SlideShare ist ein Scribd-Unternehmen logo
1 von 44
Sharon P. Hamrick, CPA, CFF, CFE
                         Senior Manager, Decosimo




ASWA - Huntsville 2012
 What is Fraud in the Workplace?
     Occupational fraud and abuse is the use of one’s
      occupation for personal enrichment and can result from
      misconduct of employees, managers and/or officers.

       Common Asset Misappropriation Schemes –

          Payroll fraud
          Check tampering
          Skimming
          Expense account schemes
          Fraudulent disbursements
          False billing
          Larceny
          Inventory theft


 ASWA - Huntsville 2012
ASWA - Huntsville 2012
ASWA - Huntsville 2012
ASWA - Huntsville 2012
ASWA - Huntsville 2012
ASWA - Huntsville 2012
   41% of perpetrators are employees; 38% of perpetrators are managers
   Median losses of frauds by employees = $60,000; by managers = $182,000
   Frauds lasted a median of 18 months before being detected
   38% of perpetrators were between the ages of 36 and 45
   Median losses by gender: Males $200,000; by female fraudsters $91,000
   Executive/upper management caused largest fraud losses
   49% of victim organizations in the study had not recovered any losses due
    to fraud




ASWA - Huntsville 2012
Opportunities




                         Fraud
Incentives/Pressures                     Rationalization


ASWA - Huntsville 2012
ASWA - Huntsville 2012
ASWA - Huntsville 2012
To n e a t t h e To p
   Management’s behavior creates an environment in the
    company - that environment can breed or condone
    fraudulent activity.

        Tips for management:

             Create and promote a comprehensive fraud policy

             Implement an entity specific code of ethics

             Consider a reporting hotline

ASWA - Huntsville 2012
   An organizational wide Fraud Policy can send a
       clear message that workplace fraud will not be
       tolerated.

         Scope of Policy
         Identify Behavior That Constitute Fraud
         Assign Responsibility for Fraud Investigation
         Reiterate Confidentiality
         Develop Procedures for Reporting Fraud
         Consequences and Corrective Action




ASWA - Huntsville 2012
Ethical
                           Mind
                   Legal              Moral
                           Set &
                           Behavior




ASWA - Huntsville 2012
   According to ACFE Reduces Fraud by 50%
           Effective Method of Deterrence
           SOX requires anonymity for whistleblowers
           Outsourcing to third parties is an option
              24 Hours/365
              Skilled Interviewer




ASWA - Huntsville 2012
   No two organization are exactly alike!
          Knowing your company-specific risk factors
           can help in fraud prevention.

             Size
             Types of products and services
             Ownership
             Financing
             Banking relationships
             Financial reporting requirements




ASWA - Huntsville 2012
   Human Resources practices and procedures
         can be very effective tools in the effort to
         prevent Workplace Fraud

              Verify references, work experience and
              education
              Criminal records checks
              Annual employee evaluations
              Permission for drug, criminal and financial
              checks if company policy or position
              requires

ASWA - Huntsville 2012
Internal Controls
    A thoughtfully designed and effectively
     implemented internal control structure is essential
     to prevent ongoing and pervasive Workplace Fraud
     from occurring and going undetected.

       Segregation of duties between recording, asset
        custody and reporting
       Supervision and oversight by management and
        board of directors
       External checks
       Monitoring to make sure internal controls
        continue to work over time
ASWA - Huntsville 2012
ASWA - Huntsville 2012
 Your company’s digital assets are perhaps
   some of its most valuable. Help shield them from
   Workplace Fraud with effective IT controls in
   place.

        Physical access to servers and computer
         center controlled
        Passwords secure and regularly changed
        Access only to necessary software
         modules
        Computer records maintained of log-ins;
        Reports generated of failed log-in attempts
         and maximum limit on number of log-in
         attempts
ASWA - Huntsville 2012
Saves Money
                         Creates Fraud Awareness
                          Enhanced Reputation
                          Compliance with SOX


ASWA - Huntsville 2012
ASWA - Huntsville 2012
ASWA - Huntsville 2012
ASWA - Huntsville 2012
ASWA - Huntsville 2012
Behavioral Red Flags Exhibited
 81% of fraudsters exhibited at least one of the listed
  behavioral red flags:
    36% Living beyond their means


      27% with financial difficulties

      19% with unusually close associations with vendors
       or customers

      18% had excessive control issues with their duties


ASWA - Huntsville 2012
ASWA - Huntsville 2012
Analytical Red Flags
   Recurring negative cash flows from operations
   Unusual general journal entries or unusual
    transactions, especially close to end of a period
   Significant related party transactions not in the
    ordinary course of business
   Abnormal profitability when compared to similar
    companies in the same industry
   Abnormal gross profit margin or growth in gross
    profit margin when compared to similar companies in
    the same industry
   Management override


