SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
SCOUTING FOR FRAUD 
SCOUTING FOR FRAUD
  IN YOUR BUSINESS
  IN YOUR BUSINESS


     Seminar on Fraud as a Strategic Risk
                                 g
 “What CFOs and CEOs don’t notice, but should”
               Parag Deodhar
               Parag Deodhar
         BANGALORE – 27 July 2012
FRAUD RISK
                    FRAUD RISK
       • Fraud is now so common that its occurrence is
         Fraud is now so common that its occurrence is 
         no longer remarkable, only its scale.
       • If f d
         If fraud were a disease, almost all companies 
                         di        l   t ll        i
         would have a slight temperature…
       • What’s @ Risk?
               – The typical organization loses an estimated 5% of 
                       yp      g
                 its annual revenues to fraud
               – Regulatory sanctions
                    g      y
               – Reputation / Brand image
               – Company closure!
                 Company closure!

27 July 2012                        Parag Deodhar                     2
TYPES OF OCCUPATIONAL FRAUD
               TYPES OF OCCUPATIONAL FRAUD
                                        SOURCE: ACFE 2012 GLOBAL FRAUD STUDY




        87%             33%                          8%




27 July 2012            Parag Deodhar                                     3
ASSET MISAPPROPRIATION SCHEMES
                            ASSET MISAPPROPRIATION SCHEMES
   Category              Description                                                      Examples
   SCHEMES INVOLVING THEFT OF CASH RECEIPTS
   Skimming              Cash is stolen from an organization before it is recorded on     Employee accepts payment from a customer but does not
                         the organization’s books and records                             record the sale and instead pockets the money

   Cash Larceny          Cash is stolen from an organization after it has been            Employee steals cash and checks from daily receipts before
                         recorded on the organization’s books and records                 they can be deposited in the bank

   SCHEMES INVOLVING FRAUDULENT DISBURSEMENTS OF CASH
   Billing               Person causes his or her employer to issue a payment by          Employee creates a shell company and bills employer for
                         submitting invoices for fictitious goods or services, inflated   services not actually rendered
                         invoices or invoices for personal purchases                      Employee purchases personal items and submits an invoice to
                                                                                          employer for payment
   Expense               An employee makes a claim for reimbursement of fictitious        Employee files fraudulent expense report, claiming personal
   Reimbursements        or inflated business expenses                                    travel, nonexistent meals, etc.

   Check Tampering       A person steals his or her employer’s funds by intercepting,     Employee steals blank company checks and makes them out to
                         forging or altering a check drawn on one of the
                            g g            g                                              himself or an accomplice
                                                                                                               p
                         organization’s bank accounts                                     Employee steals an outgoing check to a vendor and deposits it
                                                                                          into his or her own bank account
   Payroll               An employee causes his or her employer to issue a                Employee claims overtime for hours not worked
                         payment by making false claims for compensation                  Employee adds ghost employees to the payroll

   Cash Register
   C hR i t              An
                         A employee makes f l entries on a cash register t
                                l         k false t i           h  i t to                 Employee f d l tl voids a sale on hi or h cash register
                                                                                          E l        fraudulently id  l     his her    h    i t
   Disbursements         conceal the fraudulent removal of cash                           and steals the cash

   OTHER ASSET MISAPPROPRIATION SCHEMES
   Misappropriation of   The perpetrator misappropriates cash kept on hand at the         Employee steals cash from a company vault
   Cash on Hand          victim organization’s premises
                                organization s

   Non-Cash              An employee steals or misuses non-cash assets of the             Employee steals inventory from a warehouse or storeroom
   Misappropriations     victim organization                                              Employee steals or misuses confidential customer financial
                                                                                          information
27 July 2012                                                            Parag Deodhar                                                                     4
PROFILE OF A FRAUDSTER
               PROFILE OF A FRAUDSTER
                                        SOURCE: ACFE 2012 GLOBAL FRAUD STUDY




27 July 2012            Parag Deodhar                                     5
HOW ARE FRAUDS DETECTED…
               HOW ARE FRAUDS DETECTED…
                                       SOURCE: ACFE 2012 GLOBAL FRAUD STUDY




