SlideShare une entreprise Scribd logo
1  sur  67
EMPLOYEES AND FRAUD RISKS CNI’s Journey, Mistakes, and Lessons Learned Kenny Ong CNI Holdings Berhad
Contents: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
This was what happened… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intro and Background Different Business, Different Frauds
Intro: CNI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intro: CNI
Intro: CNI ,[object Object],Factory CNIE DC SP Leaders Customers
A. Risk Mitigation in CNI No Business, No Risks.
No Business, No Risks. ,[object Object],[object Object],[object Object],[object Object]
Fraud Risk Mitigation? (1/2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Fraud Risk Mitigation? (2/2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Def: “Likelihood” 5% likely to happen, hasn’t occurred within last 5 years 1. Very Low 20% likely to happen, has occurred within last 5 years 2. Low 50% likely to happen, has occurred within last 24 months 3. Medium 75% likely to happen, has occurred within last 12 months 4. High 99% likely to happen, has occurred within last 12 months 5. Very high Definition Likelihood
Def: “Impact” 0-4K 0-2K 0-5K 0-10K 1. Insignificant 5K-20K 3K-10K 6K-25K 11K-100K 2. Minor 21K-40K 11K-20K 26K-50K 101K-500K 3. Moderate 41K-60K 21K-30K 51K-100K 501K-1M 4. Serious >60K >30K >100K >1.0M 5. Very Serious Sub C Sub C Sub B Sub A Impact
CNI Risk Categories ,[object Object],[object Object],[object Object],[object Object],[object Object]
How CNI Implemented Risk Management ,[object Object],[object Object]
Examples of CNI Risks and Calculations ,[object Object]
Examples of Fraud Mitigation Actions: Fraud Risks
Where are the Fraud Risks? ,[object Object],Management Staff Frontline Suppliers/Vendors Retail Front
Industry Risks ,[object Object],[object Object],[object Object],[object Object],[object Object],These Fraud risks affect all Direct Selling organizations but cannot be controlled by us. Only in joint efforts by drafting & pushing new regulations
Real Fraud, Real Risks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
B. Reducing Fraud risk Probabilities Prevent. Deter. Kill.
Fraud Root Causes ,[object Object],[object Object],[object Object]
Risk Mitigation Strategies Culture Mitigation Identified Fraud Risks Structure Resources Leadership Person
Alignment: Framework ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Structure
*Power Balancing ,[object Object],[object Object],[object Object],[object Object],BOD Set 1 BOD Set 2 Approval/Verification
Alignment: Framework ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Resources
Strategy: Framework ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Leadership
Alignment: Framework ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Person
The Four Desperates 1. Desperate Competition 2. Desperate Consumer 3. Desperate Achievers 4. Desperate Changes
[object Object]
Possible General Root Causes for Fraud ,[object Object],[object Object],[object Object],[object Object]
GENERAL STRATEGIES AND POLICIES ,[object Object],[object Object],[object Object],[object Object]
GENERAL STRATEGIES AND POLICIES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GENERAL STRATEGIES AND POLICIES ,[object Object],[object Object],[object Object]
GENERAL STRATEGIES AND POLICIES ,[object Object],[object Object],[object Object],[object Object],[object Object]
SPECIFIC STRATEGIES AND POLICIES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SPECIFIC STRATEGIES AND POLICIES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SPECIFIC STRATEGIES AND POLICIES ,[object Object],[object Object],[object Object],[object Object]
*ICT Security and Fraud (1/3) ,[object Object],[object Object],[object Object],[object Object]
*ICT Security and Fraud (2/3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
*ICT Security and Fraud (3/3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ICT Security, Backup, and Continuity Strategies 2005-2008:
C. Decreasing the Impact We failed. Now what?
Why Impact? ,[object Object],[object Object],[object Object],[object Object]
Levels of Impact (Fraud) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
small Impact ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Real Fraud, Real Risks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Real Fraud, Real Risks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Investigation: Principles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Investigation: Process 5. Public Disclosure 6. CAR/PAR 4. Management Decision External  Legal 2. Investigating Office (I/O) External  P.I. 1. Case Tip Off 3. Internal Inquiry Independent Panel
BIG Impact ,[object Object],[object Object]
Crisis Management Plan Logistics & Info Systems Communications Process Owner: [dept. accountable] Policy and Planning After (profiting and learning) During (sound crisis management) Before (readiness for crisis) Crisis: Business Function
Crisis Communication Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
D. Tracking and Reporting
[object Object],[object Object],[object Object]
Tracking: Who? How? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
E. New Fraud Risks We need help.
New Fraud Opportunities: CNI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
eCommerce Frauds Account Takeover Pharming Counterfeit Advances Phishing Application Lost/Stolen  Credit Cards eCom  Frauds?
Latest Fraud topics: General ,[object Object],[object Object],[object Object],[object Object]
Fraud: Research Options? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Risk Management: Research Options? ,[object Object],[object Object],[object Object],[object Object],[object Object]
End Points
Dangers of Direct Incentives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mistakes and Lessons Learned ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
In the end… ,[object Object],[object Object],[object Object],[object Object]
Thank You. soft copy of slides:   www.totallyunrelatedrandomanddebatable.blogspot.com