ASWA - Huntsville 2012
Other Data Analytics
   Trend analysis – comparison to prior periods
   Comparison to forecasts, budgets
   Vertical and horizontal ratio analysis
   Correlation analysis
   Searches for duplicates
   Compliance verification
   Aging
   Benford’s law
   Beneish m-score model
   Dechow-Dichev accrual quantity


ASWA - Huntsville 2012
 Duplicate payments tests
  Benford’s Law analysis
  Rounded amount invoices
  Invoices just below approval levels
  Abnormal invoice volume activity
    Rapid increase
    High variance
  Vendors with sequential invoice Numbers or where
   numbers and dates are inconsistent
  Merge vendor and employee files


ASWA - Huntsville 2012
Examples of Phishing Emails




ASWA - Huntsville 2012
ASWA - Huntsville 2012
What is OPSEC?
   Military term         • Analytic process used to deny an
    meaning                adversary information
   Operational
     Security            • Risk assessment tool


     Universal           • Examines day-to-day activities
     concepts            • Controls information


                         • Equally applicable to individuals
  Applied in any           and businesses in general
   environment
                         • Identifies security risks

ASWA - Huntsville 2012
OPSEC Is Not:
                             An expensive
      A strict set of
                               and time-
        rules and
                              consuming
       procedures
                                process

                      Used only by
                          the
                     government or
                        military

ASWA - Huntsville 2012
Consequences
Loss of customer trust and business

Possible law suits

Legal issues

            Gramm-Leach-Bliley Act
            Fair Credit Reporting Act
            Federal Trade Commission Act
            Health Insurance Portability and Accountability
             Act (HIPPA)
            Family Educational Rights and Privacy Act
            Drivers Privacy Protection Act
            Privacy Laws
            State Laws

ASWA - Huntsville 2012
Bottom Line – Companies
   must develop and maintain
   reasonable procedures to
  protect sensitive information


ASWA - Huntsville 2012
You and Your Employees

      Know the             Know what
       threat              to protect


                     Know how
                     to protect
ASWA - Huntsville 2012
Know the Threat-Who
   Adversary – the Bad Guy

   Terrorist groups

   Criminals

   Organized crime

   Hackers/Crackers
   Insider threats – generally more costly and often
   overlooked

ASWA - Huntsville 2012
What to do if you have
                suspicions




ASWA - Huntsville 2012
What resources do you have at your disposal for
                  guidance

   Outside CPAs
   Attorney
   Internal audit
   Law enforcement




ASWA - Huntsville 2012
Legal restrictions and ramifications

                    Does your company require employees
                        sign a fraud policy statement

                     Chain of custody of documents, paper
                                 and otherwise

                    Suspect’s rights to privacy – Their work
                                      area

                           Interview do’s and don'ts




ASWA - Huntsville 2012
What a CFE can do if you have
              suspicions
   Investigate on behalf of the board of directors

   Conduct interviews

   Perform data analysis, data mining

   Search computer records
   Search sources of outside information related to
   the suspect

ASWA - Huntsville 2012
Sources
 Cornell University IT: Phish Bowl
    www.it.cornell.edu/security/safety/phishbowl.cfm
 Protect your business by understanding common
  social engineering techniques, Small Business Blog
    http://googlesmb.blogspot.com/2012/04/protect-your-
     business-by-understanding.html
 Microsoft
    www.microsoft.com/security/online-privacy/phishing-
     symptoms.aspx




ASWA - Huntsville 2012
Contact Info

                                 Sharon P. Hamrick, CPA•CFF, CFE
                                 Senior Manager, Decosimo Advisory
                                 Services
                                 sharonhamrick@decosimo.com
                                 www.linkedin.com/in/sharonhamrick



                                       423-756-7100


   The contents and opinions contained in this article are for informational purposes only. The information is
   not intended to be a substitute for professional accounting counsel. Always seek the advice of your
   accountant or other financial planner with any questions you may have regarding your financial goals.




ASWA - Huntsville 2012

Weitere ähnliche Inhalte

Was ist angesagt?