27 July 2012           Parag Deodhar                                     6
DETECTION METHODS
               DETECTION METHODS
                                       SOURCE: ACFE 2012 GLOBAL FRAUD STUDY




27 July 2012           Parag Deodhar                                     7
PROACTIVE MEASURES
               PROACTIVE MEASURES




27 July 2012           Parag Deodhar   8
WHISTLE‐BLOWER MECHANISM
                WHISTLE BLOWER MECHANISM
                 KEY ELEMENTS FOR SUCCESS

         Who
                      Who decides
                      Wh d id
      receives the
                      the actions?                High 
      complaints?                              Availability    Anonymous 
                                                    &           & Secure
                                               Accessibility
         Who           Who takes
     investigates?
     i    ti t ?        actions?
                          ti   ?
                                                               Independent 
                                               Credible & 
                                                                     & 
                                                Impartial
                                                                transparent
               Who reports?


27 July 2012                   Parag Deodhar                                  9
RED FLAGS
                   FLAGS 
                                                   SOURCE: ACFE 2012 GLOBAL FRAUD STUDY




                                        87% First timers
                                        87% First timers
                                        35% Cases never reported 
                                        to police
                                        t    li
27 July 2012            Parag Deodhar
                                        49% No recovery                             10
BEHAVIORAL RED FLAGS
               BEHAVIORAL RED FLAGS
       • Excessive Family/Peer
         Excessive Family/Peer         • Irritability, Suspiciousness
                                         Irritability, Suspiciousness 
         Pressure for Success            or Defensiveness
       • Complained About Lack         • Wheeler‐Dealer Attitude
         of Authority
           f A th it                   • Divorce/Family Problems
       • Past Legal Problems           • Control Issues, 
       • Excessive Pressure from
         Excessive Pressure from         Unwillingness to Share 
                                         Unwillingness to Share
         Within Organization             Duties
       • Refusal to Take Vacations     • Unusually Close 
                                                    y
       • Complained About                Association with 
         Inadequate Pay                  Vendor/Customer
       • Past Employment‐Related       • Financial Difficulties /
                                         Financial Difficulties / 
         Problems                        High Debt
       • Addiction Problems
         Addiction Problems            • Living Beyond Means
                                         Living Beyond Means

27 July 2012                   Parag Deodhar                             11
FRAUD DETECTION
                    FRAUD DETECTION
       • Employee Background Checks
         Employee Background Checks
               – Not just during recruitment
               – Mystery Shopping
                 Mystery Shopping
       • Mandatory Leave / Job Rotation, Transfers
       • Anti Bribery clause in Contracts
         Anti‐Bribery clause in Contracts
       • Review of Processes and Controls
       • Dedicated team for fraud detection / 
         Dedicated team for fraud detection /
         investigation
       • Clear reporting lines & Segregation of duties
         Clear reporting lines & Segregation of duties
       • Electronic / Digital surveillance
       • Over riding Controls!!!
         Over‐riding Controls!!!
27 July 2012                         Parag Deodhar       12
VENDOR / PARTNER DUE DILIGENCE
                      VENDOR / PARTNER DUE DILIGENCE
   Organizations often operate in unfamiliar territories or with little knowledge of the background, reputation or
   ability to conduct business of their business associates and service providers. Many a times the track
   record and reputation can be overlooked, while focusing only on the potential gains. While positive impact
   is often expected, the potential negative impact from these associates normally ignored at the time of
   selection which might have significant impact.

