SlideShare une entreprise Scribd logo
1  sur  16
Vendor Anomaly Detection Todd E. Petty 312.961.0111 Divine © 2002 Deloitte & Touche LLP. All rights reserved .
A/P Fraud – Easily Concealed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Economics of Fraud ABC Company Revenue - $10 million Profit margin – 10%
Anomaly Detection  –  Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Anomaly Detection – Approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process Overview - Functional Raw Internal Data Normalization Normalized Internal Data Profiles/Queries Anomalies Fraud Processed Result Create Use Profiles to Test Against External Data Internal Data Other Tests
Examples of A/P Anomalies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questionable Payments? Invoices With No Supporting PO This section reflects INVOICES without any related POs POs INVOICES VENDOR
Anomaly Detection - Deliverables ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Primary Fraud Risks
Benford’s Law
Employee Fraud
Employee Fraud
Employee Fraud
Employee Fraud
For more information, contact: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...Scott & Baldwin CPAs
 
Fraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying InformationFraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying InformationFairfax County
 
I D Theft Employee Presentation2
I D Theft Employee Presentation2I D Theft Employee Presentation2
I D Theft Employee Presentation2Heather Smith
 
Understanding Money Laundering and Fraud Risks of Wire Transfers
Understanding Money Laundering and Fraud Risks of Wire TransfersUnderstanding Money Laundering and Fraud Risks of Wire Transfers
Understanding Money Laundering and Fraud Risks of Wire TransfersAlessa
 
Legal Ethics for a Changing Profession
Legal Ethics for a Changing ProfessionLegal Ethics for a Changing Profession
Legal Ethics for a Changing ProfessionDowney Law Group LLC
 
New age of risk for contractors slide presentation
New age of risk for contractors slide presentationNew age of risk for contractors slide presentation
New age of risk for contractors slide presentation1paramount
 
Revised Fraud Powerpoint Final
Revised Fraud Powerpoint FinalRevised Fraud Powerpoint Final
Revised Fraud Powerpoint FinalToni Smart
 
Compliance Abhors a Vacuum - If the Void is Filled with Heightened BSA Scruti...
Compliance Abhors a Vacuum - If the Void is Filled with Heightened BSA Scruti...Compliance Abhors a Vacuum - If the Void is Filled with Heightened BSA Scruti...
Compliance Abhors a Vacuum - If the Void is Filled with Heightened BSA Scruti...CBIZ, Inc.
 
top-10-internal-theft-offenses-3045525
top-10-internal-theft-offenses-3045525top-10-internal-theft-offenses-3045525
top-10-internal-theft-offenses-3045525Rand Fernandes
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 
Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-researchJustin Saunders
 

Tendances (20)

State Board Of Education
State Board Of Education
State Board Of Education
State Board Of Education
 
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...
 
Fraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying InformationFraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying Information
 
I D Theft Employee Presentation2
I D Theft Employee Presentation2I D Theft Employee Presentation2
I D Theft Employee Presentation2
 
Anthem Data Breach
Anthem Data BreachAnthem Data Breach
Anthem Data Breach
 
Employers Face Liability for 5 Kinds of Identity Theft
Employers Face Liability for 5 Kinds of Identity TheftEmployers Face Liability for 5 Kinds of Identity Theft
Employers Face Liability for 5 Kinds of Identity Theft
 
SHRM id theft advice
SHRM id theft adviceSHRM id theft advice
SHRM id theft advice
 
ITRC Breach Report 2014
ITRC Breach Report 2014ITRC Breach Report 2014
ITRC Breach Report 2014
 
Understanding Money Laundering and Fraud Risks of Wire Transfers
Understanding Money Laundering and Fraud Risks of Wire TransfersUnderstanding Money Laundering and Fraud Risks of Wire Transfers
Understanding Money Laundering and Fraud Risks of Wire Transfers
 
Legal Ethics for a Changing Profession
Legal Ethics for a Changing ProfessionLegal Ethics for a Changing Profession
Legal Ethics for a Changing Profession
 
New age of risk for contractors slide presentation
New age of risk for contractors slide presentationNew age of risk for contractors slide presentation
New age of risk for contractors slide presentation
 
Revised Fraud Powerpoint Final
Revised Fraud Powerpoint FinalRevised Fraud Powerpoint Final
Revised Fraud Powerpoint Final
 
Compliance Abhors a Vacuum - If the Void is Filled with Heightened BSA Scruti...
Compliance Abhors a Vacuum - If the Void is Filled with Heightened BSA Scruti...Compliance Abhors a Vacuum - If the Void is Filled with Heightened BSA Scruti...
Compliance Abhors a Vacuum - If the Void is Filled with Heightened BSA Scruti...
 