Anti money laundering (aml) and financial crime
Anti money laundering (aml) and financial crimeAnti money laundering (aml) and financial crime
Anti money laundering (aml) and financial crimeRaviPrashant5
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingCase IQ
 
Anti money laundering
Anti money launderingAnti money laundering
Anti money launderingUttma Shukla
 
ABC SB_ABAC AWARENESS.pptx
ABC SB_ABAC AWARENESS.pptxABC SB_ABAC AWARENESS.pptx
ABC SB_ABAC AWARENESS.pptxAbd Razak Misban
 
Presentation AML
Presentation AMLPresentation AML
Presentation AMLMirsazzad
 
Tips for Preventing and Detecting Employee Theft in the Workplace
Tips for Preventing and Detecting Employee Theft in the WorkplaceTips for Preventing and Detecting Employee Theft in the Workplace
Tips for Preventing and Detecting Employee Theft in the WorkplaceCase IQ
 
Chapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudChapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudVidaB
 
Types of fraud in Accounting
Types of fraud in AccountingTypes of fraud in Accounting
Types of fraud in AccountingMuhammad Qasim
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12Fuh George Cheo
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Tahir Abbas
 
Corporate Compliance Management
Corporate Compliance Management Corporate Compliance Management
Corporate Compliance Management Pavan Kumar Vijay
 
Basics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick PrimerBasics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick Primercomplianceonline123
 

Was ist angesagt? (20)

Case study on forensic audit
Case study on forensic auditCase study on forensic audit
Case study on forensic audit
 
Anti money laundering (aml) and financial crime
Anti money laundering (aml) and financial crimeAnti money laundering (aml) and financial crime
Anti money laundering (aml) and financial crime
 
Fraud Prevention
Fraud PreventionFraud Prevention
Fraud Prevention
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
 
Fraud risk management
Fraud risk managementFraud risk management
Fraud risk management
 
Anti money laundering
Anti money launderingAnti money laundering
Anti money laundering
 
ABC SB_ABAC AWARENESS.pptx
ABC SB_ABAC AWARENESS.pptxABC SB_ABAC AWARENESS.pptx
ABC SB_ABAC AWARENESS.pptx
 
Presentation AML
Presentation AMLPresentation AML
Presentation AML
 
Tips for Preventing and Detecting Employee Theft in the Workplace
Tips for Preventing and Detecting Employee Theft in the WorkplaceTips for Preventing and Detecting Employee Theft in the Workplace
Tips for Preventing and Detecting Employee Theft in the Workplace
 
Employee Theft
Employee Theft Employee Theft
Employee Theft
 
Chapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudChapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraud
 
Money laundering
Money laundering Money laundering
Money laundering
 
Types of fraud in Accounting
Types of fraud in AccountingTypes of fraud in Accounting
Types of fraud in Accounting
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2,
 
Fraud & corruption
Fraud & corruptionFraud & corruption
Fraud & corruption
 
Corporate Compliance Management
Corporate Compliance Management Corporate Compliance Management
Corporate Compliance Management
 
Risk based approach
Risk based approachRisk based approach
Risk based approach
 
Basics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick PrimerBasics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick Primer
 
AML presentation
AML presentationAML presentation
AML presentation
 

Andere mochten auch

Cyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineCyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineFtlwood Families
 
OPSEC / PERSEC
OPSEC / PERSECOPSEC / PERSEC
OPSEC / PERSECRmd Frg
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchersvicenteDiaz_KL
 
PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...
PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...
PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...Puppet
 
OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackersgrugq
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Ethical Decision Making Process
Ethical Decision Making ProcessEthical Decision Making Process
Ethical Decision Making ProcessCoky Fauzi Alfi
 
Leases- The Winding Road Ahead
Leases- The Winding Road AheadLeases- The Winding Road Ahead
Leases- The Winding Road AheadDecosimoCPAs
 
Livelihoods framework : A case of NE Upland Communities
Livelihoods framework : A case of NE Upland CommunitiesLivelihoods framework : A case of NE Upland Communities
Livelihoods framework : A case of NE Upland CommunitiesOasis India
 
Marketing Like a Boss
Marketing Like a BossMarketing Like a Boss
Marketing Like a BossBen Strahan
 
Tp Os Perigos das Redes Sociais - João R, Hugo, Gustavo e Guilherme
Tp Os Perigos das Redes Sociais - João R, Hugo, Gustavo e GuilhermeTp Os Perigos das Redes Sociais - João R, Hugo, Gustavo e Guilherme
Tp Os Perigos das Redes Sociais - João R, Hugo, Gustavo e GuilhermeLucky Fox
 
FASB Proposals Affecting Government Contractors
FASB Proposals Affecting Government ContractorsFASB Proposals Affecting Government Contractors
FASB Proposals Affecting Government ContractorsDecosimoCPAs
 