       Almost all organizations rely on                              It is, therefore, in the interest of the
        third parties/ vendors to help them                            organizations to discover as much
        conduct their business                                         information as possible about their
       Each of these associates can have                              vendors
        a significant impact on y
            g           p       your
                                                                      The focus should be on validation of
        business
                                                                       details provided as well discovery of
       While the positive impact is often                             any undisclosed information
        expected,
        expected the potential negative
                                                                      It is also important that the right
        impact, normally ignored at the
        time of selection of a vendor can                              partners are brought on board to
        have greater significance
        h         t     i ifi                                          assist on the collation and validation
                                                                       of this information

27 July 2012                                         Parag Deodhar                                                   13
MIS & DATA ANALYTICS
                     MIS & DATA ANALYTICS
    “BIG DATA”- 80% unstructured – emails / spreadsheets & other docs
    Red Flags can be visible in routine MIS as well:
    •    Increased revenues without a                  •       Unusual increases in income or income 
         corresponding increase in cash flow,                  in excess of industry peers
         especially over time
                i ll      i                            •       Significant unexplained increases in 
    •    Significant, unusual or highly complex                fixed assets
         transactions, particularly those that are     •       Recurring negative cash flows from 
         closed near the end of a financial                    operations while reporting earnings and 
                                                               operations while reporting earnings and
         reporting period                                      earnings growth
    •    Unusual growth in the number of days’         •       Allowances for sales returns, warranty 
         sales in receivables                                  claims, etc., that are shrinking in 
    •    Strong revenue growth when peer 
         St                     th h                           percentage terms or are otherwise out 
                                                                       t    t              th     i    t
         companies are experiencing weak sales                 of line with those of industry peers
    •    Recurring negative cash flows from            •       Assets, liabilities, revenues or expenses
           p                  p     g       g
         operations while reporting earnings and                           g
                                                               based on significant estimates that 
         earnings growth                                       involve subjective judgments or 
    •    Significant declines in customer demand               uncertainties that are difficult to 
         and increasing business failures in either            corroborate
         the industry or the overall economy
         the industry or the overall economy


27 July 2012                                   Parag Deodhar                                               14
PREDICTIVE MODELING
                  PREDICTIVE MODELING




  Assimilate data from multiple    Accepting, prioritizing        Analysis and
   sources and apply predictive    and distributing alerts    visualization tool for
                                                             uncovering previously
  analytics to accurately assess     & determine if it is    unknown relationships
    transactions, activities and      actual fraud or         among accounts or
    customer state in real time    suspicious transaction            entities
27 July 2012                            Parag Deodhar                                  15
DIGITAL SURVEILLANCE
                    DIGITAL SURVEILLANCE
       • Most frauds leave a trail on the system
         Most frauds leave a trail on the system –
         emails, internet access, access control logs etc
       • Data Leakage is a major challenge
       • Tools are available to:
         Tools are available to:
               – Log events
               – Scan logs for suspicious events and alert
               – Correlate suspicious events across systems and 
                               p                     y
                 network
               – Digital forensics
                 Digital forensics

27 July 2012                        Parag Deodhar                  16
ETHICAL DILEMMA
                  ETHICAL DILEMMA 
 Align the third party code of conduct to the employee code of conduct

   • Discrimination and harassment                      Demonstrate
   • Wages and benefits                               through actions
   • Work h
     W k hours and over ti
                    d      time
   • Health and safety                                  • Any activity that you engage in with
   • Labor – forced labor / child labor /                 customers will be fair and defensible –
     abuse of employees                                   NO EXCEPTIONS
   • Compliance to environmental laws                   • Approach your big and small customers/
     and adherence to sustainable                         suppliers the same way.
     business                                           • Let all your current and potential
                                                          customers/ suppliers k
                                                              t       /     li   know th t everyone
                                                                                       that
   • Anti-bribery and corruption policies                 gets a fair chance
                                                        • Transparency in process
                                                        • Take a stand against customer who
                                                                          g
                                                          behave in a less than ethical manner
                                                        • Be willing to miss revenue or earnings
                          Key issues to                   targets if things are not done the right
                                                          wayy
                            address

27 July 2012                                Parag Deodhar                                             17
THANK YOU
               THANK YOU




27 July 2012           Parag Deodhar   18

Contenu connexe

En vedette

Forensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection toolForensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection toolHaládik Consulting, s.r.o.
 