Contenu connexe

Tendances

Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlSecureAuth
 
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...McKonly & Asbury, LLP
 
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeArianto Muditomo
 
Preventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the WorkplacePreventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the WorkplaceDecosimoCPAs
 
SSC Corporate Presentation
SSC Corporate PresentationSSC Corporate Presentation
SSC Corporate PresentationJim Craighead
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramFraudBusters
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingCase IQ
 
Financial crime anti-money laundering - bovill briefing
Financial crime   anti-money laundering - bovill briefingFinancial crime   anti-money laundering - bovill briefing
Financial crime anti-money laundering - bovill briefingBovill
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12Fuh George Cheo
 
Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud InvestigationSalih Islam
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and ReportingBrown Smith Wallace
 
Traditionally, the practice of risk management comprises acceptance, transfer...
Traditionally, the practice of risk management comprises acceptance, transfer...Traditionally, the practice of risk management comprises acceptance, transfer...
Traditionally, the practice of risk management comprises acceptance, transfer...Tommy Seah
 
Corporate Compliance & Disclosure 2015
Corporate Compliance & Disclosure 2015Corporate Compliance & Disclosure 2015
Corporate Compliance & Disclosure 2015Ruoh Yi Tham
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiEMAC Consulting Group
 
What You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From FraudWhat You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From Fraudsteinkamps6
 
Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsEMAC Consulting Group
 
Erm overview of auditing fraud and revenue assurance
Erm   overview of auditing fraud and revenue assuranceErm   overview of auditing fraud and revenue assurance
Erm overview of auditing fraud and revenue assurancewisnu wardhana, i nyoman
 
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governanceACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governanceBillyCheuk
 

Tendances (20)

Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
 
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
 
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good Practice
 
Preventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the WorkplacePreventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the Workplace
 
SSC Corporate Presentation
SSC Corporate PresentationSSC Corporate Presentation
SSC Corporate Presentation
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
 
Financial crime anti-money laundering - bovill briefing
Financial crime   anti-money laundering - bovill briefingFinancial crime   anti-money laundering - bovill briefing
Financial crime anti-money laundering - bovill briefing
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12
 
Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud Investigation
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
 
Traditionally, the practice of risk management comprises acceptance, transfer...
Traditionally, the practice of risk management comprises acceptance, transfer...Traditionally, the practice of risk management comprises acceptance, transfer...
Traditionally, the practice of risk management comprises acceptance, transfer...
 
Corporate Compliance & Disclosure 2015
Corporate Compliance & Disclosure 2015Corporate Compliance & Disclosure 2015
Corporate Compliance & Disclosure 2015
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part ii
 
What You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From FraudWhat You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From Fraud
 
Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
 
Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management Consultants
 
Erm overview of auditing fraud and revenue assurance
Erm   overview of auditing fraud and revenue assuranceErm   overview of auditing fraud and revenue assurance
Erm overview of auditing fraud and revenue assurance
 
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governanceACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
 

En vedette

How to do data-analytics on a shoestring
How to do data-analytics on a shoestringHow to do data-analytics on a shoestring
How to do data-analytics on a shoestringAbyrint
 
Ghost workers and employees: Who are they and how to deal with them
Ghost workers and employees: Who are they and how to deal with themGhost workers and employees: Who are they and how to deal with them
Ghost workers and employees: Who are they and how to deal with themAbyrint
 