710,000 Facebook Fans is Not Enough: NESCHO May 2012
710,000 Facebook Fans is Not Enough: NESCHO May 2012710,000 Facebook Fans is Not Enough: NESCHO May 2012
710,000 Facebook Fans is Not Enough: NESCHO May 2012Matt Cyr
 

Andere mochten auch (20)

OPSEC Case Study - Bush In Iraq
OPSEC Case Study - Bush In IraqOPSEC Case Study - Bush In Iraq
OPSEC Case Study - Bush In Iraq
 
Cyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineCyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_online
 
OPSEC / PERSEC
OPSEC / PERSECOPSEC / PERSEC
OPSEC / PERSEC
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
OPSEC for Kids
OPSEC for KidsOPSEC for Kids
OPSEC for Kids
 
OPSEC for Families
OPSEC for FamiliesOPSEC for Families
OPSEC for Families
 
PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...
PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...
PuppetConf 2016: Nice and Secure: Good OpSec Hygiene With Puppet! – Peter Sou...
 
Invasive species commanders_guide
Invasive species commanders_guideInvasive species commanders_guide
Invasive species commanders_guide
 
OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackers
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Ethical Decision Making Process
Ethical Decision Making ProcessEthical Decision Making Process
Ethical Decision Making Process
 
Pier conference opening remarks
Pier conference opening remarksPier conference opening remarks
Pier conference opening remarks
 
Developing Essential Early Intervention Skills
Developing Essential Early Intervention SkillsDeveloping Essential Early Intervention Skills
Developing Essential Early Intervention Skills
 
Leases- The Winding Road Ahead
Leases- The Winding Road AheadLeases- The Winding Road Ahead
Leases- The Winding Road Ahead
 
Globalconsulting
GlobalconsultingGlobalconsulting
Globalconsulting
 
Livelihoods framework : A case of NE Upland Communities
Livelihoods framework : A case of NE Upland CommunitiesLivelihoods framework : A case of NE Upland Communities
Livelihoods framework : A case of NE Upland Communities
 
Marketing Like a Boss
Marketing Like a BossMarketing Like a Boss
Marketing Like a Boss
 
Tp Os Perigos das Redes Sociais - João R, Hugo, Gustavo e Guilherme
Tp Os Perigos das Redes Sociais - João R, Hugo, Gustavo e GuilhermeTp Os Perigos das Redes Sociais - João R, Hugo, Gustavo e Guilherme
Tp Os Perigos das Redes Sociais - João R, Hugo, Gustavo e Guilherme
 
FASB Proposals Affecting Government Contractors
FASB Proposals Affecting Government ContractorsFASB Proposals Affecting Government Contractors
FASB Proposals Affecting Government Contractors
 
710,000 Facebook Fans is Not Enough: NESCHO May 2012
710,000 Facebook Fans is Not Enough: NESCHO May 2012710,000 Facebook Fans is Not Enough: NESCHO May 2012
710,000 Facebook Fans is Not Enough: NESCHO May 2012
 

Ähnlich wie Preventing and Detecting Fraud in the Workplace

Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
ACFE 2017 - Audit and Fraud Joining Forces
ACFE 2017 - Audit and Fraud Joining ForcesACFE 2017 - Audit and Fraud Joining Forces
ACFE 2017 - Audit and Fraud Joining ForcesJen Dunham, CFE
 
Who needs business intelligence?
Who needs business intelligence?Who needs business intelligence?
Who needs business intelligence?Norman Manley
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
Callcredit's Fraud Summit 2016 - Plenary session
Callcredit's Fraud Summit 2016 - Plenary sessionCallcredit's Fraud Summit 2016 - Plenary session
Callcredit's Fraud Summit 2016 - Plenary sessionCallcredit123
 
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016Harmaldeep Cassam
 
Thieves Within: Preventing Fraud in Small & Medium-Sized Organizations
Thieves Within: Preventing Fraud in Small & Medium-Sized OrganizationsThieves Within: Preventing Fraud in Small & Medium-Sized Organizations
Thieves Within: Preventing Fraud in Small & Medium-Sized OrganizationsAllen, Gibbs & Houlik, L.C.
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 
Binary Scam Watch Monitor | Restriction Of Online Scam
Binary Scam Watch Monitor | Restriction Of Online ScamBinary Scam Watch Monitor | Restriction Of Online Scam
Binary Scam Watch Monitor | Restriction Of Online ScamBinaryScamWatchMonitor
 
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...SolarWinds
 
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksRachel Hamilton
 
Unrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALUnrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALWayne Anderson
 
Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!pdallen
 
People Screening-2014 review
People Screening-2014 reviewPeople Screening-2014 review
People Screening-2014 reviewKrzys Berkieta
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsCA Technologies
 

Ähnlich wie Preventing and Detecting Fraud in the Workplace (20)

Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
ACFE 2017 - Audit and Fraud Joining Forces
ACFE 2017 - Audit and Fraud Joining ForcesACFE 2017 - Audit and Fraud Joining Forces
ACFE 2017 - Audit and Fraud Joining Forces
 
Detecting and Preventing Fraud in Nonprofits
Detecting and Preventing Fraud in NonprofitsDetecting and Preventing Fraud in Nonprofits
Detecting and Preventing Fraud in Nonprofits
 
Who needs business intelligence?
Who needs business intelligence?Who needs business intelligence?
Who needs business intelligence?
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Callcredit's Fraud Summit 2016 - Plenary session
Callcredit's Fraud Summit 2016 - Plenary sessionCallcredit's Fraud Summit 2016 - Plenary session
Callcredit's Fraud Summit 2016 - Plenary session
 
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
 
Thieves Within: Preventing Fraud in Small & Medium-Sized Organizations
Thieves Within: Preventing Fraud in Small & Medium-Sized OrganizationsThieves Within: Preventing Fraud in Small & Medium-Sized Organizations
Thieves Within: Preventing Fraud in Small & Medium-Sized Organizations
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
Binary Scam Watch Monitor | Restriction Of Online Scam
Binary Scam Watch Monitor | Restriction Of Online ScamBinary Scam Watch Monitor | Restriction Of Online Scam
Binary Scam Watch Monitor | Restriction Of Online Scam
 
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
 
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
 
Unrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALUnrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINAL
 
Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!
 
People Screening-2014 review
People Screening-2014 reviewPeople Screening-2014 review
People Screening-2014 review
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Aml 161014061258
Aml 161014061258Aml 161014061258
Aml 161014061258
 
Aml 161014061258
Aml 161014061258Aml 161014061258
Aml 161014061258
 
AML
AMLAML
AML
 

Mehr von DecosimoCPAs

Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...
Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...
Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...DecosimoCPAs
 
Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...
Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...
Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...DecosimoCPAs
 
Just What is Forensic Accounting? - Sharon Hamrick & Pam Mantone
Just What is Forensic Accounting? - Sharon Hamrick & Pam MantoneJust What is Forensic Accounting? - Sharon Hamrick & Pam Mantone
Just What is Forensic Accounting? - Sharon Hamrick & Pam MantoneDecosimoCPAs
 
The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...
The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...
The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...DecosimoCPAs
 
Winning Business in Todays Market: Optimizing Bid Decisions - Joe Yearta
Winning Business in Todays Market: Optimizing Bid Decisions - Joe YeartaWinning Business in Todays Market: Optimizing Bid Decisions - Joe Yearta
Winning Business in Todays Market: Optimizing Bid Decisions - Joe YeartaDecosimoCPAs
 
Employee Benefit Plan Errors - Marshall Harvey
Employee Benefit Plan Errors - Marshall HarveyEmployee Benefit Plan Errors - Marshall Harvey
Employee Benefit Plan Errors - Marshall HarveyDecosimoCPAs
 
Accounting for Employee Benefit Plans - Cindy Lusk
Accounting for Employee Benefit Plans - Cindy LuskAccounting for Employee Benefit Plans - Cindy Lusk
Accounting for Employee Benefit Plans - Cindy LuskDecosimoCPAs
 
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill AcuffFraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill AcuffDecosimoCPAs
 
Revenue from Contracts with Customers- Tom Eiseman
Revenue from Contracts with Customers- Tom EisemanRevenue from Contracts with Customers- Tom Eiseman
Revenue from Contracts with Customers- Tom EisemanDecosimoCPAs
 
Financial Forecasts and Projections - Paul Beckman
Financial Forecasts and Projections - Paul BeckmanFinancial Forecasts and Projections - Paul Beckman
Financial Forecasts and Projections - Paul BeckmanDecosimoCPAs
 
Reporting Options for Small Businesses - Tom Eiseman
Reporting Options for Small Businesses - Tom EisemanReporting Options for Small Businesses - Tom Eiseman
Reporting Options for Small Businesses - Tom EisemanDecosimoCPAs
 
GAAP Accounting Update: A Review of Recent Changes in GAAP - Derek Daniel
GAAP Accounting Update: A Review of Recent Changes in GAAP - Derek DanielGAAP Accounting Update: A Review of Recent Changes in GAAP - Derek Daniel
GAAP Accounting Update: A Review of Recent Changes in GAAP - Derek DanielDecosimoCPAs
 