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentBillyCheuk
 
Risk culture presentation
Risk culture presentationRisk culture presentation
Risk culture presentationBenjamin Kpodo
 
Risk Culture, Risk What?
Risk Culture, Risk What?Risk Culture, Risk What?
Risk Culture, Risk What?Ian Rich
 
Phx Fraud And Abuse Training Module
Phx Fraud And Abuse Training ModulePhx Fraud And Abuse Training Module
Phx Fraud And Abuse Training ModulePHXONLINE
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingCase IQ
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and ControlWeaverCPAs
 
Using benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditingUsing benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditingJim Kaplan CIA CFE
 
Fraud: Understanding Fraud and Our Responsibilities
Fraud:  Understanding Fraud and Our ResponsibilitiesFraud:  Understanding Fraud and Our Responsibilities
Fraud: Understanding Fraud and Our ResponsibilitiesJason Lundell
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationScott Mongeau
 
1Q 2012 Consolidated Results (May 15, 2012)
1Q 2012 Consolidated Results (May 15, 2012) 1Q 2012 Consolidated Results (May 15, 2012)
1Q 2012 Consolidated Results (May 15, 2012) Terna SpA
 

En vedette (14)

Forensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection toolForensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection tool
 
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
 
Risk culture presentation
Risk culture presentationRisk culture presentation
Risk culture presentation
 
Risk Culture, Risk What?
Risk Culture, Risk What?Risk Culture, Risk What?
Risk Culture, Risk What?
 
Phx Fraud And Abuse Training Module
Phx Fraud And Abuse Training ModulePhx Fraud And Abuse Training Module
Phx Fraud And Abuse Training Module
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
 
Corporate & Anti-fraud Culture
Corporate & Anti-fraud CultureCorporate & Anti-fraud Culture
Corporate & Anti-fraud Culture
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
 
Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 
Fraud And Internal Controls Linked In April 2011
Fraud And Internal Controls   Linked In April 2011Fraud And Internal Controls   Linked In April 2011
Fraud And Internal Controls Linked In April 2011
 
Using benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditingUsing benford's law for fraud detection and auditing
Using benford's law for fraud detection and auditing
 
Fraud: Understanding Fraud and Our Responsibilities
Fraud:  Understanding Fraud and Our ResponsibilitiesFraud:  Understanding Fraud and Our Responsibilities
Fraud: Understanding Fraud and Our Responsibilities
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and Mitigation
 
1Q 2012 Consolidated Results (May 15, 2012)
1Q 2012 Consolidated Results (May 15, 2012) 1Q 2012 Consolidated Results (May 15, 2012)
1Q 2012 Consolidated Results (May 15, 2012)
 

Similaire à Scouting For Fraud - Parag Deodhar

6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptxRandyKuswanto
 
Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Pairat Srivilairit
 
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Pairat Srivilairit
 
CH07 final accounting ifrs edition fraud
CH07 final accounting ifrs edition fraudCH07 final accounting ifrs edition fraud
CH07 final accounting ifrs edition fraudcindi73
 
fraud, internal control.ppt
fraud, internal control.pptfraud, internal control.ppt
fraud, internal control.pptmorium2
 
Fooling the auditor - Understand the People Risk
Fooling the auditor - Understand the People RiskFooling the auditor - Understand the People Risk
Fooling the auditor - Understand the People RiskJenny Reid
 
Forensic Accounting, Tools & Evidences.pdf
Forensic Accounting, Tools & Evidences.pdfForensic Accounting, Tools & Evidences.pdf
Forensic Accounting, Tools & Evidences.pdfdelllaptop1298
 
Business Frauds - A Short Guide
Business Frauds - A Short Guide Business Frauds - A Short Guide
Business Frauds - A Short Guide Cut 2 Shreds
 
Protecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudProtecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudFraudBusters
 
AreFundsInJeopardy.pptx
AreFundsInJeopardy.pptxAreFundsInJeopardy.pptx
AreFundsInJeopardy.pptxJohn Donahue
 
cash, by: Weygandt kimmel kieso
cash, by: Weygandt kimmel kiesocash, by: Weygandt kimmel kieso
cash, by: Weygandt kimmel kiesodinioctoriauns
 