Fraud Risk Consulting - Falcon Hawk, Gurgaon, India
Fraud Risk Consulting - Falcon Hawk, Gurgaon, IndiaFraud Risk Consulting - Falcon Hawk, Gurgaon, India
Fraud Risk Consulting - Falcon Hawk, Gurgaon, IndiaGaurav Sareen
 
Leveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Leveraging Technology Using Keyword Analytics in Fraud and Compliance MonitoringLeveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Leveraging Technology Using Keyword Analytics in Fraud and Compliance MonitoringJim Kaplan CIA CFE
 
The Wells Fargo Fraud and Brand Culture Disconnect
The Wells Fargo Fraud and Brand Culture Disconnect The Wells Fargo Fraud and Brand Culture Disconnect
The Wells Fargo Fraud and Brand Culture Disconnect yimikaa
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managersrickycfe
 
Forensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection toolForensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection toolHaládik Consulting, s.r.o.
 
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentBillyCheuk
 
Risk culture presentation
Risk culture presentationRisk culture presentation
Risk culture presentationBenjamin Kpodo
 
Risk Culture, Risk What?
Risk Culture, Risk What?Risk Culture, Risk What?
Risk Culture, Risk What?Ian Rich
 
Phx Fraud And Abuse Training Module
Phx Fraud And Abuse Training ModulePhx Fraud And Abuse Training Module
Phx Fraud And Abuse Training ModulePHXONLINE
 
Using benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditingUsing benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditingJim Kaplan CIA CFE
 
Fraud: Understanding Fraud and Our Responsibilities
Fraud:  Understanding Fraud and Our ResponsibilitiesFraud:  Understanding Fraud and Our Responsibilities
Fraud: Understanding Fraud and Our ResponsibilitiesJason Lundell
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationScott Mongeau
 

En vedette (18)

How to do data-analytics on a shoestring
How to do data-analytics on a shoestringHow to do data-analytics on a shoestring
How to do data-analytics on a shoestring
 
Ghost workers and employees: Who are they and how to deal with them
Ghost workers and employees: Who are they and how to deal with themGhost workers and employees: Who are they and how to deal with them
Ghost workers and employees: Who are they and how to deal with them
 
Fraud Risk Consulting - Falcon Hawk, Gurgaon, India
Fraud Risk Consulting - Falcon Hawk, Gurgaon, IndiaFraud Risk Consulting - Falcon Hawk, Gurgaon, India
Fraud Risk Consulting - Falcon Hawk, Gurgaon, India
 
Acfe jan 2017 cs ppt
Acfe jan 2017 cs pptAcfe jan 2017 cs ppt
Acfe jan 2017 cs ppt
 
Leveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Leveraging Technology Using Keyword Analytics in Fraud and Compliance MonitoringLeveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
Leveraging Technology Using Keyword Analytics in Fraud and Compliance Monitoring
 
The Wells Fargo Fraud and Brand Culture Disconnect
The Wells Fargo Fraud and Brand Culture Disconnect The Wells Fargo Fraud and Brand Culture Disconnect
The Wells Fargo Fraud and Brand Culture Disconnect
 
Tips for Recognizing Fraud
Tips for Recognizing FraudTips for Recognizing Fraud
Tips for Recognizing Fraud
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managers
 
Forensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection toolForensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection tool
 
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
 
Risk culture presentation
Risk culture presentationRisk culture presentation
Risk culture presentation
 
Risk Culture, Risk What?
Risk Culture, Risk What?Risk Culture, Risk What?
Risk Culture, Risk What?
 
Phx Fraud And Abuse Training Module
Phx Fraud And Abuse Training ModulePhx Fraud And Abuse Training Module
Phx Fraud And Abuse Training Module
 
Corporate & Anti-fraud Culture
Corporate & Anti-fraud CultureCorporate & Anti-fraud Culture
Corporate & Anti-fraud Culture
 
Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 
Using benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditingUsing benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditing
 
Fraud: Understanding Fraud and Our Responsibilities
Fraud:  Understanding Fraud and Our ResponsibilitiesFraud:  Understanding Fraud and Our Responsibilities
Fraud: Understanding Fraud and Our Responsibilities
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and Mitigation
 

Similaire à Employees And Fraud Risks - UiTM Masters in Accounting Special Lecture

Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...
Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...
Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...Kenny Ong
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Strategic Treasurer
 
Implementing Anti Money Laundering and Fraud Rules in Banking
Implementing Anti Money Laundering and Fraud Rules in BankingImplementing Anti Money Laundering and Fraud Rules in Banking
Implementing Anti Money Laundering and Fraud Rules in BankingTriVersa
 