Fraud Prevention
Fraud PreventionFraud Prevention
Fraud Prevention
 
Main body
Main bodyMain body
Main body
 
Intro to Credit
Intro to CreditIntro to Credit
Intro to Credit
 
October2016
October2016October2016
October2016
 
top-10-internal-theft-offenses-3045525
top-10-internal-theft-offenses-3045525top-10-internal-theft-offenses-3045525
top-10-internal-theft-offenses-3045525
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-research
 

En vedette

Fraud Detection Techniques
Fraud Detection TechniquesFraud Detection Techniques
Fraud Detection TechniquesVhena Pilongo
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Tahir Abbas
 
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Dinidu Weeraratne
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and ReportingBrown Smith Wallace
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector Venktesh Venke
 

En vedette (6)

Fraud Detection Techniques
Fraud Detection TechniquesFraud Detection Techniques
Fraud Detection Techniques
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2,
 
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector
 
Fraud detection
Fraud detectionFraud detection
Fraud detection
 

Similaire à Anomaly Detection Petty

Biz Practices And Scams
Biz Practices And ScamsBiz Practices And Scams
Biz Practices And Scamsvuongminhchi
 
Fraud & Internal Controls
Fraud & Internal ControlsFraud & Internal Controls
Fraud & Internal ControlsGreenway Health
 
Accounts Payable Fraud: Keys to Detection and Prevention
Accounts Payable Fraud: Keys to Detection and PreventionAccounts Payable Fraud: Keys to Detection and Prevention
Accounts Payable Fraud: Keys to Detection and PreventionCase IQ
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationbethljohnson
 
Liberty Data Solutions, Know your Client
Liberty Data Solutions, Know your ClientLiberty Data Solutions, Know your Client
Liberty Data Solutions, Know your ClientStevenDendrinos
 
Fraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesFraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesShred Station
 
02/18/2010 Meeting - Data Analytics
02/18/2010 Meeting - Data Analytics02/18/2010 Meeting - Data Analytics
02/18/2010 Meeting - Data Analyticsacfesj
 
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...Mahmoud Elmekawy
 
Fraud Prevention and Internal Controls - A Winning Combination
Fraud Prevention and Internal Controls - A Winning Combination Fraud Prevention and Internal Controls - A Winning Combination
Fraud Prevention and Internal Controls - A Winning Combination DecosimoCPAs
 
Why Fraud Exist in the Organization?
Why Fraud Exist in the Organization?Why Fraud Exist in the Organization?
Why Fraud Exist in the Organization?BDO Indonesia
 
Identity Theft and Your company
Identity Theft and Your companyIdentity Theft and Your company
Identity Theft and Your companyguest61ff5a
 
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Steve Werby
 
Identity Theft Protection. The Best Answer
Identity Theft Protection. The Best AnswerIdentity Theft Protection. The Best Answer
Identity Theft Protection. The Best Answerforcesuccess
 
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...Case IQ
 

Similaire à Anomaly Detection Petty (20)

Business Identity Theft
Business Identity TheftBusiness Identity Theft
Business Identity Theft
 
Biz Practices And Scams
Biz Practices And ScamsBiz Practices And Scams
Biz Practices And Scams
 
Fraud & Internal Controls
Fraud & Internal ControlsFraud & Internal Controls
Fraud & Internal Controls
 
Accounts Payable Fraud: Keys to Detection and Prevention
Accounts Payable Fraud: Keys to Detection and PreventionAccounts Payable Fraud: Keys to Detection and Prevention
Accounts Payable Fraud: Keys to Detection and Prevention
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Liberty Data Solutions, Know your Client
Liberty Data Solutions, Know your ClientLiberty Data Solutions, Know your Client
Liberty Data Solutions, Know your Client
 
Adrs2
Adrs2Adrs2
Adrs2
 
Fraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesFraud Awareness Guide for Businesses
Fraud Awareness Guide for Businesses
 
02/18/2010 Meeting - Data Analytics
02/18/2010 Meeting - Data Analytics02/18/2010 Meeting - Data Analytics
02/18/2010 Meeting - Data Analytics
 
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...
 
Fraud Prevention and Internal Controls - A Winning Combination
Fraud Prevention and Internal Controls - A Winning Combination Fraud Prevention and Internal Controls - A Winning Combination
Fraud Prevention and Internal Controls - A Winning Combination
 
Why Fraud Exist in the Organization?
Why Fraud Exist in the Organization?Why Fraud Exist in the Organization?
Why Fraud Exist in the Organization?
 
Revised Credit
Revised CreditRevised Credit
Revised Credit
 
Revised Credit
Revised CreditRevised Credit
Revised Credit
 
Identity Theft and Your company
Identity Theft and Your companyIdentity Theft and Your company
Identity Theft and Your company
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
 
CRIF Products Fraud Model
CRIF Products Fraud ModelCRIF Products Fraud Model
CRIF Products Fraud Model
 
Identity Theft Protection. The Best Answer
Identity Theft Protection. The Best AnswerIdentity Theft Protection. The Best Answer
Identity Theft Protection. The Best Answer
 
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
Misconduct or Missed Conduct? Ensuring Consistent SAR Reporting of Internal M...
 

Anomaly Detection Petty