Understanding & Managing Fraud Rrisk
Understanding & Managing Fraud RriskUnderstanding & Managing Fraud Rrisk
Understanding & Managing Fraud RriskSantosh Pande
 
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...Scott & Baldwin CPAs
 
Annual Fraud Update
Annual Fraud UpdateAnnual Fraud Update
Annual Fraud UpdateDecosimoCPAs
 
Chapter 14 by Svetlana
Chapter 14 by SvetlanaChapter 14 by Svetlana
Chapter 14 by SvetlanaVidaB
 
Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!pdallen
 
Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsFraudBusters
 
Why Fraud Exist in the Organization?
Why Fraud Exist in the Organization?Why Fraud Exist in the Organization?
Why Fraud Exist in the Organization?BDO Indonesia
 

Similaire à Scouting For Fraud - Parag Deodhar (20)

6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx
 
Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4
 
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
 
CH07 final accounting ifrs edition fraud
CH07 final accounting ifrs edition fraudCH07 final accounting ifrs edition fraud
CH07 final accounting ifrs edition fraud
 
fraud, internal control.ppt
fraud, internal control.pptfraud, internal control.ppt
fraud, internal control.ppt
 
Fooling the auditor - Understand the People Risk
Fooling the auditor - Understand the People RiskFooling the auditor - Understand the People Risk
Fooling the auditor - Understand the People Risk
 
Forensic Accounting, Tools & Evidences.pdf
Forensic Accounting, Tools & Evidences.pdfForensic Accounting, Tools & Evidences.pdf
Forensic Accounting, Tools & Evidences.pdf
 
Business Frauds - A Short Guide
Business Frauds - A Short Guide Business Frauds - A Short Guide
Business Frauds - A Short Guide
 
Protecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudProtecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH Fraud
 
AreFundsInJeopardy.pptx
AreFundsInJeopardy.pptxAreFundsInJeopardy.pptx
AreFundsInJeopardy.pptx
 
cash, by: Weygandt kimmel kieso
cash, by: Weygandt kimmel kiesocash, by: Weygandt kimmel kieso
cash, by: Weygandt kimmel kieso
 
Understanding & Managing Fraud Rrisk
Understanding & Managing Fraud RriskUnderstanding & Managing Fraud Rrisk
Understanding & Managing Fraud Rrisk
 
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...
 
Annual Fraud Update
Annual Fraud UpdateAnnual Fraud Update
Annual Fraud Update
 
Chapter 14 by Svetlana
Chapter 14 by SvetlanaChapter 14 by Svetlana
Chapter 14 by Svetlana
 
Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!
 
Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data Analytics
 
Acc102 chap07 publisher_power_point
Acc102  chap07 publisher_power_pointAcc102  chap07 publisher_power_point
Acc102 chap07 publisher_power_point
 
Why Fraud Exist in the Organization?
Why Fraud Exist in the Organization?Why Fraud Exist in the Organization?
Why Fraud Exist in the Organization?
 
Into to Fraud Examination
Into to Fraud ExaminationInto to Fraud Examination
Into to Fraud Examination
 

Plus de Parag Deodhar

Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Parag Deodhar
 
Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challengesParag Deodhar
 
Securing the mobile enterprise - Sydney 24 Mar 2014
Securing the mobile enterprise - Sydney 24 Mar 2014Securing the mobile enterprise - Sydney 24 Mar 2014
Securing the mobile enterprise - Sydney 24 Mar 2014Parag Deodhar
 
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...Parag Deodhar
 
How to implement and align Technology within your GRC Framework
How to implement and align Technology within your GRC FrameworkHow to implement and align Technology within your GRC Framework
How to implement and align Technology within your GRC FrameworkParag Deodhar
 
BCM Continuous improvement - Audit & Assessment
BCM Continuous improvement - Audit & AssessmentBCM Continuous improvement - Audit & Assessment
BCM Continuous improvement - Audit & AssessmentParag Deodhar
 
IT Risk Management - the right posture
IT Risk Management - the right postureIT Risk Management - the right posture
IT Risk Management - the right postureParag Deodhar
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeParag Deodhar
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace RisksParag Deodhar
 