Iaccm Risk Slides
Iaccm Risk SlidesIaccm Risk Slides
Iaccm Risk Slidesguest49199
 
Corruption Risks Update 2009
Corruption Risks Update 2009Corruption Risks Update 2009
Corruption Risks Update 2009Stephen_Horne
 
Financial Statement Fraud training by Tommy SEAH
Financial Statement Fraud training by Tommy SEAHFinancial Statement Fraud training by Tommy SEAH
Financial Statement Fraud training by Tommy SEAHTommy Seah
 
EFTRAC_Canada.pdf
EFTRAC_Canada.pdfEFTRAC_Canada.pdf
EFTRAC_Canada.pdfAnisunB
 
Improving and Implementing Internal Controls
Improving and Implementing Internal ControlsImproving and Implementing Internal Controls
Improving and Implementing Internal ControlsTommy Seah
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
 
Enterprise Fraud Risk Management
Enterprise Fraud Risk ManagementEnterprise Fraud Risk Management
Enterprise Fraud Risk ManagementTommy Seah
 
Enterprise FRM
Enterprise FRMEnterprise FRM
Enterprise FRMTommy Seah
 
Mind the Gaps: AML and Fraud Global Benchmark Survey
Mind the Gaps: AML and Fraud Global Benchmark Survey Mind the Gaps: AML and Fraud Global Benchmark Survey
Mind the Gaps: AML and Fraud Global Benchmark Survey Paul Hamilton
 
Ingenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM complianceIngenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM complianceSami Benafia
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudFraudBusters
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyAgus Wicaksono
 

Similaire à Employees And Fraud Risks - UiTM Masters in Accounting Special Lecture (20)

Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...
Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...
Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
 
Implementing Anti Money Laundering and Fraud Rules in Banking
Implementing Anti Money Laundering and Fraud Rules in BankingImplementing Anti Money Laundering and Fraud Rules in Banking
Implementing Anti Money Laundering and Fraud Rules in Banking
 
Iaccm Risk Slides
Iaccm Risk SlidesIaccm Risk Slides
Iaccm Risk Slides
 
Corruption Risks Update 2009
Corruption Risks Update 2009Corruption Risks Update 2009
Corruption Risks Update 2009
 
Kenya AMC Presentation 2
Kenya AMC Presentation 2Kenya AMC Presentation 2
Kenya AMC Presentation 2
 
Financial Statement Fraud training by Tommy SEAH
Financial Statement Fraud training by Tommy SEAHFinancial Statement Fraud training by Tommy SEAH
Financial Statement Fraud training by Tommy SEAH
 
EFTRAC_Canada.pdf
EFTRAC_Canada.pdfEFTRAC_Canada.pdf
EFTRAC_Canada.pdf
 
Improving and Implementing Internal Controls
Improving and Implementing Internal ControlsImproving and Implementing Internal Controls
Improving and Implementing Internal Controls
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
Enterprise Fraud Risk Management
Enterprise Fraud Risk ManagementEnterprise Fraud Risk Management
Enterprise Fraud Risk Management
 
Enterprise FRM
Enterprise FRMEnterprise FRM
Enterprise FRM
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Risk Assessment1.ppt
Risk Assessment1.pptRisk Assessment1.ppt
Risk Assessment1.ppt
 
Gestión de Riesgos y Control Interno en el Sector Público
Gestión de Riesgos y Control Interno en el Sector PúblicoGestión de Riesgos y Control Interno en el Sector Público
Gestión de Riesgos y Control Interno en el Sector Público
 
Mind the Gaps: AML and Fraud Global Benchmark Survey
Mind the Gaps: AML and Fraud Global Benchmark Survey Mind the Gaps: AML and Fraud Global Benchmark Survey
Mind the Gaps: AML and Fraud Global Benchmark Survey
 
Ingenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM complianceIngenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM compliance
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 

Plus de Kenny Ong

C-Suite Chemistry: Building a Powerful CEO-CFO Partnership to Navigate Today’...
C-Suite Chemistry: Building a Powerful CEO-CFO Partnership to Navigate Today’...C-Suite Chemistry: Building a Powerful CEO-CFO Partnership to Navigate Today’...
C-Suite Chemistry: Building a Powerful CEO-CFO Partnership to Navigate Today’...Kenny Ong
 
