The contents of this document are proprietary and confidential to Infosys Limited and may not be disclosed in whole or in part at any time, to any third party without the prior written consent of Infosys Limited. © 2012 Infosys Limited. All rights reserved. Copyright in the whole and any part of this document belongs to Infosys Limited. This work may not be used, sold, transferred, adapted, abridged, copied or reproduced in whole or in part, in any manner or form, or in any media, without the prior written consent of Infosys Limited.