Defining effective governance structures and nurturing collaboration
Defining effective governance structures and nurturing collaborationDefining effective governance structures and nurturing collaboration
Defining effective governance structures and nurturing collaborationParag Deodhar
 
Frauds making fs companies uncompetitive parag deodhar
Frauds making fs companies uncompetitive   parag deodharFrauds making fs companies uncompetitive   parag deodhar
Frauds making fs companies uncompetitive parag deodharParag Deodhar
 
Acfe bangalore pdm 2 fraud risk - parag deodhar
Acfe bangalore pdm 2 fraud risk - parag deodharAcfe bangalore pdm 2 fraud risk - parag deodhar
Acfe bangalore pdm 2 fraud risk - parag deodharParag Deodhar
 

Plus de Parag Deodhar (12)

Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
 
Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challenges
 
Securing the mobile enterprise - Sydney 24 Mar 2014
Securing the mobile enterprise - Sydney 24 Mar 2014Securing the mobile enterprise - Sydney 24 Mar 2014
Securing the mobile enterprise - Sydney 24 Mar 2014
 
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...
 
How to implement and align Technology within your GRC Framework
How to implement and align Technology within your GRC FrameworkHow to implement and align Technology within your GRC Framework
How to implement and align Technology within your GRC Framework
 
BCM Continuous improvement - Audit & Assessment
BCM Continuous improvement - Audit & AssessmentBCM Continuous improvement - Audit & Assessment
BCM Continuous improvement - Audit & Assessment
 
IT Risk Management - the right posture
IT Risk Management - the right postureIT Risk Management - the right posture
IT Risk Management - the right posture
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
Defining effective governance structures and nurturing collaboration
Defining effective governance structures and nurturing collaborationDefining effective governance structures and nurturing collaboration
Defining effective governance structures and nurturing collaboration
 
Frauds making fs companies uncompetitive parag deodhar
Frauds making fs companies uncompetitive   parag deodharFrauds making fs companies uncompetitive   parag deodhar
Frauds making fs companies uncompetitive parag deodhar
 
Acfe bangalore pdm 2 fraud risk - parag deodhar
Acfe bangalore pdm 2 fraud risk - parag deodharAcfe bangalore pdm 2 fraud risk - parag deodhar
Acfe bangalore pdm 2 fraud risk - parag deodhar
 