Storytelling and Brand Integrity
Storytelling and Brand IntegrityStorytelling and Brand Integrity
Storytelling and Brand IntegrityKenny Ong
 
Reversing the Great Resignation
Reversing the Great ResignationReversing the Great Resignation
Reversing the Great ResignationKenny Ong
 
Balancing Human and Digital Resources for HR Digital Transformation
Balancing Human and Digital Resources for HR Digital TransformationBalancing Human and Digital Resources for HR Digital Transformation
Balancing Human and Digital Resources for HR Digital TransformationKenny Ong
 
Sound of the Future
Sound of the FutureSound of the Future
Sound of the FutureKenny Ong
 
Maneuvering Through A Crowded Media Landscape
Maneuvering Through A Crowded Media LandscapeManeuvering Through A Crowded Media Landscape
Maneuvering Through A Crowded Media LandscapeKenny Ong
 
BACK TO ZERO - Understanding who our customers really are and what to do with...
BACK TO ZERO - Understanding who our customers really are and what to do with...BACK TO ZERO - Understanding who our customers really are and what to do with...
BACK TO ZERO - Understanding who our customers really are and what to do with...Kenny Ong
 
FUTURE WORKPLACE: Preparing and Planning for Tomorrow’s Employees Today
FUTURE WORKPLACE:  Preparing and Planning for Tomorrow’s Employees TodayFUTURE WORKPLACE:  Preparing and Planning for Tomorrow’s Employees Today
FUTURE WORKPLACE: Preparing and Planning for Tomorrow’s Employees TodayKenny Ong
 
Engaging you audience for a informed digital marketing campaign in the age of...
Engaging you audience for a informed digital marketing campaign in the age of...Engaging you audience for a informed digital marketing campaign in the age of...
Engaging you audience for a informed digital marketing campaign in the age of...Kenny Ong
 
Managing Your Professional Development
Managing Your Professional DevelopmentManaging Your Professional Development
Managing Your Professional DevelopmentKenny Ong
 
Digital Marketing - Getting Your Audience Involved
Digital Marketing  - Getting Your Audience InvolvedDigital Marketing  - Getting Your Audience Involved
Digital Marketing - Getting Your Audience InvolvedKenny Ong
 
(CLARIDEN) Managing Your Professional Development: Effective Strategies for C...
(CLARIDEN) Managing Your Professional Development: Effective Strategies for C...(CLARIDEN) Managing Your Professional Development: Effective Strategies for C...
(CLARIDEN) Managing Your Professional Development: Effective Strategies for C...Kenny Ong
 
(COMFORI) Climbing the Corporate Ladder: From Assistant to Strategic Business...
(COMFORI) Climbing the Corporate Ladder: From Assistant to Strategic Business...(COMFORI) Climbing the Corporate Ladder: From Assistant to Strategic Business...
(COMFORI) Climbing the Corporate Ladder: From Assistant to Strategic Business...Kenny Ong
 
(BridgeKnowle) Year End Checklist for HR - Companion WorkBook
(BridgeKnowle) Year End Checklist for HR - Companion WorkBook(BridgeKnowle) Year End Checklist for HR - Companion WorkBook
(BridgeKnowle) Year End Checklist for HR - Companion WorkBookKenny Ong
 
(BridgeKnowle) Year End Checklist for HR - Main Slides
(BridgeKnowle) Year End Checklist for HR - Main Slides(BridgeKnowle) Year End Checklist for HR - Main Slides
(BridgeKnowle) Year End Checklist for HR - Main SlidesKenny Ong
 
Change Leadership-Understanding the Role of Management in Achieving Business ...
Change Leadership-Understanding the Role of Management in Achieving Business ...Change Leadership-Understanding the Role of Management in Achieving Business ...
Change Leadership-Understanding the Role of Management in Achieving Business ...Kenny Ong
 
Sketching the mental framework and physical appearance of a fraudster
Sketching the mental framework and physical appearance of a fraudsterSketching the mental framework and physical appearance of a fraudster
Sketching the mental framework and physical appearance of a fraudsterKenny Ong
 
Bridge Knowle Workshop - Developing Effective KPIs (Companion Workbook)
Bridge Knowle Workshop - Developing Effective KPIs (Companion Workbook)Bridge Knowle Workshop - Developing Effective KPIs (Companion Workbook)
Bridge Knowle Workshop - Developing Effective KPIs (Companion Workbook)Kenny Ong
 