Accounting "Oopsies" - Jennifer Goodman
Accounting "Oopsies" - Jennifer GoodmanAccounting "Oopsies" - Jennifer Goodman
Accounting "Oopsies" - Jennifer GoodmanDecosimoCPAs
 
Valuation of Physician Practices - David Cranford, Shannon Farr
Valuation of Physician Practices - David Cranford, Shannon FarrValuation of Physician Practices - David Cranford, Shannon Farr
Valuation of Physician Practices - David Cranford, Shannon FarrDecosimoCPAs
 
Redstone Overview - Winning in Today's Market: Optimizing Opportunities
Redstone Overview - Winning in Today's Market: Optimizing Opportunities Redstone Overview - Winning in Today's Market: Optimizing Opportunities
Redstone Overview - Winning in Today's Market: Optimizing Opportunities DecosimoCPAs
 
Using Analytics to Detect Possible Fraud: Overview of Tools and Techniques
Using Analytics to Detect Possible Fraud: Overview of Tools and TechniquesUsing Analytics to Detect Possible Fraud: Overview of Tools and Techniques
Using Analytics to Detect Possible Fraud: Overview of Tools and TechniquesDecosimoCPAs
 
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...DecosimoCPAs
 
Forensics and Fraud: Red Flags and War Stories
Forensics and Fraud: Red Flags and War StoriesForensics and Fraud: Red Flags and War Stories
Forensics and Fraud: Red Flags and War StoriesDecosimoCPAs
 
Checklist presentations
Checklist presentationsChecklist presentations
Checklist presentationsDecosimoCPAs
 
What Was the FASB Thinking?
What Was the FASB Thinking? What Was the FASB Thinking?
What Was the FASB Thinking? DecosimoCPAs
 

Mehr von DecosimoCPAs (20)

Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...
Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...
Forensic Analysis of Financial Statements: Anything Look Odd to You? - Shanno...
 
Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...
Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...
Successfully Addressing Key Valuation Issues for Hedge Funds - Renee Ford & S...
 
Just What is Forensic Accounting? - Sharon Hamrick & Pam Mantone
Just What is Forensic Accounting? - Sharon Hamrick & Pam MantoneJust What is Forensic Accounting? - Sharon Hamrick & Pam Mantone
Just What is Forensic Accounting? - Sharon Hamrick & Pam Mantone
 
The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...
The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...
The Changing Landscape of Recruiting Physicians to Your Practice - David Cran...
 
Winning Business in Todays Market: Optimizing Bid Decisions - Joe Yearta
Winning Business in Todays Market: Optimizing Bid Decisions - Joe YeartaWinning Business in Todays Market: Optimizing Bid Decisions - Joe Yearta
Winning Business in Todays Market: Optimizing Bid Decisions - Joe Yearta
 
Employee Benefit Plan Errors - Marshall Harvey
Employee Benefit Plan Errors - Marshall HarveyEmployee Benefit Plan Errors - Marshall Harvey
Employee Benefit Plan Errors - Marshall Harvey
 
Accounting for Employee Benefit Plans - Cindy Lusk
Accounting for Employee Benefit Plans - Cindy LuskAccounting for Employee Benefit Plans - Cindy Lusk
Accounting for Employee Benefit Plans - Cindy Lusk
 
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill AcuffFraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
 
Revenue from Contracts with Customers- Tom Eiseman
Revenue from Contracts with Customers- Tom EisemanRevenue from Contracts with Customers- Tom Eiseman
Revenue from Contracts with Customers- Tom Eiseman
 
Financial Forecasts and Projections - Paul Beckman
Financial Forecasts and Projections - Paul BeckmanFinancial Forecasts and Projections - Paul Beckman
Financial Forecasts and Projections - Paul Beckman
 
Reporting Options for Small Businesses - Tom Eiseman
Reporting Options for Small Businesses - Tom EisemanReporting Options for Small Businesses - Tom Eiseman
Reporting Options for Small Businesses - Tom Eiseman
 
GAAP Accounting Update: A Review of Recent Changes in GAAP - Derek Daniel
GAAP Accounting Update: A Review of Recent Changes in GAAP - Derek DanielGAAP Accounting Update: A Review of Recent Changes in GAAP - Derek Daniel
GAAP Accounting Update: A Review of Recent Changes in GAAP - Derek Daniel
 
Accounting "Oopsies" - Jennifer Goodman
Accounting "Oopsies" - Jennifer GoodmanAccounting "Oopsies" - Jennifer Goodman
Accounting "Oopsies" - Jennifer Goodman
 