Scouting For Fraud - Parag Deodhar

  • 1. SCOUTING FOR FRAUD  SCOUTING FOR FRAUD IN YOUR BUSINESS IN YOUR BUSINESS Seminar on Fraud as a Strategic Risk g “What CFOs and CEOs don’t notice, but should” Parag Deodhar Parag Deodhar BANGALORE – 27 July 2012
  • 2. FRAUD RISK FRAUD RISK • Fraud is now so common that its occurrence is Fraud is now so common that its occurrence is  no longer remarkable, only its scale. • If f d If fraud were a disease, almost all companies  di l t ll i would have a slight temperature… • What’s @ Risk? – The typical organization loses an estimated 5% of  yp g its annual revenues to fraud – Regulatory sanctions g y – Reputation / Brand image – Company closure! Company closure! 27 July 2012 Parag Deodhar 2
  • 3. TYPES OF OCCUPATIONAL FRAUD TYPES OF OCCUPATIONAL FRAUD SOURCE: ACFE 2012 GLOBAL FRAUD STUDY 87% 33% 8% 27 July 2012 Parag Deodhar 3
  • 4. ASSET MISAPPROPRIATION SCHEMES ASSET MISAPPROPRIATION SCHEMES Category Description Examples SCHEMES INVOLVING THEFT OF CASH RECEIPTS Skimming Cash is stolen from an organization before it is recorded on Employee accepts payment from a customer but does not the organization’s books and records record the sale and instead pockets the money Cash Larceny Cash is stolen from an organization after it has been Employee steals cash and checks from daily receipts before recorded on the organization’s books and records they can be deposited in the bank SCHEMES INVOLVING FRAUDULENT DISBURSEMENTS OF CASH Billing Person causes his or her employer to issue a payment by Employee creates a shell company and bills employer for submitting invoices for fictitious goods or services, inflated services not actually rendered invoices or invoices for personal purchases Employee purchases personal items and submits an invoice to employer for payment Expense An employee makes a claim for reimbursement of fictitious Employee files fraudulent expense report, claiming personal Reimbursements or inflated business expenses travel, nonexistent meals, etc. Check Tampering A person steals his or her employer’s funds by intercepting, Employee steals blank company checks and makes them out to forging or altering a check drawn on one of the g g g himself or an accomplice p organization’s bank accounts Employee steals an outgoing check to a vendor and deposits it into his or her own bank account Payroll An employee causes his or her employer to issue a Employee claims overtime for hours not worked payment by making false claims for compensation Employee adds ghost employees to the payroll Cash Register C hR i t An A employee makes f l entries on a cash register t l k false t i h i t to Employee f d l tl voids a sale on hi or h cash register E l fraudulently id l his her h i t Disbursements conceal the fraudulent removal of cash and steals the cash OTHER ASSET MISAPPROPRIATION SCHEMES Misappropriation of The perpetrator misappropriates cash kept on hand at the Employee steals cash from a company vault Cash on Hand victim organization’s premises organization s Non-Cash An employee steals or misuses non-cash assets of the Employee steals inventory from a warehouse or storeroom Misappropriations victim organization Employee steals or misuses confidential customer financial information 27 July 2012 Parag Deodhar 4
  • 5. PROFILE OF A FRAUDSTER PROFILE OF A FRAUDSTER SOURCE: ACFE 2012 GLOBAL FRAUD STUDY 27 July 2012 Parag Deodhar 5
  • 6. HOW ARE FRAUDS DETECTED… HOW ARE FRAUDS DETECTED… SOURCE: ACFE 2012 GLOBAL FRAUD STUDY 27 July 2012 Parag Deodhar 6
  • 7. DETECTION METHODS DETECTION METHODS SOURCE: ACFE 2012 GLOBAL FRAUD STUDY 27 July 2012 Parag Deodhar 7
  • 8. PROACTIVE MEASURES PROACTIVE MEASURES 27 July 2012 Parag Deodhar 8
  • 9. WHISTLE‐BLOWER MECHANISM WHISTLE BLOWER MECHANISM KEY ELEMENTS FOR SUCCESS Who Who decides Wh d id receives the the actions? High  complaints? Availability  Anonymous  &  & Secure Accessibility Who Who takes investigates? i ti t ? actions? ti ? Independent  Credible &  &  Impartial transparent Who reports? 27 July 2012 Parag Deodhar 9
  • 10. RED FLAGS FLAGS  SOURCE: ACFE 2012 GLOBAL FRAUD STUDY 87% First timers 87% First timers 35% Cases never reported  to police t li 27 July 2012 Parag Deodhar 49% No recovery  10
  • 11. BEHAVIORAL RED FLAGS BEHAVIORAL RED FLAGS • Excessive Family/Peer Excessive Family/Peer  • Irritability, Suspiciousness Irritability, Suspiciousness  Pressure for Success or Defensiveness • Complained About Lack  • Wheeler‐Dealer Attitude of Authority f A th it • Divorce/Family Problems • Past Legal Problems • Control Issues,  • Excessive Pressure from Excessive Pressure from  Unwillingness to Share  Unwillingness to Share Within Organization Duties • Refusal to Take Vacations • Unusually Close  y • Complained About  Association with  Inadequate Pay Vendor/Customer • Past Employment‐Related  • Financial Difficulties / Financial Difficulties /  Problems High Debt • Addiction Problems Addiction Problems • Living Beyond Means Living Beyond Means 27 July 2012 Parag Deodhar 11