Bridge Knowle Workshop - Developing Effective KPIs (Main Slides)
Bridge Knowle Workshop - Developing Effective KPIs (Main Slides)Bridge Knowle Workshop - Developing Effective KPIs (Main Slides)
Bridge Knowle Workshop - Developing Effective KPIs (Main Slides)Kenny Ong
 
BridgeKnowle Conference - Managing Training & Development Workshop
BridgeKnowle Conference -  Managing Training & Development WorkshopBridgeKnowle Conference -  Managing Training & Development Workshop
BridgeKnowle Conference - Managing Training & Development WorkshopKenny Ong
 

Plus de Kenny Ong (20)

C-Suite Chemistry: Building a Powerful CEO-CFO Partnership to Navigate Today’...
C-Suite Chemistry: Building a Powerful CEO-CFO Partnership to Navigate Today’...C-Suite Chemistry: Building a Powerful CEO-CFO Partnership to Navigate Today’...
C-Suite Chemistry: Building a Powerful CEO-CFO Partnership to Navigate Today’...
 
Storytelling and Brand Integrity
Storytelling and Brand IntegrityStorytelling and Brand Integrity
Storytelling and Brand Integrity
 
Reversing the Great Resignation
Reversing the Great ResignationReversing the Great Resignation
Reversing the Great Resignation
 
Balancing Human and Digital Resources for HR Digital Transformation
Balancing Human and Digital Resources for HR Digital TransformationBalancing Human and Digital Resources for HR Digital Transformation
Balancing Human and Digital Resources for HR Digital Transformation
 
Sound of the Future
Sound of the FutureSound of the Future
Sound of the Future
 
Maneuvering Through A Crowded Media Landscape
Maneuvering Through A Crowded Media LandscapeManeuvering Through A Crowded Media Landscape
Maneuvering Through A Crowded Media Landscape
 
BACK TO ZERO - Understanding who our customers really are and what to do with...
BACK TO ZERO - Understanding who our customers really are and what to do with...BACK TO ZERO - Understanding who our customers really are and what to do with...
BACK TO ZERO - Understanding who our customers really are and what to do with...
 
FUTURE WORKPLACE: Preparing and Planning for Tomorrow’s Employees Today
FUTURE WORKPLACE:  Preparing and Planning for Tomorrow’s Employees TodayFUTURE WORKPLACE:  Preparing and Planning for Tomorrow’s Employees Today
FUTURE WORKPLACE: Preparing and Planning for Tomorrow’s Employees Today
 
Engaging you audience for a informed digital marketing campaign in the age of...
Engaging you audience for a informed digital marketing campaign in the age of...Engaging you audience for a informed digital marketing campaign in the age of...
Engaging you audience for a informed digital marketing campaign in the age of...
 
Managing Your Professional Development
Managing Your Professional DevelopmentManaging Your Professional Development
Managing Your Professional Development
 
Digital Marketing - Getting Your Audience Involved
Digital Marketing  - Getting Your Audience InvolvedDigital Marketing  - Getting Your Audience Involved
Digital Marketing - Getting Your Audience Involved
 
(CLARIDEN) Managing Your Professional Development: Effective Strategies for C...
(CLARIDEN) Managing Your Professional Development: Effective Strategies for C...(CLARIDEN) Managing Your Professional Development: Effective Strategies for C...
(CLARIDEN) Managing Your Professional Development: Effective Strategies for C...
 
(COMFORI) Climbing the Corporate Ladder: From Assistant to Strategic Business...
(COMFORI) Climbing the Corporate Ladder: From Assistant to Strategic Business...(COMFORI) Climbing the Corporate Ladder: From Assistant to Strategic Business...
(COMFORI) Climbing the Corporate Ladder: From Assistant to Strategic Business...
 
(BridgeKnowle) Year End Checklist for HR - Companion WorkBook
(BridgeKnowle) Year End Checklist for HR - Companion WorkBook(BridgeKnowle) Year End Checklist for HR - Companion WorkBook
(BridgeKnowle) Year End Checklist for HR - Companion WorkBook
 
(BridgeKnowle) Year End Checklist for HR - Main Slides
(BridgeKnowle) Year End Checklist for HR - Main Slides(BridgeKnowle) Year End Checklist for HR - Main Slides
(BridgeKnowle) Year End Checklist for HR - Main Slides
 
Change Leadership-Understanding the Role of Management in Achieving Business ...
Change Leadership-Understanding the Role of Management in Achieving Business ...Change Leadership-Understanding the Role of Management in Achieving Business ...
Change Leadership-Understanding the Role of Management in Achieving Business ...
 