Valuation of Physician Practices - David Cranford, Shannon Farr
Valuation of Physician Practices - David Cranford, Shannon FarrValuation of Physician Practices - David Cranford, Shannon Farr
Valuation of Physician Practices - David Cranford, Shannon Farr
 
Redstone Overview - Winning in Today's Market: Optimizing Opportunities
Redstone Overview - Winning in Today's Market: Optimizing Opportunities Redstone Overview - Winning in Today's Market: Optimizing Opportunities
Redstone Overview - Winning in Today's Market: Optimizing Opportunities
 
Using Analytics to Detect Possible Fraud: Overview of Tools and Techniques
Using Analytics to Detect Possible Fraud: Overview of Tools and TechniquesUsing Analytics to Detect Possible Fraud: Overview of Tools and Techniques
Using Analytics to Detect Possible Fraud: Overview of Tools and Techniques
 
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...
 
Forensics and Fraud: Red Flags and War Stories
Forensics and Fraud: Red Flags and War StoriesForensics and Fraud: Red Flags and War Stories
Forensics and Fraud: Red Flags and War Stories
 
Checklist presentations
Checklist presentationsChecklist presentations
Checklist presentations
 
What Was the FASB Thinking?
What Was the FASB Thinking? What Was the FASB Thinking?
What Was the FASB Thinking?
 

Kürzlich hochgeladen

Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 

Kürzlich hochgeladen (20)

Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 

Preventing and Detecting Fraud in the Workplace

  • 1. Sharon P. Hamrick, CPA, CFF, CFE Senior Manager, Decosimo ASWA - Huntsville 2012
  • 2.  What is Fraud in the Workplace?  Occupational fraud and abuse is the use of one’s occupation for personal enrichment and can result from misconduct of employees, managers and/or officers. Common Asset Misappropriation Schemes –  Payroll fraud  Check tampering  Skimming  Expense account schemes  Fraudulent disbursements  False billing  Larceny  Inventory theft ASWA - Huntsville 2012
  • 8. 41% of perpetrators are employees; 38% of perpetrators are managers  Median losses of frauds by employees = $60,000; by managers = $182,000  Frauds lasted a median of 18 months before being detected  38% of perpetrators were between the ages of 36 and 45  Median losses by gender: Males $200,000; by female fraudsters $91,000  Executive/upper management caused largest fraud losses  49% of victim organizations in the study had not recovered any losses due to fraud ASWA - Huntsville 2012
  • 9. Opportunities Fraud Incentives/Pressures Rationalization ASWA - Huntsville 2012
  • 12. To n e a t t h e To p  Management’s behavior creates an environment in the company - that environment can breed or condone fraudulent activity.  Tips for management:  Create and promote a comprehensive fraud policy  Implement an entity specific code of ethics  Consider a reporting hotline ASWA - Huntsville 2012
  • 13. An organizational wide Fraud Policy can send a clear message that workplace fraud will not be tolerated.  Scope of Policy  Identify Behavior That Constitute Fraud  Assign Responsibility for Fraud Investigation  Reiterate Confidentiality  Develop Procedures for Reporting Fraud  Consequences and Corrective Action ASWA - Huntsville 2012
  • 14. Ethical Mind Legal Moral Set & Behavior ASWA - Huntsville 2012
  • 15. According to ACFE Reduces Fraud by 50%  Effective Method of Deterrence  SOX requires anonymity for whistleblowers  Outsourcing to third parties is an option  24 Hours/365  Skilled Interviewer ASWA - Huntsville 2012
  • 16. No two organization are exactly alike!  Knowing your company-specific risk factors can help in fraud prevention.  Size  Types of products and services  Ownership  Financing  Banking relationships  Financial reporting requirements ASWA - Huntsville 2012
  • 17. Human Resources practices and procedures can be very effective tools in the effort to prevent Workplace Fraud  Verify references, work experience and education  Criminal records checks  Annual employee evaluations  Permission for drug, criminal and financial checks if company policy or position requires ASWA - Huntsville 2012
  • 18. Internal Controls  A thoughtfully designed and effectively implemented internal control structure is essential to prevent ongoing and pervasive Workplace Fraud from occurring and going undetected.  Segregation of duties between recording, asset custody and reporting  Supervision and oversight by management and board of directors  External checks  Monitoring to make sure internal controls continue to work over time ASWA - Huntsville 2012
  • 20.  Your company’s digital assets are perhaps some of its most valuable. Help shield them from Workplace Fraud with effective IT controls in place.  Physical access to servers and computer center controlled  Passwords secure and regularly changed  Access only to necessary software modules  Computer records maintained of log-ins;  Reports generated of failed log-in attempts and maximum limit on number of log-in attempts ASWA - Huntsville 2012
  • 21. Saves Money Creates Fraud Awareness Enhanced Reputation Compliance with SOX ASWA - Huntsville 2012
  • 26. Behavioral Red Flags Exhibited  81% of fraudsters exhibited at least one of the listed behavioral red flags:  36% Living beyond their means  27% with financial difficulties  19% with unusually close associations with vendors or customers  18% had excessive control issues with their duties ASWA - Huntsville 2012
  • 28. Analytical Red Flags  Recurring negative cash flows from operations  Unusual general journal entries or unusual transactions, especially close to end of a period  Significant related party transactions not in the ordinary course of business  Abnormal profitability when compared to similar companies in the same industry  Abnormal gross profit margin or growth in gross profit margin when compared to similar companies in the same industry  Management override ASWA - Huntsville 2012
  • 29. Other Data Analytics  Trend analysis – comparison to prior periods  Comparison to forecasts, budgets  Vertical and horizontal ratio analysis  Correlation analysis  Searches for duplicates  Compliance verification  Aging  Benford’s law  Beneish m-score model  Dechow-Dichev accrual quantity ASWA - Huntsville 2012
  • 30.  Duplicate payments tests  Benford’s Law analysis  Rounded amount invoices  Invoices just below approval levels  Abnormal invoice volume activity  Rapid increase  High variance  Vendors with sequential invoice Numbers or where numbers and dates are inconsistent  Merge vendor and employee files ASWA - Huntsville 2012
  • 31. Examples of Phishing Emails ASWA - Huntsville 2012
  • 33. What is OPSEC? Military term • Analytic process used to deny an meaning adversary information Operational Security • Risk assessment tool Universal • Examines day-to-day activities concepts • Controls information • Equally applicable to individuals Applied in any and businesses in general environment • Identifies security risks ASWA - Huntsville 2012
  • 34. OPSEC Is Not: An expensive A strict set of and time- rules and consuming procedures process Used only by the government or military ASWA - Huntsville 2012
  • 35. Consequences Loss of customer trust and business Possible law suits Legal issues  Gramm-Leach-Bliley Act  Fair Credit Reporting Act  Federal Trade Commission Act  Health Insurance Portability and Accountability Act (HIPPA)  Family Educational Rights and Privacy Act  Drivers Privacy Protection Act  Privacy Laws  State Laws ASWA - Huntsville 2012
  • 36. Bottom Line – Companies must develop and maintain reasonable procedures to protect sensitive information ASWA - Huntsville 2012
  • 37. You and Your Employees Know the Know what threat to protect Know how to protect ASWA - Huntsville 2012
  • 38. Know the Threat-Who Adversary – the Bad Guy Terrorist groups Criminals Organized crime Hackers/Crackers Insider threats – generally more costly and often overlooked ASWA - Huntsville 2012
  • 39. What to do if you have suspicions ASWA - Huntsville 2012
  • 40. What resources do you have at your disposal for guidance Outside CPAs Attorney Internal audit Law enforcement ASWA - Huntsville 2012
  • 41. Legal restrictions and ramifications Does your company require employees sign a fraud policy statement Chain of custody of documents, paper and otherwise Suspect’s rights to privacy – Their work area Interview do’s and don'ts ASWA - Huntsville 2012
  • 42. What a CFE can do if you have suspicions Investigate on behalf of the board of directors Conduct interviews Perform data analysis, data mining Search computer records Search sources of outside information related to the suspect ASWA - Huntsville 2012
  • 43. Sources  Cornell University IT: Phish Bowl  www.it.cornell.edu/security/safety/phishbowl.cfm  Protect your business by understanding common social engineering techniques, Small Business Blog  http://googlesmb.blogspot.com/2012/04/protect-your- business-by-understanding.html  Microsoft  www.microsoft.com/security/online-privacy/phishing- symptoms.aspx ASWA - Huntsville 2012
  • 44. Contact Info Sharon P. Hamrick, CPA•CFF, CFE Senior Manager, Decosimo Advisory Services sharonhamrick@decosimo.com www.linkedin.com/in/sharonhamrick 423-756-7100 The contents and opinions contained in this article are for informational purposes only. The information is not intended to be a substitute for professional accounting counsel. Always seek the advice of your accountant or other financial planner with any questions you may have regarding your financial goals. ASWA - Huntsville 2012