  • 12. FRAUD DETECTION FRAUD DETECTION • Employee Background Checks Employee Background Checks – Not just during recruitment – Mystery Shopping Mystery Shopping • Mandatory Leave / Job Rotation, Transfers • Anti Bribery clause in Contracts Anti‐Bribery clause in Contracts • Review of Processes and Controls • Dedicated team for fraud detection /  Dedicated team for fraud detection / investigation • Clear reporting lines & Segregation of duties Clear reporting lines & Segregation of duties • Electronic / Digital surveillance • Over riding Controls!!! Over‐riding Controls!!! 27 July 2012 Parag Deodhar 12
  • 13. VENDOR / PARTNER DUE DILIGENCE VENDOR / PARTNER DUE DILIGENCE Organizations often operate in unfamiliar territories or with little knowledge of the background, reputation or ability to conduct business of their business associates and service providers. Many a times the track record and reputation can be overlooked, while focusing only on the potential gains. While positive impact is often expected, the potential negative impact from these associates normally ignored at the time of selection which might have significant impact.  Almost all organizations rely on  It is, therefore, in the interest of the third parties/ vendors to help them organizations to discover as much conduct their business information as possible about their  Each of these associates can have vendors a significant impact on y g p your  The focus should be on validation of business details provided as well discovery of  While the positive impact is often any undisclosed information expected, expected the potential negative  It is also important that the right impact, normally ignored at the time of selection of a vendor can partners are brought on board to have greater significance h t i ifi assist on the collation and validation of this information 27 July 2012 Parag Deodhar 13
  • 14. MIS & DATA ANALYTICS MIS & DATA ANALYTICS “BIG DATA”- 80% unstructured – emails / spreadsheets & other docs Red Flags can be visible in routine MIS as well: • Increased revenues without a  • Unusual increases in income or income  corresponding increase in cash flow,  in excess of industry peers especially over time i ll i • Significant unexplained increases in  • Significant, unusual or highly complex  fixed assets transactions, particularly those that are  • Recurring negative cash flows from  closed near the end of a financial  operations while reporting earnings and  operations while reporting earnings and reporting period earnings growth • Unusual growth in the number of days’  • Allowances for sales returns, warranty  sales in receivables claims, etc., that are shrinking in  • Strong revenue growth when peer  St th h percentage terms or are otherwise out  t t th i t companies are experiencing weak sales of line with those of industry peers • Recurring negative cash flows from  • Assets, liabilities, revenues or expenses p p g g operations while reporting earnings and  g based on significant estimates that  earnings growth involve subjective judgments or  • Significant declines in customer demand  uncertainties that are difficult to  and increasing business failures in either  corroborate the industry or the overall economy the industry or the overall economy 27 July 2012 Parag Deodhar 14
  • 15. PREDICTIVE MODELING PREDICTIVE MODELING Assimilate data from multiple Accepting, prioritizing Analysis and sources and apply predictive and distributing alerts visualization tool for uncovering previously analytics to accurately assess & determine if it is unknown relationships transactions, activities and actual fraud or among accounts or customer state in real time suspicious transaction entities 27 July 2012 Parag Deodhar 15
  • 16. DIGITAL SURVEILLANCE DIGITAL SURVEILLANCE • Most frauds leave a trail on the system Most frauds leave a trail on the system – emails, internet access, access control logs etc • Data Leakage is a major challenge • Tools are available to: Tools are available to: – Log events – Scan logs for suspicious events and alert – Correlate suspicious events across systems and  p y network – Digital forensics Digital forensics 27 July 2012 Parag Deodhar 16
  • 17. ETHICAL DILEMMA ETHICAL DILEMMA  Align the third party code of conduct to the employee code of conduct • Discrimination and harassment Demonstrate • Wages and benefits through actions • Work h W k hours and over ti d time • Health and safety • Any activity that you engage in with • Labor – forced labor / child labor / customers will be fair and defensible – abuse of employees NO EXCEPTIONS • Compliance to environmental laws • Approach your big and small customers/ and adherence to sustainable suppliers the same way. business • Let all your current and potential customers/ suppliers k t / li know th t everyone that • Anti-bribery and corruption policies gets a fair chance • Transparency in process • Take a stand against customer who g behave in a less than ethical manner • Be willing to miss revenue or earnings Key issues to targets if things are not done the right wayy address 27 July 2012 Parag Deodhar 17
  • 18. THANK YOU THANK YOU 27 July 2012 Parag Deodhar 18