Sketching the mental framework and physical appearance of a fraudster
Sketching the mental framework and physical appearance of a fraudsterSketching the mental framework and physical appearance of a fraudster
Sketching the mental framework and physical appearance of a fraudster
 
Bridge Knowle Workshop - Developing Effective KPIs (Companion Workbook)
Bridge Knowle Workshop - Developing Effective KPIs (Companion Workbook)Bridge Knowle Workshop - Developing Effective KPIs (Companion Workbook)
Bridge Knowle Workshop - Developing Effective KPIs (Companion Workbook)
 
Bridge Knowle Workshop - Developing Effective KPIs (Main Slides)
Bridge Knowle Workshop - Developing Effective KPIs (Main Slides)Bridge Knowle Workshop - Developing Effective KPIs (Main Slides)
Bridge Knowle Workshop - Developing Effective KPIs (Main Slides)
 
BridgeKnowle Conference - Managing Training & Development Workshop
BridgeKnowle Conference -  Managing Training & Development WorkshopBridgeKnowle Conference -  Managing Training & Development Workshop
BridgeKnowle Conference - Managing Training & Development Workshop
 

Dernier

Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...ShrutiBose4
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 

Dernier (20)

Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 

Employees And Fraud Risks - UiTM Masters in Accounting Special Lecture

  • 1. EMPLOYEES AND FRAUD RISKS CNI’s Journey, Mistakes, and Lessons Learned Kenny Ong CNI Holdings Berhad
  • 2.
  • 3.
  • 4. Intro and Background Different Business, Different Frauds
  • 5.
  • 7.
  • 8. A. Risk Mitigation in CNI No Business, No Risks.
  • 9.
  • 10.
  • 11.
  • 12. Def: “Likelihood” 5% likely to happen, hasn’t occurred within last 5 years 1. Very Low 20% likely to happen, has occurred within last 5 years 2. Low 50% likely to happen, has occurred within last 24 months 3. Medium 75% likely to happen, has occurred within last 12 months 4. High 99% likely to happen, has occurred within last 12 months 5. Very high Definition Likelihood
  • 13. Def: “Impact” 0-4K 0-2K 0-5K 0-10K 1. Insignificant 5K-20K 3K-10K 6K-25K 11K-100K 2. Minor 21K-40K 11K-20K 26K-50K 101K-500K 3. Moderate 41K-60K 21K-30K 51K-100K 501K-1M 4. Serious >60K >30K >100K >1.0M 5. Very Serious Sub C Sub C Sub B Sub A Impact
  • 14.
  • 15.
  • 16.
  • 17. Examples of Fraud Mitigation Actions: Fraud Risks
  • 18.
  • 19.
  • 20.
  • 21. B. Reducing Fraud risk Probabilities Prevent. Deter. Kill.
  • 22.
  • 23. Risk Mitigation Strategies Culture Mitigation Identified Fraud Risks Structure Resources Leadership Person
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. The Four Desperates 1. Desperate Competition 2. Desperate Consumer 3. Desperate Achievers 4. Desperate Changes
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. C. Decreasing the Impact We failed. Now what?
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49. Investigation: Process 5. Public Disclosure 6. CAR/PAR 4. Management Decision External Legal 2. Investigating Office (I/O) External P.I. 1. Case Tip Off 3. Internal Inquiry Independent Panel
  • 50.
  • 51. Crisis Management Plan Logistics & Info Systems Communications Process Owner: [dept. accountable] Policy and Planning After (profiting and learning) During (sound crisis management) Before (readiness for crisis) Crisis: Business Function
  • 52.
  • 53.
  • 54. D. Tracking and Reporting
  • 55.
  • 56.
  • 57. E. New Fraud Risks We need help.
  • 58.
  • 59. eCommerce Frauds Account Takeover Pharming Counterfeit Advances Phishing Application Lost/Stolen Credit Cards eCom Frauds?
  • 60.
  • 61.
  • 62.
  • 64.
  • 65.
  • 66.
  • 67. Thank You. soft copy of slides: www.totallyunrelatedrandomanddebatable.blogspot.com